PrepAway - Latest Free Exam Questions & Answers

Category: 70-351

Exam 70-351: TS: Microsoft Internet Security and Acceleration (ISA) Server 2006, Configuring

So what action should you perform?

You work as an IT professional in an international corporation named Wiikigo. In the company, your job is to configure Microsoft Internet Security and Acceleration Server 2006. And you are experienced in performing and managing networks and operational systems. In addition, you are skilled at deploying ISA Server 2006, configuring firewall settings, and optimizing performance of the ISA Server 2006 cache. There is an ISA Server 2006 computer named ISA01 in the company network. ISA01 is configured to permit outbound Internet access. There is a listener named DefaultHTTP. This listener is also configured to listen for requests on port 80 on the external interface. There are two Web sites in the Internal network. The two Web sites are respectively named IT and Marketing. Employees use the two Web sites. The IT Web site is stored on a Web server named Web1.wiikigoinc.com. The Marketing Web site is stored on a Web server named Marketing1.wiikigoinc.com. Employees use the URL http://www. wiikigoinc.com to access the wiikigo, Inc., Web site. Employees must be allowed to access both the IT Web site and the Marketing Web site from the Internet. You must make sure that employees are able to use the URL http://www. wiikigoinc.com/it to access the IT Web site. You must also guarantee that employees can access the Marketing Web site by using the URL http://www. wiikigoinc.com/marketing. So what action should you perform?

Which action will you perform in the ISA Server log?

You work as an IT professional in an international corporation named Wiikigo. In the company, your job is to configure Microsoft Internet Security and Acceleration Server 2006. And you are experienced in performing and managing networks and operational systems. In addition, you are skilled at deploying ISA Server 2006, configuring firewall settings, and optimizing performance of the ISA Server 2006 cache. An ISA Server array is included by your network and inbound and outbound firewall services are offered by the ISA Server array. The company set all client computers as SecureNAT clients. 1,000 users are contained on the network. The naming convention is Firstname.Lastname. A URL set in ISA Server named Blocked Web Sites is contained, and the URLs of 10 Web sites are included by the Blocked Web Sites. An Internet access rule is created, and access to the Blocked Web Sites URL set should be excluded. It is reported by a user named Nathan Geiger that 10 blocked Web sites are available to him. The ISA Server rule that allows Nathan to access the blocked Web sites should be identified. Which action will you perform in the ISA Server log?

Which action should be performed?

You work as an IT professional in an international corporation named Wiikigo. In the company, your job is to configure Microsoft Internet Security and Acceleration Server 2006. And you are experienced in performing and managing networks and operational systems. In addition, you are skilled at deploying ISA Server 2006, configuring firewall settings, and optimizing performance of the ISA Server 2006 cache. A single ISA Server 2006 computer named ISA01 is contained by your network. According to the company’s new, written security policy, internal computer names should not be published or available via the Internet. A new Web site should be published and many internal computer names within the Web site are contained by the new Web site. You are required to have this Web site published without violating the company’s security policy. Which action should be performed?

What will you do to configure the array by the use of the ISA Server management console?

You work as an IT professional in an international corporation named Wiikigo. In the company, your job is to configure Microsoft Internet Security and Acceleration Server 2006. And you are experienced in performing and managing networks and operational systems. In addition, you are skilled at deploying ISA Server 2006, configuring firewall settings, and optimizing performance of the ISA Server 2006 cache. There are two employees in your company, and remote access to the network is required by them. An ISA Server Enterprise Edition array is contained by your network.
And two servers are included by an ISA Server Enterprise Edition array. Firewall services and Web proxy services are offered by the array. The array should be configured to have VPN gateway services offered for remote client connections. What will you do to configure the array by the use of the ISA Server management console? (Choose more than one.)

So which authentication method should be choosed?

You work as an IT professional in an international corporation named Wiikigo. In the company, your job is to configure Microsoft Internet Security and Acceleration Server 2006. And you are experienced in performing and managing networks and operational systems. In addition, you are skilled at deploying ISA Server 2006, configuring firewall settings, and optimizing performance of the ISA Server 2006 cache. There is a VPN server in the company network. ISA Server 2006 is run by this VPN server. According to the company requirement, two-factor authentication for VPN access should be implemented. Since you are the technical support, the company assigns this task to you. You have to decide the authentication protocol which will support your planned implementation. So which authentication method should be choosed?

In order to make sure of this, what action should you perform?

You work as an IT professional in an international corporation named Wiikigo. In the company, your job is to configure Microsoft Internet Security and Acceleration Server 2006. And you are experienced in performing and managing networks and operational systems. In addition, you are skilled at deploying ISA Server 2006, configuring firewall settings, and optimizing performance of the ISA Server 2006 cache. There is a head office and two branch offices in the company. Each office is configured with a server. ISA Server 2006 Enterprise Edition is run by the server. The ISA Servers connect to the Internet and offer Internet access to users. There is a Configuration Storage server in the head office. In the head office, the ISA Server is configured as a firewall and as a VPN gateway to the Internet. In the branch offices, the ISA Servers use an L2TP/IPsec site-to-site VPN tunnel to connect to the head office. You must make sure that in the event that the VPN tunnel is not available, the Configuration Storage server can be accessed by the ISA Servers in the branch offices. In order to make sure of this, what action should you perform? (Choose more than one)

From the following four ISA roles, which one should be assigned to the support technician?

You work as an IT professional in an international corporation named Wiikigo. In the company, your job is to configure Microsoft Internet Security and Acceleration Server 2006. And you are experienced in performing and managing networks and operational systems. In addition, you are skilled at deploying ISA Server 2006, configuring firewall settings, and optimizing performance of the ISA Server 2006 cache. There is a main office and a branch office in your company. A single ISA enterprise is contained by the network. Two ISA Server 2006 Enterprise Edition arrays are included by the ISA enterprise, and the two arrays are respectively named Array01 and Array02. A support technician should be enabled to have log information monitored for Array01. The least amount of permissions will be offered to finish the task. From the following four ISA roles, which one should be assigned to the support technician?

Which action should be configured?

You work as an IT professional in an international corporation named Wiikigo. In the company, your job is to configure Microsoft Internet Security and Acceleration Server 2006. And you are experienced in performing and managing networks and operational systems. In addition, you are skilled at deploying ISA Server 2006, configuring firewall settings, and optimizing performance of the ISA Server 2006 cache. The company installs ISA Server 2006 as its firewall. Microsoft Outlook 2003 is run by all of the company’s portable computers. According to the company’s written security policy, the company wants to have all e-mail communications to the Microsoft Exchange Server 2003 computer over the Internet encrypted. You are required to make sure that Outlook 2003 should be utilized by all employees, no matter e-mail in the office is utilized or e-mail remotely over the Internet is utilized. Which action should be configured?

So what action should you perform to achieve this?

You work as an IT professional in an international corporation named Wiikigo. In the company, your job is to configure Microsoft Internet Security and Acceleration Server 2006. And you are experienced in performing and managing networks and operational systems. In addition, you are skilled at deploying ISA Server 2006, configuring firewall settings, and optimizing performance of the ISA Server 2006 cache. There are two ISA Server 2006 computers in the company network. The two computers are respectively named ISA01 and ISA02. ISA01 has been configured as the Enterprise Configuration Storage server. ISA01 and ISA02 belong to a single enterprise array. There is a Web server named Web01 that is located in the perimeter network. On Web01, an external Web site is published by you. On the array, an internal Web site is published by you. ISA01 and ISA02 are each configured with a RAID-5 volume. On ISA01, a cache drive is enabled. On ISA01 and ISA02, Cache Array Routing Protocol (CARP) is enabled on the Internal network. You receive report from users saying that it is quite slow to access Web01. You notice that on ISA01 and Web01, physical disk usage is extremely high. ISA Server 2006 needs to be configured to permit faster access to Web01. So what action should you perform to achieve this?

Which action should be performed?

You work as an IT professional in an international corporation named Wiikigo. In the company, your job is to configure Microsoft Internet Security and Acceleration Server 2006. And you are experienced in performing and managing networks and operational systems. In addition, you are skilled at deploying ISA Server 2006, configuring firewall settings, and optimizing performance of the ISA Server 2006 cache. An ISA Server 2006 computer named ISA01 is included by your network.ISA01 is configured with two network adapters. The company sets the external network adapter to connect to the Internet, and configure the internal network adapter to connect to the Internal network. The Internal network address ranges from 10.0.0.0 to 10.0.0.255. The VPN assignment is defined as a static pool, and the static pool extends from 10.0.1.0 through 10.0.1.255. VPN client access is enabled. The VPN configuration is tested and a VPN connection to ISA01 is created successfully from an external Windows XP Professional client computer, and the computer is named XP1. You find a problem that external Web sites cannot be browsed from XP1, while it has a VPN session with ISA01. You verify that external Web sites can be browsed by internal client computers. You need to ensure that external Web sites can be browsed by VPN clients while ISA01 is connected. In addition, you should make sure that all requests for external Web sites from VPN clients are handled through ISA01.Which action should be performed?


Page 5 of 10« First...34567...10...Last »