PrepAway - Latest Free Exam Questions & Answers

Author: admin

From the following four network objects, which one should be enabled by you to finish the task?

You work as an IT professional in an international corporation named Wiikigo. In the company, your job is to configure Microsoft Internet Security and Acceleration Server 2006. And you are experienced in performing and managing networks and operational systems. In addition, you are skilled at deploying ISA Server 2006, configuring firewall settings, and optimizing performance of the ISA Server 2006 cache. In your company, you work as the network administrator. An ISA Server 2006 computer named ISA01 is contained by the network, and the ISA01 was recently installed. According to the company’s written security policy, all HTTP traffic should go through ISA01. A new HR Web site is created by the human resources (HR) department and the new HR Web site is utilized by the employees to access and manage their benefits. Its own Windows Server 2003 Web server and its own server publishing rule on ISA01 are contained by the HR Web site. According to the security requirements, the HR Web site should not be accessed from an untrusted client computer by the employees. The server publishing rule should be set to satisfy the security requirements. From the following four network objects, which one should be enabled by you to finish the task?

So what action should you perform?

You work as an IT professional in an international corporation named Wiikigo. In the company, your job is to configure Microsoft Internet Security and Acceleration Server 2006. And you are experienced in performing and managing networks and operational systems. In addition, you are skilled at deploying ISA Server 2006, configuring firewall settings, and optimizing performance of the ISA Server 2006 cache. There is an ISA Server 2006 array in the company network. Internet access and Web caching is offered by the array. Your corporate Web site is hosted at www.luxware.com by a Web hosting company. This morning you receive a report from the webmaster.
He tells you that it seems that the changes do not take effect at the time that he has contend updated on the Web site the changes. But according to the indication of the Web page authoring tool, updates of the pages succeeded. In order to make sure that recent changes to the content on the Web site can be viewed by you, ISA Server needs to be configured. So what action should you perform?

Which alias (CNAME) record should be created?

You work as an IT professional in an international corporation named Wiikigo. In the company, your job is to configure Microsoft Internet Security and Acceleration Server 2006. And you are experienced in performing and managing networks and operational systems. In addition, you are skilled at deploying ISA Server 2006, configuring firewall settings, and optimizing performance of the ISA Server 2006 cache. There is an Active Directory forest in the company network. Three domains are contained in this forest. The root domain and the child domains are respectively named wiikigo.com, domain01.wiikigo.com and domain02.wiikigo.com. Forward Web caching for all domain computers is provided with forward Web caching by a single ISA Server 2006 computer named ISA01. ISA01 belongs to domain02.wiikigo.com. In DNS, a host (A) record is created by you for isa01.domain02.wiikigo.com. You must make sure that ISA01 is used by all computers as their Web proxy. Which alias (CNAME) record should be created?

So what action should you perform?

You work as an IT professional in an international corporation named Wiikigo. In the company, your job is to configure Microsoft Internet Security and Acceleration Server 2006. And you are experienced in performing and managing networks and operational systems. In addition, you are skilled at deploying ISA Server 2006, configuring firewall settings, and optimizing performance of the ISA Server 2006 cache. There is a single Active Directory domain in the company network. A server named ISA01 is contained in the network. ISA Server 2006 is run by ISA01. ISA01 provides Web Proxy applications and Winsock Proxy applications with Internet access. ISA01 connects to two internal network segments. The two segments are respectively named Segment 01 and Segment 02. All client computers are joined to the domain. The diagram below shows the configuration of the network. Both network segments are able to access Active Directory services, DNS services, and DHCP services. Access to the Internet from both network segments is allowed by an access rule. In DNS, a Web Proxy Automatic Discovery (WPAD) entry is configured to resolve to the internal IP address of the ISA Server on Segment 01. You receive report from users on Segment 02 saying that the Internet cannot be accessed by them. Since you are the technical support, you have to solve this problem. The network should be configured to have Internet access enabled from Segment 02. So what action should you perform?

So what action should you perform to achieve this goal?

You work as an IT professional in an international corporation named Wiikigo. In the company, your job is to configure Microsoft Internet Security and Acceleration Server 2006. And you are experienced in performing and managing networks and operational systems. In addition, you are skilled at deploying ISA Server 2006, configuring firewall settings, and optimizing performance of the ISA Server 2006 cache. There is a server in the network. ISA Server 2006 is run by this server. The ISA Server has 4 GB of RAM. A Microsoft Office SharePoint Server 2007 portal named Portal01 is used by the company. A Web Publishing rule is created by you. Users are allowed to access Portal01 by this Web Publishing rule. On the ISA Server, a cache drive is defined by you. Now you receive report from users saying that access to Portal01 is quite slow. Since you are the technical support, you have to solve this problem. That is to say, the amount of time that users spend in accessing content on Portal01 should be cut down. So what action should you perform to achieve this goal?

So what action should you perform?

You work as an IT professional in an international corporation named Wiikigo. In the company, your job is to configure Microsoft Internet Security and Acceleration Server 2006. And you are experienced in performing and managing networks and operational systems. In addition, you are skilled at deploying ISA Server 2006, configuring firewall settings, and optimizing performance of the ISA Server 2006 cache. There is an ISA Server 2004 Enterprise Edition array in the company network. Two servers are contained array contains. The two servers are respectively named ISA01 and ISA02. Both ISA01 and ISA02 have a Configuration Storage server installed locally and are replicas of the same array. The company requires that both ISA01 and ISA02 should be upgraded to ISA Server 2006. The upgrade must reduce interruptions to Internet access and cut down hardware costs Since you are the technical support, the company assigns this task to you. So what action should you perform?

Which action should you perform next?

You work as an IT professional in an international corporation named Wiikigo. In the company, your job is to configure Microsoft Internet Security and Acceleration Server 2006. And you are experienced in performing and managing networks and operational systems. In addition, you are skilled at deploying ISA Server 2006, configuring firewall settings, and optimizing performance of the ISA Server 2006 cache. An ISA Server array is included by your network. Two computers are contained by the array, and the two computers are respectively named ISA01 and ISA02. ISA Server 2006 Enterprise Edition is run by the two computers. A single Configuration Storage server is contained by the array, and it is named CSS01. The configuration of the ISA enterprise is backed up to a file, and the file is named Backup.xml. CSS01 cannot work successfully. A new server named CSS02 is installed. You are required to make sure that the ISA Server logging features can be accessed and the ISA firewall policy can be changed. ISA Server 2006 is installed on CSS02. You utilize the Import (Restore) option to start the Import Wizard. Which action should you perform next?

Which action should be performed to achieve the goal?

You work as an IT professional in an international corporation named Wiikigo. In the company, your job is to configure Microsoft Internet Security and Acceleration Server 2006. And you are experienced in performing and managing networks and operational systems. In addition, you are skilled at deploying ISA Server 2006, configuring firewall settings, and optimizing performance of the ISA Server 2006 cache. Two ISA Server 2006 Enterprise Edition computers are included by your network and the two computers are respectively named ISA01 and ISA02. ISA01 and ISA02 are members of an ISA Server 2006 array. The array is set to have outgoing Web requests cached. The array is set so as to have the cached Web content distributed between ISA01 and ISA02. The traffic on the intra-array network should be cut to the least. Which action should be performed to achieve the goal?

From the following four sets of access rules, which one should be utilized?

You work as an IT professional in an international corporation named Wiikigo. In the company, your job is to configure Microsoft Internet Security and Acceleration Server 2006. And you are experienced in performing and managing networks and operational systems. In addition, you are skilled at deploying ISA Server 2006, configuring firewall settings, and optimizing performance of the ISA Server 2006 cache. A server is included by your network, and ISA Server is run by the server. The ISA Server is one of an Active Directory domain. Internet access is offered by the ISA Server. And the ISA Server is the default gateway for all computers on the network.
Your company configures the Web browsers proxy settings by utilizing Web Proxy Automatic Discovery (WPAD).
The following objects are created on the server. One should be two user sets named Internet Users and Admin Internet Users, and another should be a URL set named Blocked Sites that includes the URLs of Internet sites to which users should be blocked The Firewall Policy rules on the ISA Server should be configured to satisfy the following requirements.
First, members of Internet Users should be enabled to get access to Internet Web sites, except for the sites
in the Blocked Sites URL set.
Second, members of Admin Internet Users should be enabled to access all Internet Web sites. Third, HTTP, HTTPS, and FTP must be accessible for all allowed sites. From the following four sets of access rules, which one should be utilized?

So what is your solution?

You work as an IT professional in an international corporation named Wiikigo. In the company, your job is to configure Microsoft Internet Security and Acceleration Server 2006. And you are experienced in performing and managing networks and operational systems. In addition, you are skilled at deploying ISA Server 2006, configuring firewall settings, and optimizing performance of the ISA Server 2006 cache. There is a server in the company network. ISA Server is run by this network. The ISA Server has been configured as a firewall and as a VPN gateway. Another company named Luxware is purchased by your company. A third-party firewall and VPN solution is used by Luxware. According to the company requirement, resources on both networks should be able to be accessed by users from both networks. Since you are the technical support, the company asks you to work out a solution that offers TCP/IP connectivity between the two networks. So what is your solution?