Monday, October 12, 2009

70-351 dumps, Microsoft 70-351 Exam, 70-351 test questions, 70-351 torrent, 70-351 study guide, 70-351 ebook, 70-351 PDF, 70-351 VCE

(70-351) TS:MS Internet Security & Acceleration Serv 2006, Configuring

Microsoft 70-351 Exam - Certifysky.com

Free 70-351 Sample Questions:

1. Your network contains a single ISA Server 2006 computer named ISA1. ISA1 is not yet configured to allow inbound VPN access.
You deploy a new application named App1. The server component of App1 is installed on an internal server named Server1. The client component of App1 is installed on employee and partner computers. Employees and partners will establish VPN connections when they use App1 from outside the corporate network.
You identify the following requirements regarding VPN connections to the corporate network.
Employees must be allowed access to only Server1, three file servers, and an internal Web server named Web1.
Employees must have installed all current software updates and antivirus software before connecting to any internal resources.
Partners must be allowed access to only Server1.
You must not install any software other than the App1 client on any partner computers.
You need to plan the VPN configuration for the company.
What should you do?
A. Configure ISA1 to accept incoming VPN connections from partners and employees.
Enable Quarantine Control on ISA1.
Configure Quarantine Control to disconnect users after a short period of time.
Use access rules to allow access to only the permitted resources.
B. Configure ISA1 to accept incoming VPN connections from partners and employees.
Enable Quarantine Control on ISA1.
Exempt partners from Quarantine Control.
Use access rules to allow access to only the permitted resources.
C. Configure ISA1 to accept incoming VPN connections from partners and employees.
Enable Quarantine Control on ISA1.
Enable RADIUS authentication and user namespace mapping.
Configure a Windows Server 2003 Routing and Remote Access server as a RADIUS server.
Create a single remote access policy.
D. Add a second ISA Server 2006 computer named ISA2.
Configure ISA1 to accept VPN connections from employees. Do not enable Quarantine Control on ISA1.
Configure ISA2 to accept VPN connections from partners. Enable Quarantine Control on ISA2.
On each server, use access rules to allow access to only the permitted resources.
Answer: B

2. Your network contains an ISA Server 2006 computer named ISA1.
ISA1 is connected to the Internet. VPN access is configured to ISA1. RADIUS is configured as the only type of authentication for VPN connections. All remote users can connect to ISA1 by using a VPN connection. All internal users can connect to the Internet.
You are replacing ISA1 with a new ISA Server computer named ISA2. You export the network-level node configuration settings on ISA1 to a file named ISAconfig.xml. You import the ISAconfig.xml file on ISA2. You replace ISA1 with ISA2 on the network.
Remote VPN users report that they cannot authenticate to gain access to the network. Internal network users report that they cannot connect to the Internet.
You need to configure ISA2 to allow incoming and outgoing access for company users.
What should you do?
A. Export the system policy configuration settings on ISA1 to an .xml file. Import the .xml file on ISA2.
B. Export the array configuration settings on ISA1. Include confidential information in the exported configuration file. Import the file on ISA2.
C. Export the array configuration settings on ISA1. Include user permission settings in the exported configuration file. Import the file on ISA2.
D. Export the VPN Clients configuration on ISA1. Include confidential information in the exported configuration file. Import the file on ISA2.
Answer: B

3. Your network consists of a single Active Directory domain. The network contains an ISA Server 2006 computer named ISA1. Client computers on the network consist of Windows XP Professional computers, UNIX workstations, and Macintosh portable computers. All client computers are domain members.
You configure ISA1 by using the Edge Firewall network template. You manually configure ISA1 with access rules to allow HTTP and HTTPS access to the Internet. You configure ISA1 to require all users to authenticate.
You need to provide Internet access for all client computers on the network while preventing unauthorized non-company users from accessing the Internet through ISA1. You also want to reduce the amount of administrative effort needed when you configure the client computers.
What should you do?
A. Configure all client computers as Web Proxy clients. Configure Basic authentication on the Internal network.
B. Configure all client computers as Web Proxy clients. Configure Basic authentication on the Local Host network.
C. Configure all client computers as SecureNAT clients. Configure Basic authentication on the Internal network.
D. Configure the Windows-based computers as Firewall clients. Configure the non-Windows-based computers as Web Proxy clients. Configure Basic authentication on the Local Host network.
Answer: A

4. Your network consists of a single Active Directory domain named contoso.com. The network contains an ISA Server 2000 computer named ISA1.
All client computers have the ISA Server 2000 Firewall Client software installed. Client computers are configured to use an internal DNS server. Two Windows Server 2003 computers named App1 and App2 run a Web-based application that is used to process company data.
You configure ISA1 with protocol rules to allow HTTP, HTTPS, RDP, POP3, and SMTP access.
The list of domain names available on the Internal network on ISA1 contains the following entries.
*.south.contoso.com
*.north.contoso.com
*.east.contoso.com
*.west.contoso.com
You perform an in-place upgrade of ISA1 by using the ISA Server 2006 Migration Tool. When you use Network Monitor on ISA1, you discover that client requests for App1 and App2 are being passed through ISA1.
You need to provide a solution that will allow clients to directly access company data on App1 and App2.
What should you do?
A. Create and configure HTTP, HTTPS, RDP, POP3, and SMTP access rules on ISA1.
B. Configure an Application.ini file on the client computers.
C. Redeploy the ISA Server 2006 Firewall Client software by distributing it to the client computers by using Group Policy.
D. Add app1.contoso.com and app2.contoso.com to the list of domain names available on the Internal network on ISA1.
Answer: D

5. You install ISA Server 2006 on a computer that has three network adapters. One of the network adapters is connected to the Internet, one is connected to the Internal network, and one is connected to a perimeter network.
The perimeter network adapter and the internal network adapter are connected to private address networks.
You configure ISA Server by applying the 3-Leg Perimeter network template. You run the 3-Leg Perimeter Network Template wizard. You then make the following changes to the firewall policy:
Create an access rule to allow all traffic between the Internal network and the Internet.
Create an access rule to allow all traffic between the Internal network and the perimeter network.
Create an access rule to allow SMTP traffic from an SMTP server on the perimeter network to a Microsoft Exchange Server computer on the Internal network.
Create a server publishing rule to allow SMTP traffic from the External network to the SMTP server on the perimeter network.
Users report that they cannot receive e-mail messages from users outside of the Internal network.
You need to allow users to receive e-mail messages from other users on the Internet. You do not want to create a server publishing rule.
What should you do?
A. Change the network rule that controls the route relationship between the perimeter network and the Internal network to Route.
B. Change all network rules that control the route relationships between the Internal network, perimeter network, and External network to Route.
C. Change the network rule that controls the route relationship between the perimeter network and the External network to NAT.
D. Change all network rules that control the route relationships between the Internal network, perimeter network, and External network to NAT.
Answer: A

6. Your network contains a single ISA Server 2006 computer named ISA1. All Internet access for the local network occurs through ISA1.
The network contains a Web server named Server1. Server1 is configured as a SecureNAT client. A Web application runs on Server1 that communicates with an external Web site named www.contoso.com.
You configure ISA1 with two access rules for outbound HTTP access. The rules are named HTTP Access 1 and HTTP Access 2.
HTTP Access 1 is configured to use the All Authenticated Users user set as a condition. HTTP Access 2 is configured to use the All Users user set as a condition, and it restricts outbound HTTP traffic to the IP address of Server1.
You verify that users can access external Web sites. However, you discover that the Web application cannot access www.contoso.com.
You need to allow the Web application to use anonymous credentials when it communicates with www.contoso.com. You also need to require authentication on ISA1 for all users when they access all external Web sites.
What should you do?
A. On Server1, configure Web Proxy clients to bypass the proxy server for the IP address of the server that hosts www.contoso.com.
B. On ISA1, add the fully qualified domain name (FQDN) www.contoso.com to the list of domain names available on the Internal network.
C. On ISA1, disable the Web Proxy filter for the HTTP protocol.
D. Modify the order of the access rules so that HTTP Access 2 is processed before HTTP Access 1.
Answer: D

7. You are the administrator of an ISA Server 2006 computer named ISA1. ISA1 has two network adapters. Access rules allow users on the Internal network to have HTTP access to the Internet.
You add a third network adapter to ISA1 and connect the third network adapter to a perimeter network. You place a Web server named WebServer2 on this perimeter network segment.
WebServer2 must be accessible to computers on the Internal network. You create a computer object for WebServer2 and then create an access rule that allows Internal network clients HTTP access to WebServer2. Users are not required to authenticate with ISA1 to access WebServer2.
Users report that they cannot access information on WebServer2. When they attempt to access the Web site, they receive the following error message: Error Code 10060: Connection timeout. Background: There was a time out before the page could be retrieved. This might indicate that the network is congested or that the website is experiencing technical difficulties.
You need to ensure that users on the Internal network can access information on WebServer2. First, you verify that WebServer2 is operational.
What should you do next?
A. Create a network rule that sets a route relationship between the Internal network and the perimeter network.
B. Create a server publishing rule that publishes WebServer2 to the Internal network.
C. Create a Web publishing rule that publishes WebServer2 to the Internal network.
D. Create an access rule that allows WebServer2 access to the Internal network.
Answer: A

8. The network contains an ISA Server 2006 computer named ISA1.
ISA1 connects to the Internet. ISA1 is configured with access rules for Internet access. A Windows Server 2003 computer named CERT1 is configured as an internal certification authority (CA). ISA1 can download the certificate revocation list (CRL) from CERT1.
You are deploying 10 new ISA Server 2006 computers on the network. On ISA1 you export the firewall policy settings into a file named ISA1export.xml. You configure the network configuration settings on each new ISA Server computer. You import the firewall policy settings from the ISA1export.xml file on each new ISA Server computer.
You test the imported configuration on each of the new ISA Server computers. You discover that each new ISA Server computer cannot download the CRL from CERT1.
You need to ensure that the new ISA Server computers can download the CRL.
What should you do?
A. Edit the ISA1export.xml file by adding the following lines:
StorageType=Allow HTTP from ISA Server to all networks (for CRL downloads)
String=0
Enabled=1
Import the ISA1export.xml file on each new ISA Server computer.
B. Export the system policy rules on ISA1 by using the Export System Policy task. Import the system policy rules on each new ISA Server computer.
C. Export the array configuration settings on ISA1 to an .xml file. Import the .xml file on the new ISA Server computers.
D. Create a destination set for the new ISA Server 2006 computers. Add this destination set to the destination list on the Allow all HTTP traffic from ISA Server to all networks (for CRL downloads) system policy rule.
Answer: B

Click here for more 070-351 exam questions

70-351 Exam Prep

Learn what you need to know to pass the 70-351 exam easily

Guarantee your 70-351 success with our 70-351 Exam Resources. Our exams are developed by experiences IT Professionals working in today's prospering companies and date centers. All our practice exams including 70-351 exam guarantee you the exam success you need.

CertifySky offers free demo for 70-351 exam. You can check out the interface, question quality and usability of our practice exams before you decide to buy it. We are the only one site can offer demo for almost all products. If you want to try 70-351 Exam Prep Demo, Click the "Try Demo" button.

70-351 Certification Exam and Study Guide

There are many online resources for preparing for the 70-351 exam. Read below to discover why Certifysky.com is your premier source for practice tests, and true testing environment.

CertifySky is the online Certification Expert recognized by a worldwide audience of IT professionals and executives alike as the definitive source of training materials for the candidate seeking insight, updates and resources for vendor certifications.

70-351 Practice Test Questions, Printable PDF Braindumps
We are all well aware that a major problem in the IT industry is that there is a lack of quality study materials. Our 70-351 Preparation Exam Material provides you everything you will need to take a certification examination. Details are researched and produced by Certification Experts who are constantly using industry experience to produce precise, logical and verified explanations for the answers. You may get questions from different web sites or books, but logic is the key.

  • Comprehensive questions with complete details
  • Questions accompanied by exhibits (when applicable)
  • Verified Answers Researched by Industry Experts
  • Drag and Drop questions as experienced in the Actual Exams (when applicable)
  • Questions updated on regular basis
  • These questions and answers are backed by our GUARANTEE
  • Like actual certification exams our product is in multiple-choice questions (MCQs)

  • Our 70-351 Exam will provide you with exam questions and verified answers that reflect the actual exam. These questions and answers provide you with the experience of taking the actual test. Our 70-351 Exam is not just questions and answers. They are your access to high technical expertise and accelerated learning capacity. Certification Experts, Certified Computer Trainers, Technical Coworker and Comprehensive Language Masters, who have a solid, verified and certified background and high technical expertise, have compiled these detailed questions and answers. 70-351 Certification preparation Q and A provided by Certifysky.com will make you feel like you are taking an actual exam at a Prometric or VUE center.

    Furthermore, we are constantly updating our 70-351 Exam. These 70-351 Exam updates are supplied free of charge to Certify Sky.com customers- hereby becoming an investment rather than a disposable product. Our clients receive the most reliable and up-to-date information when they decide to take the exam, just contact us. Our candidates walk into the Testing Room as confident as a Certification Administrator.

    Like actual certification exams our 70-351 Exam is in multiple-choice questions (MCQs). After purchasing our products you are just a step away from testing for certification. Still not convinced? Try our free samples or choose to buy your 70-351 Practice Exam now!

    Our 70-351 practice exams and study questions are composed by current and active Information Technology experts, who use their experience in preparing you for your future in IT.

    Commitment to Your Success:
    At Certifysky.com we are committed to you ongoing success. Our exams and questions are constantly being updated and compared to industry standards.

    You are not about to purchase a disposable product. 70-351 practice exam updates are supplied free of charge. Regardless of how soon you decide to take the actual 70-351 examination certification, you will be able to walk into the testing room as confident as the Certification Administrator.

    The CertifySky 70-351 study guide is guaranteed to be 100% braindump free. We value the quality of training you receive through the 70-351 study guide and will never support 70-351 braindumps, or any 70-351 brain dump site. 70-351 braindump sites cannot compare to the understanding, learning and comprehension you will gain from a non-70-351 braindumps site, based on facts and case studies, like Certify Sky.

    When selecting the CertifySky 70-351 exam study preparation materials, you are purchasing the highest quality CertifySky 70-351 products available through the web today. The 70-351 CertifySky practice exams and study guides are current and updated monthly, providing you with the highest 70-351 Certify Sky ROI. Start you road to 70-351 CertifySky success today, buy purchasing the CertifySky 70-351 training materials today!