PrepAway - Latest Free Exam Questions & Answers

Author: admin

So what action should you perform next?

You work as an IT professional in an international corporation named Wiikigo. In the company, your job is to configure Microsoft Internet Security and Acceleration Server 2006. And you are experienced in performing and managing networks and operational systems. In addition, you are skilled at deploying ISA Server 2006, configuring firewall settings, and optimizing performance of the ISA Server 2006 cache. There is a server in the network. ISA Server 2006 is run by this server. On the ISA Server, a cache drive is defined by you. Now you receive reports from users saying that outdated information is contained in the external Web site www.wiikigoinc.com. On the ISA Server, the Cachedir.exe program is installed by you. You run In order to make you be able to mark objects in the cache as obsolete, you have Cachedir.exe run on the ISA Server. You are not able to find www.wiikigoinc.com listed in the cache. www.wiikigoinc.com needs to be marked as obsolete in the cache. So what action should you perform next?

So what action should you perform?

You work as an IT professional in an international corporation named Wiikigo. In the company, your job is to configure Microsoft Internet Security and Acceleration Server 2006. And you are experienced in performing and managing networks and operational systems. In addition, you are skilled at deploying ISA Server 2006, configuring firewall settings, and optimizing performance of the ISA Server 2006 cache. There is a single ISA Server 2006 computer in the network. This computer is named ISA01. All Internet access for the local network occurs through ISA01. A Web server named S01 is contained in the network. S01 has been configured as a SecureNAT client. A Web application runs on S01 that communicates with an external Web site named www.wiikigo.com.
ISA01 is configured with two access rules for outbound HTTP access. The two rules are respectively named HTTP Access 01 and HTTP Access 02. HTTP Access 01 has been configured to use the All Authenticated Users user set as a condition. HTTP Access 02 has been configured to use the All Users user set as a condition, and it limits outbound HTTP traffic to the IP address of S01. You find that www.wiikigo.com cannot be accessed by the Web application. But you are sure that external Web sites can be accessed by users. At the time that the Web application communicates with www.wiikigo.com, it needs to be allowed to use anonymous credentials. Besides, at the time that all external Web sites are accessed by all users, authentication on ISA01 is required for all of them.
So what action should you perform?

What action should you perform?

You work as an IT professional in an international corporation named Wiikigo. In the company, your job is to configure Microsoft Internet Security and Acceleration Server 2006. And you are experienced in performing and managing networks and operational systems. In addition, you are skilled at deploying ISA Server 2006, configuring firewall settings, and optimizing performance of the ISA Server 2006 cache. There is a head office and five branch offices in the company. The six offices use high-speed network links to connect. The head office is the only location that has an Internet connection. There is a server named ISA01 in the head office. You plan to have ISA Server 2006 deployed on ISA01. Two network adapters are contained in ISA01. They are respectively named NA01 and NA02. NA1 is connected to the internal network and NA02 is connected to the Internet. You intend to have ISA01 configured to cache Web content for all users and to have all computers defined as Web Proxy clients. You must make sure that the Internet can be accessed by users from the head office and the branch offices. What action should you perform?

So what action should you perform to accomplish your task?

You work as an IT professional in an international corporation named Wiikigo. In the company, your job is to configure Microsoft Internet Security and Acceleration Server 2006. And you are experienced in performing and managing networks and operational systems. In addition, you are skilled at deploying ISA Server 2006, configuring firewall settings, and optimizing performance of the ISA Server 2006 cache. There is a server named S01 for you. The 64-bit version of Windows Server 2003 is run by S01. Now you receive an order from the company manager. On S01, ISA Server 2006 needs to be installed as required by the company. Since you are the technical support, the company assigns this task to you. So what action should you perform to accomplish your task?

So what action should you perform?

You work as an IT professional in an international corporation named Wiikigo. In the company, your job is to configure Microsoft Internet Security and Acceleration Server 2006. And you are experienced in performing and managing networks and operational systems. In addition, you are skilled at deploying ISA Server 2006, configuring firewall settings, and optimizing performance of the ISA Server 2006 cache. There is a head office and branch office in the company. There is a server named ISA01 in the head office. ISA Server 2004 is run by ISA01. There is a server named ISA02 in the branch office. ISA Server 2004 is run by ISA02. 5,000 desktop client computers are contained in the network. The desktop client computers have installed Firewall Client for ISA Server 2000. ISA01 is configured to only permit encrypted Firewall client connections after you have ISA01 upgraded to ISA Server 2006. You receive reports from users in the head office saying that they cannot use Microsoft Office Outlook to access external e-mail services. Since you are the technical support, you have to solve this problem for them. You must make sure that users in the head office are able to use Outlook to access external e-mail servers. So what action should you perform?

What should you do?

Your network contains a single ISA Server 2006 computer named ISA1. ISA1 is not yet configured to allow inbound VPN access.
You deploy a new application named App1. The server component of App1 is installed on an internal server named Server1. The client component of App1 is installed on employee and partner computers.
Employees and partners will establish VPN connections when they use App1 from outside the corporate network.
You identify the following requirements regarding VPN connections to the corporate network. Employees must be allowed access to only Server1, three file servers, and an internal Web server named Web1.
Employees must have installed all current software updates and antivirus software before connecting to any internal resources.
Partners must be allowed access to only Server1.
You must not install any software other than the App1 client on any partner computers. You need to plan the VPN configuration for the company.
What should you do?

What should you do?

Your network contains an ISA Server 2006 array. The array contains six members. You enable Cache Array Routing Protocol (CARP) so that outbound Web requests are resolved within the array. Soon after you enable CARP on the array, Web users on the corporate network report that Internet access is slower than normal. You use Network Monitor to check network traffic patterns on each of the ISA Server 2006 array members. You discover that there is very high network utilization on the intra-array network. You need to reduce the amount of intra-array traffic.
What should you do?

What should you do?

Your network contains a single ISA Server 2006 computer named ISA1. All Internet access for the local network occurs through ISA1.
The network contains a Web server named Server1. Server1 is configured as a SecureNAT client. A Web application runs on Server1 that communicates with an external Web site named www.contoso.com.
You configure ISA1 with two access rules for outbound HTTP access. The rules are named HTTP Access 1 and HTTP Access 2.
HTTP Access 1 is configured to use the All Authenticated Users user set as a condition. HTTP Access 2 is configured to use the All Users user set as a condition, and it restricts outbound HTTP traffic to the IP address of Server1.
You verify that users can access external Web sites. However, you discover that the Web application cannot access www.contoso.com.
You need to allow the Web application to use anonymous credentials when it communicates with www.contoso.com. You also need to require authentication on ISA1 for all users when they access all external Web sites.
What should you do?

What should you do?

Your network consists of a single Active Directory domain. The network contains an ISA Server 2006 computer named ISA1. Client computers on the network consist of Windows XP Professional computers, UNIX workstations, and Macintosh portable computers. All client computers are domain members. You configure ISA1 by using the Edge Firewall network template. You manually configure ISA1 with access rules to allow HTTP and HTTPS access to the Internet. You configure ISA1 to require all users to authenticate. You need to provide Internet access for all client computers on the network while preventing unauthorized non-company users from accessing the Internet through ISA1. You also want to reduce the amount of administrative effort needed when you configure the client computers. What should you do?

What should you do?

Your network consists of a single Active Directory domain named contoso.com. The network contains an ISA Server 2000 computer named ISA1.
All client computers have the ISA Server 2000 Firewall Client software installed. Client computers are configured to use an internal DNS server. Two Windows Server 2003 computers named App1 and App2 run a Web-based application that is used to process company data.
You configure ISA1 with protocol rules to allow HTTP, HTTPS, RDP, POP3, and SMTP access. The list of domain names available on the Internal network on ISA1 contains the following entries.
� *.south.contoso.com
� *.north.contoso.com
� *.east.contoso.com
� *.west.contoso.com
You perform an in-place upgrade of ISA1 by using the ISA Server 2006 Migration Tool. When you use Network Monitor on ISA1, you discover that client requests for App1 and App2 are being passed through ISA1.
You need to provide a solution that will allow clients to directly access company data on App1 and App2.
What should you do?