PrepAway - Latest Free Exam Questions & Answers

Category: 70-351

Exam 70-351: TS: Microsoft Internet Security and Acceleration (ISA) Server 2006, Configuring

What should you do?

Your network contains a single computer that runs ISA Server 2006. You have a server named Server1. Server1 contains a security application that scans host computers on a remote network.
The security application successfully scans some computers on the remote network, and then the ISA Server blocks all traffic for Server1.
You need to ensure that the security application on Server1 can successfully scan all computers on the remote network.
What should you do?

What should you do?

Your network consists of a single Active Directory domain. The domain contains one ISA Server 2006 Enterprise Edition array. The array contains two servers named ISA1 and ISA2. Both servers have the Configuration Storage server role installed. Both servers connect to each other by using dedicated network adapters named Adapter1 and Adapter2. You enable integrated Network Load Balancing for the array. You need to ensure that changes to the firewall policy are replicated between ISA1 and ISA2.
You must not disable Network Load Balancing.
What should you do?

What should you do?

Your network contains a server that runs ISA Server 2006. Your company uses an extranet Web site. You create a Web Publishing rule to provide user access to the extranet.
The Web Publishing rule uses SSL bridging.
You define a cache drive on the ISA Server.
You need to prevent encrypted information from being cached on the ISA Server.
What should you do?

What should you do?

Your network contains a server that runs ISA Server 2006. The ISA Server provides Internet access. The ISA Server also has Web caching enabled and uses the default settings for all other cache settings.
The ISA Server contains 4 GB of RAM, one main hard disk drive, and three spare hard disk drives.
You need to configure the ISA Server to optimize the performance of the cache. You must provide the maximum amount of storage space for the cache.
What should you do?

What should you do?

Your network contains an ISA Server 2006 array. The array provides Internet access and Web caching services.
A Web cache database exists on the ISA Server. The Web cache database uses the default settings.
Users access an external Web site daily. The Web site contains several large graphics. The domain name for the Web site is www.contoso.com. The Web site is accessible by using HTTP and HTTPS.
Some users report that the Web site takes a long time to load. You need to ensure that all users can access the Web site from the Web cache.
What should you do?

How should you configure authentication for the Web listener and the Web publishing rule?

Your network contains a server that runs ISA Server 2006. The ISA Server provides reverse proxy services.
The network also contains a Web server that runs Internet Information Services (IIS). The Web server requires user authentication.
You need to configure the ISA Server to provide access to the Web server. You want to achieve this goal while meeting the following requirements:
Authenticates inbound traffic from applications that pass through the reverse proxy. Implements a two-factor authentication system for remote access to the Web server. Does not use Windows passwords for to remote access authentication. Prompts users for authentication only once per session. You create a Web listener. You create a Web publishing rule that publishes the Web server. How should you configure authentication for the Web listener and the Web publishing rule?

What should you do?

Your network contains an ISA Server Enterprise Edition array. The array provides publishing and reverse proxy services. To ensure redundancy, the array contains two member servers. The array has Network Load Balancing configured on the external network only. You have a terminal server on the internal network. You install a certificate on the terminal server and configure the terminal server to use Secure Sockets Layer (SSL) as the security layer.
You need to configure the array to provide remote access to the terminal server.
What should you do?

Which action should be performed?

You work as an IT professional in an international corporation named Wiikigo. In the company, your job is to configure Microsoft Internet Security and Acceleration Server 2006. And you are experienced in performing and managing networks and operational systems. In addition, you are skilled at deploying ISA Server 2006, configuring firewall settings, and optimizing performance of the ISA Server 2006 cache. There is a server in your company, and ISA Server 2006 is run by the server. Web Proxy services are provided forward by the ISA Server for all users. An SQL database server is utilized by the ISA Server for the Firewall logs and the Web Proxy logs. The SQL database cannot work successfully. It is reported by the users that the Internet is not available. The ISA Server should be set to make sure that the users can get access to Internet when the SQL database fails. Which action should be performed?

Which action should be performed?

You work as an IT professional in an international corporation named Wiikigo. In the company, your job is to configure Microsoft Internet Security and Acceleration Server 2006. And you are experienced in performing and managing networks and operational systems. In addition, you are skilled at deploying ISA Server 2006, configuring firewall settings, and optimizing performance of the ISA Server 2006 cache. A server that runs ISA Server 2006 is included by your network. Microsoft Exchange Server 2007 is run by another server. The company has set Outlook Web Access (OWA) on the Exchange server to utilize Basic authentication. External user’s access should be provided to OWA on the Exchange Server. And the company intends to require the clients for re-authentication if their session is not active for a long period of time. Which action should be performed?


Page 3 of 1012345...10...Last »