Which action should be performed?

You work as an IT professional in an international corporation named Wiikigo. In the company, your job is to configure Microsoft Internet Security and Acceleration Server 2006. And you are experienced in performing and managing networks and operational systems. In addition, you are skilled at deploying ISA Server 2006, configuring firewall settings, and optimizing performance of the ISA Server 2006 cache. You work as the administrator of an ISA Server 2006 computer, and the computer is named ISA01. The company has ISA01 connected to the Internet. And the company has all client computers configured as SecureNAT clients. According to the company’s new written security policy, the company permits only Web-based traffic through the ISA Server. But all instant messaging traffic was permitted in the past. ISA01 should be configured to all instant messaging traffic and all other non-Web traffic blocked. Which action should be performed?

You work as an IT professional in an international corporation named Wiikigo. In the company, your job is to configure Microsoft Internet Security and Acceleration Server 2006. And you are experienced in performing and managing networks and operational systems. In addition, you are skilled at deploying ISA Server 2006, configuring firewall settings, and optimizing performance of the ISA Server 2006 cache. You work as the administrator of an ISA Server 2006 computer, and the computer is named ISA01. The company has ISA01 connected to the Internet. And the company has all client computers configured as SecureNAT clients. According to the company’s new written security policy, the company permits only Web-based traffic through the ISA Server. But all instant messaging traffic was permitted in the past. ISA01 should be configured to all instant messaging traffic and all other non-Web traffic blocked. Which action should be performed?

A.
A new access rule that has only HTTP and HTTPS as the allowed protocols should be created. And then, HTTP filtering should be set and signatures should be added for instant messaging applications. At last, the HTTP filter should be unbound from the HTTP protocol definition.

B.
A computer set definition for instant messaging servers on the Internet should be created.
And then, a new access rule that denies all instant messaging protocols should be created to the computer set that is defined by you. At last, a new access rule that has only HTTP and HTTPS as the allowed protocols should be created.

C.
All current access rules should be deleted. And then, a new access rule that has only HTTP and HTTPS as the permitted protocols should be created. At last, HTTP filtering should be set and signatures for instant messaging applications should be added.

D.
A new access rule that denies all instant messaging protocols should be created. And then, a new access rule that has only HTTP and HTTPS as the allowed protocols should be created.



Leave a Reply 0

Your email address will not be published. Required fields are marked *