PrepAway - Latest Free Exam Questions & Answers

Category: 70-351

Exam 70-351: TS: Microsoft Internet Security and Acceleration (ISA) Server 2006, Configuring

So what action should you perform?

You work as an IT professional in an international corporation named Wiikigo. In the company, your job is to configure Microsoft Internet Security and Acceleration Server 2006. And you are experienced in performing and managing networks and operational systems. In addition, you are skilled at deploying ISA Server 2006, configuring firewall settings, and optimizing performance of the ISA Server 2006 cache. There is an ISA Server 2004 Enterprise Edition array in the company network. Two servers are contained array contains. The two servers are respectively named ISA01 and ISA02. Both ISA01 and ISA02 have a Configuration Storage server installed locally and are replicas of the same array. The company requires that both ISA01 and ISA02 should be upgraded to ISA Server 2006. The upgrade must reduce interruptions to Internet access and cut down hardware costs Since you are the technical support, the company assigns this task to you. So what action should you perform?

Which action should you perform next?

You work as an IT professional in an international corporation named Wiikigo. In the company, your job is to configure Microsoft Internet Security and Acceleration Server 2006. And you are experienced in performing and managing networks and operational systems. In addition, you are skilled at deploying ISA Server 2006, configuring firewall settings, and optimizing performance of the ISA Server 2006 cache. An ISA Server array is included by your network. Two computers are contained by the array, and the two computers are respectively named ISA01 and ISA02. ISA Server 2006 Enterprise Edition is run by the two computers. A single Configuration Storage server is contained by the array, and it is named CSS01. The configuration of the ISA enterprise is backed up to a file, and the file is named Backup.xml. CSS01 cannot work successfully. A new server named CSS02 is installed. You are required to make sure that the ISA Server logging features can be accessed and the ISA firewall policy can be changed. ISA Server 2006 is installed on CSS02. You utilize the Import (Restore) option to start the Import Wizard. Which action should you perform next?

Which action should be performed to achieve the goal?

You work as an IT professional in an international corporation named Wiikigo. In the company, your job is to configure Microsoft Internet Security and Acceleration Server 2006. And you are experienced in performing and managing networks and operational systems. In addition, you are skilled at deploying ISA Server 2006, configuring firewall settings, and optimizing performance of the ISA Server 2006 cache. Two ISA Server 2006 Enterprise Edition computers are included by your network and the two computers are respectively named ISA01 and ISA02. ISA01 and ISA02 are members of an ISA Server 2006 array. The array is set to have outgoing Web requests cached. The array is set so as to have the cached Web content distributed between ISA01 and ISA02. The traffic on the intra-array network should be cut to the least. Which action should be performed to achieve the goal?

From the following four sets of access rules, which one should be utilized?

You work as an IT professional in an international corporation named Wiikigo. In the company, your job is to configure Microsoft Internet Security and Acceleration Server 2006. And you are experienced in performing and managing networks and operational systems. In addition, you are skilled at deploying ISA Server 2006, configuring firewall settings, and optimizing performance of the ISA Server 2006 cache. A server is included by your network, and ISA Server is run by the server. The ISA Server is one of an Active Directory domain. Internet access is offered by the ISA Server. And the ISA Server is the default gateway for all computers on the network.
Your company configures the Web browsers proxy settings by utilizing Web Proxy Automatic Discovery (WPAD).
The following objects are created on the server. One should be two user sets named Internet Users and Admin Internet Users, and another should be a URL set named Blocked Sites that includes the URLs of Internet sites to which users should be blocked The Firewall Policy rules on the ISA Server should be configured to satisfy the following requirements.
First, members of Internet Users should be enabled to get access to Internet Web sites, except for the sites
in the Blocked Sites URL set.
Second, members of Admin Internet Users should be enabled to access all Internet Web sites. Third, HTTP, HTTPS, and FTP must be accessible for all allowed sites. From the following four sets of access rules, which one should be utilized?

So what is your solution?

You work as an IT professional in an international corporation named Wiikigo. In the company, your job is to configure Microsoft Internet Security and Acceleration Server 2006. And you are experienced in performing and managing networks and operational systems. In addition, you are skilled at deploying ISA Server 2006, configuring firewall settings, and optimizing performance of the ISA Server 2006 cache. There is a server in the company network. ISA Server is run by this network. The ISA Server has been configured as a firewall and as a VPN gateway. Another company named Luxware is purchased by your company. A third-party firewall and VPN solution is used by Luxware. According to the company requirement, resources on both networks should be able to be accessed by users from both networks. Since you are the technical support, the company asks you to work out a solution that offers TCP/IP connectivity between the two networks. So what is your solution?

So what action should you perform next?

You work as an IT professional in an international corporation named Wiikigo. In the company, your job is to configure Microsoft Internet Security and Acceleration Server 2006. And you are experienced in performing and managing networks and operational systems. In addition, you are skilled at deploying ISA Server 2006, configuring firewall settings, and optimizing performance of the ISA Server 2006 cache. There is a server in the network. ISA Server 2006 is run by this server. On the ISA Server, a cache drive is defined by you. Now you receive reports from users saying that outdated information is contained in the external Web site www.wiikigoinc.com. On the ISA Server, the Cachedir.exe program is installed by you. You run In order to make you be able to mark objects in the cache as obsolete, you have Cachedir.exe run on the ISA Server. You are not able to find www.wiikigoinc.com listed in the cache. www.wiikigoinc.com needs to be marked as obsolete in the cache. So what action should you perform next?

So what action should you perform?

You work as an IT professional in an international corporation named Wiikigo. In the company, your job is to configure Microsoft Internet Security and Acceleration Server 2006. And you are experienced in performing and managing networks and operational systems. In addition, you are skilled at deploying ISA Server 2006, configuring firewall settings, and optimizing performance of the ISA Server 2006 cache. There is a single ISA Server 2006 computer in the network. This computer is named ISA01. All Internet access for the local network occurs through ISA01. A Web server named S01 is contained in the network. S01 has been configured as a SecureNAT client. A Web application runs on S01 that communicates with an external Web site named www.wiikigo.com.
ISA01 is configured with two access rules for outbound HTTP access. The two rules are respectively named HTTP Access 01 and HTTP Access 02. HTTP Access 01 has been configured to use the All Authenticated Users user set as a condition. HTTP Access 02 has been configured to use the All Users user set as a condition, and it limits outbound HTTP traffic to the IP address of S01. You find that www.wiikigo.com cannot be accessed by the Web application. But you are sure that external Web sites can be accessed by users. At the time that the Web application communicates with www.wiikigo.com, it needs to be allowed to use anonymous credentials. Besides, at the time that all external Web sites are accessed by all users, authentication on ISA01 is required for all of them.
So what action should you perform?

What action should you perform?

You work as an IT professional in an international corporation named Wiikigo. In the company, your job is to configure Microsoft Internet Security and Acceleration Server 2006. And you are experienced in performing and managing networks and operational systems. In addition, you are skilled at deploying ISA Server 2006, configuring firewall settings, and optimizing performance of the ISA Server 2006 cache. There is a head office and five branch offices in the company. The six offices use high-speed network links to connect. The head office is the only location that has an Internet connection. There is a server named ISA01 in the head office. You plan to have ISA Server 2006 deployed on ISA01. Two network adapters are contained in ISA01. They are respectively named NA01 and NA02. NA1 is connected to the internal network and NA02 is connected to the Internet. You intend to have ISA01 configured to cache Web content for all users and to have all computers defined as Web Proxy clients. You must make sure that the Internet can be accessed by users from the head office and the branch offices. What action should you perform?

So what action should you perform to accomplish your task?

You work as an IT professional in an international corporation named Wiikigo. In the company, your job is to configure Microsoft Internet Security and Acceleration Server 2006. And you are experienced in performing and managing networks and operational systems. In addition, you are skilled at deploying ISA Server 2006, configuring firewall settings, and optimizing performance of the ISA Server 2006 cache. There is a server named S01 for you. The 64-bit version of Windows Server 2003 is run by S01. Now you receive an order from the company manager. On S01, ISA Server 2006 needs to be installed as required by the company. Since you are the technical support, the company assigns this task to you. So what action should you perform to accomplish your task?

So what action should you perform?

You work as an IT professional in an international corporation named Wiikigo. In the company, your job is to configure Microsoft Internet Security and Acceleration Server 2006. And you are experienced in performing and managing networks and operational systems. In addition, you are skilled at deploying ISA Server 2006, configuring firewall settings, and optimizing performance of the ISA Server 2006 cache. There is a head office and branch office in the company. There is a server named ISA01 in the head office. ISA Server 2004 is run by ISA01. There is a server named ISA02 in the branch office. ISA Server 2004 is run by ISA02. 5,000 desktop client computers are contained in the network. The desktop client computers have installed Firewall Client for ISA Server 2000. ISA01 is configured to only permit encrypted Firewall client connections after you have ISA01 upgraded to ISA Server 2006. You receive reports from users in the head office saying that they cannot use Microsoft Office Outlook to access external e-mail services. Since you are the technical support, you have to solve this problem for them. You must make sure that users in the head office are able to use Outlook to access external e-mail servers. So what action should you perform?


Page 7 of 10« First...56789...Last »