PrepAway - Latest Free Exam Questions & Answers

Category: 70-351

Exam 70-351: TS: Microsoft Internet Security and Acceleration (ISA) Server 2006, Configuring

So what action should you perform to accomplish your task?

You work as an IT professional in an international corporation named Wiikigo. In the company, your job is to configure Microsoft Internet Security and Acceleration Server 2006. And you are experienced in performing and managing networks and operational systems. In addition, you are skilled at deploying ISA Server 2006, configuring firewall settings, and optimizing performance of the ISA Server 2006 cache. There is a server in the company network. ISA Server 2006 is run by this server. Internal users are provided with forward Web caching by the ISA Server. The Web site of your company is hosted at www.cpandl.com by a Web hosting company. www.cpandl.com is used as the default home page by the Web browser on internal client computers. Now you receive an order from the company management. According to the company requirement, you must make sure that www.cpandl.com can be accessed by internal users. The company also requires that the usage of Internet bandwidth is reduced to the least when you try to achieve this. So what action should you perform to accomplish your task?

So what action should you perform?

You work as an IT professional in an international corporation named Wiikigo. In the company, your job is to configure Microsoft Internet Security and Acceleration Server 2006. And you are experienced in performing and managing networks and operational systems. In addition, you are skilled at deploying ISA Server 2006, configuring firewall settings, and optimizing performance of the ISA Server 2006 cache. The network is composed of an Active Directory domain. All computers in the network belong to the Active Directory domain. There is a server in the network. This server runs ISA Server. The server has been configured as a firewall and as a Web proxy. User access to HTTP, HTTPS, FTP, and RDP has been defined by the existing Internet access rule. The user set of the Internet access rule is changed by you from All Users to All Authenticated Users. You receive report from users saying that they fail to use the Remote Desktop client to connect to remote computers, but they are able to use a Web browser to access the Internet. Since you are the technical support, you have to make sure that on the Internet, RDP connections to servers on the Internet can be established by users. So what action should you perform?

So what action should you perform?

You work as an IT professional in an international corporation named Wiikigo. In the company, your job is to configure Microsoft Internet Security and Acceleration Server 2006. And you are experienced in performing and managing networks and operational systems. In addition, you are skilled at deploying ISA Server 2006, configuring firewall settings, and optimizing performance of the ISA Server 2006 cache. There is a server named ISA01 for you. You have Windows Server 2003 Service Pack 1 installed on ISA01. On ISA01, you have ISA Server 2006 deployed as a firewall. According to the requirement of new security policy of the company, only required services can be run by servers that connect directly to the Internet. Therefore, you must make sure that the new security policy is met.
So what action should you perform?

Which action should you perform?

You work as an IT professional in an international corporation named Wiikigo. In the company, your job is to configure Microsoft Internet Security and Acceleration Server 2006. And you are experienced in performing and managing networks and operational systems. In addition, you are skilled at deploying ISA Server 2006, configuring firewall settings, and optimizing performance of the ISA Server 2006 cache. ISA Server 2006 is installed on a computer, and three network adapters are included by the computer. The three network adapters are respectively connected to the Internet, the Internal network, and a perimeter network.
The perimeter network adapter and the internal network adapter connect the Private address networks. You apply the 3-Leg Perimeter network template to configure ISA Server. The 3-Leg Perimeter Network Template wizard is run by you. The following changes can be made to the firewall policy.
First, an access rule can be created to permit all traffic between the Internal network and the Internet. Second, an access rule can be created to permit all traffic between the Internal network and the perimeter network.
Third, an access rule can be created to permit SMTP traffic from an SMTP server on the perimeter network to a Microsoft Exchange Server computer on the Internal network.
Fourth, a server publishing rule can be created to permit SMTP traffic from the External network to the SMTP server on the perimeter network. It is reported by the uses that the e-mail messages from users outside of the Internal network can not be received.
You should make sure the users can receive e-mail messages from other users on the Internet.
And a server publishing rule will not be created.
Which action should you perform?

From the following four types of content, which one should be contained in the report to finish the task?

You work as an IT professional in an international corporation named Wiikigo. In the company, your job is to configure Microsoft Internet Security and Acceleration Server 2006. And you are experienced in performing and managing networks and operational systems. In addition, you are skilled at deploying ISA Server 2006, configuring firewall settings, and optimizing performance of the ISA Server 2006 cache. A single server is included by your network, and ISA Server 2006 is run by the single server. A report should be created. In the report, the client operating systems that are most frequently utilized to connect to the ISA Server is listed. From the following four types of content, which one should be contained in the report to finish the task?

From the following four network objects, which one should be enabled by you to finish the task?

You work as an IT professional in an international corporation named Wiikigo. In the company, your job is to configure Microsoft Internet Security and Acceleration Server 2006. And you are experienced in performing and managing networks and operational systems. In addition, you are skilled at deploying ISA Server 2006, configuring firewall settings, and optimizing performance of the ISA Server 2006 cache. In your company, you work as the network administrator. An ISA Server 2006 computer named ISA01 is contained by the network, and the ISA01 was recently installed. According to the company’s written security policy, all HTTP traffic should go through ISA01. A new HR Web site is created by the human resources (HR) department and the new HR Web site is utilized by the employees to access and manage their benefits. Its own Windows Server 2003 Web server and its own server publishing rule on ISA01 are contained by the HR Web site. According to the security requirements, the HR Web site should not be accessed from an untrusted client computer by the employees. The server publishing rule should be set to satisfy the security requirements. From the following four network objects, which one should be enabled by you to finish the task?

So what action should you perform?

You work as an IT professional in an international corporation named Wiikigo. In the company, your job is to configure Microsoft Internet Security and Acceleration Server 2006. And you are experienced in performing and managing networks and operational systems. In addition, you are skilled at deploying ISA Server 2006, configuring firewall settings, and optimizing performance of the ISA Server 2006 cache. There is an ISA Server 2006 array in the company network. Internet access and Web caching is offered by the array. Your corporate Web site is hosted at www.luxware.com by a Web hosting company. This morning you receive a report from the webmaster.
He tells you that it seems that the changes do not take effect at the time that he has contend updated on the Web site the changes. But according to the indication of the Web page authoring tool, updates of the pages succeeded. In order to make sure that recent changes to the content on the Web site can be viewed by you, ISA Server needs to be configured. So what action should you perform?

Which alias (CNAME) record should be created?

You work as an IT professional in an international corporation named Wiikigo. In the company, your job is to configure Microsoft Internet Security and Acceleration Server 2006. And you are experienced in performing and managing networks and operational systems. In addition, you are skilled at deploying ISA Server 2006, configuring firewall settings, and optimizing performance of the ISA Server 2006 cache. There is an Active Directory forest in the company network. Three domains are contained in this forest. The root domain and the child domains are respectively named wiikigo.com, domain01.wiikigo.com and domain02.wiikigo.com. Forward Web caching for all domain computers is provided with forward Web caching by a single ISA Server 2006 computer named ISA01. ISA01 belongs to domain02.wiikigo.com. In DNS, a host (A) record is created by you for isa01.domain02.wiikigo.com. You must make sure that ISA01 is used by all computers as their Web proxy. Which alias (CNAME) record should be created?

So what action should you perform?

You work as an IT professional in an international corporation named Wiikigo. In the company, your job is to configure Microsoft Internet Security and Acceleration Server 2006. And you are experienced in performing and managing networks and operational systems. In addition, you are skilled at deploying ISA Server 2006, configuring firewall settings, and optimizing performance of the ISA Server 2006 cache. There is a single Active Directory domain in the company network. A server named ISA01 is contained in the network. ISA Server 2006 is run by ISA01. ISA01 provides Web Proxy applications and Winsock Proxy applications with Internet access. ISA01 connects to two internal network segments. The two segments are respectively named Segment 01 and Segment 02. All client computers are joined to the domain. The diagram below shows the configuration of the network. Both network segments are able to access Active Directory services, DNS services, and DHCP services. Access to the Internet from both network segments is allowed by an access rule. In DNS, a Web Proxy Automatic Discovery (WPAD) entry is configured to resolve to the internal IP address of the ISA Server on Segment 01. You receive report from users on Segment 02 saying that the Internet cannot be accessed by them. Since you are the technical support, you have to solve this problem. The network should be configured to have Internet access enabled from Segment 02. So what action should you perform?

So what action should you perform to achieve this goal?

You work as an IT professional in an international corporation named Wiikigo. In the company, your job is to configure Microsoft Internet Security and Acceleration Server 2006. And you are experienced in performing and managing networks and operational systems. In addition, you are skilled at deploying ISA Server 2006, configuring firewall settings, and optimizing performance of the ISA Server 2006 cache. There is a server in the network. ISA Server 2006 is run by this server. The ISA Server has 4 GB of RAM. A Microsoft Office SharePoint Server 2007 portal named Portal01 is used by the company. A Web Publishing rule is created by you. Users are allowed to access Portal01 by this Web Publishing rule. On the ISA Server, a cache drive is defined by you. Now you receive report from users saying that access to Portal01 is quite slow. Since you are the technical support, you have to solve this problem. That is to say, the amount of time that users spend in accessing content on Portal01 should be cut down. So what action should you perform to achieve this goal?


Page 6 of 10« First...45678...Last »