Free Cheat-test Samples and Demo Questions Download
Adobe exams Adobe
Apple exams Apple
Avaya exams Avaya
Check Point exams Check Point
Cisco exams Cisco
Citrix exams Citrix
CIW exams CIW
CompTIA exams CompTIA
CWNP exams CWNP
EC-Council exams EC-Council
EMC exams EMC
Exin exams Exin
Fortinet exams Fortinet
GIAC exams GIAC
Hitachi exams Hitachi
HP exams HP
IBM exams IBM
Isaca exams Isaca
ISC exams ISC
ISEB exams ISEB
Juniper exams Juniper
LPI exams LPI
McAfee exams McAfee
Microsoft exams Microsoft
Oracle exams Oracle
PMI exams PMI
Riverbed exams Riverbed
SNIA exams SAP
Sun exams SAS
Symantec exams Symantec
VMware exams VMware
All certification exams

Microsoft 70-351 Exam - Cheat-Test.com

Free 70-351 Sample Questions:

1. Your network contains a single ISA Server 2006 computer named ISA1. ISA1 is not yet configured to allow inbound VPN access.
You deploy a new application named App1. The server component of App1 is installed on an internal server named Server1. The client component of App1 is installed on employee and partner computers. Employees and partners will establish VPN connections when they use App1 from outside the corporate network.
You identify the following requirements regarding VPN connections to the corporate network.
Employees must be allowed access to only Server1, three file servers, and an internal Web server named Web1.
Employees must have installed all current software updates and antivirus software before connecting to any internal resources.
Partners must be allowed access to only Server1.
You must not install any software other than the App1 client on any partner computers.
You need to plan the VPN configuration for the company.
What should you do?
A. Configure ISA1 to accept incoming VPN connections from partners and employees.
Enable Quarantine Control on ISA1.
Configure Quarantine Control to disconnect users after a short period of time.
Use access rules to allow access to only the permitted resources.
B. Configure ISA1 to accept incoming VPN connections from partners and employees.
Enable Quarantine Control on ISA1.
Exempt partners from Quarantine Control.
Use access rules to allow access to only the permitted resources.
C. Configure ISA1 to accept incoming VPN connections from partners and employees.
Enable Quarantine Control on ISA1.
Enable RADIUS authentication and user namespace mapping.
Configure a Windows Server 2003 Routing and Remote Access server as a RADIUS server.
Create a single remote access policy.
D. Add a second ISA Server 2006 computer named ISA2.
Configure ISA1 to accept VPN connections from employees. Do not enable Quarantine Control on ISA1.
Configure ISA2 to accept VPN connections from partners. Enable Quarantine Control on ISA2.
On each server, use access rules to allow access to only the permitted resources.
Answer: B

2. Your network contains an ISA Server 2006 computer named ISA1.
ISA1 is connected to the Internet. VPN access is configured to ISA1. RADIUS is configured as the only type of authentication for VPN connections. All remote users can connect to ISA1 by using a VPN connection. All internal users can connect to the Internet.
You are replacing ISA1 with a new ISA Server computer named ISA2. You export the network-level node configuration settings on ISA1 to a file named ISAconfig.xml. You import the ISAconfig.xml file on ISA2. You replace ISA1 with ISA2 on the network.
Remote VPN users report that they cannot authenticate to gain access to the network. Internal network users report that they cannot connect to the Internet.
You need to configure ISA2 to allow incoming and outgoing access for company users.
What should you do?
A. Export the system policy configuration settings on ISA1 to an .xml file. Import the .xml file on ISA2.
B. Export the array configuration settings on ISA1. Include confidential information in the exported configuration file. Import the file on ISA2.
C. Export the array configuration settings on ISA1. Include user permission settings in the exported configuration file. Import the file on ISA2.
D. Export the VPN Clients configuration on ISA1. Include confidential information in the exported configuration file. Import the file on ISA2.
Answer: B

3. Your network consists of a single Active Directory domain. The network contains an ISA Server 2006 computer named ISA1. Client computers on the network consist of Windows XP Professional computers, UNIX workstations, and Macintosh portable computers. All client computers are domain members.
You configure ISA1 by using the Edge Firewall network template. You manually configure ISA1 with access rules to allow HTTP and HTTPS access to the Internet. You configure ISA1 to require all users to authenticate.
You need to provide Internet access for all client computers on the network while preventing unauthorized non-company users from accessing the Internet through ISA1. You also want to reduce the amount of administrative effort needed when you configure the client computers.
What should you do?
A. Configure all client computers as Web Proxy clients. Configure Basic authentication on the Internal network.
B. Configure all client computers as Web Proxy clients. Configure Basic authentication on the Local Host network.
C. Configure all client computers as SecureNAT clients. Configure Basic authentication on the Internal network.
D. Configure the Windows-based computers as Firewall clients. Configure the non-Windows-based computers as Web Proxy clients. Configure Basic authentication on the Local Host network.
Answer: A

4. Your network consists of a single Active Directory domain named contoso.com. The network contains an ISA Server 2000 computer named ISA1.
All client computers have the ISA Server 2000 Firewall Client software installed. Client computers are configured to use an internal DNS server. Two Windows Server 2003 computers named App1 and App2 run a Web-based application that is used to process company data.
You configure ISA1 with protocol rules to allow HTTP, HTTPS, RDP, POP3, and SMTP access.
The list of domain names available on the Internal network on ISA1 contains the following entries.
*.south.contoso.com
*.north.contoso.com
*.east.contoso.com
*.west.contoso.com
You perform an in-place upgrade of ISA1 by using the ISA Server 2006 Migration Tool. When you use Network Monitor on ISA1, you discover that client requests for App1 and App2 are being passed through ISA1.
You need to provide a solution that will allow clients to directly access company data on App1 and App2.
What should you do?
A. Create and configure HTTP, HTTPS, RDP, POP3, and SMTP access rules on ISA1.
B. Configure an Application.ini file on the client computers.
C. Redeploy the ISA Server 2006 Firewall Client software by distributing it to the client computers by using Group Policy.
D. Add app1.contoso.com and app2.contoso.com to the list of domain names available on the Internal network on ISA1.
Answer: D

5. You install ISA Server 2006 on a computer that has three network adapters. One of the network adapters is connected to the Internet, one is connected to the Internal network, and one is connected to a perimeter network.
The perimeter network adapter and the internal network adapter are connected to private address networks.
You configure ISA Server by applying the 3-Leg Perimeter network template. You run the 3-Leg Perimeter Network Template wizard. You then make the following changes to the firewall policy:
Create an access rule to allow all traffic between the Internal network and the Internet.
Create an access rule to allow all traffic between the Internal network and the perimeter network.
Create an access rule to allow SMTP traffic from an SMTP server on the perimeter network to a Microsoft Exchange Server computer on the Internal network.
Create a server publishing rule to allow SMTP traffic from the External network to the SMTP server on the perimeter network.
Users report that they cannot receive e-mail messages from users outside of the Internal network.
You need to allow users to receive e-mail messages from other users on the Internet. You do not want to create a server publishing rule.
What should you do?
A. Change the network rule that controls the route relationship between the perimeter network and the Internal network to Route.
B. Change all network rules that control the route relationships between the Internal network, perimeter network, and External network to Route.
C. Change the network rule that controls the route relationship between the perimeter network and the External network to NAT.
D. Change all network rules that control the route relationships between the Internal network, perimeter network, and External network to NAT.
Answer: A

6. Your network contains a single ISA Server 2006 computer named ISA1. All Internet access for the local network occurs through ISA1.
The network contains a Web server named Server1. Server1 is configured as a SecureNAT client. A Web application runs on Server1 that communicates with an external Web site named www.contoso.com.
You configure ISA1 with two access rules for outbound HTTP access. The rules are named HTTP Access 1 and HTTP Access 2.
HTTP Access 1 is configured to use the All Authenticated Users user set as a condition. HTTP Access 2 is configured to use the All Users user set as a condition, and it restricts outbound HTTP traffic to the IP address of Server1.
You verify that users can access external Web sites. However, you discover that the Web application cannot access www.contoso.com.
You need to allow the Web application to use anonymous credentials when it communicates with www.contoso.com. You also need to require authentication on ISA1 for all users when they access all external Web sites.
What should you do?
A. On Server1, configure Web Proxy clients to bypass the proxy server for the IP address of the server that hosts www.contoso.com.
B. On ISA1, add the fully qualified domain name (FQDN) www.contoso.com to the list of domain names available on the Internal network.
C. On ISA1, disable the Web Proxy filter for the HTTP protocol.
D. Modify the order of the access rules so that HTTP Access 2 is processed before HTTP Access 1.
Answer: D

7. You are the administrator of an ISA Server 2006 computer named ISA1. ISA1 has two network adapters. Access rules allow users on the Internal network to have HTTP access to the Internet.
You add a third network adapter to ISA1 and connect the third network adapter to a perimeter network. You place a Web server named WebServer2 on this perimeter network segment.
WebServer2 must be accessible to computers on the Internal network. You create a computer object for WebServer2 and then create an access rule that allows Internal network clients HTTP access to WebServer2. Users are not required to authenticate with ISA1 to access WebServer2.
Users report that they cannot access information on WebServer2. When they attempt to access the Web site, they receive the following error message: Error Code 10060: Connection timeout. Background: There was a time out before the page could be retrieved. This might indicate that the network is congested or that the website is experiencing technical difficulties.
You need to ensure that users on the Internal network can access information on WebServer2. First, you verify that WebServer2 is operational.
What should you do next?
A. Create a network rule that sets a route relationship between the Internal network and the perimeter network.
B. Create a server publishing rule that publishes WebServer2 to the Internal network.
C. Create a Web publishing rule that publishes WebServer2 to the Internal network.
D. Create an access rule that allows WebServer2 access to the Internal network.
Answer: A

8. The network contains an ISA Server 2006 computer named ISA1.
ISA1 connects to the Internet. ISA1 is configured with access rules for Internet access. A Windows Server 2003 computer named CERT1 is configured as an internal certification authority (CA). ISA1 can download the certificate revocation list (CRL) from CERT1.
You are deploying 10 new ISA Server 2006 computers on the network. On ISA1 you export the firewall policy settings into a file named ISA1export.xml. You configure the network configuration settings on each new ISA Server computer. You import the firewall policy settings from the ISA1export.xml file on each new ISA Server computer.
You test the imported configuration on each of the new ISA Server computers. You discover that each new ISA Server computer cannot download the CRL from CERT1.
You need to ensure that the new ISA Server computers can download the CRL.
What should you do?
A. Edit the ISA1export.xml file by adding the following lines:
StorageType=Allow HTTP from ISA Server to all networks (for CRL downloads)
String=0
Enabled=1
Import the ISA1export.xml file on each new ISA Server computer.
B. Export the system policy rules on ISA1 by using the Export System Policy task. Import the system policy rules on each new ISA Server computer.
C. Export the array configuration settings on ISA1 to an .xml file. Import the .xml file on the new ISA Server computers.
D. Create a destination set for the new ISA Server 2006 computers. Add this destination set to the destination list on the Allow all HTTP traffic from ISA Server to all networks (for CRL downloads) system policy rule.
Answer: B


© 2014 Cheat-Test.com, All Rights Reserved