Microsoft ISA 2006 Preparation Questions

 

  1. Section 1

 

  1. New Version of Microsoft ISA 2006

    a. Microsoft System Management Center

    b. Microsoft Fore Front

    c. Microsoft Essential

  1. We can Install ISA Server 2006 on

    a. Window Server 2008 R2

    b. Window Server 2003

c. Window Server 2003 64bits

  1. Which of the following are transport layer protocols?

    a. IP

    b. TCP and IP

    c. TCP and UDP

  1. Layer of TCP/IP Layers (TCP/IP Model)

    a. Application, Transport, Internet, and Network

    b. Application, encryption, network, transport, logical Link control, Physical

    c. Application, Presentation, Session, Transport, Network, Data Link Layer, and Physical

  1. Which Layer is responsible for packet sequencing, acknowledgements, and requests for retransmission?

    a. Transport

    b. Physical

    c. Network

  1. Which VPN Authentication method is more secure

PAP

MS-CHAP version 2

EAP

  1. We can Deploy ISA Server NLB on

a. ISA Server 2K6 Standard Edition Window 2003 Enterprise Edition

b. ISA Server 2K6 Enterprise Edition with Window Server 2k3 Enterprise Edition

c. ISA Server 2K6 Enterprise Edition with Window 2K3 standard

  1. Type of VPN Protocol

MS-CHAPv2

PPTP

L2TP/IPSec

 

 

 

 

 

 

 

 

  1. Section 2

     

  1. What is Dos Attack?
  2. What is DDos attack?
  3. What is Trust Exploitation?
  4. What is man in the middle attack?
  5. What is Application Layer Attack?
  6. What is Packet Sniffer?
  7. What is IP Weakness?
  8. What is Virus, warm, Spam, and Trojan horse?
  9. What are different between ISA Server 2k6 Standard Edition and Enterprise Edition?
  10. Describe about Function of ISA Server Enterprise Edition for Enterprise Network.
  11. What are type of Firewall Clients? Describe each type.
  12. What are the benefits of deploying a proxy server? What are the benefits of deploying a caching server?
  13. What firewall functionality is provided by ISA Server 2006? Briefly describe each type of functionality.
  14. What are the benefits of deploying a proxy server? What are the benefits of deploying a caching server?    
  15. What is Intrusion detection system? Describe how IDS Work.
  16. What is Proxy Server? Why we should use proxy in organization?
  17. What is Reverse Proxy? Describe how it works.
  18. What is Forward proxy? Describe how it works.
  19. What is VPN? And what are VPN Deployment Scenarios?
  20. What is VPN quarantine control?

     

    1. Section 3:

Introduction

The following three scenarios all describe an organizations security requirements. Determine what type of firewall functionality is required to address each security concern in the scenario.

  • Scenario 1

Fabrikam, Inc. is implementing a new firewall solution. The organization needs to provide access to the Internet for all internal employees using any protocol. In the past, several employees have been reprimanded for accessing inappropriate Web content. The organization must be able to limit which Web sites employees can connect to and must be able to log all user access to Web sites. Fabrikam, Inc has a Web site that is hosted by an ISP, so there is no need for any HTTP or HTTPS traffic originating from the Internet to enter the company network. The organization does have an internal SMTP server. In the past, several security breaches have occurred when users received viruses by e-mail, so the organization needs to be able to prevent this from happening again.

  • Scenario 2

Contoso, Ltd. is implementing a new firewall solution. The organization needs to provide access to the Internet for all internal employees using any protocol. However, the organization must be able limit what types of content and files users can download from the Internet. Contoso, Ltd. has a Web site that is located on a perimeter network behind the firewall. The security logs indicate that 80 percent of attack attempts on the Web site come from five IP addresses on the Internet. The organization wants to prevent any network connections from those IP addresses, but also needs to be alerted when any other attack attempts occur.

  • Scenario 3

Tailspin Toys is implementing a new firewall solution. The organization needs to provide access to the Internet for all internal employees using any protocol. Tailspin Toys has an internal Web site that is located on a perimeter network behind the firewall. This internal Web site should be accessible only to employees of a partner organization, and only when the users are in the partner organizations office. The security logs indicate that the previous firewall frequently received packets that were not part of a current connection with a client inside the network. The organization needs to ensure that this type of attack will not succeed in the future.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s