Objective 4.4 Questions


1.

One of your customers runs a small business network that consists of four computers running Windows XP Professional. One computer has a dial-up Internet connection and is configured with ICS. The other three computers access the Internet through the ICS computer. Your customer wants to protect the network by using ICF. What must the customer do?

  1. The customer should upgrade to a dedicated Internet connection. ICF is not available on dial-up connections.

  2. The customer should enable ICF on the ICS computer only.

  3. The customer should enable ICF on all computers on the network.

  4. ICF cannot protect a network in this manner. The customer should buy a router with a built-in firewall and install it on the network.

 correct answers: b a. incorrect icf is available on dial-up connections. b. correct only computers directly connected to the internet (the ics computer, in this case) need to have icf enabled. c. incorrect only computers directly connected to the internet (the ics computer, in this case) need to have icf enabled. d. incorrect icf can protect a network if it is enabled on the ics computer that is directly connected to the internet.

2.

One of your customers has a home computer that runs Windows XP Professional and has a dedicated Internet connection. The customer has ICF configured on the computer. The customer has just installed Internet Information Services on the computer so that she can host her own website. However, users from the Internet cannot view the website. What should the customer do?

  1. On the Services tab of the ICF’s Advanced Settings dialog box, select the Web Server (HTTP) check box.

  2. On the ICMP tab of the ICF’s Advanced Settings dialog box, select the Web Server (HTTP) check box.

  3. The customer should install ICS on the computer.

  4. The customer must disable ICF in order to allow access to the website.

 correct answers: a a. correct use the services tab to select the services running on a computer that internet users are allowed to access. b. incorrect the web server (http) check box, as well as options for allowing other services, are located on the services tab. c. incorrect ics is used to share a computer s internet connection with other computers on a local network. d. incorrect you can configure icf to allow certain types of incoming traffic, including web traffic.

3.

One of your customers runs a database on her computer that allows applications to connect using TCP port 34562. The user prefers to keep ICF enabled on her Internet connection, but ICF prevents people from connecting to her database. What should you tell the customer?

  1. Use the Add button on the Services tab of the ICF’s Advanced Settings dialog box to add the service and port number to those that ICF allows.

  2. On the Services tab of the ICF’s Advanced Settings dialog box, select the Allow Custom Services Above Port# 35000 check box.

  3. Use the ICMP tab of the ICF’s Advanced Settings dialog box to add the service and port number to those that ICF allows.

  4. The user cannot add custom services to ICF.

 correct answers: a a. correct you can add new services to those that icf allows traffic for. b. incorrect there is no allow custom services above port# 35000 check box. c. incorrect the icmp tab is used to create allowances for icmp messages only, not for services. d. incorrect you can add new services to those that icf allows traffic for.

4.

One of your customers runs a game server on his home computer. For game clients to detect whether the game server is full, the game client software must be able to ping the game server. When a game client tries to connect to the server, the game client software uses port 8452 to connect to the game server. Your customer has ICF enabled, and he has already created and enabled a custom service for the appropriate port number. What else must the customer do to allow the remote game client software to successfully ping his game server?

  1. On the Services tab of the ICF’s Advanced Settings dialog box, select the Allow Incoming Ping check box.

  2. On the Services tab of the ICF’s Advanced Settings dialog box, select the Allow Incoming Echo Request check box.

  3. On the ICMP tab of the ICF’s Advanced Settings dialog box, select the Allow Incoming Ping check box.

  4. On the ICMP tab of the ICF’s Advanced Settings dialog box, select the Allow Incoming Echo Request check box.

 correct answers: d a. incorrect there is no allow incoming ping check box on the services tab. b. incorrect there is no allow incoming echo request check box on the services tab. this option is found on the icmp tab. c. incorrect there is no allow incoming ping check box on the icmp tab. d. correct the allow incoming echo request option controls whether a remote computer can ask for and receive a response from the computer. ping is a command that requires you to enable this option.

5.

Which of the following types of information is collected in the ICF security log? (Choose all that apply.)

  1. Source IP

  2. Destination port

  3. Source DNS host name

  4. Source user name

 correct answers: a and b a. correct the source ip (the ip address from which the traffic originated) is collected in the security log. b. correct the destination port (the port number the traffic is configured to use) is collected in the security log. c. incorrect the source dns host name is not collected by the security log. d. incorrect the source user name is not collected by the security log.

Answers

1.

Correct Answers: B

  1. Incorrect ICF is available on dial-up connections.

  2. Correct Only computers directly connected to the Internet (the ICS computer, in this case) need to have ICF enabled.

  3. Incorrect Only computers directly connected to the Internet (the ICS computer, in this case) need to have ICF enabled.

  4. Incorrect ICF can protect a network if it is enabled on the ICS computer that is directly connected to the Internet.

2.

Correct Answers: A

  1. Correct Use the Services tab to select the services running on a computer that Internet users are allowed to access.

  2. Incorrect The Web Server (HTTP) check box, as well as options for allowing other services, are located on the Services tab.

  3. Incorrect ICS is used to share a computer’s Internet connection with other computers on a local network.

  4. Incorrect You can configure ICF to allow certain types of incoming traffic, including Web traffic.

3.

Correct Answers: A

  1. Correct You can add new services to those that ICF allows traffic for.

  2. Incorrect There is no Allow Custom Services Above Port# 35000 check box.

  3. Incorrect The ICMP tab is used to create allowances for ICMP messages only, not for services.

  4. Incorrect You can add new services to those that ICF allows traffic for.

4.

Correct Answers: D

  1. Incorrect There is no Allow Incoming Ping check box on the Services tab.

  2. Incorrect There is no Allow Incoming Echo Request check box on the Services tab. This option is found on the ICMP tab.

  3. Incorrect There is no Allow Incoming Ping check box on the ICMP tab.

  4. Correct The Allow Incoming Echo Request option controls whether a remote computer can ask for and receive a response from the computer. Ping is a command that requires you to enable this option.

5.

Correct Answers: A and B

  1. Correct The source IP (the IP address from which the traffic originated) is collected in the security log.

  2. Correct The destination port (the port number the traffic is configured to use) is collected in the security log.

  3. Incorrect The source DNS host name is not collected by the security log.

  4. Incorrect The source user name is not collected by the security log.




McDst Self-Paced Training Kit (Exam 70-272(c) Supporting Users and Troubleshooting Desktop Applications on a[... ]ystem)
McDst Self-Paced Training Kit (Exam 70-272(c) Supporting Users and Troubleshooting Desktop Applications on a[... ]ystem)
ISBN: N/A
EAN: N/A
Year: 2006
Pages: 237

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net