PrepAway - Latest Free Exam Questions & Answers

Author: admin

In order to make sure of this, what action should you perform?

You work as an IT professional in an international corporation named Wiikigo. In the company, your job is to configure Microsoft Internet Security and Acceleration Server 2006. And you are experienced in performing and managing networks and operational systems. In addition, you are skilled at deploying ISA Server 2006, configuring firewall settings, and optimizing performance of the ISA Server 2006 cache. There is a head office and two branch offices in the company. Each office is configured with a server. ISA Server 2006 Enterprise Edition is run by the server. The ISA Servers connect to the Internet and offer Internet access to users. There is a Configuration Storage server in the head office. In the head office, the ISA Server is configured as a firewall and as a VPN gateway to the Internet. In the branch offices, the ISA Servers use an L2TP/IPsec site-to-site VPN tunnel to connect to the head office. You must make sure that in the event that the VPN tunnel is not available, the Configuration Storage server can be accessed by the ISA Servers in the branch offices. In order to make sure of this, what action should you perform? (Choose more than one)

From the following four ISA roles, which one should be assigned to the support technician?

You work as an IT professional in an international corporation named Wiikigo. In the company, your job is to configure Microsoft Internet Security and Acceleration Server 2006. And you are experienced in performing and managing networks and operational systems. In addition, you are skilled at deploying ISA Server 2006, configuring firewall settings, and optimizing performance of the ISA Server 2006 cache. There is a main office and a branch office in your company. A single ISA enterprise is contained by the network. Two ISA Server 2006 Enterprise Edition arrays are included by the ISA enterprise, and the two arrays are respectively named Array01 and Array02. A support technician should be enabled to have log information monitored for Array01. The least amount of permissions will be offered to finish the task. From the following four ISA roles, which one should be assigned to the support technician?

Which action should be configured?

You work as an IT professional in an international corporation named Wiikigo. In the company, your job is to configure Microsoft Internet Security and Acceleration Server 2006. And you are experienced in performing and managing networks and operational systems. In addition, you are skilled at deploying ISA Server 2006, configuring firewall settings, and optimizing performance of the ISA Server 2006 cache. The company installs ISA Server 2006 as its firewall. Microsoft Outlook 2003 is run by all of the company’s portable computers. According to the company’s written security policy, the company wants to have all e-mail communications to the Microsoft Exchange Server 2003 computer over the Internet encrypted. You are required to make sure that Outlook 2003 should be utilized by all employees, no matter e-mail in the office is utilized or e-mail remotely over the Internet is utilized. Which action should be configured?

So what action should you perform to achieve this?

You work as an IT professional in an international corporation named Wiikigo. In the company, your job is to configure Microsoft Internet Security and Acceleration Server 2006. And you are experienced in performing and managing networks and operational systems. In addition, you are skilled at deploying ISA Server 2006, configuring firewall settings, and optimizing performance of the ISA Server 2006 cache. There are two ISA Server 2006 computers in the company network. The two computers are respectively named ISA01 and ISA02. ISA01 has been configured as the Enterprise Configuration Storage server. ISA01 and ISA02 belong to a single enterprise array. There is a Web server named Web01 that is located in the perimeter network. On Web01, an external Web site is published by you. On the array, an internal Web site is published by you. ISA01 and ISA02 are each configured with a RAID-5 volume. On ISA01, a cache drive is enabled. On ISA01 and ISA02, Cache Array Routing Protocol (CARP) is enabled on the Internal network. You receive report from users saying that it is quite slow to access Web01. You notice that on ISA01 and Web01, physical disk usage is extremely high. ISA Server 2006 needs to be configured to permit faster access to Web01. So what action should you perform to achieve this?

Which action should be performed?

You work as an IT professional in an international corporation named Wiikigo. In the company, your job is to configure Microsoft Internet Security and Acceleration Server 2006. And you are experienced in performing and managing networks and operational systems. In addition, you are skilled at deploying ISA Server 2006, configuring firewall settings, and optimizing performance of the ISA Server 2006 cache. An ISA Server 2006 computer named ISA01 is included by your network.ISA01 is configured with two network adapters. The company sets the external network adapter to connect to the Internet, and configure the internal network adapter to connect to the Internal network. The Internal network address ranges from 10.0.0.0 to 10.0.0.255. The VPN assignment is defined as a static pool, and the static pool extends from 10.0.1.0 through 10.0.1.255. VPN client access is enabled. The VPN configuration is tested and a VPN connection to ISA01 is created successfully from an external Windows XP Professional client computer, and the computer is named XP1. You find a problem that external Web sites cannot be browsed from XP1, while it has a VPN session with ISA01. You verify that external Web sites can be browsed by internal client computers. You need to ensure that external Web sites can be browsed by VPN clients while ISA01 is connected. In addition, you should make sure that all requests for external Web sites from VPN clients are handled through ISA01.Which action should be performed?

So what action should you perform to accomplish your task?

You work as an IT professional in an international corporation named Wiikigo. In the company, your job is to configure Microsoft Internet Security and Acceleration Server 2006. And you are experienced in performing and managing networks and operational systems. In addition, you are skilled at deploying ISA Server 2006, configuring firewall settings, and optimizing performance of the ISA Server 2006 cache. There is a server in the company network. ISA Server 2006 is run by this server. Internal users are provided with forward Web caching by the ISA Server. The Web site of your company is hosted at www.cpandl.com by a Web hosting company. www.cpandl.com is used as the default home page by the Web browser on internal client computers. Now you receive an order from the company management. According to the company requirement, you must make sure that www.cpandl.com can be accessed by internal users. The company also requires that the usage of Internet bandwidth is reduced to the least when you try to achieve this. So what action should you perform to accomplish your task?

So what action should you perform?

You work as an IT professional in an international corporation named Wiikigo. In the company, your job is to configure Microsoft Internet Security and Acceleration Server 2006. And you are experienced in performing and managing networks and operational systems. In addition, you are skilled at deploying ISA Server 2006, configuring firewall settings, and optimizing performance of the ISA Server 2006 cache. The network is composed of an Active Directory domain. All computers in the network belong to the Active Directory domain. There is a server in the network. This server runs ISA Server. The server has been configured as a firewall and as a Web proxy. User access to HTTP, HTTPS, FTP, and RDP has been defined by the existing Internet access rule. The user set of the Internet access rule is changed by you from All Users to All Authenticated Users. You receive report from users saying that they fail to use the Remote Desktop client to connect to remote computers, but they are able to use a Web browser to access the Internet. Since you are the technical support, you have to make sure that on the Internet, RDP connections to servers on the Internet can be established by users. So what action should you perform?

So what action should you perform?

You work as an IT professional in an international corporation named Wiikigo. In the company, your job is to configure Microsoft Internet Security and Acceleration Server 2006. And you are experienced in performing and managing networks and operational systems. In addition, you are skilled at deploying ISA Server 2006, configuring firewall settings, and optimizing performance of the ISA Server 2006 cache. There is a server named ISA01 for you. You have Windows Server 2003 Service Pack 1 installed on ISA01. On ISA01, you have ISA Server 2006 deployed as a firewall. According to the requirement of new security policy of the company, only required services can be run by servers that connect directly to the Internet. Therefore, you must make sure that the new security policy is met.
So what action should you perform?

Which action should you perform?

You work as an IT professional in an international corporation named Wiikigo. In the company, your job is to configure Microsoft Internet Security and Acceleration Server 2006. And you are experienced in performing and managing networks and operational systems. In addition, you are skilled at deploying ISA Server 2006, configuring firewall settings, and optimizing performance of the ISA Server 2006 cache. ISA Server 2006 is installed on a computer, and three network adapters are included by the computer. The three network adapters are respectively connected to the Internet, the Internal network, and a perimeter network.
The perimeter network adapter and the internal network adapter connect the Private address networks. You apply the 3-Leg Perimeter network template to configure ISA Server. The 3-Leg Perimeter Network Template wizard is run by you. The following changes can be made to the firewall policy.
First, an access rule can be created to permit all traffic between the Internal network and the Internet. Second, an access rule can be created to permit all traffic between the Internal network and the perimeter network.
Third, an access rule can be created to permit SMTP traffic from an SMTP server on the perimeter network to a Microsoft Exchange Server computer on the Internal network.
Fourth, a server publishing rule can be created to permit SMTP traffic from the External network to the SMTP server on the perimeter network. It is reported by the uses that the e-mail messages from users outside of the Internal network can not be received.
You should make sure the users can receive e-mail messages from other users on the Internet.
And a server publishing rule will not be created.
Which action should you perform?

From the following four types of content, which one should be contained in the report to finish the task?

You work as an IT professional in an international corporation named Wiikigo. In the company, your job is to configure Microsoft Internet Security and Acceleration Server 2006. And you are experienced in performing and managing networks and operational systems. In addition, you are skilled at deploying ISA Server 2006, configuring firewall settings, and optimizing performance of the ISA Server 2006 cache. A single server is included by your network, and ISA Server 2006 is run by the single server. A report should be created. In the report, the client operating systems that are most frequently utilized to connect to the ISA Server is listed. From the following four types of content, which one should be contained in the report to finish the task?