Assessment Test


1. ‚  

You are testing Exchange Server 2003 to determine whether it is worth upgrading to. You have just finished installing an Exchange server and are exploring the directories in which the files were created when you come across two files named PUB.EDB and PUB.STM . You recognize from earlier versions of Exchange Server that the PUB.EDB file is the database for your public folders. What is the PUB.STM file used for?

  1. Allowing web access to the public folders

  2. Storing information about the folders that are compatible with earlier versions of Exchange Server

  3. Storing certain types of media files in their native format

  4. Providing a backup of the PUB.EDB file

2. ‚  

You have installed multiple public folder trees in your organization. Which of the following clients will be able to access the default public folder tree and all of the additional trees? (Choose all that apply.)

  1. Outlook

  2. A web browser

  3. An Office application

  4. A generic POP3 client

3. ‚  

You are the administrator of a large Exchange organization and have been given the task of creating a connector between two routing groups. You have the following requirements:

‚ Use the simplest connector possible in terms of configuration and maintenance.

‚ Configure multiple bridgehead servers.

‚ Assign a low cost to this connector so that is it more likely to be used than other connectors between the same routing groups.

‚ Have servers issue authentication before sending any mail.

You implement the following solution:

Install a Routing Group Connector between the two routing groups.

Which of the requirements does the proposed solution meet? (Choose all that apply.)

  1. Use the simplest connector possible in terms of configuration and maintenance.

  2. Configure multiple bridgehead servers.

  3. Assign a low cost to this connector so that is it more likely to be used than other connectors between the same routing groups.

  4. Have servers issue authentication before sending any mail.

4. ‚  

You are the Exchange administrator for a large network and are about to install the first Exchange server in the organization. Before you do that, however, you must run the ForestPrep utility to prepare your forest. To which of the following groups must you belong in order to run the ForestPrep utility? (Choose all that apply.)

  1. Server Admins

  2. Domain Admins

  3. Schema Admins

  4. Enterprise Admins

5. ‚  

You have five computers on which you are considering installing Exchange Server 2003 as a testing environment. Which of the following systems meet the requirements for installing Exchange Server 2003? (Choose all that apply.)

  1. Pentium 90, 64 MB RAM, 500 MB disk space

  2. Pentium 133, 64 MB RAM, 2500 MB disk space

  3. Pentium II 450, 256 MB RAM, 1000 MB disk space

  4. Pentium II 400, 512 MB RAM, 200 MB disk space

  5. Pentium III 500, 256 MB RAM, 2000 MB disk space

6. ‚  

You have three Exchange 2000 Server computers at Service Pack 3 that are running Windows 2000 Advanced Server Service Pack 2. What do you need to update before you can upgrade these servers to Exchange Server 2003? (Choose all that apply.)

  1. You will need to update the Windows 2000 Advanced Server installations to Service Pack 3.

  2. You will need to update the Windows 2000 Advanced Server installations to Service Pack 4.

  3. You will need to update the Exchange 2000 Server installations to Service Pack 4.

  4. You will need to update the current Active Directory schema using the ForestPrep utility.

7. ‚  

Which of the following MAPI components is a replaceable component that communicates with the server side of the messaging system?

  1. Client Application Layer

  2. MAPI subsystem

  3. Common Mail Call

  4. MAPI service provider

8. ‚  

Your company has hired an outside agency to provide accounting services. Many of your employees need to e-mail messages to people in this agency using the Internet. You want to set it up so that the people in the agency appear in the Exchange Global Address List. What type of recipient object do you need to configure for each person in the outside agency?

  1. Mailbox

  2. Mail-enabled user

  3. Contact

  4. A mailbox with a foreign owner

9. ‚  

Your organization has three routing groups: RG1, RG2, and RG3. Each group consists of three Exchange servers configured with about 500 users each. RG1 and RG2 are connected with a 256-KB wide area network (WAN). RG2 and RG3 are connected with a switched 56-KB connection. RG1 is not directly connected to RG3. You have created a public folder that contains 600 MB of data. Users in RG1 and RG3 need access to the folder throughout the day. Users in RG2 need only occasional access. The folder data is updated on a daily basis. On what servers should replicas be placed?

  1. On every server

  2. On one server in each routing group

  3. On every server in RG1 and RG3

  4. Only on the server where the public folder was originally created

  5. Only on domain controllers

10. ‚  

You are the administrator of a large network running Lotus Notes. As part of a plan for moving to Exchange Server 2003, you have just installed the first Exchange Server 2003 server and created a new Exchange organization. You would like to gradually migrate users from the Lotus Notes system and allow users of both systems to exchange messages during the migration. In order to do this, first you must set up a way for the two systems to communicate. What component of Exchange Server 2003 would you use?

  1. Migration kit

  2. Connector

  3. Import/Export tool

  4. None of the above

11. ‚  

You have three Exchange 2000 Server computers at Service Pack 3 that are running Windows 2000 Advanced Server Service Pack 2. What Exchange 2000 Server components do you need to remove before you can upgrade these servers to Exchange Server 2003? (Choose all that apply.)

  1. Exchange Chat

  2. Key Management Service

  3. SMTP connectors

  4. MS Mail connector

12. ‚  

How can Exchange Server 2003 routing groups be connected to one another? (Choose all that apply.)

  1. Using Routing Group Connectors

  2. Using SMTP Connectors

  3. Using X.400 Connectors

  4. Using Calendar connectors

13. ‚  

You are running a mixed-mode organization that contains a number of Exchange Server 2003 and Exchange Server 5.5 servers in several different sites. How do Exchange 5. x servers in different sites exchange directory information?

  1. Using e-mail messages

  2. Using MAPI

  3. Using RPCs

  4. Using LDAP

14. ‚  

Which of the following objects can an administrative group hold? (Choose all that apply.)

  1. Servers

  2. Routing groups

  3. Recipients container

  4. System policy containers

  5. Tools container

15. ‚  

You are creating an Active/Active Exchange Server 2003 cluster. How many total storage groups should you place in this cluster for best performance?

  1. Two

  2. Three

  3. Four

  4. Five

16. ‚  

You are planning your company ‚ s Exchange Server 2003 deployment and are deciding how to group servers into routing groups. Which of the following criteria must servers meet to be in the same routing group? (Choose all that apply.)

  1. All servers must be in the same forest.

  2. All servers must be in the same domain tree.

  3. All servers must be in the same domain.

  4. All servers must be capable of supporting SMTP connectivity.

  5. All servers must be in the same administrative group.

  6. All servers must be capable of supporting high-speed connectivity.

17. ‚  

You have configured four storage groups on your Exchange server. One group holds five mailbox stores and no public stores. The other two groups are configured with two public stores each and no mailbox stores. The final group has one mailbox store and one public store. How many sets of transaction logs are maintained on the server?

  1. One

  2. Four

  3. Six

  4. Seven

  5. Nine

18. ‚  

You have just configured your Exchange server for IMAP4 client access. IMAP4 clients can be authenticated with either Basic or Basic with SSL authentication. The administrator of your firewall informs you that the firewall will allow traffic from SMTP (port 25), IMAP4 (port 143), and HTTP (port 80). What additional traffic must the firewall be configured to allow for your Exchange server IMAP4 configuration to be used?

  1. 993

  2. 995

  3. 137

  4. 135

19. ‚  

You are the administrator of a large Exchange organization. Recently, you have become aware that users on the Internet have been using an SMTP server that you configured outside your firewall to relay messages not bound for your organization. How can you stop this?

  1. Use the Relay setting on the SMTP virtual server object ‚ s Access property page.

  2. Use the Inbound Security settings on the SMTP virtual server object ‚ s Advanced property page.

  3. Use the Authentication setting on the SMTP virtual server object ‚ s Access property page.

  4. Configure the Relay settings for the SMTP Connector object.

20. ‚  

What type of policy will you need to configure to limit mailbox store size ?

  1. Recipient policy

  2. Storage policy

  3. Mailbox store policy

  4. Server policy

21. ‚  

Management would like for you to configure the Exchange Server 2003 organization at your company so that users can access their mailboxes and other Exchange-based folders over the Internet. You have decided that the easiest way to do this would be for the users to be able to connect with a web browser. Which of the following components work together to allow web browsers to access an Exchange server? (Choose all that apply.)

  1. Internet Information Services

  2. Outlook Browser Access

  3. Outlook Web Access

  4. Exchange Web Server

22. ‚  

Which of the following types of Windows authentication are used in a network operating at the Windows 2000 native domain functional level? (Choose all that apply.)

  1. Kerberos v3

  2. Kerberos v5

  3. NTLM

  4. Basic

  5. Basic over SSL

23. ‚  

Which of the following permissions would you assign to an object if you wanted an administrator to be able to view the contents of a container in System Manager but not access the object ‚ s properties?

  1. Read

  2. Write

  3. Read Properties

  4. List Contents

  5. Read Contents

24. ‚  

You have just received a message encrypted using a public-key encryption system. What key will be used to decrypt the message?

  1. The sender ‚ s public encryption key

  2. The sender ‚ s private encryption key

  3. Your public encryption key

  4. Your private encryption key

25. ‚  

A user named Mary is the owner of a public folder. Mary leaves your company, and the former administrator deletes her user account. As the current administrator, you now need to modify the permissions on the public folder. What will you have to do?

  1. Create a new account with the same user information as the deleted account.

  2. Restore a backup tape of the server that was created before the user was deleted.

  3. Designate your account as the owner of the folder.

  4. Create a new public folder and move the contents of the old folder to it.

26. ‚  

Which of the following tools provides a way to log the operation statistics of a computer ‚ s resources over time?

  1. Performance snap-in

  2. Computer Management

  3. Monitoring and Status

  4. Task Manager

27. ‚  

Several of your users routinely travel with their portable Windows XP Professional computers. When they travel, they use Outlook 2003 to access your Exchange organization via POP3. All messages they send or receive during this time are stored in a PST file. When the users get back, they import any required message items back into their Exchange mailboxes. One of these users has called you from a remote job site complaining that she cannot access her PST file. What tool should you tell her to use to try to fix the problem?

  1. PST Integrity Checker

  2. PST Repair Tool

  3. Outlook Repair Tool

  4. Inbox Repair Tool

28. ‚  

You are taking a long-overdue vacation and want system notifications regarding public folders to be sent to one of your assistants while you are away. What permission would you assign the assistant on each of the folders?

  1. Folder Owner

  2. Folder Manager

  3. Folder Contact

  4. Folder Notification

29. ‚  

Your Windows Active Directory forest consists of two domain trees. The first tree consists of a single root-level domain and four child domains of that root domain. The second tree consists only of a single root domain. You plan to install Exchange Server 2003 servers in both root domains and in one child domain of the first root domain. How many times would you need to run the DomainPrep utility?

  1. One

  2. Two

  3. Three

  4. Six

30. ‚  

Which Exchange role allows the user to add, delete, and rename objects but not modify permissions on objects?

  1. Exchange Full Administrator

  2. Exchange Administrator

  3. Exchange View-Only Administrator

  4. Exchange Read-Only Administrator

31. ‚  

You have been directed to create a highly available Outlook Web Access solution for your employees. Over 3,000 of your company ‚ s 4,000 employees routinely travel and need access to the Exchange organization. You ‚ ve decided to implement a front-end/back-end solution using an Active/Passive cluster on the back end and a Network Load Balancing cluster on the front end. How many nodes will your Active/Passive cluster be able to have if you use Exchange Server 2003 Enterprise Edition on Windows Server 2003 Enterprise Edition?

  1. Minimum of one, maximum of four

  2. Minimum of two, maximum of six

  3. Minimum of two, maximum of eight

  4. Minimum of one, maximum of two

32. ‚  

You are the Exchange administrator for an organization that is currently running Exchange Server 5.5. You are going to upgrade to Exchange Server 2003 but plan to do so in stages. During this time, your organization must operate in mixed mode. Which of the following are limitations of working in a mixed-mode organization? (Choose all that apply.)

  1. Administrative groups and Exchange Server 5.5 sites must be mapped on a one-to-one basis.

  2. Routing groups and Exchange Server 5.5 sites must be mapped on a one-to-one basis.

  3. You can create only one administrative group for your Exchange 2000 organization, and all Exchange Server 5.5 sites must be contained in that group.

  4. You can create only one routing group for your Exchange Server 2003 organization, and all Exchange Server 5.5 sites must be contained in that group.

33. ‚  

For security reasons, you have decided to configure your mailbox storage group to zero out deleted databases. When does this process occur?

  1. During routing information store maintenance

  2. Every four hours by default, but you can change this setting

  3. Once per day by default, but you can change this setting

  4. After an online backup is performed

34. ‚  

Which of the following constructs is used to track the set of root Certificate Authorities whose certificates can be trusted in a domain?

  1. Certificate Revocation List

  2. Certificate Trust List

  3. Certificate Authority List

  4. Root CA List

35. ‚  

You have an Exchange server that contains four storage groups. The first storage group contains a single mailbox store that consumes 20 GB of disk space. The second storage group contains two mailbox stores that consume 10 GB of disk space each. The third storage group holds a single public store that consumes 10 GB of disk space. The fourth storage group holds a mailbox store that consumes 15 GB of disk space. You want to enable full-text indexing on all of these stores. How much total disk space should the stores consume after indexing is complete?

  1. 55 GB

  2. 60.5 GB

  3. 66 GB

  4. 71.5 GB

  5. 82.5 GB

36. ‚  

You are the Exchange administrator for a large mixed-mode organization that is gradually upgrading to Exchange Server 2003. You are about to decommission one of your Exchange 5.5 servers and need to move all of the mailboxes on that server to a single mailbox store on one of your Exchange Server 2003 servers. You connect to the Exchange 5.5 server using Exchange Administrator and try to move the mailboxes, but during the process you get an error, and the operation fails. What is the likely problem?

  1. You cannot use Exchange Administrator to move mailboxes from Exchange 5.5 to Exchange Server 2003.

  2. You must first configure a temporary one-way connection agreement between the Exchange 5.5 server and the Exchange Server 2003 server.

  3. The mailbox store must be dismounted before this operation can take place.

  4. The mailbox store is not empty.

37. ‚  

Which of the following backup types would cause the archive bit for a file that is backed up to be set to the on position? (Choose all that apply.)

  1. Normal

  2. Copy

  3. Incremental

  4. Differential

  5. None of these

38. ‚  

You are configuring a connector between two routing groups that are in different buildings. You have a dedicated, high-speed link between the buildings but have decided to create a routing group for each building anyway. You would like to use a connector that is fairly easy to set up and configure, but you also need the connector to support TLS encryption. What type of connector would you choose?

  1. Routing Group Connector

  2. Site Connector

  3. X.400 Connector

  4. SMTP Connector

39. ‚  

Which of the following statements are true concerning an offline backup? (Choose all that apply.)

  1. File corruption is checked by using checksums.

  2. Purged transaction logs are not cleared from the server.

  3. The database must be dismounted.

  4. Users experience no interruption in mailbox store access.

40. ‚  

You have just configured your Exchange server for HTTP client access. Your company has a front-end server running outside the company firewall that can accept the HTTP client requests . This server authenticates HTTP clients with either Basic (Clear-Text) or Basic over SSL. The firewall currently allows traffic via SMTP (port 25) and POP3 (port 110). Which additional ports must be opened on the firewall to allow clients to connect using HTTP? (Choose all that apply.)

  1. 80

  2. 135

  3. 443

  4. 2890

  5. 3268

Answers

1. ‚  

C. An Exchange Server 2003 database represents two physical database files: a rich-text ( .EDB ) file and a streaming media ( .STM ) file. The rich-text file holds messages and works much like the database files in previous versions of Exchange Server. The streaming media file has been added to provide native support for many types of streaming media, including voice, audio, and video. See Chapter 2 for more information.

2. ‚  

B, C. MAPI clients, such as Outlook, can access only the default public folder tree in an organization. Clients that can directly access the file system, such as Office applications, web browsers, and Windows Explorer, can access multiple public folder trees. POP3 clients have no mechanism for accessing public folders at all. See Chapter 6 for more information.

3. ‚  

A, B, C. The Routing Group Connector (RGC) is preferred for connecting routing groups, because it is robust and simple to configure and maintain. It allows the use of multiple bridgehead servers and cost assignment. Only the SMTP Connector can issue authentication before sending mail, specify TLS encryption, and remove mail from queues on remote servers. See Chapter 8 for more information.

4. ‚  

C, D. In order to run the ForestPrep utility, a user must belong to both the Schema Admins and Enterprise Admins global groups. The user must also belong to the local Administrators group on the computer on which the utility is actually run. See Chapter 3 for more information.

5. ‚  

C, E. Exchange Server 2003 requires a minimum of a Pentium 133, 256 MB RAM, and 500 MB disk space. See Chapter 3 for more information.

6. ‚  

A, D. Before you can upgrade an existing Exchange 2000 Server, both Exchange 2000 Server and Windows 2000 Server must have at least Service Pack 3 (or later) installed. In addition, before you can install the first Exchange Server 2003 computer, you must run the Exchange Server 2003 ForestPrep and DomainPrep utilities to prepare the schema and the domains for the new Exchange Server 2003 installations. See Chapter 12 for more information.

7. ‚  

D. MAPI service providers are replaceable components that communicate with the server side of the messaging system. There are three types of service providers: address book providers, message store providers, and message transport providers. See Chapter 7 for more information.

8. ‚  

C. A contact holds the address of a non-Exchange mail recipient. Contacts are made visible in the Global Address List. See Chapter 5 for more information.

9. ‚  

B. There is really no need to have replicas configured on multiple servers in each routing group. However, because of the slow link speed between routing groups ( especially RG2 and RG3), it is important that at least one server in each routing group have a replica. Since there is more available bandwidth at night, and since the public folder data is not time-critical, you could also schedule replication to occur only at night. See Chapter 8 for more information.

10. ‚  

B. Connectors provide a way to connect Exchange servers in different routing groups and a way to connect Exchange organizations to external messaging systems. The Lotus Notes connector is one of the connectors supplied with Exchange Server 2003. Once the connector is configured, you will be able to have both messaging systems coexist with each other and eventually perform the migration to Exchange Server 2003. See Chapter 13 for more information.

11. ‚  

A, B, D. Before you can upgrade an Exchange 2000 Server to Exchange Server 2003, you must remove the following unsupported components:

‚ Microsoft Mobile Information Server

‚ Instant Messaging

‚ Exchange Chat

‚ Exchange 2000 Conferencing Server

‚ Key Management Service

‚ The cc:Mail connector

‚ The MS Mail connector

See Chapter 12 for more information.

12. ‚  

A, B, C. Exchange Server 2003 routing groups can be connected using the easy-to-configure Routing Group Connector or the multipurpose SMTP or X.400 Connectors. See Chapter 8 for more information.

13. ‚  

A. All Exchange 5. x servers in the same site automatically replicate directory information using RPCs. Replication of directory information between Exchange 5. x servers in different sites must be configured manually and occurs by sending e-mail messages over whatever connector is used to connect the sites. See Chapter 11 for more information.

14. ‚  

A, B, D. Administrative groups can contain servers, routing groups, public folder trees, and system policies. See Chapter 8 for more information.

15. ‚  

C. Since all resources on a failed node in an Active/Active cluster have only one possible server to failover to, you should not configure more than four total storage groups on an Active/Active cluster. See Chapter 4 for more information.

16. ‚  

A, D. In order to be in the same routing group, all servers must have reliable, permanent, and direct network connectivity that supports SMTP. They must also belong to the same Active Directory forest and be able to connect to a routing group master. See Chapter 8 for more information.

17. ‚  

B. Only one transaction log set is maintained for each storage group. See Chapter 9 for more information.

18. ‚  

A. IMAP4 uses TCP port 143. If Secure Sockets Layer (SSL) is being used to create an encrypted authentication channel, port 993 is used instead. See Chapter 7 for more information.

19. ‚  

A. By default, an SMTP virtual server will accept messages from any host but will relay only messages sent from authorized clients. This allows clients in your domain using POP3 or IMAP4 clients to send SMTP messages using the SMTP virtual host. If you want to configure your SMTP virtual server to act as a smart host for relay messages coming in from other domains, you can configure the specific clients to relay messages by using this button. See Chapter 13 for more information.

20. ‚  

C. A mailbox store policy can be used to configure mailbox size limits. See Chapter 10 for more information.

21. ‚  

A, C. Internet Information Services is a web server service built into Windows Server 2003 that provides the Internet protocol support for Exchange Server 2003. Outlook Web Access is a component that allows IIS to access the Web Store and then present information to Web browsers in HTML format. See Chapter 2 for more information.

22. ‚  

B, D, E. The Basic (Clear-Text) and Basic over SSL authentication methods may be used on any type of network. The third method available is Integrated Windows authentication. When operating at the Windows 2000 native mixed-domain functional level, Integrated Windows authentication uses the NTLM protocol supported by Windows NT 4.0. When running in native mode, Integrated Windows authentication used Kerberos v5. See Chapter 15 for more information.

23. ‚  

D. The List Contents permission lets a user view the contents of a container object but not access its properties. See Chapter 10 for more information.

24. ‚  

D. The recipient ‚ s public key is used to encrypt a message, and the recipient ‚ s private key is used to decrypt the message. See Chapter 15 for more information.

25. ‚  

C. An administrator has the permission to change the owner of a folder. Once the administrator takes ownership of the folder, they can then perform administrative tasks , such as adding rules and installing forms. See Chapter 6 for more information.

26. ‚  

A. The Performance snap-in lets you create a log of the performance of certain resources over time and then use that log to chart results. Other tools on this list also provide some performance data, but none allow for logging. See Chapter 10 for more information.

27. ‚  

D. The Inbox Repair Tool ( SCANPST.EXE ) tests and repairs a personal folder store (*.PST). It scans for bad blocks and attempts to rebuild them. If a PST file is corrupted beyond repair, this program will try to evacuate the good blocks of data and remove the corrupted blocks. This program does not need to be run unless there are operational problems with personal folders. See Chapter 10 for more information.

28. ‚  

C. A person with the Folder Contact permissions can receive e-mail notifications relating to a folder. Notifications include replication conflicts, folder design conflicts, and storage limit notifications. See Chapter 6 for more information.

29. ‚  

C. DomainPrep is a tool used to prepare each domain in which Exchange will be installed. The tool is run using the /domainprep switch for the SETUP.EXE program. See Chapter 3 for more information.

30. ‚  

B. The Exchange Administrator role gives the same full administrative capability as the Exchange Full Administrator role but does not give administrators permission to modify permissions for objects. See Chapter 10 for more information.

31. ‚  

C. An Active/Passive cluster using Exchange Server 2003 Enterprise Edition on Windows Server 2003 Enterprise Edition can have a maximum of eight nodes. You must have at least two nodes in the cluster. See Chapter 4 for more information.

32. ‚  

A. Exchange Server 5.5 sites are mapped directly to Exchange Server 2003 Server administrative groups and vice versa. This gives you less flexibility in setting up administrative groups than when working in native mode. See Chapter 11 for more information.

33. ‚  

D. The Zero Out Deleted Database Pages option is used to remove all 4-KB pages of data for items when they are deleted from a database by writing zeros to these pages within all stores of the storage group. This process occurs after an online backup is performed. This option can significantly reduce server performance, though, because of the additional overhead of writing to all the pages. See Chapter 9 for more information.

34. ‚  

B. The Certificate Trust List (CTL) for a domain holds the set of root CAs whose certificates can be trusted. Trust in root CAs can be set by policy or by managing the CTL directly. See Chapter 15 for more information.

35. ‚  

C. An indexed store requires about 20 percent more disk space than a non-indexed store. Before indexing, the combined space consumed by the stores was 55 GB. Following indexing, this would increase by 20 percent, making the combined space consumed 66 GB. See Chapter 9 for more information.

36. ‚  

A. Moving mailboxes from Exchange 5.5 to Exchange Server 2003 with Exchange Administrator is not supported. You must use the Exchange Task Wizard, which is accessed from the Active Directory Users and Computers console. See Chapter 11 for more information.

37. ‚  

E. No backup type sets the archive bit to on. When a file is created or modified, the archive bit is set to on. When some types of backups run, the archive bit is set to off, which indicates that the file has been backed up. The normal and incremental backup types set the archive bit to off so that the same files will not be backed up in subsequent backups unless the files change. See Chapter 14 for more information.

38. ‚  

D. The Routing Group Connector is the fastest and simplest to set up. However, only the SMTP Connector offers the ability to use authentication and encryption of the connection. See Chapter 8 for more information.

39. ‚  

B, C. An offline backup requires that you first dismount the database to be backed up, thus making it unavailable for user access. Besides taking the database out of use, offline backups also do not purge committed transaction logs after the backup has completed. In addition, no automatic checksum error checking is performed during an offline backup. You will need to use the eesutil utility to check the offline backup for corruption after it has been completed. See Chapter 14 for more information.

40. ‚  

A, E. Since the front-end server is outside the firewall, it can already accept HTTP and HTTP over SSL connections. The front-end server must be able to look up information from the Global Catalog server using port 3268 and transfer information with the back-end server using port 80. Therefore those two ports must be opened on the firewall. See Chapter 15 for more information.




MCSA[s]MCSE
MCSA[s]MCSE
ISBN: 735621527
EAN: N/A
Year: 2004
Pages: 160

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net