Loading ...
Global Do...
News & Politics
2
0
Try Now
Log In
Pricing
Your Partner of IT Exam http://www.exambible.com/ 70-350: Implementing Microsoft Internet Security and Acceleration(ISA) Server 2004 Version: Demo Your Partner of IT Exam http://www.exambible.com/ About Exambible Your Partner of IT Exam Found in 1998 Exambible is a company specialized on providing high quality IT exam practice study materials, especially Cisco CCNA, CCDA, CCNP, CCIE, Checkpoint CCSE, CompTIA A+, Network+ certification practice exams and so on. We guarantee that the candidates will not only pass any IT exam at the first attempt but also get profound understanding about the certificates they have got. There are so many alike companies in this industry, however, Exambible has its unique advantages that other companies could not achieve. Our Advances * 99.9% Uptime All examinations will be up to date. * 24/7 Quality Support We will provide service round the clock. * 100% Pass Rate Our guarantee that you will pass the exam. * Unique Gurantee If you do not pass the exam at the first time, we will not only arrange FULL REFUND for you, but also provide you another exam of your claim, ABSOLUTELY FREE! Your Partner of IT Exam http://www.exambible.com/ 1. You are the network administrator for Contoso, Ltd. The network contains an ISA Server 2004 computer named ISA1. You enable a cache drive on ISA1. ISA1 is a multi-homed server. A Web server named Web2 resides in a perimeter network. Web2 contains two company Web sites named http://internal.contoso.com and http://external.contoso.com. Members of the graphics team make frequent changes to the Web site named http://internal.contoso.com. When the team members update the Web site, they cannot see changes from other members of the team. You need to configure ISA1 to allow members of the graphics team to immediately view the updates to http://internal.contoso.com. What should you do? A. Add the contoso.com domain name to the list of domains on the Internal network. Disable the Bypass proxy for Web servers in this network option. B. Add the client computers used by the members of the graphics team to a computer set. Create a cache rule to include the computer set. Enable the Never. No content will ever be cached setting. C. Create a URL set for http://internal.contoso.com. Create a cache rule to include the URL set. Enable the Never. No content will ever be cached setting. D. Create a new computer set for Web2. Create a cache rule to include the computer set. Disable HTTP caching on the cache rule. Answer: C 2. You are the network administrator for Contoso, Ltd. The network contains two ISA Server 2004 computers named ISA1 and ISA2. The network also contains a Routing and Remote Access server named RRAS1. The company has a main office and one branch office. ISA2 uses a dial-up connection to connect to RRAS1. On ISA2, you create a Web chaining rule that redirects requests to ISA1. Users in the branch office frequently access a published Web site named http://sales.contoso.com. This sales Web site resides on a Web server in the perimeter network. Users in the branch office report that occasionally during business hours they cannot connect to http://sales.contoso.com. You configure and enable a content download job to ensure that Web site content is loaded into the Web cache on ISA2. You need to ensure that content from http://sales.contoso.com will always be available to users in the branch office, even if the connection is unavailable. What should you do on ISA2? A. Create a new Web chaining rule. On the rule, enable a backup route to ISA1. Add a URL set for http://sales.contoso.com to the Web chaining rule. On the default cache rule, increase the Time to Live Your Partner of IT Exam http://www.exambible.com/ (TTL) for HTTP objects. B. Create a new Web chaining rule. On the rule, redirect SSL requests as SSL requests.Add a URL set for http://sales.contoso.com to the Web chaining rule. On the default cache rule, decrease the Time to Live (TTL) for HTTP objects. C. Create a cache rule. Enable If any version of the object exists in cache. If none exists, route the request. Enable Content for offline browsing. On the cache rule, decrease the Time to Live (TTL) for HTTP objects. D. Create a cache rule. Enable Only if a valid version of the object exists in cache. If no valid version exists, route the request. Enable Content for offline browsing. On the cache rule, increase the Time to Live (TTL) for HTTP objects. Answer: C 3. You are the network administrator for your company. The network contains an ISA Server 2004 array. The array contains six members. You enable Cache Array Routing Protocol (CARP) so that outbound Web requests are resolved within the array. Soon after you enable CARP on the array, Web users on the corporate network report that Internet access is slower than normal. You use Network Monitor to check network traffic patterns on each of the ISA Server 2004 array members. You discover that there is very high network utilization on the intra-array network. You need to reduce the amount of intra-array traffic. What should you do? A. Enable Network Load Balancing on the intra-array network. B. Configure the client computers as SecureNAT clients. C. Use automatic discovery to configure the client computers as Web Proxy clients. D. Enable CARP on the intra-array network. Answer: C 4. You are the network administrator for your company. The company has a main office and three branch offices. The network contains an ISA Server 2004 computer named ISA1, which is located at the main office. You plan to deploy new ISA Server 2004 computers for the branch offices. You name one of the new computers ISA2. You perform the following tasks:Export the ISA Server 2004 configuration on Your Partner of IT Exam http://www.exambible.com/ ISA1 to a file named ISASETUPCONFIG.XML.Edit the ISASETUPCONFIG.XML file to include a valid external IP address. Create a file named C:\Msisaund.ini on ISA2. You install ISA Server 2004 on ISA2 by using an unattended installation. When the installation is finished, you discover that the ISA Server 2004 configuration settings from ISA1 are not copied to ISA2. You need to deploy the ISA Server 2004 computers in the branch offices with the configuration settings from ISA1. You want to accomplish this goal by using the minimum amount of administrative effort. What should you do? A. Export the system policy rules on ISA1 to another file named ISA1SystemPolicy.xml. Add the following lines to the C:\Msisaund.ini file on ISA2: IMPORTISACONFIG=1 IMPORT_CONFIG=ISASETUPCONFIG.XML IMPORT_CONFIG=ISA1SystemPolicy.xmlRun an unattended setup by using this Msisaund.ini file on each new ISA Server 2004 computer. B. Back up the array configuration on ISA1. Save the file as C:\Msisaunattended.xml.Run the following command from the ISA Server 2004 installation media: setup.exe /unattended:ISASETUPCONFIG.XML C:\Msisaund.ini C. Create an individual ISASETUPCONFIG.XML file for each branch office ISA Server 2004 computer.Edit each ISASETUPCONFIG.XML file to include the internal network addresses for the respective branch office.Edit the Msisaund.ini file from ISA2 by adding the following line: IMPORT_CONFIG_FILE=ISASETUPCONFIG.XMLRun an unattended setup by using the Msisaund.ini file from ISA2 on each new ISA Server 2004 computer. D. Create a file named Msisaunattend.txt. Include the following lines: UNATTENDED=1 EXPORT_ISACONFIG=0 IMPORT_ISACONFIG=1 FILEPATH=ISASETUPCONFIG.XMLRun an unattended setup by using this Msisaunattend.txt file on each new ISA Server 2004 computer. Answer: C 5. You are the network administrator for your company. The network contains an ISA Server 2000 computer named ISA1. ISA1 connects to the Internet. ISA1 is configured with access rules to allow Internet access for all users. All client computers are configured as Web Proxy clients of ISA1. You are deploying a new ISA Server 2004 computer named ISA2 for use by the research department. You run the ISA Server 2004 Migration Tool on ISA1. You save the resulting configuration to a file named Backupconfig.xml. You install ISA Server 2004 on ISA2, and you import Backupconfig.xml on ISA2. On ISA2, you configure the Internal network with a valid IP address range for the research department client Your Partner of IT Exam http://www.exambible.com/ computers. You configure a Web chaining rule on ISA2 to redirect Web requests to ISA1. You configure client computers in the research department as Web Proxy clients of ISA2. Users of the research department client computers report that they cannot connect to the Internet. You need to ensure that users of client computers in the research department can connect to the Internet. What should you do? A. Change the external IP address on ISA2 to a valid IP address for the external network. B. On ISA2, save its configuration as ISAbackup.xml. Restart the Microsoft Firewall service on ISA2. Then import the configuration. C. Configure the research department client computers as Firewall clients of ISA2. Enable automatic discovery on ISA2. D. Perform an ISA Server 2004 in-place upgrade on ISA1. On ISA2, configure access rules to allow Internet access for the research department users. Answer: A 6. You are the administrator of an ISA Server 2004 computer named ISA1. ISA1 has two network adapters. Access rules allow users on the Internal network to have HTTP access to the Internet. You add a third network adapter to ISA1 and connect the third network adapter to a perimeter network. You place a Web server named WebServer2 on this perimeter network segment. WebServer2 must be accessible to computers on the Internal network. You create a computer object for WebServer2 and then create an access rule that allows Internal network clients HTTP access to WebServer2. Users are not required to authenticate with ISA1 to access WebServer2. Users report that they cannot access information on WebServer2. When they attempt to access the Web site, they receive the following error message: Error Code 10060: Connection timeout. Background: There was a time out before the page could be retrieved. This might indicate that the network is congested or that the website is experiencing technical difficulties. You need to ensure that users on the Internal network can access information on WebServer2. First, you verify that WebServer2 is operational. What should you do next? A. Create a network rule that sets a route relationship between the Internal network and the perimeter network. B. Create a server publishing rule that publishes WebServer2 to the Internal network. C. Create a Web publishing rule that publishes WebServer2 to the Internal network. D. Create an access rule that allows WebServer2 access to the Internal network. Your Partner of IT Exam http://www.exambible.com/ Answer: A 7. You are a network administrator for your company. The network contains an ISA Server 2004 computer named ISA1. Remote users establish VPN connections to ISA1 to access resources on the Internal network. Remote users are required to use a smart card when they establish VPN connections. Another administrator reports that remote users can still establish VPN connections to ISA1 after their smart card certificate has been revoked and a new certification revocation list (CRL) has been published. You need to ensure that users whose smart card certificates are revoked cannot establish VPN connections to ISA1. What should you do? A. Select the Use RADIUS for authentication check box. B. Select the Extensible authentication protocol (EAP) with smart card or other certificate check box. C. Select the Verify that incoming client certificates are not revoked check box. D. Select the Verify that incoming server certificates are not revoked in a reverse scenario check box. Answer: C 8. You are the network administrator for your company. You install ISA Server 2004 on a computer that has three network adapters. One of the network adapters is connected to the Internet, one is connected to the Internal network, and one is connected to a perimeter network. The perimeter network adapter and the internal network adapter are connected to private address networks. You configure ISA Server by applying the 3-Leg Perimeter network template. You run the 3-Leg Perimeter Network Template wizard. You then make the following changes to the firewall policy:Create an access rule to allow all traffic between the Internal network and the Internet.Create an access rule to allow all traffic between the Internal network and the perimeter network.Create an access rule to allow SMTP traffic from an SMTP server on the perimeter network to a Microsoft Exchange Server computer on the Internal network.Create a server publishing rule to allow SMTP traffic from the External network to the SMTP server on the perimeter network. Users report that they cannot receive e-mail messages from users outside of the Internal network. You need to allow users to receive e-mail messages from other users on the Internet. You do not want to create a server publishing rule. What should you do? A. Change the network rule that controls the route relationship between the perimeter network and the Your Partner of IT Exam http://www.exambible.com/ Internal network to Route. B. Change all network rules that control the route relationships between the Internal network, perimeter network, and External network to Route. C. Change the network rule that controls the route relationship between the perimeter network and the External network to NAT. D. Change all network rules that control the route relationships between the Internal network, perimeter network, and External network to NAT. Answer: A 9. You are the network administrator for your company. The network contains an ISA Server 2004 computer named ISA1. You deploy an internal certification authority (CA). You deploy client certificates to users. You configure client certificate mapping for internal network users. All client computers are configured as Web Proxy clients. You configure the Internal network to allow only certificate-based authentication for Web Proxy clients. You revoke a users certificate. After one week, you discover that ISA1 is still authenticating Web requests for that user. You need to configure ISA1 to deny Internet access to the user. What should you do on ISA1? A. Add the All Networks (and Local Host) network set as a destination for the Allow access to directory services for authentication purposes system policy rule. B. Create a new content type set. Select the application/pkix-crl and application/x-x509-ca-cert MIME types as the content types to allow. C. Enable the Verify that incoming server certificates are not revoked in reverse scenario certificate validation setting on ISA1, and enable the related system policy rule. D. Enable the Verify that incoming client certificates are not revoked certificate validation setting on ISA1, and enable the related system policy rule. Answer: D 10. You are a network administrator for your company. The company has a main office and one branch office. The main office has a high-speed Internet connection. The branch office has a dial-up Internet connection. An administrator in the main office configures one ISA Server 2004 computer to provide Internet access to users in the main office. The administrator configures access rules and enables VPN Your Partner of IT Exam http://www.exambible.com/ access to the ISA Server computer. The access rules allow only authorized users access to the Internet. You install an ISA Server 2004 computer in the branch office. You need to configure the branch office ISA Server computer to meet the following requirements:Ensure that users in the branch office can access the Internet.Ensure that users in the branch office are restricted by the main office access rules when accessing the Internet.Ensure that all information sent over the Internet is encrypted between the offices. What should you do? A. Create a dial-up connection to the main office. Configure ISA Server to use the dial-up connection as the default gateway. Configure a dial-up user account. B. Create a dial-up connection to an ISP. Configure ISA Server to use the dial-up connection as the default gateway. Configure Web Proxy chaining. C. Create a demand-dial VPN connection to the main office. Configure ISA Server to use the VPN connection as the default gateway. Configure firewall chaining. Configure a firewall chaining user account. D. Create a demand-dial VPN connection to an ISP. Configure firewall chaining. Configure a firewall chaining user account. Answer: C Your Partner of IT Exam http://www.exambible.com/ Contact us We are proud of our high-quality customer service, which serves you around the clock 24/7. Contact us by emails Please allow up to 24 hours for us to respond problems about sales and so on problems about payment,installation, acitvation and so on Sales Email sales@exambible.com Support Email support@exambible.com Please Note: Please accept mail from an official, do not believe any of the other E-mail