1. Trang chủ
  2. » Công Nghệ Thông Tin

Tài liệu MCSE ISA Server 2000- P19 ppt

30 245 0

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Định dạng
Số trang 30
Dung lượng 157,62 KB

Nội dung

PRACTICE EXAM 513 34. You are administering an ISA Server array, and want to create a site and content rule to allow users to gain access to a Web site. When you attempt to create this rule, the option to allow access is not available, you can only deny access. What is causing this problem? A. You must be a member of the Enterprise Admins group to configure this rule. B. There is already a rule to allow access to the Web site configured. C. There is an Enterprise policy defined for this array. D. Array policies are only defined to deny access, not allow access. 35. As the network administrator for your organiza- tion, you are in the process of installing ISA Server. You have selected the Integrated installa- tion mode, because you want to have the ISA Server perform forward caching. When the instal- lation program presents you with the interface to specify the initial cache size, there are no drives listed in the drive selection box. What is the cause of this problem? A. There is insufficient drive space available for caching. B. There is only one volume on the hard drive. The cache must be on a separate volume than the operating system. C. There are no NTFS volumes on the system. D. Caching is not available in Integrated mode. 36. Your company has established a joint venture with another company, and some of your employees will be working at the partner compa- ny’s location. These users will need to connect to your company’s intranet site from the remote location. The partner company uses a third-party proxy server product. Which authentication method should you use to provide secure access to your intranet from the partner company’s loca- tion? A. Basic Authentication B. Digest Authentication C. Integrated Windows Authentication D. Client Certificate Authentication 37. Your company has a secure intranet site that you would like to make available over the public Internet. The Web server runs Microsoft Internet Information Server v5, and is accessible on the private network. The Web server is configured to use Integrated Windows Authentication. When users access the Web server on the private net- work, they authenticate normally by entering their ID and password. When users attempt to access the server from across the Internet, they are forced to enter their ID and password twice. Which of the following explains why this is happening? A. This is normal Windows NT Challenge/ Response authentication behavior. B. Because the ISA Server and the IIS server are using two different authentication methods. C. The ISA Server must always authenticate a user to a Windows domain before passing the request to the Web server. D. Because the ISA listener is configured to require authentication. This authentication is in addition to any authentication performed by the Web server. 38. You have been asked by the network administra- tor for some assistance. The administrator would like to determine if the current ISA Server config- uration and hardware is providing acceptable 26 mcse Practice Exam 6/5/01 12:20 PM Page 513 Please purchase PDF Split-Merge on www.verypdf.com to remove this watermark. 514 PRACTICE EXAM Winsock-based application to only the three users that require it? A. Configure all the clients as Web proxy clients. B. Configure all the clients as SecureNAT clients. C. Configure all the clients as firewall clients. D. Configure all the clients as Web proxy clients, and the users requiring access to the Winsock application, install the firewall client. E. Configure all the clients as Web proxy clients, and the users requiring access to the Winsock application, install the SecureNAT client. 41. The manager of a real-estate office calls you with a problem. The local telephone company has installed a DSL line into the office to provide Internet access to the agents. The office has a Windows 2000 Server that they use for file and print sharing. The manager tells you that one of her agents has the responsibility of creating and managing their Web page. Her problem is that several of the other agents are using this Internet connection to download pictures, MP3 files, and other unnecessary files. She would like to permit only the one agent the capability to FTP files to and from the Internet, and all other users the capability to only use the connection for Web browsing. Which of the following methods would you use to provide this security to this company? A. Web proxy client B. SecureNAT client C. Firewall client D. Winsock proxy client 42. The network administrator of the company that you work for has asked to you handle the config- uration of the end-user computers for him. He informs you that the company has installed and performance for servicing user requests to Web pages on the Internet. You would like to verify that the company’s connection to the Internet is utilized as efficiently as possible. Which of the following Performance Monitor object would you select to evaluate this information? A. ISA Server Bandwidth Control B. ISA Server Cache C. ISA Server Firewall Service D. ISA Server Packet Filter E. ISA Server Web Proxy Service 39. Your company has recently created its public Web site, and has also configured a DNS server to handle name resolution for Internet clients. Because the DNS server has a network interface for both the Internet and the internal network, you have decided to install ISA Server on the computer running DNS. You need to configure a packet filter to allow the DNS service to continue to respond to DNS queries from the Internet. Which of the following port numbers should you allow access to from the Internet? (Select two answers.) A. TCP port 25 B. UDP port 35 C. UDP port 25 D. TCP port 53 E. TCP port 35 F. UDP port 53 40. As the network administrator for an insurance company, you need to provide access to an Internet-based, Winsock-based application for three of your users. You also would like to provide access to Web sites for all your users. Which of the following will allow access to the 26 mcse Practice Exam 6/5/01 12:20 PM Page 514 Please purchase PDF Split-Merge on www.verypdf.com to remove this watermark. PRACTICE EXAM 515 configured a new ISA Server, and he asks you to configure all of the end user computers to be Web proxy clients. The company has 200 Windows 98 computers, 10 Windows NT 4.0 computers, and 75 Windows 2000 Professional computers. You have also installed Microsoft Internet Explorer 5.0 on all computers. How would you configure each of the computers to be Web proxy clients? A. Open the TCP/IP properties, and set the Default Gateway to the IP address of the ISA Server. B. Open the Properties page of Internet Explorer, place a check mark in the Use a Proxy Server box, and specify the IP address and port numbers for the ISA Server. C. From each computer, connect to the \MSPClnt share of the ISA Server, and run Setup.exe. D. At each of your routers, create a static route of 0.0.0.0, and set the gateway address of the route to the IP address of the ISA Server. 43. The Information Systems manager of your com- pany has requested that you assist her with a pro- ject. Your company has a mail server that is used for internal email only. She would like to make the mail server accessible over the Internet, so users can access their mailboxes from other loca- tions, and customers can send email directly to your employees. She requires that the mail server be secure, as it also is used for file and print ser- vices. She would also like to have content filtering applied to all incoming email. What is the sim- plest method of making this server available? A. Publish the server using the Mail Server Security Wizard. The default options are SSL authentication and the application of content filters on incoming email. B. Publish the server using the Mail Server Security Wizard. Select the option use SSL authentication and the application of content filters on incoming email. C. Publish the server using the Mail Server Security Wizard. Configure the ISA Server to use IPSec to connect to the mail server, and create a content filter rule for incoming email. D. Publish the server using the Mail Server Security Wizard. Configure the ISA Server to use IPSec for client connections over the Internet, which will secure communications. Create a content filter rule for incoming email. 44. You have been hired to assist a small manufac- turing company provide Internet access to its employees. The company has 45 computers run- ning Windows 98 and 20 computers running Windows 2000 Professional. The company also has four Windows 2000 Server computers, one is a domain controller only, and one is a domain controller and also hosts the users home directo- ries. Another server runs Exchange 2000, and the fourth server hosts the company’s Web site. You have decided to install ISA Server on the Web server. Which of the following Security Levels should you select for this scenario? A. Secure B. Limited Services C. Dedicated D. Integrated 45. As the network administrator for a small comput- er consulting firm, several of the employees are requesting access to the internal network from customer locations. You have decided to use ISA Server’s Virtual Private Networking feature to accomplish this. The consultants in your 26 mcse Practice Exam 6/5/01 12:20 PM Page 515 Please purchase PDF Split-Merge on www.verypdf.com to remove this watermark. 516 PRACTICE EXAM site, the Web administrator has changed to the port number used to connect to the site to 27443. All three Web sites are published to the ISA Server. Employees at remote locations are unable to connect to the employee’s only site. What must be done to correct this problem? A. You must change the employees’ site back to the default TCP port for HTTPS. B. On the Web Publishing Rules Properties page, set the Use This Port For Redirecting HTTP Requests box to 27443. C. On the Web Publishing Rules Properties page, set the Use This port For Redirecting SSL Requests box to 27443. D. On the Web Publishing Rules Properties page, set the Use This Port For Redirecting FTP Requests box to 27443. 48. As the network administrator for a large compa- ny, you have been assigned the task of creating the ISA Server structure. Your company has 8,000 users, who are roughly divided equally across the domain root and three child domains. All the users work at your company’s office com- plex, in which all the buildings are connected via T1 lines in a single site. After doing your perfor- mance evaluation, you determine that you will create an array of four ISA Server computers to support all of the users. Which of the below guidelines should you follow to correctly create the ISA Server array? (Select two answers.) A. Have one of the ISA Servers in each of the domains. B. All members of the array are required to be members of the forest root domain. C. All members of the array are required to be members of the same domain. D. Use the installation mode for a particular member that most closely applies to the users for a particular domain. company have laptop computers, some running Windows 2000 Professional, some are running Windows 98. Which of VPN Protocol selections would you choose to provide the most secure method for your remote users to connect to your internal network? A. Use L2TP over IPSec, if available; otherwise use PPTP. B. Use L2TP over IPSec. C. Use PPTP. D. Use IPSec. 46. You are a member of a team that has been assigned the role of installing and configuring your company’s ISA Server deployment. Your team has been asked to present a demonstration of some of ISA Server capabilities to the execu- tives. You have been asked to print some of the reports available in ISA Server. After installing ISA Server with the default options, you attempt to create some reports, but are unable to do so. What is most likely the cause of this problem? A. There are no log files available for the reports you are trying to print. B. The default installation of ISA Server does not include a reporting module. C. You must be a member of the ISAadmin group to print reports. D. You have installed ISA Server as a standalone server. Only arrays provide the option of printing reports. 47. You work for a software-development company. The company has a public Web site, as well as a secure Web site for existing customers. Both the public and secure sites use the default TCP port numbers. Your company also has a secure site for employees only. To protect the employees-only 26 mcse Practice Exam 6/5/01 12:20 PM Page 516 Please purchase PDF Split-Merge on www.verypdf.com to remove this watermark. PRACTICE EXAM 517 E. Use the same installation mode for all mem- bers of the array. F. You can only install array members using Integrated mode. 49. As the security administrator for your company, you want to ensure that the ISA Server never responds to any outside connection attempts that use the telnet protocol. You have installed the tel- net service on the ISA Server so you can do remote administration from inside the network. Which port number should you create an IP packet filter for to prevent an outside user to telnet into your ISA Server? A. TCP 25 B. TCP 23 C. UDP 23 D. UDP 25 E. TCP32 50. The Human Resources manager of your company needs your help. The users in her department need access to an application across the Internet. All the users have Microsoft Internet Explorer 5.0. You have already created the permissions for the appropriate groups, and allowed access to the protocols required by the application. You have notified the HR manager that all that is left to do is to deploy the firewall client. Which of the fol- lowing could be used to deploy the firewall client software to the HR department’s users? (Select two answers.) A. Have the users connect to the ISA Server’s \MSPCLNT share, and run setup.exe. B. Have the users connect to the ISA Server’s \PRXYCLNT share and run setup.exe. C. Have the users open the URL to a Web server that you have copied the default.htm and setup.bat files from the ISA Server’s \WEBINST folder, and select the link “ISA CLIENT SOFTWARE.” D. Create an installation disk set, and have the HR manager install the software manually. E. Have the users open the URL to a Web server that you have copied the default.htm and setup.bat files from the ISA Server’s \WEBINST folder, save the file setup.bat to their hard drive, and run it from the saved location. 51. You have been hired by a firm to assist them with the installation and configuration of ISA Server. The firm is a contractor with the Department of Defense, and must provide information to the DoD for auditing purposes. To ensure that the correct information is available in the Security reports, which of the following logs and sum- maries must be available to print the reports. (Select three answers.) A. Web Proxy logs B. Firewall Service logs C. Application Filter logs D. SecureNAT logs E. Bandwidth logs F. Site and Content logs G. Packet Filter logs 52. Your company created a private Web site for its customers to obtain billing and shipping infor- mation. You are using an ISA Server as the firewall from the Internet. Because sensitive information is to be passed back to the customer, you would like to secure communications between the Internet client, and your ISA Server. Which of the features of ISA Server provides this function? 26 mcse Practice Exam 6/5/01 12:20 PM Page 517 Please purchase PDF Split-Merge on www.verypdf.com to remove this watermark. 518 PRACTICE EXAM B. A PTR record for the CEO’s computer IP address. C. A SRV record for the Q931 service at the H.323 Gatekeeper’s IP address. D. A SRV record for the H323 service at the H.323 Gatekeeper’s IP address. E. A MX record for the email server. The email server will locate the user. 55. You have just installed Microsoft ISA Server for your organization. Other members of the Information Systems department, including your- self, test the ISA Server from your computers, which are on the same subnet as the ISA Server, and connect to external Web sites with no prob- lem. When you attempt to connect to the Internet from other users computers on different subnets, you are unable to connect to the Internet. Where would you begin troubleshooting your ISA installation? A. Be sure that users have permissions to communicate with the ISA Server. B. The Local Address Table. C. The ISA Server’s internal routing table. D. The ISA Server’s host name and IP address. 56. You completed a default installation of ISA Server. You have determined that you would like to apply the Limited Services security level to the server. When you run the ISA Server Security Configuration Wizard, and select the Limited Services option, you receive an error message that the process failed. Which of the following is the reason this is occurring? A. You do not have ISA Admin permissions. B. You have installed ISA on a domain controller. A. IPSec B. L2TP C. SSL Bridging D. SSL 53. Your company has recently upgraded its network to a Windows 2000 domain, RIPCO.COM. The organization has maintained a public Web site for several months, and your Internet Service Provider (ISP) hosts this site. You have just installed an ISA Server, and configured your user’s computers Web browsers with the IP address of the ISA Server, and the correct port number for HTTP. Users can connect to Web sites with no problems. You have also recently created an intranet site that hosts an application that your employees use for billing and Human Recourse purposes. You now find that users cannot connect to the intranet site. What would be the simplest method for resolving this problem? A. Install the firewall client on each computer. B. Configure the ISA Server to ignore these requests C. Publish the intranet server in the ISA Server. D. Configure the client computer browsers to Bypass Proxy Server for Local Addresses. 54. The CEO of your company wants to use Microsoft NetMeeting to conference with execu- tives of other companies. You have created the H.323 Gatekeeper and H.323 filter to allow incoming calls. You must also create a record in DNS so the address of the CEO’s computer can be found. How should the DNS record be con- figured so users can contact the CEO via NetMeeting? A. An A record for the CEO’s computer IP address. 26 mcse Practice Exam 6/5/01 12:20 PM Page 518 Please purchase PDF Split-Merge on www.verypdf.com to remove this watermark. PRACTICE EXAM 519 C. You must stop the ISA Server service to change security level. D. The template files are not in the systemroot\security\templates folder. 57. You created a secure intranet Web site for your employees. They will be managing their timesheets, tracking vacation days, and viewing information about your company’s projects. You have secured this Web site by using Integrated Windows Authentication. One of your employees calls, indicating that he cannot connect to the Web site from your internal network. Which of the following is a reason why this user cannot connect to the intranet site? A. He is using Internet Explorer 3.0. B. His password to the intranet site is different than his domain password. C. He is on a computer running Windows 98. D. He is using the Netscape Web browser. 58. The CEO of your firm is concerned about viruses attached to email messages infecting your system. He is especially concerned about Vbscript attach- ments. He has asked you if there is anyway to prevent these types of files from entering the net- work via email. How would you go about pre- venting Visual Basic script attachments from get- ting to your email server using ISA Server? A. Create a protocol filter denying access to TCP port 25. B. Create a site and content rule, and deny .vbs file types. C. Configure the SMTP filter under Application Filters, and select the option to Disallow an SMTP command. D. Configure the SMTP filter under Application Filters. On the Attachments tab, add the Mail Attachment Rule, and select Attachment Extension. E. Configure the SMTP filter under Application Filters. On the Attachments tab, add the Mail Attachment Rule, and select Attachment Name. 59. The Information Systems Manager of your com- pany has asked you to be part of the Network Capacity team. The responsibility of this team is to monitor activity on the company’s network, and to make recommendations to improve per- formance. You have been asked to monitor and report on Internet activity. The team leader has asked that you give her a report showing which members of the company utilize the Internet the most, and which Web browsers they are using. Which of the following ISA reports would you print to provide this information to the team lead? A. Summary Reports B. Web Usage Reports C. Application Usage Reports D. Traffic and Utilization Reports E. Security Reports 60. The network administrator has asked for your assistance with a problem. Several of the users on the network are downloading MP3 files from the Internet and storing them in their home directo- ries on one of the servers. She would like to pre- vent users from downloading MP3 files from the Internet. Which of the following is the correct method for preventing users from downloading MP3 files? A. Create a Destination set for .mp3.* and deny access to all users. B. Create a Protocol definition for mp3, and deny access to all users. 26 mcse Practice Exam 6/5/01 12:20 PM Page 519 Please purchase PDF Split-Merge on www.verypdf.com to remove this watermark. 520 PRACTICE EXAM computers, and 10 Windows NT 4.0 Workstation computers. The company has three Windows NT 4.0 server computers, two acting as file and print servers, and one acting as a domain controller. The administrator would like to pro- vide access only for Web browsing. How would you configure the users computers to meet these requirements? A. Web proxy clients B. SecureNAT clients C. Firewall clients D. Winsock proxy clients 64. You have been hired to consult for a large manu- facturing company on its ISA Server implementa- tion. The organization has 6,000 computers run- ning a variety of operating systems. The project lead for the company informs you that they will be required to use the firewall client, as they need to provide Internet access based on user identifi- cation. He asks you to provide him with a list of operating systems on which the firewall client can be installed. Which of the following operating systems support the firewall client? (Select all that apply.) A. Windows Millennium Edition B. Windows for Workgroups 3.11 C. Windows 95 D. Windows 95 OSR2 E. Windows 98 F. Windows 98 Second Edition G. Windows NT 3.51 H. Windows NT 4.0 I. Windows 2000 C. Create a Content group for mp3, and deny access to all users. D. Use the predefined Audio Content Type, and deny access to all users. 61. You have been hired by a large software-publish- ing company to assist them with the installation and configuration of their ISA Servers. The com- pany has an array of three ISA Servers at their main office. Each of the company’s five remote offices also has an ISA Server. All the remote offices are connected to the main office by means of a Frame Relay Private Virtual Circuit. The IS manager would like to log information from all of the organizations ISA Servers to a single loca- tion. Which of the following formats would you select in this situation? A. W3C format B. ISA format C. ODBC format D. CSV format 62. Your organization has decided to implement Microsoft ISA Server to provide Internet access for its users, and to protect its internal resources from intrusion from the Internet. The company has approximately 1,500 users. Which of the fol- lowing are the recommended hardware require- ments for this configuration? A. Pentium II 300Mhz with 128MB RAM. B. Pentium II 300Mhz with 256MB RAM. C. Pentium III 55Mhz with 128MB RAM. D. Pentium III 550Mhz with 256MB RAM. 63. The network administrator of a small manufac- turing company has asked you to assist him in providing Internet access to the 50 users in his company. The organization has 40 Windows 98 26 mcse Practice Exam 6/5/01 12:20 PM Page 520 Please purchase PDF Split-Merge on www.verypdf.com to remove this watermark. PRACTICE EXAM 521 65. You have agreed to act as a security consultant for a small publishing company. The company wants to provide Internet access to their internal users. They have a Windows 2000 native mode domain, email that is hosted by their Internet Service Provider, and three Windows 2000 mem- ber servers. The organization consists of 10 PCs running Windows 2000 Professional, and 16 PCs running Windows 98. The president of the com- pany wants to determine if she should purchase the Enterprise Edition or Standard Edition of Microsoft ISA Server. Which of the following fea- tures are available in the Enterprise edition, and not available in the Standard edition? (Choose three answers.) A. Hierarchical caching B. Enterprise Policy C. Bandwidth control D. Packet filtering E. Active Directory Integration F. Distributed caching G. Server publishing ANSWERS TO EXAM QUESTIONS 1. B. No, this cannot be done. Unlike Web pub- lishing, you cannot use a different port for the ISA Server to connect to a published server. 2. B, C. With the Web proxy service logs and fire- wall service logs available, you would be able to print traffic and utilization reports to determine areas where bandwidth is over- or under-utilized. You could also create a Performance Monitor log, using the ISA Server Bandwidth Control object, and capture the appropriate counters to view this information. With this information, you can make appropriate modifications to Bandwidth Rules. 3. A. Reverse caching assists in minimizing net- work traffic on the internal network. Once the ISA Server has cached the Web page from your internal Web server, it will provide this content to subsequent external requests from its cache, with- out generating any traffic on the internal net- work. Forward caching refers to internal clients obtaining content from the external network, the Internet. 4. A. Because the Enterprise Initialization Utility makes modifications to the Schema, you will only want to run this utility when network perfor- mance will be least affected. The utility contacts the domain controller that holds the Schema Master role, and makes the modifications. These modifications must then be replicated out to all domain controllers in the forest. 5. A. Events must be enabled on the ISA Server to allow alerts to function. To enable Events, expand the server or array name, and then expand Monitoring Configuration. Open the Alerts fold- er, and double-click the alert you want to use. Placing a check mark in the Enable box activates the alert. 6. C. The array policies would need to be rede- fined. When an enterprise policy is applied to an existing array, the array policies are deleted. 7. E. An ISA Server in firewall mode can be con- figured to use Virtual Private Networking. The sales staff at remote locations can then securely connect to the internal network, and access resources as if they were in the office. 8. C. Windows 2000 Service Pack 1 is also required to install ISA Server. Because you 26 mcse Practice Exam 6/5/01 12:20 PM Page 521 Please purchase PDF Split-Merge on www.verypdf.com to remove this watermark. 522 PRACTICE EXAM then be able to promote the standalone server to a member of the array. 14. D. To configure an array to chain up to another array, open the ISA MMC snap-in. Under the Array option, select Network Configuration. You will then have an option to Configure Firewall Chaining. From this interface, you can configure the array to forward request to. 15. C. A feature of ISA Server is the capability to save reports as Web (HTML) pages. The admin- istrators would then have the capability to pub- lish their reports to the intranet server, where their Web browser can then view them easily. Assuming the intranet server is also connected to the Internet, the administrators would then be able to view this information from any location. 16. A. Use L2TP over IPSec, if available; otherwise use PPTP. Because some of the computers are not using Windows 2000, you will still be required to support PPTP. The Windows 2000 computers will negotiate the use of L2TP with the VPN server, which will provide you with the highest level of security. You would be able to modify this setting to Use L2TP over IPSec, and eliminate the need for PPTP after all the remote computers have been upgraded to Windows 2000. 17. B. The computers at the remote clinics will require the firewall client to access this applica- tion. You may be required to do some additional configuration to allow access to the application, depending on the port that is being used. The Web proxy client and SecureNAT client will only allow access to the HTTP and FTP protocols. 18. D. Based on the information in the question, D is the correct option. Because you are required to set priorities for specific groups, using Client Types page, where you can specify Any user, group, or computer, or specific users and groups, installed Windows 2000 with the default options, Internet Information Server is already installed. DNS and WINS are not required options on the computer running ISA Server. 9. B, D. Because the internal and ISP’s DNS servers are authoritative for the DNS namespace of MYCO.COM, you will need to manually update the internal DNS server with the IP address of the company’s Web server. You should also verify the DNS queries are allowed to pass through the ISA Server to the Internet for name resolution of external domain names. 10. A. Because EXTARRAY is connected to the Internet and the perimeter network, the only address range that should be in its Local Address Table is the perimeter network address range. The array that is connected to the perimeter network and the private network will have the private net- work ranges in its Local Address Table. 11. D. Based on the fact that the hostname can be resolved via ping, but not via the ISA Server, the Local Domain Table would be the place to start. Because the site you are trying to connect to is internal only, it must be resolved by your internal DNS. If the ISA Server does not have the domain name in the Local Domain Table, it will attempt to resolve the name via external DNS. 12. B. By enabling routing and packet filtering between the corporate network interface and the perimeter network resources, you are allowing your users direct access to the resources. Publishing servers to the Internet through the ISA Server will prevent external users from direct- ly connecting to the servers, and protect the internal structure of the servers from Internet users. 13. C. You would first need to join the computer to the domain that contains the array. You would 26 mcse Practice Exam 6/5/01 12:20 PM Page 522 Please purchase PDF Split-Merge on www.verypdf.com to remove this watermark. [...]... watermark 29 mcse XB 6/5/01 12:28 PM Page 539 A P P E N D I X B ISA Setup Log This appendix consists of a copy of an ISA setup log made during the migration of a Proxy 2.0 server Isas.log Microsoft ISA Server Setup Log of 1-1-2001 21:46 ———————————————— ISA ISA ISA ISA ISA ISA ISA ISA ISA ISA ISA ISA Setup: Setup: Setup: Setup: Setup: Setup: Setup: Setup: Setup: Setup: Setup: Setup: LangId=1033 VerifyISAConditions... L5=Disable=1 L6=[inetinfo] L7=Disable=1 L8=[services] L9=Disable=1 L10=[spoolss] Please purchase PDF Split-Merge on www.verypdf.com to remove this watermark 28 mcse XA 6/5/01 12:22 PM Page 537 Appendix A MICROSOFT PROXY SERVER 2.0 CONFIGURATION BACKUP L11=Disable=1 L12=[rpcss] L13=Disable=1 L14=[kernel32] L15=Disable=1 L16=[mapisp32] L17=Disable=0 L18=[exchng32] L19=Disable=0 L20=[outlook] L21=Disable=0... configure the browser, in this case Microsoft Internet Explorer, to use the ISA Server IP address This will only pass HTTP requests to the ISA Server Configuring the ISA Server address as the computers default gateway creates SecureNAT clients, which will pass both HTTP and FTP requests to the ISA Server Connecting to the ISA Servers/MSPClnt share and running Setup.exe will install the firewall client... ISA Setup: ComponentChoosed camf=9 ois=0 or=821 DstDir=C:\msp\ ISA Setup: ComponentChoosed sim=1 ISA Setup: ComponentChoosed camf=10 ois=0 or=831 DstDir=NULL ISA Setup: ComponentChoosed sim=1 ISA Setup: ComponentChoosed camf=9 ois=0 or=831 DstDir=C:\msp\ ISA Setup: ComponentChoosed sim=1 ISA Setup: ComponentChoosed camf=18 ois=0 or=901 DstDir=C:\msp\ ISA Setup: ComponentChoosed sim=1 ISA Setup: DoServerAndAdminCommonStuff... ois=0 or=1001 DstDir=C:\msp\ ISA Setup: ComponentChoosed sim=1 ISA Setup: ComponentChoosed camf=12 ois=0 or=1001 DstDir=C:\msp\ ISA Setup: ComponentChoosed sim=1 ISA Setup: VerifyServerCondition camf=12 ois=0 or=1110 DstDir=C:\msp\ ISA Setup: VerifyServerCondition sma=0 ISA Setup: VerifyServerCondition camfSetModeOfObject returned DEFAULT!!! camf=12 ois=0 or=1110 DstDir=C:\msp\ ISA Setup: OldInstTrigger... or=751 DstDir=NULL ISA Setup: ComponentChoosed sim=1 ISA Setup: ComponentChoosed camf=0 ois=0 or=901 DstDir=NULL ISA Setup: ComponentChoosed sim=1 ISA Setup: DoServerAndAdminCommonStuff returned DEFAULT!!! camf=0 ois=0 or=9970 DstDir=NULL ISA Setup: ComponentChoosed camf=0 ois=0 or=821 DstDir=NULL ISA Setup: ComponentChoosed sim=1 ISA Setup: ComponentChoosed camf=0 ois=0 or=831 DstDir=NULL ISA Setup: ComponentChoosed... or=751 DstDir=NULL ISA Setup: ComponentChoosed sim=1 ISA Setup: ComponentChoosed camf=0 ois=0 or=901 DstDir=NULL ISA Setup: ComponentChoosed sim=1 ISA Setup: DoServerAndAdminCommonStuff returned DEFAULT!!! camf=0 ois=0 or=9970 DstDir=NULL ISA Setup: ComponentChoosed camf=0 ois=0 or=821 DstDir=NULL ISA Setup: ComponentChoosed sim=1 ISA Setup: ComponentChoosed camf=0 ois=0 or=831 DstDir=NULL ISA Setup: ComponentChoosed... DstDir=C:\msp\ ISA Setup: ComponentChoosed sim=1 ISA Setup: DoServerAndAdminCommonStuff returned DEFAULT!!! camf=10 ois=0 or=9970 DstDir=NULL ISA Setup: DoServerAndAdminCommonStuff returned DEFAULT!!! camf=9 ois=0 or=9970 DstDir=C:\msp\ ISA Setup: ComponentChoosed camf=10 ois=0 or=1001 DstDir=NULL ISA Setup: ComponentChoosed sim=1 ISA Setup: ComponentChoosed camf=9 ois=0 or=1001 DstDir=C:\msp\ ISA Setup:... cache server Dedicated is used when the server functions only as a dedicated firewall Integrated is not an option as a Security Level 45 A Use L2TP over IPSec, otherwise use PPTP Because Windows 98 clients do not support L2TP, your VPN server will still need to support PPTP The VPN server will attempt to negotiate L2TP first If the remote client is unable to use L2TP, then PPTP will be used 46 A ISA Server. .. DstDir=C:\msp\ ISA Setup: ComponentChoosed camf=18 ois=0 or=1001 DstDir=C:\msp\ ISA Setup: ComponentChoosed sim=1 ISA Setup: DoServerAndAdminCommonStuff returned DEFAULT!!! camf=18 ois=0 or=9970 DstDir=C:\msp\ ISA Setup: ComponentChoosed camf=18 ois=0 or=901 DstDir=C:\msp\ ISA Setup: ComponentChoosed sim=1 ISA Setup: DoServerAndAdminCommonStuff returned DEFAULT!!! camf=18 ois=0 or=9970 DstDir=C:\msp\ ISA Setup: . this information? A. ISA Server Bandwidth Control B. ISA Server Cache C. ISA Server Firewall Service D. ISA Server Packet Filter E. ISA Server Web Proxy Service 39 the ISA Server to ignore these requests C. Publish the intranet server in the ISA Server. D. Configure the client computer browsers to Bypass Proxy Server

Ngày đăng: 22/01/2014, 00:20