PrepAway - Latest Free Exam Questions & Answers

Category: 70-351

Exam 70-351: TS: Microsoft Internet Security and Acceleration (ISA) Server 2006, Configuring

What should you do?

Your network contains a single ISA Server 2006 computer named ISA1. ISA1 is not yet configured to allow inbound VPN access.
You deploy a new application named App1. The server component of App1 is installed on an internal server named Server1. The client component of App1 is installed on employee and partner computers.
Employees and partners will establish VPN connections when they use App1 from outside the corporate network.
You identify the following requirements regarding VPN connections to the corporate network. Employees must be allowed access to only Server1, three file servers, and an internal Web server named Web1.
Employees must have installed all current software updates and antivirus software before connecting to any internal resources.
Partners must be allowed access to only Server1.
You must not install any software other than the App1 client on any partner computers. You need to plan the VPN configuration for the company.
What should you do?

What should you do?

Your network contains an ISA Server 2006 array. The array contains six members. You enable Cache Array Routing Protocol (CARP) so that outbound Web requests are resolved within the array. Soon after you enable CARP on the array, Web users on the corporate network report that Internet access is slower than normal. You use Network Monitor to check network traffic patterns on each of the ISA Server 2006 array members. You discover that there is very high network utilization on the intra-array network. You need to reduce the amount of intra-array traffic.
What should you do?

What should you do?

Your network contains a single ISA Server 2006 computer named ISA1. All Internet access for the local network occurs through ISA1.
The network contains a Web server named Server1. Server1 is configured as a SecureNAT client. A Web application runs on Server1 that communicates with an external Web site named www.contoso.com.
You configure ISA1 with two access rules for outbound HTTP access. The rules are named HTTP Access 1 and HTTP Access 2.
HTTP Access 1 is configured to use the All Authenticated Users user set as a condition. HTTP Access 2 is configured to use the All Users user set as a condition, and it restricts outbound HTTP traffic to the IP address of Server1.
You verify that users can access external Web sites. However, you discover that the Web application cannot access www.contoso.com.
You need to allow the Web application to use anonymous credentials when it communicates with www.contoso.com. You also need to require authentication on ISA1 for all users when they access all external Web sites.
What should you do?

What should you do?

Your network consists of a single Active Directory domain. The network contains an ISA Server 2006 computer named ISA1. Client computers on the network consist of Windows XP Professional computers, UNIX workstations, and Macintosh portable computers. All client computers are domain members. You configure ISA1 by using the Edge Firewall network template. You manually configure ISA1 with access rules to allow HTTP and HTTPS access to the Internet. You configure ISA1 to require all users to authenticate. You need to provide Internet access for all client computers on the network while preventing unauthorized non-company users from accessing the Internet through ISA1. You also want to reduce the amount of administrative effort needed when you configure the client computers. What should you do?

What should you do?

Your network consists of a single Active Directory domain named contoso.com. The network contains an ISA Server 2000 computer named ISA1.
All client computers have the ISA Server 2000 Firewall Client software installed. Client computers are configured to use an internal DNS server. Two Windows Server 2003 computers named App1 and App2 run a Web-based application that is used to process company data.
You configure ISA1 with protocol rules to allow HTTP, HTTPS, RDP, POP3, and SMTP access. The list of domain names available on the Internal network on ISA1 contains the following entries.
� *.south.contoso.com
� *.north.contoso.com
� *.east.contoso.com
� *.west.contoso.com
You perform an in-place upgrade of ISA1 by using the ISA Server 2006 Migration Tool. When you use Network Monitor on ISA1, you discover that client requests for App1 and App2 are being passed through ISA1.
You need to provide a solution that will allow clients to directly access company data on App1 and App2.
What should you do?

What should you do?

Your network contains a single ISA Server 2006 computer, which is named ISA1. ISA1 provides access to the Internet for computers on the Internal network, which consists of a single subnet.
The companys written security policy states that the ISA Server logs must record the user name for all outbound Internet access. All client computers are configured with the Firewall client and the Web Proxy client and are not configured with a default gateway. Users in the marketing department require access to an external POP3 and SMTP mail server so that they can use an alternate e-mail address when they sign up for subscriptions on competitors Web sites.
You create and apply an ISA Server access rule as shown in the following display.
The marketing department users configure Microsoft Outlook to connect to the external mail server.
They report that they receive error messages when they attempt to read or send e-mail from the external mail server. You examine the ISA1 logs and discover that ISA1 denies POP3 and SMTP connections from the client computers.
You need to ensure that the marketing department users can connect to the external mail server.
What should you do?

What should you do?

Your network contains two ISA Server 2006 Enterprise Edition computers named ISA1 and ISA2. ISA1 and ISA2 are configured as members of an ISA Server 2006 array. You configure the array to cache outgoing Web requests. You configure the array so that the cached Web content is distributed between ISA1 and ISA2. You want to minimize the traffic on the intra-array network.
What should you do?

What should you do?

Your network contains an ISA Server 2006 computer named ISA1. The companys written security policy states that users must be allowed access to the Internet only between the hours of 08:00 and 17:00. You need to configure ISA1 to allow all Internet traffic between 08:00 and
17:00 and to not allow outbound Internet traffic at other times. What should you do?

What should you do?

Your network contains a single ISA Server 2006 computer named ISA1. The companys new, written security policy states that internal computer names must not be published or accessible via the Internet. You need to publish a new Web site that has many internal computer names within the Web site. You must publish this Web site while adhering to the companys security policy.
What should you do?

What should you do?

Your network contains a single ISA Server 2006 computer named ISA1. The companys written security policy states that ISA1 must authenticate users before users on the Internet are allowed to access corporate Web servers. You install a new Web server on the Internal network. Partners and customers will access the Web pages hosted by this Web server only from the Internet. You need to configure ISA1 to publish the Web site hosted by this Web server, and you need to adhere to the companys security policy. What should you do?


Page 8 of 10« First...678910