Which action will you perform in the ISA Server log?

You work as an IT professional in an international corporation named Wiikigo. In the company, your job is to configure Microsoft Internet Security and Acceleration Server 2006. And you are experienced in performing and managing networks and operational systems. In addition, you are skilled at deploying ISA Server 2006, configuring firewall settings, and optimizing performance of the ISA Server 2006 cache. An ISA Server array is included by your network and inbound and outbound firewall services are offered by the ISA Server array. The company set all client computers as SecureNAT clients. 1,000 users are contained on the network. The naming convention is Firstname.Lastname. A URL set in ISA Server named Blocked Web Sites is contained, and the URLs of 10 Web sites are included by the Blocked Web Sites. An Internet access rule is created, and access to the Blocked Web Sites URL set should be excluded. It is reported by a user named Nathan Geiger that 10 blocked Web sites are available to him. The ISA Server rule that allows Nathan to access the blocked Web sites should be identified. Which action will you perform in the ISA Server log?

You work as an IT professional in an international corporation named Wiikigo. In the company, your job is to configure Microsoft Internet Security and Acceleration Server 2006. And you are experienced in performing and managing networks and operational systems. In addition, you are skilled at deploying ISA Server 2006, configuring firewall settings, and optimizing performance of the ISA Server 2006 cache. An ISA Server array is included by your network and inbound and outbound firewall services are offered by the ISA Server array. The company set all client computers as SecureNAT clients. 1,000 users are contained on the network. The naming convention is Firstname.Lastname. A URL set in ISA Server named Blocked Web Sites is contained, and the URLs of 10 Web sites are included by the Blocked Web Sites. An Internet access rule is created, and access to the Blocked Web Sites URL set should be excluded. It is reported by a user named Nathan Geiger that 10 blocked Web sites are available to him. The ISA Server rule that allows Nathan to access the blocked Web sites should be identified. Which action will you perform in the ISA Server log?

A.
You should filter by Client IP for values that equal the IP address of Nathans computer. And then you should filter by Transport for values that equal UDP.

B.
You should filter by Client IP for values that equal the IP address of Nathans computer. And then, you should filter by URL for values that include the URL that Nathan accessed.

C.
You should filter by Rule for values that equal Blocked Web Sites, and then, you should filter by Protocol for values that equal HTTP.

D.
You should filter by Client Username for values that contain Nathan Geiger. And then, you should filter by Protocol for values that contain the URL that Nathan accessed.



Leave a Reply 0

Your email address will not be published. Required fields are marked *