Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống
1
/ 30 trang
THÔNG TIN TÀI LIỆU
Thông tin cơ bản
Định dạng
Số trang
30
Dung lượng
157,62 KB
Nội dung
PRACTICE EXAM 513
34. You are administering an ISAServer array, and
want to create a site and content rule to allow
users to gain access to a Web site. When you
attempt to create this rule, the option to allow
access is not available, you can only deny access.
What is causing this problem?
A. You must be a member of the Enterprise
Admins group to configure this rule.
B. There is already a rule to allow access to the
Web site configured.
C. There is an Enterprise policy defined for this
array.
D. Array policies are only defined to deny access,
not allow access.
35. As the network administrator for your organiza-
tion, you are in the process of installing ISA
Server. You have selected the Integrated installa-
tion mode, because you want to have the ISA
Server perform forward caching. When the instal-
lation program presents you with the interface to
specify the initial cache size, there are no drives
listed in the drive selection box. What is the
cause of this problem?
A. There is insufficient drive space available for
caching.
B. There is only one volume on the hard drive.
The cache must be on a separate volume than
the operating system.
C. There are no NTFS volumes on the system.
D. Caching is not available in Integrated mode.
36. Your company has established a joint venture
with another company, and some of your
employees will be working at the partner compa-
ny’s location. These users will need to connect to
your company’s intranet site from the remote
location. The partner company uses a third-party
proxy server product. Which authentication
method should you use to provide secure access
to your intranet from the partner company’s loca-
tion?
A. Basic Authentication
B. Digest Authentication
C. Integrated Windows Authentication
D. Client Certificate Authentication
37. Your company has a secure intranet site that you
would like to make available over the public
Internet. The Web server runs Microsoft Internet
Information Server v5, and is accessible on the
private network. The Web server is configured to
use Integrated Windows Authentication. When
users access the Web server on the private net-
work, they authenticate normally by entering
their ID and password. When users attempt to
access the server from across the Internet, they are
forced to enter their ID and password twice.
Which of the following explains why this is
happening?
A. This is normal Windows NT Challenge/
Response authentication behavior.
B. Because the ISAServer and the IIS server are
using two different authentication methods.
C. The ISAServer must always authenticate a
user to a Windows domain before passing the
request to the Web server.
D. Because the ISA listener is configured to
require authentication. This authentication is
in addition to any authentication performed
by the Web server.
38. You have been asked by the network administra-
tor for some assistance. The administrator would
like to determine if the current ISAServer config-
uration and hardware is providing acceptable
26 mcse Practice Exam 6/5/01 12:20 PM Page 513
Please purchase PDF Split-Merge on www.verypdf.com to remove this watermark.
514 PRACTICE EXAM
Winsock-based application to only the three users
that require it?
A. Configure all the clients as Web proxy clients.
B. Configure all the clients as SecureNAT
clients.
C. Configure all the clients as firewall clients.
D. Configure all the clients as Web proxy clients,
and the users requiring access to the Winsock
application, install the firewall client.
E. Configure all the clients as Web proxy clients,
and the users requiring access to the Winsock
application, install the SecureNAT client.
41. The manager of a real-estate office calls you with
a problem. The local telephone company has
installed a DSL line into the office to provide
Internet access to the agents. The office has a
Windows 2000 Server that they use for file and
print sharing. The manager tells you that one of
her agents has the responsibility of creating and
managing their Web page. Her problem is that
several of the other agents are using this Internet
connection to download pictures, MP3 files, and
other unnecessary files. She would like to permit
only the one agent the capability to FTP files to
and from the Internet, and all other users the
capability to only use the connection for Web
browsing. Which of the following methods would
you use to provide this security to this company?
A. Web proxy client
B. SecureNAT client
C. Firewall client
D. Winsock proxy client
42. The network administrator of the company that
you work for has asked to you handle the config-
uration of the end-user computers for him. He
informs you that the company has installed and
performance for servicing user requests to Web
pages on the Internet. You would like to verify
that the company’s connection to the Internet is
utilized as efficiently as possible. Which of the
following Performance Monitor object would you
select to evaluate this information?
A. ISAServer Bandwidth Control
B. ISAServer Cache
C. ISAServer Firewall Service
D. ISAServer Packet Filter
E. ISAServer Web Proxy Service
39. Your company has recently created its public Web
site, and has also configured a DNS server to
handle name resolution for Internet clients.
Because the DNS server has a network interface
for both the Internet and the internal network,
you have decided to install ISAServer on the
computer running DNS. You need to configure a
packet filter to allow the DNS service to continue
to respond to DNS queries from the Internet.
Which of the following port numbers should you
allow access to from the Internet? (Select two
answers.)
A. TCP port 25
B. UDP port 35
C. UDP port 25
D. TCP port 53
E. TCP port 35
F. UDP port 53
40. As the network administrator for an insurance
company, you need to provide access to an
Internet-based, Winsock-based application for
three of your users. You also would like to
provide access to Web sites for all your users.
Which of the following will allow access to the
26 mcse Practice Exam 6/5/01 12:20 PM Page 514
Please purchase PDF Split-Merge on www.verypdf.com to remove this watermark.
PRACTICE EXAM 515
configured a new ISA Server, and he asks you to
configure all of the end user computers to be
Web proxy clients. The company has 200
Windows 98 computers, 10 Windows NT 4.0
computers, and 75 Windows 2000 Professional
computers. You have also installed Microsoft
Internet Explorer 5.0 on all computers. How
would you configure each of the computers to be
Web proxy clients?
A. Open the TCP/IP properties, and set the
Default Gateway to the IP address of the ISA
Server.
B. Open the Properties page of Internet
Explorer, place a check mark in the Use a
Proxy Server box, and specify the IP address
and port numbers for the ISA Server.
C. From each computer, connect to the
\MSPClnt share of the ISA Server, and run
Setup.exe.
D. At each of your routers, create a static route
of 0.0.0.0, and set the gateway address of the
route to the IP address of the ISA Server.
43. The Information Systems manager of your com-
pany has requested that you assist her with a pro-
ject. Your company has a mail server that is used
for internal email only. She would like to make
the mail server accessible over the Internet, so
users can access their mailboxes from other loca-
tions, and customers can send email directly to
your employees. She requires that the mail server
be secure, as it also is used for file and print ser-
vices. She would also like to have content filtering
applied to all incoming email. What is the sim-
plest method of making this server available?
A. Publish the server using the Mail Server
Security Wizard. The default options are SSL
authentication and the application of content
filters on incoming email.
B. Publish the server using the Mail Server
Security Wizard. Select the option use SSL
authentication and the application of content
filters on incoming email.
C. Publish the server using the Mail Server
Security Wizard. Configure the ISAServer to
use IPSec to connect to the mail server, and
create a content filter rule for incoming email.
D. Publish the server using the Mail Server
Security Wizard. Configure the ISAServer to
use IPSec for client connections over the
Internet, which will secure communications.
Create a content filter rule for incoming
email.
44. You have been hired to assist a small manufac-
turing company provide Internet access to its
employees. The company has 45 computers run-
ning Windows 98 and 20 computers running
Windows 2000 Professional. The company also
has four Windows 2000 Server computers, one is
a domain controller only, and one is a domain
controller and also hosts the users home directo-
ries. Another server runs Exchange 2000, and the
fourth server hosts the company’s Web site. You
have decided to install ISAServer on the Web
server. Which of the following Security Levels
should you select for this scenario?
A. Secure
B. Limited Services
C. Dedicated
D. Integrated
45. As the network administrator for a small comput-
er consulting firm, several of the employees are
requesting access to the internal network from
customer locations. You have decided to use
ISA Server’s Virtual Private Networking feature
to accomplish this. The consultants in your
26 mcse Practice Exam 6/5/01 12:20 PM Page 515
Please purchase PDF Split-Merge on www.verypdf.com to remove this watermark.
516 PRACTICE EXAM
site, the Web administrator has changed to the
port number used to connect to the site to
27443. All three Web sites are published to the
ISA Server. Employees at remote locations are
unable to connect to the employee’s only site.
What must be done to correct this problem?
A. You must change the employees’ site back to
the default TCP port for HTTPS.
B. On the Web Publishing Rules Properties
page, set the Use This Port For Redirecting
HTTP Requests box to 27443.
C. On the Web Publishing Rules Properties
page, set the Use This port For Redirecting
SSL Requests box to 27443.
D. On the Web Publishing Rules Properties
page, set the Use This Port For Redirecting
FTP Requests box to 27443.
48. As the network administrator for a large compa-
ny, you have been assigned the task of creating
the ISAServer structure. Your company has
8,000 users, who are roughly divided equally
across the domain root and three child domains.
All the users work at your company’s office com-
plex, in which all the buildings are connected via
T1 lines in a single site. After doing your perfor-
mance evaluation, you determine that you will
create an array of four ISAServer computers to
support all of the users. Which of the below
guidelines should you follow to correctly create
the ISAServer array? (Select two answers.)
A. Have one of the ISA Servers in each of the
domains.
B. All members of the array are required to be
members of the forest root domain.
C. All members of the array are required to be
members of the same domain.
D. Use the installation mode for a particular
member that most closely applies to the users
for a particular domain.
company have laptop computers, some running
Windows 2000 Professional, some are running
Windows 98. Which of VPN Protocol selections
would you choose to provide the most secure
method for your remote users to connect to your
internal network?
A. Use L2TP over IPSec, if available; otherwise
use PPTP.
B. Use L2TP over IPSec.
C. Use PPTP.
D. Use IPSec.
46. You are a member of a team that has been
assigned the role of installing and configuring
your company’s ISAServer deployment. Your
team has been asked to present a demonstration
of some of ISAServer capabilities to the execu-
tives. You have been asked to print some of the
reports available in ISA Server. After installing
ISA Server with the default options, you attempt
to create some reports, but are unable to do so.
What is most likely the cause of this problem?
A. There are no log files available for the reports
you are trying to print.
B. The default installation of ISAServer does
not include a reporting module.
C. You must be a member of the ISAadmin
group to print reports.
D. You have installed ISAServer as a standalone
server. Only arrays provide the option of
printing reports.
47. You work for a software-development company.
The company has a public Web site, as well as a
secure Web site for existing customers. Both the
public and secure sites use the default TCP port
numbers. Your company also has a secure site for
employees only. To protect the employees-only
26 mcse Practice Exam 6/5/01 12:20 PM Page 516
Please purchase PDF Split-Merge on www.verypdf.com to remove this watermark.
PRACTICE EXAM 517
E. Use the same installation mode for all mem-
bers of the array.
F. You can only install array members using
Integrated mode.
49. As the security administrator for your company,
you want to ensure that the ISAServer never
responds to any outside connection attempts that
use the telnet protocol. You have installed the tel-
net service on the ISAServer so you can do
remote administration from inside the network.
Which port number should you create an IP
packet filter for to prevent an outside user to
telnet into your ISA Server?
A. TCP 25
B. TCP 23
C. UDP 23
D. UDP 25
E. TCP32
50. The Human Resources manager of your company
needs your help. The users in her department
need access to an application across the Internet.
All the users have Microsoft Internet Explorer
5.0. You have already created the permissions for
the appropriate groups, and allowed access to the
protocols required by the application. You have
notified the HR manager that all that is left to do
is to deploy the firewall client. Which of the fol-
lowing could be used to deploy the firewall client
software to the HR department’s users? (Select
two answers.)
A. Have the users connect to the ISA Server’s
\MSPCLNT share, and run setup.exe.
B. Have the users connect to the ISA Server’s
\PRXYCLNT share and run setup.exe.
C. Have the users open the URL to a Web server
that you have copied the default.htm and
setup.bat files from the ISA Server’s
\WEBINST folder, and select the link “ISA
CLIENT SOFTWARE.”
D. Create an installation disk set, and have the
HR manager install the software manually.
E. Have the users open the URL to a Web server
that you have copied the default.htm and
setup.bat files from the ISA Server’s
\WEBINST folder, save the file setup.bat to
their hard drive, and run it from the saved
location.
51. You have been hired by a firm to assist them with
the installation and configuration of ISA Server.
The firm is a contractor with the Department of
Defense, and must provide information to the
DoD for auditing purposes. To ensure that the
correct information is available in the Security
reports, which of the following logs and sum-
maries must be available to print the reports.
(Select three answers.)
A. Web Proxy logs
B. Firewall Service logs
C. Application Filter logs
D. SecureNAT logs
E. Bandwidth logs
F. Site and Content logs
G. Packet Filter logs
52. Your company created a private Web site for its
customers to obtain billing and shipping infor-
mation. You are using an ISAServer as the
firewall from the Internet. Because sensitive
information is to be passed back to the customer,
you would like to secure communications
between the Internet client, and your ISA Server.
Which of the features of ISAServer provides this
function?
26 mcse Practice Exam 6/5/01 12:20 PM Page 517
Please purchase PDF Split-Merge on www.verypdf.com to remove this watermark.
518 PRACTICE EXAM
B. A PTR record for the CEO’s computer IP
address.
C. A SRV record for the Q931 service at the
H.323 Gatekeeper’s IP address.
D. A SRV record for the H323 service at the
H.323 Gatekeeper’s IP address.
E. A MX record for the email server. The email
server will locate the user.
55. You have just installed Microsoft ISAServer for
your organization. Other members of the
Information Systems department, including your-
self, test the ISAServer from your computers,
which are on the same subnet as the ISA Server,
and connect to external Web sites with no prob-
lem. When you attempt to connect to the
Internet from other users computers on different
subnets, you are unable to connect to the
Internet. Where would you begin troubleshooting
your ISA installation?
A. Be sure that users have permissions to
communicate with the ISA Server.
B. The Local Address Table.
C. The ISA Server’s internal routing table.
D. The ISA Server’s host name and IP address.
56. You completed a default installation of ISA
Server. You have determined that you would like
to apply the Limited Services security level to the
server. When you run the ISAServer Security
Configuration Wizard, and select the Limited
Services option, you receive an error message that
the process failed. Which of the following is the
reason this is occurring?
A. You do not have ISA Admin permissions.
B. You have installed ISA on a domain
controller.
A. IPSec
B. L2TP
C. SSL Bridging
D. SSL
53. Your company has recently upgraded its network
to a Windows 2000 domain, RIPCO.COM. The
organization has maintained a public Web site for
several months, and your Internet Service
Provider (ISP) hosts this site. You have just
installed an ISA Server, and configured your user’s
computers Web browsers with the IP address of
the ISA Server, and the correct port number for
HTTP. Users can connect to Web sites with no
problems. You have also recently created an
intranet site that hosts an application that your
employees use for billing and Human Recourse
purposes. You now find that users cannot connect
to the intranet site. What would be the simplest
method for resolving this problem?
A. Install the firewall client on each computer.
B. Configure the ISAServer to ignore these
requests
C. Publish the intranet server in the ISA Server.
D. Configure the client computer browsers to
Bypass Proxy Server for Local Addresses.
54. The CEO of your company wants to use
Microsoft NetMeeting to conference with execu-
tives of other companies. You have created the
H.323 Gatekeeper and H.323 filter to allow
incoming calls. You must also create a record in
DNS so the address of the CEO’s computer can
be found. How should the DNS record be con-
figured so users can contact the CEO via
NetMeeting?
A. An A record for the CEO’s computer IP
address.
26 mcse Practice Exam 6/5/01 12:20 PM Page 518
Please purchase PDF Split-Merge on www.verypdf.com to remove this watermark.
PRACTICE EXAM 519
C. You must stop the ISAServer service to
change security level.
D. The template files are not in the
systemroot\security\templates folder.
57. You created a secure intranet Web site for your
employees. They will be managing their
timesheets, tracking vacation days, and viewing
information about your company’s projects. You
have secured this Web site by using Integrated
Windows Authentication. One of your employees
calls, indicating that he cannot connect to the
Web site from your internal network. Which of
the following is a reason why this user cannot
connect to the intranet site?
A. He is using Internet Explorer 3.0.
B. His password to the intranet site is different
than his domain password.
C. He is on a computer running Windows 98.
D. He is using the Netscape Web browser.
58. The CEO of your firm is concerned about viruses
attached to email messages infecting your system.
He is especially concerned about Vbscript attach-
ments. He has asked you if there is anyway to
prevent these types of files from entering the net-
work via email. How would you go about pre-
venting Visual Basic script attachments from get-
ting to your email server using ISA Server?
A. Create a protocol filter denying access to TCP
port 25.
B. Create a site and content rule, and deny .vbs
file types.
C. Configure the SMTP filter under Application
Filters, and select the option to Disallow an
SMTP command.
D. Configure the SMTP filter under Application
Filters. On the Attachments tab, add the Mail
Attachment Rule, and select Attachment
Extension.
E. Configure the SMTP filter under Application
Filters. On the Attachments tab, add the Mail
Attachment Rule, and select Attachment
Name.
59. The Information Systems Manager of your com-
pany has asked you to be part of the Network
Capacity team. The responsibility of this team is
to monitor activity on the company’s network,
and to make recommendations to improve per-
formance. You have been asked to monitor and
report on Internet activity. The team leader has
asked that you give her a report showing which
members of the company utilize the Internet the
most, and which Web browsers they are using.
Which of the following ISA reports would you
print to provide this information to the team
lead?
A. Summary Reports
B. Web Usage Reports
C. Application Usage Reports
D. Traffic and Utilization Reports
E. Security Reports
60. The network administrator has asked for your
assistance with a problem. Several of the users on
the network are downloading MP3 files from the
Internet and storing them in their home directo-
ries on one of the servers. She would like to pre-
vent users from downloading MP3 files from the
Internet. Which of the following is the correct
method for preventing users from downloading
MP3 files?
A. Create a Destination set for .mp3.* and deny
access to all users.
B. Create a Protocol definition for mp3, and
deny access to all users.
26 mcse Practice Exam 6/5/01 12:20 PM Page 519
Please purchase PDF Split-Merge on www.verypdf.com to remove this watermark.
520 PRACTICE EXAM
computers, and 10 Windows NT 4.0
Workstation computers. The company has three
Windows NT 4.0 server computers, two acting as
file and print servers, and one acting as a domain
controller. The administrator would like to pro-
vide access only for Web browsing. How would
you configure the users computers to meet these
requirements?
A. Web proxy clients
B. SecureNAT clients
C. Firewall clients
D. Winsock proxy clients
64. You have been hired to consult for a large manu-
facturing company on its ISAServer implementa-
tion. The organization has 6,000 computers run-
ning a variety of operating systems. The project
lead for the company informs you that they will
be required to use the firewall client, as they need
to provide Internet access based on user identifi-
cation. He asks you to provide him with a list of
operating systems on which the firewall client can
be installed. Which of the following operating
systems support the firewall client? (Select all that
apply.)
A. Windows Millennium Edition
B. Windows for Workgroups 3.11
C. Windows 95
D. Windows 95 OSR2
E. Windows 98
F. Windows 98 Second Edition
G. Windows NT 3.51
H. Windows NT 4.0
I. Windows 2000
C. Create a Content group for mp3, and deny
access to all users.
D. Use the predefined Audio Content Type, and
deny access to all users.
61. You have been hired by a large software-publish-
ing company to assist them with the installation
and configuration of their ISA Servers. The com-
pany has an array of three ISA Servers at their
main office. Each of the company’s five remote
offices also has an ISA Server. All the remote
offices are connected to the main office by means
of a Frame Relay Private Virtual Circuit. The IS
manager would like to log information from all
of the organizations ISA Servers to a single loca-
tion. Which of the following formats would you
select in this situation?
A. W3C format
B. ISA format
C. ODBC format
D. CSV format
62. Your organization has decided to implement
Microsoft ISAServer to provide Internet access
for its users, and to protect its internal resources
from intrusion from the Internet. The company
has approximately 1,500 users. Which of the fol-
lowing are the recommended hardware require-
ments for this configuration?
A. Pentium II 300Mhz with 128MB RAM.
B. Pentium II 300Mhz with 256MB RAM.
C. Pentium III 55Mhz with 128MB RAM.
D. Pentium III 550Mhz with 256MB RAM.
63. The network administrator of a small manufac-
turing company has asked you to assist him in
providing Internet access to the 50 users in his
company. The organization has 40 Windows 98
26 mcse Practice Exam 6/5/01 12:20 PM Page 520
Please purchase PDF Split-Merge on www.verypdf.com to remove this watermark.
PRACTICE EXAM 521
65. You have agreed to act as a security consultant for
a small publishing company. The company wants
to provide Internet access to their internal users.
They have a Windows 2000 native mode
domain, email that is hosted by their Internet
Service Provider, and three Windows 2000 mem-
ber servers. The organization consists of 10 PCs
running Windows 2000 Professional, and 16 PCs
running Windows 98. The president of the com-
pany wants to determine if she should purchase
the Enterprise Edition or Standard Edition of
Microsoft ISA Server. Which of the following fea-
tures are available in the Enterprise edition, and
not available in the Standard edition? (Choose
three answers.)
A. Hierarchical caching
B. Enterprise Policy
C. Bandwidth control
D. Packet filtering
E. Active Directory Integration
F. Distributed caching
G. Server publishing
ANSWERS TO EXAM
QUESTIONS
1. B. No, this cannot be done. Unlike Web pub-
lishing, you cannot use a different port for the
ISA Server to connect to a published server.
2. B, C. With the Web proxy service logs and fire-
wall service logs available, you would be able to
print traffic and utilization reports to determine
areas where bandwidth is over- or under-utilized.
You could also create a Performance Monitor log,
using the ISAServer Bandwidth Control object,
and capture the appropriate counters to view this
information. With this information, you can
make appropriate modifications to Bandwidth
Rules.
3. A. Reverse caching assists in minimizing net-
work traffic on the internal network. Once the
ISA Server has cached the Web page from your
internal Web server, it will provide this content to
subsequent external requests from its cache, with-
out generating any traffic on the internal net-
work. Forward caching refers to internal clients
obtaining content from the external network, the
Internet.
4. A. Because the Enterprise Initialization Utility
makes modifications to the Schema, you will only
want to run this utility when network perfor-
mance will be least affected. The utility contacts
the domain controller that holds the Schema
Master role, and makes the modifications. These
modifications must then be replicated out to all
domain controllers in the forest.
5. A. Events must be enabled on the ISAServer to
allow alerts to function. To enable Events, expand
the server or array name, and then expand
Monitoring Configuration. Open the Alerts fold-
er, and double-click the alert you want to use.
Placing a check mark in the Enable box activates
the alert.
6. C. The array policies would need to be rede-
fined. When an enterprise policy is applied to an
existing array, the array policies are deleted.
7. E. An ISAServer in firewall mode can be con-
figured to use Virtual Private Networking. The
sales staff at remote locations can then securely
connect to the internal network, and access
resources as if they were in the office.
8. C. Windows 2000 Service Pack 1 is also
required to install ISA Server. Because you
26 mcse Practice Exam 6/5/01 12:20 PM Page 521
Please purchase PDF Split-Merge on www.verypdf.com to remove this watermark.
522 PRACTICE EXAM
then be able to promote the standalone server to
a member of the array.
14. D. To configure an array to chain up to another
array, open the ISA MMC snap-in. Under the
Array option, select Network Configuration. You
will then have an option to Configure Firewall
Chaining. From this interface, you can configure
the array to forward request to.
15. C. A feature of ISAServer is the capability to
save reports as Web (HTML) pages. The admin-
istrators would then have the capability to pub-
lish their reports to the intranet server, where
their Web browser can then view them easily.
Assuming the intranet server is also connected to
the Internet, the administrators would then be
able to view this information from any location.
16. A. Use L2TP over IPSec, if available; otherwise
use PPTP. Because some of the computers are not
using Windows 2000, you will still be required to
support PPTP. The Windows 2000 computers
will negotiate the use of L2TP with the VPN
server, which will provide you with the highest
level of security. You would be able to modify this
setting to Use L2TP over IPSec, and eliminate
the need for PPTP after all the remote computers
have been upgraded to Windows 2000.
17. B. The computers at the remote clinics will
require the firewall client to access this applica-
tion. You may be required to do some additional
configuration to allow access to the application,
depending on the port that is being used. The
Web proxy client and SecureNAT client will only
allow access to the HTTP and FTP protocols.
18. D. Based on the information in the question, D
is the correct option. Because you are required to
set priorities for specific groups, using Client
Types page, where you can specify Any user,
group, or computer, or specific users and groups,
installed Windows 2000 with the default options,
Internet Information Server is already installed.
DNS and WINS are not required options on the
computer running ISA Server.
9. B, D. Because the internal and ISP’s DNS
servers are authoritative for the DNS namespace
of MYCO.COM, you will need to manually
update the internal DNS server with the IP
address of the company’s Web server. You should
also verify the DNS queries are allowed to pass
through the ISAServer to the Internet for name
resolution of external domain names.
10. A. Because EXTARRAY is connected to the
Internet and the perimeter network, the only
address range that should be in its Local Address
Table is the perimeter network address range. The
array that is connected to the perimeter network
and the private network will have the private net-
work ranges in its Local Address Table.
11. D. Based on the fact that the hostname can be
resolved via ping, but not via the ISA Server, the
Local Domain Table would be the place to start.
Because the site you are trying to connect to is
internal only, it must be resolved by your internal
DNS. If the ISAServer does not have the domain
name in the Local Domain Table, it will attempt
to resolve the name via external DNS.
12. B. By enabling routing and packet filtering
between the corporate network interface and the
perimeter network resources, you are allowing
your users direct access to the resources.
Publishing servers to the Internet through the
ISA Server will prevent external users from direct-
ly connecting to the servers, and protect the
internal structure of the servers from Internet
users.
13. C. You would first need to join the computer to
the domain that contains the array. You would
26 mcse Practice Exam 6/5/01 12:20 PM Page 522
Please purchase PDF Split-Merge on www.verypdf.com to remove this watermark.
[...]... watermark 29 mcse XB 6/5/01 12:28 PM Page 539 A P P E N D I X B ISA Setup Log This appendix consists of a copy of an ISA setup log made during the migration of a Proxy 2.0 server Isas.log Microsoft ISAServer Setup Log of 1-1-2001 21:46 ———————————————— ISA ISAISAISAISAISAISAISAISAISAISAISA Setup: Setup: Setup: Setup: Setup: Setup: Setup: Setup: Setup: Setup: Setup: Setup: LangId=1033 VerifyISAConditions... L5=Disable=1 L6=[inetinfo] L7=Disable=1 L8=[services] L9=Disable=1 L10=[spoolss] Please purchase PDF Split-Merge on www.verypdf.com to remove this watermark 28 mcse XA 6/5/01 12:22 PM Page 537 Appendix A MICROSOFT PROXY SERVER 2.0 CONFIGURATION BACKUP L11=Disable=1 L12=[rpcss] L13=Disable=1 L14=[kernel32] L15=Disable=1 L16=[mapisp32] L17=Disable=0 L18=[exchng32] L19=Disable=0 L20=[outlook] L21=Disable=0... configure the browser, in this case Microsoft Internet Explorer, to use the ISAServer IP address This will only pass HTTP requests to the ISA Server Configuring the ISA Server address as the computers default gateway creates SecureNAT clients, which will pass both HTTP and FTP requests to the ISA Server Connecting to the ISA Servers/MSPClnt share and running Setup.exe will install the firewall client... ISA Setup: ComponentChoosed camf=9 ois=0 or=821 DstDir=C:\msp\ ISA Setup: ComponentChoosed sim=1 ISA Setup: ComponentChoosed camf=10 ois=0 or=831 DstDir=NULL ISA Setup: ComponentChoosed sim=1 ISA Setup: ComponentChoosed camf=9 ois=0 or=831 DstDir=C:\msp\ ISA Setup: ComponentChoosed sim=1 ISA Setup: ComponentChoosed camf=18 ois=0 or=901 DstDir=C:\msp\ ISA Setup: ComponentChoosed sim=1 ISA Setup: DoServerAndAdminCommonStuff... ois=0 or=1001 DstDir=C:\msp\ ISA Setup: ComponentChoosed sim=1 ISA Setup: ComponentChoosed camf=12 ois=0 or=1001 DstDir=C:\msp\ ISA Setup: ComponentChoosed sim=1 ISA Setup: VerifyServerCondition camf=12 ois=0 or=1110 DstDir=C:\msp\ ISA Setup: VerifyServerCondition sma=0 ISA Setup: VerifyServerCondition camfSetModeOfObject returned DEFAULT!!! camf=12 ois=0 or=1110 DstDir=C:\msp\ ISA Setup: OldInstTrigger... or=751 DstDir=NULL ISA Setup: ComponentChoosed sim=1 ISA Setup: ComponentChoosed camf=0 ois=0 or=901 DstDir=NULL ISA Setup: ComponentChoosed sim=1 ISA Setup: DoServerAndAdminCommonStuff returned DEFAULT!!! camf=0 ois=0 or=9970 DstDir=NULL ISA Setup: ComponentChoosed camf=0 ois=0 or=821 DstDir=NULL ISA Setup: ComponentChoosed sim=1 ISA Setup: ComponentChoosed camf=0 ois=0 or=831 DstDir=NULL ISA Setup: ComponentChoosed... or=751 DstDir=NULL ISA Setup: ComponentChoosed sim=1 ISA Setup: ComponentChoosed camf=0 ois=0 or=901 DstDir=NULL ISA Setup: ComponentChoosed sim=1 ISA Setup: DoServerAndAdminCommonStuff returned DEFAULT!!! camf=0 ois=0 or=9970 DstDir=NULL ISA Setup: ComponentChoosed camf=0 ois=0 or=821 DstDir=NULL ISA Setup: ComponentChoosed sim=1 ISA Setup: ComponentChoosed camf=0 ois=0 or=831 DstDir=NULL ISA Setup: ComponentChoosed... DstDir=C:\msp\ ISA Setup: ComponentChoosed sim=1 ISA Setup: DoServerAndAdminCommonStuff returned DEFAULT!!! camf=10 ois=0 or=9970 DstDir=NULL ISA Setup: DoServerAndAdminCommonStuff returned DEFAULT!!! camf=9 ois=0 or=9970 DstDir=C:\msp\ ISA Setup: ComponentChoosed camf=10 ois=0 or=1001 DstDir=NULL ISA Setup: ComponentChoosed sim=1 ISA Setup: ComponentChoosed camf=9 ois=0 or=1001 DstDir=C:\msp\ ISA Setup:... cache server Dedicated is used when the server functions only as a dedicated firewall Integrated is not an option as a Security Level 45 A Use L2TP over IPSec, otherwise use PPTP Because Windows 98 clients do not support L2TP, your VPN server will still need to support PPTP The VPN server will attempt to negotiate L2TP first If the remote client is unable to use L2TP, then PPTP will be used 46 A ISA Server. .. DstDir=C:\msp\ ISA Setup: ComponentChoosed camf=18 ois=0 or=1001 DstDir=C:\msp\ ISA Setup: ComponentChoosed sim=1 ISA Setup: DoServerAndAdminCommonStuff returned DEFAULT!!! camf=18 ois=0 or=9970 DstDir=C:\msp\ ISA Setup: ComponentChoosed camf=18 ois=0 or=901 DstDir=C:\msp\ ISA Setup: ComponentChoosed sim=1 ISA Setup: DoServerAndAdminCommonStuff returned DEFAULT!!! camf=18 ois=0 or=9970 DstDir=C:\msp\ ISA Setup: . this information?
A. ISA Server Bandwidth Control
B. ISA Server Cache
C. ISA Server Firewall Service
D. ISA Server Packet Filter
E. ISA Server Web Proxy Service
39 the ISA Server to ignore these
requests
C. Publish the intranet server in the ISA Server.
D. Configure the client computer browsers to
Bypass Proxy Server