Proxy Server1. Proxy Server includes packet filtering: (Choose all that apply) A. That is dynamic B. That is static C. That is passive D. That is reiterative E. For the internal network adapter
2. Socks Proxy supports: A. IPX B. Telnet C. Real Audio D. VDOLive E. Microsoft NetShow
3. Which protocols can pass through Microsoft Proxy Server 2.0 via the Web Proxy: A. HTTP B. FTP C. Gopher D. SSL E. IPX/SPX
4. What protocols can pass through Microsoft Proxy Server 2.0 via the WinSock Proxy: A. HTTP B. FTP C. Telnet D. RealAudio E. IPX/SPX
5. What protocols can pass through Microsoft Proxy Server 2.0 via the SOCKS Proxy: A. HTTP B. FTP C. Telnet D. UDP
6. If the default set of protocol definitions are used, Proxy Server will: A. Open a random port B. Open port 23 C. Open port 80 D. Open 1125
7. Which protocols can desktop clients use to connect to the Internet through Proxy Server? A. TCP/IP B. NWLink IPX/XPX C. DLC D. NetBEUI
8. How does Proxy Server maximize use of available bandwidth? A. By eliminating Secure Sockets Layer authentication B. By the use of a high-level compression algorithm C. With caching D. By piggy-backing multiple connection requests
9. Multiple web servers can publish to the Internet through: A. Web Proxy B. Winsock Proxy C. Socks Proxy D. Reverse Proxy E. Reverse Hosting
10. You can respond to requests from the Internet on behalf of a web server through: A. Web Proxy B. Winsock Proxy C. Socks Proxy D. Reverse Proxy
11. Setting up a modem or an ISDN adapter with Proxy Server requires the installation of: A. Nothing is required. Proxy Server has its own dial-out feature B. RAS C. Multi-home routing D. CARP
12. The best method to create a Local Access Table is: A. Enter each address manually B. Select "Load known address ranges from all IP interface cards" C. Select "Load known address ranges from the following IP interface cards:" D. Use LMHOSTS file E. Use DNS
13. To add an address of 131.107.1.15 to the LAT you would enter: A. From:131.107.1.0 To:131.107.1.255 B. From:131.107.1.0 To:131.107.1.15 C. From:131.107.1.8 To:131.107.1.15 D. From:131.107.1.15 To:131.107.1.15
14. The most efficient method of creating a custom Local Access Table on a client is: A. Do nothing. The client can't be customized as the Msplat.txt file would be overwritten at the next refresh if you changed it. B. Create a locallat.txt file to be used instead of Msplat.txt C. Create a locallat.txt file to be used with Msplat.txt D. Edit the Msplat.txt file on the client
15. The default folder in which the mcpclnt.ini file is stored on the client, and default permission to the folder is: A. Mcpclnt and Everyone:read B. Mspclnt and Everyone:full control C. MSPClients and MSPUsers:read D. MSPClients and MSPUsers:full control
16. Proxy Client is installed and the following changes have been made to the Windows95 client machine: (Choose all that apply) A. Msplat.txt is copied to the client B. A WSP icon is added to Control Panel C. Mcpclnt.ini is copied to the client D. A WSP address is added to LMHOSTS
17. Your internal network uses IPX only and you don't want TCP/IP to be used internally by the WinSock Proxy. You should: (Choose all that apply) A. Disable TCP/IP on the clients B. Select "Force IPX/SPX protocol" C. Remove TCP/IP from the internal network D. Remove the [Servers IP Addresses] section in the Mspclnt.ini file
18. TCP is supported by: A. Web Proxy B. WinSock Proxy C. Web Proxy D. All Services with Proxy 2.0
19. What is meant by IP aggregation? A. Allowing transparent access from an internal or private network to the public or external network while masking or protecting the internal network. B. Allowing multiple sites to use one IP address C. Allowing multiple IP addresses to be bound to one network card D. Allowing a round-robin selection of an IP address from a group of IP addresses
20. By running as an ISAPI application, Proxy Server benefits from IIS 4.0 features. TCP connections remain intact after a request and response though: A. null connects B. null sessions C. keep-alives D. implicit connections
21. With passive caching, when a client requests an object, the Proxy Server: (Choose all that apply) A. Returns the object to the client then caches it, if possible B. Returns the object to the client if F5 is used. C. Caches the item, if possible. D. Returns the object from cache if it exists, unless F5 is used. E. Retrieves the object from the remote server each time and then caches it
22. Proxy Server uses: (Choose all that apply) A. Distributed caching B. Passive caching C. Active caching D. Aggressive caching E. Hierarchical caching
23. The process whereby Proxy Server automatically regenerates cached objects is called: A. Distributed caching B. Aggressive caching C. Hierarchical caching D. Passive caching E. Active caching
24. Windows Sockets APIs support: (Choose all that apply) A. Initiating an outbound connection for a client application B. Accepting an inbound connection for the server application C. Sending and receiving data on a client/server connection D. Terminating a client/server connection E. Initiating an inbound connection for a client application
25. Automatically closing ports after termination of a connection with a remote Server is a function of: A. Active caching B. Passive caching C. Static packet filtering D. Dynamic packet filtering
26. To use dynamic packet filtering, you should: A. Unbind specific unused services from the external network adapter B. Unbind specific unused services from the internal network adapter C. Turn on the IPX gateway D. All of the above E. None of the above
27. The process of intercepting and evaluating packets before they are passed to higher levels in the protocol layers or an application is called: (Choose all that apply) A. Passive filtering B. Dynamic filtering C. Cache filters D. A firewall E. CARP
28. Dynamic packet filtering: (Choose all that apply) A. Is turned off by default B. Is turned on by default C. Is for the external network adapter D. Blocks all packets by default when on E. Is for the internal network adapter
29. Alerts can be set: (Choose all that apply) A. For oversized packets B. For rejected packets C. For protocol violations D. For disk full messages E. Only if packet filtering is on
30. You want to diagnose the client configuration for WinSock Proxy on a Windows 95 machine. You should run: A. CLCONFG B. CLCFG32 C. CHKWSP16 D. CHKWSP32
31. Proxy Server 2 includes the following features: (Choose all that apply) A. Reverse proxy B. Packet filtering C. FTP object caching D. HTTP object caching E. IPX shadowing
32. To implement caching with Proxy Server 2.0, the following are required: (Choose all that apply) A. 24MB RAM B. Three network adapters C. Internet Information Server D. NT Server 4.0 Service Pack 3 E. TCP/IP - NTFS partition
33. You want to dial up the Internet from home to your ISP, using the notebook computer from work that is configured to use WinSock Proxy. You should: A. Do nothing. Dial up will work normally B. Enable multiple sessions C. Disable WinSock Proxy D. Uninstall IPX E. Add a hardware profile for the dial up configuration from home
34. You want to see full diagnostics information for the WinSock client. You should run: A. CLCFG32 /v B. CLCFG32 /m C. CHKWSP32 /v D. CHKWSP32 /f
35. CHKWSP32 is the utility used for: A. WinSock Proxy diagnostics B. SOCKS Proxy client diagnostics C. Web Proxy diagnostics D. WinSock Proxy client diagnostics E. Web Proxy client diagnostics
36. You have recently changed the home directory properties on the WWW Service to a remote UNC pathname. Now your clients are receiving the following error when they attempt to access the path through Proxy Server: "HTTP/1.0 500 server error (An attempt has been made to operate on an impersonation token by a thread that is not currently impersonating a client)". How do you resolve the problem? A. Reset the directories to the default condition B. Run CHKWSP32 /f C. stop and restart the WWW and Web Proxy services D. Check the user's permissions
37. You have installed Proxy Server on a server with no NTFS partitions. You later convert a FAT partition to NTFS and decide to use it for caching. You must: (Choose all that apply) A. Stop and restart Web Proxy service B. Enable caching C. Regenerate cache D. Set cache size E. Apply changes
38. You have 400 users and want to set cache size on your NTFS partition. The suggested cache size setting is: A. 200 MB B. 300 MB C. 400 MB D. 500 MB
39. You are running a network with DNS and WindowsS internally. You have configured your Proxy Server to allow all ICMP packets to go through. When a client attempts to ping another internal FQDN, computer.domainname.com, ping fails. Why has this happen? A. Third party WinSock DLL B. The WINS Service is stopped C. DNS server IP address is not listed in the LAT D. Ping is not allowed internally, by default, when running Proxy Server
40. You are frequently connecting to a remote server that is running the identification protocol. You have recently enabled packet filtering and as a result are suffering performance delays when connecting to this remote server. What can you do to increase the performance? A. Increase the packet buffer setting B. Add one or more network adapters C. Activate the predefined "Identd" packet filter on Proxy Serv D. Nothing. Packet filtering only affects inbound packets
41. You stop the Web Proxy Service and are now attempting to stop the WWW service on your IIS Server. You receive the following error: "The service has not been started" The icon shows that the WWW service is running. Why do you get this message? A. You haven't yet started the WWW service B. WWW service isn't starting automatically C. You stopped the Web Proxy service D. You have an error in your configuration
42. You have been experiencing poor routing performance with your array, and on researching the problem realize you have been having too many lateral resolutions. This is a result of: (Choose all that apply) A. Too few clients implementing the routing function B. Too few downstream proxies implementing the routing function C. Too many downstream proxies implementing the routing functio D. This will not happen with CARP implementation
43. The "Enter Domain Credentials" prompt appears every time you launch a WinSock application. You don't want to keep entering this information for the same domain. You would: A. Configure WinSock to enter this information for you B. Keep another WinSock application open C. Change permissions for the user so credentials are no longer required D. Use Ctrl>V to enter the credentials
44. To use CHKWSP32 from a client using IPX you need to: A. Install SAP Agent service on the client B. Install SAP Agent service on the NT Server C. Start the SAP Agent service D. Install the resource kit
45. After implementing Proxy Server, your clients are complaining that they are unable to connect to one internal server. There are no problems connecting to other servers on the LAN. What should you do? A. Check that the IP address of the DNS server is in the LAT B. Check that the IP address of the server is in the LAT C. Check that the IP addresses of the clients are in the LAT D. Check the Mspclnt directory for error .out files
46. On your network, some clients require a statically assigned IP address. After assigning these clients their addresses manually, one is complaining that he cannot connect through WinSock Proxy. What should you do? A. Verify that Proxy Server can remote the client B. Verify that the DNS server has the IP address of the client C. Verify that the IP address of the client is in the LAT D. Turn off WinSock identification requests
47. What command line utility would you use to view current network values for TCP/IP and IPX on a Windows 95 client? A. IPCONFIG and IPXCFG B. IPCONFIG and IPXROUTE CONFIG C. WINIPCFG and IPXROUTE CONFIG D. WINIPCFG; there is no command line prompt for IPX
48. Which tools or utilities would you use to troubleshoot the status of a WinSock Proxy client? (Choose all that apply) A. CHKWSPxx /f B. FTP C. TELNET D. NT Diagnostics
49. If you suspect that your server is experiencing a SYN attack you would use what utility to make that determination? A. ARP B. NBTStat C. Netstat D. PING
50. Proxy Server can act as a firewall by the use of: (Choose all that apply) A. Reiterative packet filtering B. IP aggregation C. Dynamic packet filtering D. Static packet filtering E. IP forwarding
51. You're using an Internet Server attached to a firewall and want to discourage spoofing. You would: (Choose all that apply) A. Turn on packet filtering by user B. Configure IIS to deny access to your firewall's IP address C. Configure Reverse Proxy to deny access to a suspect IP address D. Attempt multiple SYN's for the suspect address
52. An Internet application requests a Proxy Server port number. If the default set of protocol definitions are used, Proxy Server will: A. Open a random port B. Open port 23 C. Open port 80 D. Open port 1125
53. The process of intercepting and evaluating packets before they are passed to higher levels in the protocol layers or an application is called: (Choose all that apply) A. Passive filtering B. Dynamic filtering C. Cache filters D. A firewall E. CARP
54. After you have enabled Packet Filtering and Enabled Dynamic Packet Filtering of MS Proxy Server packets, what must you do to block X-Windows packets on port range 6000 to 6100? A. Enable a filter for X-Windows B. Enable port blocking at 6000 to 6100 C. Turn on CARP D. Do nothing. X-Windows is blocked by default
55. Proxy Server dials out on demand: (Choose all that apply) A. through Proxy Server AutoDial B. through RAS C. through Windows 95 DUN D. When a requested object can't be found in cache for Web Proxy E. For all requests for WinSock Proxy or Socks Proxy
56. RAS with Proxy Server: (Choose all that apply) A. Should be configured to run on the Proxy Server computer B. Should be configured to run on a computer other than the Proxy Server C. Should be configured to dial out only D. Can be set to dial out only during certain hours E. Will dial out less often if cache size is decreased
57. How do you prevent Internet users from accessing the NetBIOS name table with a name table lookup? (Choose all that apply) A. Don't use NetBIOS B. Disable WINS on the external network card C. Enable packet filtering D. Disable IP forwarding
58. How is Proxy Server licensed? A. A license is required for each server and a CAL for each client B. Proxy Server does not require a license, the NT Server license suffices C. A license is required for each server only D. Only a CAL is required
59. You have three Proxy Servers in an array. How many hops before a request reaches cache? A. None B. One C. Two D. Three E. Four
60. Paul is working on a project to allow his network to host the corporate web site on a number of web servers. The network presently uses Proxy Server for Internet access. Required results: 1. Paul must protect the web servers from potential attacks from external Internet users. 2. Paul must make it appear to external users that the corporate website is in one location, or web server, only. Optional desired results: 1. Paul must ensure that the website is available to all corporate employees through the intranet as well as to all Internet users. 2. Paul must ensure that network traffic is optimized on the web server and keep client requests to a minimum. Proposed solution: Paul plans to place the web servers upstream from the Proxy server and add the HTTP Server (port 80) predefined filter. A. This solution meets the required results and both optional results. B. This solution meets the required results and one optional result. C. This solution meets only the required results. D. This solution does not meet the required results.
61. Paul is working on a project to allow his network to host the corporate web site on a number of web servers. The network presently uses Proxy Server for Internet access. Required results: 1. Paul must protect the web servers from potential attacks from external Internet users. 2. Paul must make it appear to external users that the corporate website is in one location, or web server, only. Optional desired results: 1. Paul must ensure that the website is available to all corporate employees through the intranet as well as to all Internet users. 2. Paul must ensure that network traffic is optimized on the web server and keep client requests to a minimum. Proposed solution: Paul plans on placing the web servers downstream from the Proxy Server. He will then enable dynamic packet filtering and add the HTTP Server (port 80) predefined filter. He will enable caching on a FAT partition of the server and set up the filters to always cache the corporate website. Paul will enable web publishing and set the mappings to route incoming requests to the proper server. A. This solution meets the required results and both optional results. B. This solution meets the required results and one optional result. C. This solution meets only the required results. D. This solution does not meet the required results.
62. Chris has just finished doing maintenance on his proxy server. In the course of doing modifications, he removed the default gateway on the external adapter and forgot to put a new one in. One of his users goes to browse a web page. What will happen? A. If the page is in the cache, the user will receive it as usual; if it is not in the cache, the operation will fail. B. If the page is in the cache, the user will receive it as usual, if it is not in the cache, the proxy server will go out to the Internet to retrieve it. C. The proxy server will have to go directly to the Internet to get the page. D. The action will fail, as the proxy server does not have a gateway on the external card.
63. Jason has decided to set his Proxy Server cache to multiple drives. He has plenty of free space on drives D and E, when he configures the cache, he is able to on Drive E. Drive D is dimmed. What is the problem and what should he do to be able to use Drive D for caching purposes? A. Drive D is FAT. Use Disk Administrator to convert drive D to NTFS. B. Drive D has hidden files that are taking up disk space. Change the options in Windows Explorer to view all files, then delete unnecessary files to free up space. C. Drive D is FAT. Run Convert.exe at the command prompt. D. Drive D is the System partition. Jason cannot cache on the System partition.
64. Peter wants to set up caching for his Proxy Server. He opens Disk Administrator, and sees the following information: proxyq65.png On which drives can he set up caching? A. Drive C B. Drives C and D C. Drives C, D, and E D. Drives D and E E. Drive D only
65. Sylvia is working for a company that has 300 employees. Growth is static in the company and she is implementing Proxy Server mainly for its caching abilities. What is the minimum cache size Sylvia should set up? A. 200Mb B. 250Mb C. 300Mb D. 350Mb E. 400Mb
66. Wendy is implementing caching with her proxy server. She is working for a company which has 500 users at present, but has anticipated growth of approximately 200 more employees in the next six months. She has converted Drive E to NTFS, which has approximately 1Gb of free space. How much of the free space should Wendy use for caching. A. 250Mb B. 300Mb C. 350Mb D. 400Mb E. 450Mb
67. Alex's corporate network uses the non-routable network numbers all on one subnet. The range used by the servers is 10.0.0.1 to 10.0.0.30. All users on the network are using 10.0.0.50 to 10.0.0.150. Proxy Server provides Internet access over a dial-up ISDN. The Proxy Server computer's network card is assigned the IP address of 10.0.0.200. Which IP addresses should Alex list in the LAT? A. 10.0.0.1 - 10.0.0.30, 10.0.0.50 - 10.0.0.150, 10.0.0.200 B. 10.0.0.0 - 10.0.0.255 C. only the IP address assigned by the ISP D. 10.0.0.1 - 10.0.0.200 and the IP address assigned by the ISP
68. Jamie's internal network uses a Proxy Server computer for Internet access. The Locallat.txt file on one of his user's computer contains the IP addresses 172.16.0.0-172.32.255.255, 10.0.0.0-10.0.0.100 and 192.168.0.200-192.168.0.255. The Msplat.txt file contains the IP addresses 10.0.0.175-10.0.0.255. Which of these addresses are used on the internal network? A. 10.0.0.175-10.0.0.255 B. 10.0.0.0 - 10.0.0.100, 10.0.0.175 - 10.0.0.255 C. 10.0.0.0 - 10.0.0.100, 10.0.0.175 - 10.0.0.255, 172.16.0.0 - 172.32.255.255, 192.168.0.200-192.168.0.255 D. 10.0.0.0 - 10.0.0.100, 172.16.0.0 - 172.32.255.255, 192.168.0.200-192.168.0.255
69. Katherine is configuring the Proxy Server for her corporate network. The internal network adapter on the proxy server has the IP address 192.168.66.1 with a subnet mask of 255.255.240.0. The external network adapter card is assigned an IP address of 131.162.33.1 with a subnet mask of 255.255.224.0. Which of the following are valid IP addresses for the LAT? A. 131.162.189.250 B. 131.164.170.32 C. 131.162.31.250 D. 192.168.238.255 E. 192.168.15.240
70. Lauren has configured her application Server to also work as her Proxy Server. All drives have NTFS, with the appropriate permissions applied to the application directories. The TCP/IP protocol is used to connect to the Internet only, and NetBEUI or IPX/SPX are used in the internal network. How should the protocols be bound to the internal and external network cards? A. TCP/IP only to both network cards B. IPX/SPX and TCP/IP to the internal card, TCP/IP to the external card C. IPX/SPX and TCP/IP to the internal and external network cards D. NetBEUI, IPX/SPX, and TCP/IP to the internal card, TCP/IP to the external card E. NetBEUI, IPX/SPX, and TCP/IP to the internal and external cards
71. After installing a Proxy Server array for his network, Patrick enables an option to configure his client's web browsers with an automatically generated script. All of his clients use IE 4.01. When one of his clients connects using their web browser, what will be downloaded to the client's computer? A. the Msplat.txt file B. JavaScript script C. VBScript D. the Locallat.txt E. the Mspclnt directory
72. Emily has been approved by management to have Internet access from her desktop. The corporate network is using IPX/SPX on their internal network and a proxy server to access the internet. What must be done for Emily to have Internet access without adding TCP/IP to her network card? (Choose all that apply) A. configure Emily's web browser to use Web Proxy server B. configure Emily's web browser to use WinSock Proxy server C. configure Emily's computer to use Web Proxy server on the LAN D. configure Emily's computer to use WinSock Proxy server on the LAN E. this cannot be done. Emily must have TCP/IP installed to access the proxy server
73. John wishes to have his WinSock Proxy Service protocols defined uniformly throughout a chain of Proxy Servers. What command line utility can he use in conjunction with a script file to ensure this occurs with a minimal risk of human error? A. RemoteMSP B. WspProto C. RemoteWSP D. ISM HTMLA
74. Michael is concerned about some variances he has noticed on inbound network traffic on his Proxy Server and decides to monitor it. What tool should he use to accomplish this? A. Network Monitor B. IIS logging C. Proxy Server packet logging D. Performance Monitor E. Windows NT auditing
75. Deborah is the LAN administrator for Gropplegrommer Ltd. She has enabled Web Proxy Service and is using NT Challenge Response authentication to the Proxy Server. Paul, one of the employees, must access a site that only supports Basic Authentication. What must Deborah do to ensure that Paul can access this site. A. Enable Basic Authentication instead of NT Challenge Response for Paul's user account only. B. Enable Basic Authentication instead of NT Challenge Response Authentication for Web Proxy Service. C. Enable Basic Authentication in conjunction with NT Challenge Response Authentication for Web Proxy Service. D. Do nothing.
76. Patrick, a consultant, has been contracted to set up a Proxy Server solution for a company of approximately 2,300 employees with six unique divisions. Each division is expected to have a high Internet usage. Which of the following solutions would best serve the needs of this company? A. All divisions connect to a single Proxy Server for Internet access. This will provide uniform caching. B. Each division connects to its own Proxy Server for Internet access. This will provide unique caching. C. All divisions connect to an array of Proxy Servers for Internet access. This will provide distributed caching. D. All divisions connect to a chain of Proxy Servers for Internet access. This will provide hierarchical caching.
77. MS Proxy Server 2.0 introduced a new protocol to allow for queryless distributed caching in arrays of Proxy Servers. This protocol greatly improved the scalability and efficiency of Proxy Server arrays. The name of the protocol is: A. ARP B. ICMP C. ICP D. CARP
78. Katherine has been assigned the task of ensuring that her company's website is protected from external hackers. What two things can she do to secure the proxy server from unwanted entry from the internet? A. Deny listening on inbound service ports B. Include the Proxy Server IP external address on the LAT C. Enable IP forwarding D. Disable IP forwarding E. Create a domain filter
79. Lauren has configured her internal network as follows. Using the internal network address 192.168.0.0, with a subnet mask of 255.255.240.0, she sets up the following subnets: 192.168.17.1 - 192.168.30.16 - Sales 192.168.50.16 - 192.168.57.255 - Marketing 192.168.176.20 - 192.168.177.254 - Management 192.168.190.1 - 192.168.191.254 - Mail Room 192.168.193.1 - 192.168.199.15 - Translation All clients are using NT Workstation on their desktops and IE 4.01 as browsers, and have static IP addresses. However, only members of the management team are to have access to the Internet through the Web Proxy Service. When configuring the security options under the Services tab of Web Proxy properties, Lauren chooses "Deny Access" and then lists the following group as the exception: Network: 192.168.176.0 S/N Mask 255.255.240.0 However, after implementing this solution, she receives a call from the Mail Room manager complaining that his employees are spending too much time playing online games during working hours. She redoes her calculations and realizes that the Mail Room and Management are in the same subnet. While this does not cause any problems in the internal network at any time, it has allowed the Mail Room the same access to the Internet as the Management team. What is the simplest solution for Lauren to implement to eliminate this problem? A. Change the Mail Room's IP addresses to the range 192.168.208.1 to 192.158.209.254 B. Change the subnet mask for all clients to 255.255.248.0 C. Change the subnet mask on the exception group on Proxy to 255.255.248.0 D. Add the addresses 192.168.190.1 - 192.168.191.254 to the exception list on Proxy and deny access
80. Caroline wishes to set up her proxy server to allow clients to use ICQ. Her clients are using either Macintosh or NT Workstation. Which of the following steps should Caroline take to allow ICQ access for her clients? (Choose all that apply) A. Install ICQ and WinSock Proxy Client on the Windows clients. The Macintosh clients will not be able to use ICQ with Proxy 2.0 without a third party program. B. Under WinSock Proxy Properties on the server, add the pre-configured ICQ protocol. Restart the proxy services. C. Under WinSock Proxy Client on the client, assigned the 4000 port to ICQ. Restart the WinSock Proxy Client. D. Leave the default access control permissions. E. Install ICQ on all clients. Install WinSock Proxy Client on the Windows computers and Socks Proxy client on the Macintosh computers.
81. Jamie has an array of Proxy Servers set up as NT member servers. While he wants to authenticate users for client requests that pass through Web Proxy service, he also wants to allow anonymous access to Web publishing from the IIS computer. He grants the appropriate permissions to the IUSR_computername account, but finds he is getting intermittent success. What should Jamie do to resolve this problem? You want to allow "anonymous" access to Web publishing from the local IIS computer. You want to authenticate users for client requests that pass through the Web Proxy service. A. Promote the member servers to backup domain controllers. B. Grant permissions to the Everyone account rather than the IUSR_computername account. C. Change the authentication level to Basic from NT Challenge/Response. D. Synchronize the accounts database among array members.
82. An anonymous complaint was received by senior management that a specific employee has been using the office Internet connection to visit adult web sites every afternoon. The Director is loathe to speak to the employee on the strength of an anonymous complaint and has asked your assistance in proving or disproving the allegations. He needs to have some information back within a couple of weeks. All employees have Internet access and use IE 4.01 on Windows 95 computers. There is no access to newsgroups. What can you do to assist the Director in his request? A. Enable NT auditing on the Proxy Server computer and complete logging for a period of 2 weeks. B. Enable Web Proxy Service regular logging and complete logging for a period of 2 weeks. C. Enable Web Proxy Service verbose logging and complete logging for a period of 2 weeks. D. Enable WinSock Proxy Service regular logging and complete logging for a period of 2 weeks. E. Enable WinSock Proxy Service verbose logging and complete logging for a period of 2 weeks.
83. Marie has set up access control to the company website on the intranet. On the WWW Service Properties sheet, she has allowed Anonymous and NT Challenge/Response authentication. On Web Proxy Service, she restricts access to domain users. All employees must access the website through Proxy Server. Which groups can gain access to the company website? A. All users logging in with valid NT accounts. B. All members of the Everyone group. C. All Domain Users and users logging in anonymously (IUSR_computername) D. All Domain Users only.
84. You have been asked to develop a network solution for a small business with 25 employees. All employees will require full Internet access. You have recommended using Proxy Sever 2.0 as a firewall as well as for its caching abilities to keep connect time down to the Internet. What type of connection will you recommend to this company for its Internet connectivity? A. POTS B. ADSL C. ISDN (BRI) D. T1
85. Stephen is planning to purchase a new computer on which to implement a Proxy Server for his organization. There are approximately 1,200 users in his organization. What should he be looking at purchasing? A. Pentium 75, 700 MB hard disk space for caching, 24 MB RAM B. Pentium 133, 2 GB hard disk space for caching, 32 MB RAM C. Pentium 166, 4 GB hard disk space for caching, 64 MB RAM D. Pentium 200, 16 GB caching, 128 MB RAM
86. Which Proxy service is used to access a Real Audio application on the Internet? A. WWW Service B. Web Proxy Service C. WinSock Proxy Service D. SOCKS Proxy Service
87. Polimorphics Incorporated has four Proxy servers that provide access to the Internet. You have listed each Proxy Server in the DNS database, which is used for internal name resolution on your network. You are now finding that one server seems to be carrying the majority of the traffic out to the Internet. You resolve this issue by assigning all Proxy Servers the same DNS name, and adding A records to the DNS database that maps this common name to all four IP addresses. You must now edit the client configuration so that load balancing takes effect. How would you do this? A. Edit the Mspclnt.ini file on each server to read the following: [Master Config] Path1=\\PRXYSVR\Mspclnt\ [Servers IP Addresses] Name=PRXYSVR B. Edit the Mspclnt.ini file on each server to read the following: [Master Config] Path1=\\PRXYSVR\Mspclnt\ [Servers IP Addresses] Name=DNSSVR C. Edit the Mspclnt.ini file on each client to read the following: [Master Config] Path1=\\PRXYSVR\Mspclnt\ [Servers IP Addresses] Name=PRXYSVR D. Edit the Mspclnt.ini file on each client to read the following: [Master Config] Path1=\\PRXYSVR\Mspclnt\ [Servers IP Addresses] Name=DNSSVR
88. Shannon is planning on implementing Proxy Server for her company, which consists of approximately 10,000 clients, consisting of 7 subnets: Subnet A - 1000 computers Subnet B - 2000 computers Subnet C - 5000 computers Subnet D, E, F, G - 200 computers each Shannon wants to ensure that all clients on each subnet get equal opportunity to be served by the Proxy Server services. Internal bandwidth is not an issue. What would be the best implementation for Shannon's needs? A. One Proxy Server between the internal network and the Internet. B. One Proxy Server per subnet with direct access to the Internet. C. One Proxy Server per 2,000 clients, configured in a chain. D. One Proxy Sever per 2,000 clients, configured in an array. E. One array of Proxy Servers per 2000 clients, configured in a chain.
89. A company recently installed a Proxy server to provide firewall protection to their internal network. They are running a pure NT network, all clients using NT Workstation, with a DHCP, DNS and WINS Server internally. Charles has been called as a special consultant to test the security of the system. Charles runs the NBTStat utility and manages to access the Proxy NetBIOS name cache. What recommendations does Charles give to further secure the network and prevent a malicious attack on the internal network? (Choose all that apply) A. Install a chain of Proxy Servers to provide multiple firewall protection B. Unbind WINS client from the external adapter card C. Unbind DNS client from the external adapter card D. Enable Packet Filtering for Port 139 E. Place the gateway address on the internal network adapter card
90. Daniel's, an employee at XYG Company, uses IE 3.0 to browse the Internet. Given the following network layout: proxyq93.png and counting each access to a Proxy Server array member as one hop, how many hops does Daniel's request make before the requested HTTP object is returned? A. 1 B. 2 C. 3 D. 4 E. 5
91. Which of the following can be configured to appear in Event Viewer for monitoring purposes? (Choose all that apply) A. Rejected Packets B. TCP/IP problems C. URL access D. Packet source address E. Logging messages
92. Kirsten wishes to monitor TCP and UDP counters with Performance Monitor to analyze TCP/IP on her Proxy Server. However, when she goes to Performance Monitor, there are no detailed counters available for TCP or UDP. What else does need to do to access these counters? A. Kirsten does not have appropriate administrator rights to monitor TCP/IP through performance monitor. Her rights must be upgraded. B. Kirsten must install SNMP services on her system. C. The computer, including Proxy Server Service, must be shutdown and restarted before the counters will appear. D. Without the full-blown version of Network Monitor, available with SMS, these counters will not appear. E. Kirsten must run diskperf -y to start these counters.
93. Joseph has been asked to install a Proxy Server for his government department's employees to safely access the Internet. The department is using the existing NetWare Server:s, but one NT Server has been installed to handle Proxy. There is a mixed bag of client operating systems, including Windows 3.1, Windows 3.11, Windows 95 and NT Workstation. All clients are using IPX to connect to the servers. Joseph installs NWLink and TCP/IP on the internal network card and TCP/IP on the external network card. The result is that the Windows 95 clients and the NT Workstation clients are having no problem. The clients with the older versions of Windows (3.1, 3.11) cannot. What is the problem? A. Clients running Windows versions prior to Windows 95 do not have Internet Access capability. B. All clients must have TCP/IP to access the Internet through Proxy Server. C. The Windows 3.1 and 3.11 clients must be upgraded to 32-bit protocols (TCP/IP or IPX/SPX) before they can access the Internet. D. IPX for Windows 3.11 and Windows 3.1 is not supported with Proxy.
94. George has installed Proxy Server on a new machine. He wants to check performance on the drive, but after a period of time the disk counters read as 0. What must George do to enable these counters? (Choose all that apply) A. George does not have appropriate administrator rights to monitor TCP/IP through performance monitor. Her rights must be upgraded. B. George must install SNMP services on her system. C. The computer, including Proxy Server Service, must be shutdown and restarted before the counters will appear. D. Without the full-blown version of Network Monitor, available with SMS, these counters will not appear. E. George must run diskperf -y to start these counters.
95. The function of Proxy Server demonstrates the newly added features and benefits of: (Choose all that apply) A. Proxy-to-proxy authentication B. Dynamic packet filtering C. Array-based content caching D. Chain-based content caching
96. Internet request for access to your web server through Proxy Server are processed using: A. TCP/IP designated ports B. Packet filters C. Reverse Proxy D. Domain filters
97. Installation of the Proxy Server 2.0 requires Microsoft Windows NT Server version 4.0 and: A. Service Pack 3 B. RAS Service C. IIS 2.0 or later D. NTFS Volume
98. You are running an IIS 4.0 Web Server, with Proxy 2.0 as a firewall. Because the web server is for the intranet, and not published to the Internet, you have implemented NT Challenge/Response for all access to ensure that access is by members of your domain only. You have implemented reverse proxy. An employee who is working from home calls you complain that every time he tries to log on to the website, he gets the error "Access is Denied" after entering his username and password. You check his account and he has the appropriate permissions to access the site, and his account is not locked out. What do you check next? A. what processor his machine is running at home B. what browser he is running at home C. whether he has dial-in permissions on his user account D. whether his password has expired
99. You have three locations, location A, location B, and location C. Location A is connected to the Internet via a MS Proxy Server and a 1.5MB T1 connection. Location B is connected with a 56kb leased connection directly to the Internet. Location C has an MS Proxy Server and you would like to configure auto-dial to either A or B with an ISDN for their Internet connection. How should your Internet access be configured? A. Location A Primary, Location B Backup B. Location B Primary, Location A Backup C. Location A Primary, No Backup D. Location B Primary, No Backup
100. Your network is configured with three MS Proxy Servers on computers: Computer1, Computer2, Computer3. A DNS server has been configured as follows:
You want to ensure all MS Proxy Servers are distributing the load for Internet access. When you check the servers from the Internet Service Manager you notice that Computer1 bares the load for Internet access. What is the problem and how can it be repaired? A. Configure the client configuration file on each client computer appropriately to specify INET.com B. Configure the client configuration file on each client computer appropriately to specify Computer1 C. Add an alias to the DNS server for INET in the round-robin group D. At the Proxy server configure an array to forward queue requests to the next server
101. Your network is configured with an array of three Proxy servers on computers Computer1, Computer2, and Computer3. A DNS server has been configured as follows:
You want to ensure all Proxy servers are distributing the load for Internet access. When you check the servers from the Internet Service Manager you notice that Computer1 bares the load for Internet access. What is the problem and how can it be repaired? A. Configure the client configuration file on each client computer appropriately to specify the DNS server B. Configure the client configuration file on each client computer appropriately to specify Computer1 C. The DNS entries are invalid. 192.168.100.2 must point to Computer2 and 192.168.100.3 must point to Computer3 D. At the Proxy server configure an array to forward queue requests to the next server
102. Your company would like to implement Internet access on their local network. They currently use the IPX protocol for Windows for Workgroups, Windows 95 and Windows NT Workstation clients. After configuring a Microsoft MS Proxy Server for use with the MS WinSock Proxy Service, the WFW and Windows 3.x clients report that they are unable to access the Internet while the Windows 95 and Window NT clients report no problems. What can be done to allow the Windows 3.x and WFW clients to access the Internet? A. Ensure the 32bit support drivers are loaded on the WFW and Windows clients B. From the Internet Service Manager, add the WFW IPX agent driver for the WinSock Proxy C. Windows 3.x based clients that use IPX are not able to access the WinSock Proxy Service D. Load the NetWare 16 bit VLM's on each of the Windows 3.x based clients
103. Your company would like to implement Internet access on their local network. They currently use the TCP/IP protocol for Windows for Workgroups and Windows 3.x clients. After configuring the Microsoft Web Proxy Service, the WFW and Windows 3.x clients report that they are unable to access the Internet. What can be done to allow the Windows 3.x and WFW clients to access the Internet? A. Ensure the WEB applications and Browser have been configured with the correct Proxy parameters B. Ensure the 32bit support drivers are loaded on the WFW and Windows clients C. From the Internet Proxy Manager, add the WFW IPX agent driver for the WinSock Proxy D. Windows for Workgroups clients that use IPX are not able to access the WinSock Proxy service for Proxy Server
104. You are concerned that your MS Proxy Server is not performing at its peak. You wish to check performance but when you try to take a look at the Performance monitor Physical Disk counters you see 0's. Realizing this is not correct, what steps must be taken to get Performance Monitor to correctly report disk usage? (Choose all that apply) A. From the Performance Monitor, select disk counters and follow the on-screen instructions to turn the disk counters on or off. B. At a command prompt use the diskperf command to turn the disk counters on or off. C. Restart the WEB and WinSock services from the Internet Service Manager, and then use Performance Monitor to view activity. D. Restart the server computer, and then use Performance Monitor to view activity.
105. When using Performance Monitor to monitor MS Proxy services, you notice that your %CPU Usage is rather high averaging 90% usage. When looking further into the problem you notice that disk usage counters register zeros yet the drive is thrashing wildly. You remember that the "diskperf -y" command must be entered at the command line. After entering the command you notice that the disk counters still register zero. Realizing this is not correct, what step must be taken to get Performance Monitor to correctly report disk usage? A. The Performance Monitor must be ended and restarted B. Restart the server computer, and then use Performance Monitor to view activity C. All Proxy services must be ended and restarted and then use Performance Monitor to view activity D. Check the service pack level of the server and upgrade if necessary to Service Pack 4
106. Your network has 1200 Windows 95 clients and 300 Windows NT Workstation clients. You would like to configure your MS Proxy Server for optimal caching. What should your cache size be set to? A. 500MB B. 750MB C. 850MB D. 1.5GB
107. Your network has 1500 clients. You would like to properly configure your MS Proxy Server for optimal caching. What should your cache size be set to? A. 500MB B. 750MB C. 850MB D. 1.5GB
108. Your network has 500 Windows NT Workstation clients and 100 Windows 95 clients. You would like to properly configure your MS Proxy Server for optimal caching. What should your cache size be set to? A. 400MB B. 500MB C. 600MB D. 1.2GB
109. An Internet domain "bozo.com" has an Internet IP address of 117.25.67.34. What is the effect of a Domain Filter of "Denied" except to "117.25.67.34"? A. Access is granted to bozo.com and IP address 117.25.67.34 B. Access is granted to bozo.com but denied to IP address 117.25.67.34 C. Access is denied to bozo.com and IP address 117.25.67.34 D. Access is denied to bozo.com but granted to IP address 117.25.67.34
110. Which of the following services are used to configure Passive caching? (Choose all that apply) A. SOCKS Proxy Properties B. WinSock Proxy Properties C. Web Proxy Properties D. CERN Services
111. Which of the following services are used to configure Active caching? (Choose all that apply) A. SOCKS Proxy Properties B. WinSock Proxy Properties C. Web Proxy Properties D. CERN services
112. When configuring WEB Proxy Cache, which of the following can accept and store the cached information? (Choose all that apply) A. HPFS B. FAT16 C. FAT32 D. NTFS
113. When configuring WEB Proxy Cache, which of the following CANNOT accept and store the cached information? (Choose all that apply) A. HPFS B. FAT16 C. FAT32 D. NTFS
114. What is the result of setting the cache size on a drive to 0? A. The cached data will remain but caching is suspended B. The cached data will be cleared and all caching is suspended C. The cached data will be cleared and that drive is no longer used for caching D. The drive is configured for maximum caching
115. Which of the following object types can be cached? (Choose all that apply) A. HTTP B. TELNET C. FTP D. Gopher
116. Your company accesses a web site that changes regularly each hour of the day. You are very concerned that the information presented to your clients be current and accurate. What caching option would ensure that commonly accessed information is optimally cached yet the information in cache is updated to reflect changed web information? A. Use active caching and set the policy to reflect that faster user response is more important B. Use Active caching and set the policy to reflect fewer network accesses are more important C. Use Passive caching and set the cache expiration policy to reflect that updates are more important D. Use passive caching and set the cache expiration policy to reflect that fewer network accesses are more important
117. Your company accesses a web site heavily which changes regularly each evening. You are very concerned that the information be current and accurate which is presented to your 2500 clients. What caching option would ensure that commonly accessed information is optimally cached yet the information in cache is updated to reflect changed web information each day? A. Use Active caching and set the policy to reflect that faster user response is more important B. Use Active caching and set the policy to reflect fewer network accesses are more important C. Use Passive caching and set the cache expiration policy to reflect that updates are more important D. Use Passive caching and set the cache expiration policy to reflect that fewer network accesses are more important
118. You are setting up a multi-server environment and need to determine what configuration option may give you improved performance. What option do you select? A. Distributed caching is accomplished by linking multiple Proxy Server computers together to form an array B. Hierarchical caching, also known as chaining or cascaded proxying, is also accomplished by linking multiple Proxy Server computers together to form upstream caching C. DNS Round-Robin server selection D. All of the above options are valid performance enhancers
119. You are administering an array of MS Proxy servers that are utilized on a network containing both TCP/IP and IPX/SPX clients. You choose to streamline your company by using only one protocol, namely TCP/IP. After reconfiguring all the proxy and network clients to utilize only TCP/IP, you start to finalize your new network scenario by removing IPX/SPX from the first server in the MS Proxy array. Because it is an array, are you required to remove the IPX protocol from each server or will array synchronization have taken care of it for you? A. When IPX/SPX is removed from the first server, all other array members will synchronize automatically B. When IPX/SPX is removed from the first server, all other array members will synchronize when MS Proxy is restarted C. When IPX/SPX is removed from the first server, all other array members will synchronize when the first server is restarted D. IPX/SPX must be removed manually from each server in the array leaving TCP/IP to support MS Proxy
120. Which of the following MS Proxy Server services supports the configuration of "TCP" based applications? (Choose all that apply) A. Web Proxy Services B. WinSock Proxy Services C. SOCKS Proxy Services D. None of the above
121. Which of the following MS Proxy Server services support the configuration of "UDP" based applications? A. Web Proxy Services B. WinSock Proxy Services C. SOCKS Proxy Services D. None of the above
122. Your company has implemented Internet access on their local network for Windows 95 and Windows NT clients via an MS Proxy WinSock service. The Windows 95 clients currently load their network connections with the 16bit VLM's and the Windows NT Workstation clients utilize Microsoft TCP/IP. Users report that the Windows 95 clients are unable to establish connections to the MS Proxy server yet the Windows NT Workstation clients connect successfully. If the MS Proxy Server supports both IPX and TCP/IP Proxy servicing, what option would successfully allow the Windows 95 clients to utilize IPX and MS Proxy Services to the Internet from the local Intranet? A. Replace the VLM's with the 32bit IP network protocol and client drivers B. Replace the VLM's with the 32bit IPX network protocol and client drivers C. Utilize the WEB Proxy instead of the WinSock proxy D. Replace the NT Workstation TCP/IP with Client Services for NetWare
123. Your company has implemented Internet access on there local network for Windows 95 and Windows NT clients via a MS Proxy WinSock service. The Windows 95 clients and the Windows NT Workstation clients utilize Microsoft 32bit IPX protocol. Users report that the Windows 95 clients prompt the user to "Enter domain credentials" each time a new Windows Sockets application is launched. What can be done to resolve this problem? A. Replace the Microsoft 32bit IPX protocol with the NetWare IPX protocol and reload the MS Proxy WinSock Client B. Ensure all applications support Microsoft NT Challenge/Response C. Leave the first application open and minimize it on the desktop D. Ensure the user ID and password are correct
124. The event message "The WinSock Proxy service has denied client authentication." was returned and displayed to clients running Windows NT services or server applications by the WinSock Proxy service. What can be done? (Choose all that apply) A. Verify that the account user name and password are current and correct B. Verify that TCP/IP or IPX is bound to the proper network adapter card C. Set the user account with a password that does not expire D. Set the user account with a password that has expired
125. You change a client's local MSPLAT.TXT file because the LAT table downloaded from the server does not contain the correct information for the client to gain access to a server in the Intranet-work. You attempt to connect to the server defined in the modified client MSPLAT.TXT file and are successful. Later on that day the client reboots his system and is then unsuccessful in connecting to the same server. Why did this occur? A. The MSPLAT.TXT file must be modified in a Proxy setup script for the client to retain settings B. The client's MSPLAT.TXT file must be modified to specify a static entry to prevent losses C. The client's MSPLAT.TXT file is overwritten by a fresh version downloaded from the server D. The client's WinSock software must be reinstalled after a LAT modification
126. You change a client's local MSPLAT.TXT file because the LAT table downloaded from the server does not contain the correct information for the client to gain access to a server in the Intranet-work. You attempt to connect to the server defined in the modified client MSPLAT.TXT file and are successful. Later on that day the client reboots his system and is then unsuccessful in connecting to the same server. When troubleshooting you realize that the server copy overwrote the client's copy. How can this be prevented in the future? A. Create a custom LAT file named LOCALLAT.TXT, and place it in the client's MSPCLNT directory B. Create a custom LAT file named MSPLAT.TXT, and place it in the client's MSPCLNT directory C. Create a custom file named MSPCLNT.INI, and place it in the client's MSPCLNT directory D. Add a static entry to the file named MSPLAT.TXT, and place it in the client's MSPCLNT directory
127. Every time a Web browser is opened, you can optionally download a client configuration script located on the Proxy Server computer to the client computer to improve browser performance and to update browser configuration parameters. What is this script written in? A. VBScript B. CGI C. JavaScript D. Microsoft Batch File
128. You have 200 MS Proxy clients. 150 use WEB proxy services and 50 use the WinSock proxy services. How many MS Proxy 2.0 CAL's or client access licenses are required? A. 0 B. 50 C. 150 D. 200
129. You have 2000 MS Proxy clients utilizing an array of 4 MS Proxy servers. 1500 use WEB proxy services and 500 use the WinSock proxy services. How many MS Proxy 2.0 CAL's or client access licenses are required? A. 0 B. 4 C. 2000 D. 4000
130. Your WWW service on your WEB server is set for Windows NT Challenge/Response and Allow Anonymous authentication. Your clients use Netscape Navigator for WEB browsing and report that they are continually prompted with the MS Windows Challenge/Response screen. What can you do to assist your users in quickly repairing this problem? A. Disable anonymous authentication B. Allow Basic Clear text authentication C. Clear Windows NT Challenge/Response authentication D. Replace Netscape Navigator with Internet Explorer 4.x
|