question 1

You have installed Microsoft Proxy Server 2.0 on your network. The two network cards have the IP addresses 10.10.10.10 and 100.100.100.10. The default gateway in the TCP/IP protocol properties page is 100.100.100.1. Which IP address represents the external network card address?

A 100.100.100.10
B 10.10.10.10
C None; these are conflicting addresses.
D 100.100.100.1

question 2

You want to decrease the size of your Proxy Server cache and free up some disk space. You enter a smaller number for the cache size, but you notice that there is no free space. What is the best way to free up the disk space?

A Reduce the Time To Live settings to zero.
B Reboot the Proxy Server.
C Restart the Web Proxy service.
D Set active caching to Off.

question 3

NightWatchmen lnc., a temp agency for security personnel, has 13 branch offices all linked by 56 Kbps lines. Headquarters for NightWatchmen lnc. connects to the Internet with two T1 lines. It is your job to install Microsoft Proxy Server 2.0 in the corporation and also to minimize user response time. Which feature of Micorsoft Proxy Server 2.0 should you use to minimize response time under these conditions?

A Reverse hosting.
B Packet filtering.
C Hierarchical caching
D Reverse Proxying.

question 4

Which of the following services are considered part of a secure Web publishing system? (Choose two)

A Reverse Proxy.
B WinSock Proxy.
C Server Proxy.
D Reverse hosting.


question 5

Which parameters are replicated in a Proxy Server array when the array is synchronized? (Choose three)

A Logging directories for each service.
B Web Proxy service access control information.
C Packet Filters.
D Domain filters.
E WinSock Proxy service protocol definitions.


question 6

Your users access the Internet via Microsoft Proxy Server 2.0. When one of your users specifies an Internet site URL in his Web browser, the URL name destination gets resolved by a DNS server on the Internet. Where should you enter the DNS server information that makes this possible?

A In the TCP/IP properties of the internal network card on your Proxy Server.
B In the client TCP/IP properties.
C In the client Web browser properties.
D In the TCP/IP properties of the external network card on your Proxy Server.

question 7

How do you set up a UNIX system to access the Web Proxy service ? (Choose two)

A Configure TCP/IP on the UNIX system.
B Add the Proxy Server name or IP address in the UNIX Web browser.
C Install Microsoft Proxy CIient.
D Add the UNIX IP address to the LAT.


question 8

Angie's Desktop Emporium has a company Web site on the same computer that contains their Proxy Server. After months of deliberation, Angie decides to allow public Internet access to her company Web site. She asks for your help in reconfiguring her Proxy Server. You agree. First you enable Web publishing and packet filtering on the Proxy Server computer. Now you must choose a predefined packet filter. Which of the following is the correct choice?

A NetBIOS (WINS client only)
B FNetBIOS
C DNS lookup
D ICMP all outbound
E IDENTD HTTP server port 80

question 9

Monitoring the performance of a Proxy Server computer shows that the Current Disk Queue Length counter value is four and that the Cache Hit Ratio counter for the Web Proxy Server Service object is consistently high. What should be done to improve performance?

A Spread the content cache over multiple physical disks.
B Spread the content cache over multiple logical disks.
C Enable active caching.
D Increase the cache size.

question 10

You are adding a new Proxy Server to an existing array in a designated proxy array domain called PSARRAY. The new Proxy Server will be installed on a member server in the existing PSARRAY domain. Which user or group accounts have the rights to add the new Proxy Server to the existing array? (Choose two)

A All members of the local array admin group.
B Any user with the logon locally right on the new array member.
C The Domain Admins global group in the PSARRAY domain.
D An administrative account on an array member computer in the array you are joining.


question 11

Which feature of Microsoft Proxy Server 2.0 should you enable to restrict your internal network users from accessing certain Internet sites?

A Disable IP forwarding.
B Create a locallat.txt file on alI WinSock clients.
C Packet filtering.
D Domain filtering.

question 12

Which of the following is the log file created by the Proxy Server client setup program?

A mpcsetup.log
B mspclnt.log
C wspsetup.log
D mspclnt.ini

question 13

ABZ Communications has two Proxy Server computers which ABZ network clients will use to access the Internet. What should you do in order to use a DNS server to distribute access between the two Proxy Server computers? (Choose two)

A Configure the Proxy Server client software so that the client computers access the Proxy Server computer by DNS host name.
B Configure the Proxy Server client software so that the client computers access the Proxy Server computer by IP address.
C On the DNS server create two A records that map a single DNS host name to the TCP/IP address of the external network adapter on the two Proxy Server computers.
D On the DNS server create two A records that map a single DNS host name to the TCP/IP address of the internal network adapter on the Proxy Server computer.


question 14

One of the following items cannot be used to define a packet filter. Identify the invalid item.

A Datagram
B IP address
C Packet fragment
D Packet type

question 15

Your company has an existing Proxy Server that handles all your internal user access to the Internet. You are adding 300 new users to your network and have decided to buy a more powerfuI Proxy Server computer. What would you do to copy your existing Proxy Server configuration to the new server? (Choose two)

A From the Services tab on the old Proxy Server computer, select Backup Server.
B From the Services tab on the old Proxy Server computer, select Restore Server.
C Copy the mspcnt.ini file from the old server to the new server.
D From the Services tab on the new Proxy Server computer, select Restore Server.


question 16

Your TCP/IP network consists of a single segment. AII computers on your network use IP addresses ranging between 100.0.0.1 -100.0.0.50. A Proxy Server computer with two network cards provides access to the Internet. One network card is assigned the IP address 100.0.0.1 and the other 200.10.10.10. Which IP addresses should you list in the LocaI Address Table (LAT) on the Proxy Server computer?

A 100.0.0.1 - 100.0.0.255
B 200.10.10.10 - 200.10.10.255
C 100.0.0.1 - 100.0.0.50
D 100.0.0.1, 200.10.10.10

question 17

Your company consists of a variety of different client systems including Microsoft Windows NT, Windows 95, Windows for Workgroups, Windows 3.1, and NovelI NetWare servers. The Microsoft Windows for Workgroups and Windows 3.1 clients are running 16-bit Novell client software. You want to instalI Microsoft Proxy Server 2.0 to access the Internet. How can you ensure that all client computers will be able to use Microsoft Proxy Server 2.0 to access the Internet?

A Delete the 16-bit client software and upgrade all Microsoft Windows for Workgroups and Windows 3.1 clients to Windows 95.
B Install the IPX/SPX compatible software on all Proxy Server computers and upgrade all computers to Microsoft Windows 98.
C Install a 32-bit Novell client on all Microsoft Windows 95 computers and install the TCP/IP protocol on all Microsoft Windows for Workgroups and Windows 3.1 computers.
D Install TCP/IP on all computers and upgrade your Novell clients to Microsoft Windows NT.

question 18

You have installed Microsoft Proxy Server 2.0 on a computer on your intranet to provide Internet access. You did not specify a default gateway for the Proxy Server computer's external network adapter. What would happen if a client computer on your intranet were to request an object from a site on the Internet by using the Web Proxy service?

A The request fails regardless of whether the object is in the Web Proxy server cache. The requested object is retrieved from a host computer on the intranet regardless of whether the object is in the Web Proxy server cache.
B If the requested object is in the Web Proxy server cache, the object is retrieved.
C If the requested object is a not in the Web Proxy server cache, the object is retrieved from the Internet server side.
D If the requested object is in the Web Proxy Server cache, the object is retrieved. If the requested object is not in the Web Proxy server cache, the request fails.

question 19

What is the fastest way to determine how long a user has been connected to the Internet?

A With Network Monitor.
B With NT Event Viewer.
C With Performance Monitor.
D With Current Sessions in Proxy Server.

question 20

What should you do to enable Microsoft Windows 95 clients using the IPX/SPX protocol to access the Proxy Server for internet access? (Choose two)

A Install TCP/IP on all the Windows 95 computers.
B Install NWLink on the Proxy Server and bind it to the internal network card on the Proxy Server.
C Add the NetBIOS name of the Proxy Server to the WinSock client on all Windows 95 clients.
D Install a WinSock Proxy client on the Windows 95 computers.


question 21

If your network uses an internaI DNS server and an externaI DNS server, what should you do to stop your locaI DNS server from blocking the use of secondary (externaI DNS server) DNS servers to resolve host names?

A Add the secondary DNS server's IP address to the LAT.
B Do nothing.
C Stop the local DNS service.
D Turn off recursive forwarding.

question 22

Your network clients need to access another corporation's application via the locaI Proxy Server. The other corporation's application uses the User Datagram ProtocoI (UDP) to communicate. With this in mind, which of the following Proxy Server services must be in place?

A Both the WinSock Proxy service and the SOCKS Proxy Service.
B Only WinSock Proxy service.
C Only Web Proxy service.
D Only SOCKS Proxy Service.

question 23

Which of the following procedures would you use to manually configure Netscape Navigator to use the Web Proxy service?

A From the Options menu, on the Proxies tab, click Network Preferences and then click Manual Proxy Configuration.
B From the Configuration menu, on the Proxies tab, click Network Preferences and then click Manual Proxy Configuration.
C From the Configuration menu, on the Proxies tab, click Manual Proxy Configuration.
D From the Options menu, on the Proxies tab, click Manual Proxy Configuration.

question 24

You are managing a network of IPX clients that uses Microsoft Proxy Server 2.0 to access the Internet. You have recently added five new clients to your network. They cannot access any sites on the Internet via their WinSock application. Which of the following should you use to troubleshoot this problem?

A ROUTE
B PING
C NBTSTAT
D IPXROUTE

question 25

The default Proxy Server logging is:

A Logging to a text file.
B Logging to an ODBC database.
C No logging is the default.
D Logging to Event Viewer.

question 26

Your Microsoft Windows NT network is configured to access the Internet through a Proxy Server computer. AII users on the internal network use only CERN-compliant Web browsers. Which Proxy Service should you set up to log the URLs on the Internet that your clients are accessing?

A Web Proxy service.
B WinSock Proxy service.
C SOCKS Proxy service.
D WWW service.

question 27

You have installed Proxy Server on a computer that is also a WINS server. What must you do to stop Internet users from seeing the NetBIOS names of computers on the internal network of your company?

A Unbind WINS from the external network card of the Proxy Server.
B This cannot be done.
C Disable any external ports used by the WINS client.
D Enable packet filtering and set a filter for the WINS protocols.

question 28

Your company network uses Microsoft Proxy Server 2.0 for Internet access. How should you configure the Web Proxy service cache options to increase the number of cached objects?

A Select the Limit Size Of Cached Objects To option in the advanced window of the Caching tab.
B Select the Return Expired Objects For Up To option in the advanced window of the Caching tab.
C Set both the Minimum and Maximum Time To Live for cached objects to zero.
D Do nothing; the default settings are set for maximum caching.

question 29

TeICo's Proxy Server separates their intranet from the Internet. Management has recently undergone an IT security audit and they feel strongly that their intranet needs protection from inbound packets from the Internet. Management now looks to you to implement a solution. As network administrator, which two things should you do on the Proxy Server computer? (Choose two)

A Enable packet filtering.
B Enable access control in the Web Proxy service.
C Disable IP forwarding.
D Enable access control in the WinSock Proxy service.


question 30

Your company has decided to use Microsoft Proxy Server 2.0 to access the Internet. Your company has more than 7,500 computers and will require firewalls on multiple Proxy Servers. What is the best way to configure your Proxy Servers so that you can implement load balancing among them?

A By installing your Proxy Servers as an array.
B By installing at least one Proxy Server on each of your company's subnets.
C By installing your Proxy Servers in a chain configuration.
D By installing multiple proxy arrays and configuring them in a chain.

question 31

Your company network is presently using a proxy array to access the Internet. You decide to add a new Proxy Server to the array. You want to clear the client configuration URL to prevent users from downloading a client configuration script. Which of the following steps must you take to accomplish this?

A Use the Configure button in the Client lnstallation/Configuration dialogue box. In the Configuration URL for clients dialogue box, select the Use default script supplied by server option.
B Use the Configure button in the Client lnstallation/Configuration dialogue box. In the Configuration URL for clients dialogue box, select the Use Custom URL option and delete any text found in the text box.
C Use the Configure button in the Client lnstallation/Configuration dialogue box. In the Configuration URL for clients dialogue box, select the Use existing configuration script option and specify the correct array name.
D This cannot be done.

question 32

You have a server with only one network interface card. It is currently configured with the NWLink protocoI. Identify the tasks you need to perform to successfully install Microsoft Proxy Server 2.0. (Choose all that apply)

A Install Microsoft Service Pack 2.0 or later.
B Install a second network interface card.
C Install NetBEUI.
D Install Microsoft Windows Workstation 4.0.
E Install Microsoft IIS.
F Install Microsoft Service Pack 3.0 or later.
G Configure TCP/IP for the second interface card.


question 33

Because of budgetary restraints in your company, you have installed Microsoft Proxy Server 2.0 on the same Microsoft Windows NT computer that is running your DNS service. What must you do to ensure that your internal network security remains intact?

A Enable IP forwarding on the internal network interface.
B Disable the DNS option for the external network interface on the Proxy Server.
C Disable the DNS option for the internal network interface on the Proxy computer.
D Enable IP forwarding on the external interface.

question 34

Identify the correct licensing requirements for a single Proxy Server computer on a network.

A None. There are no licensing requirements.
B One Proxy Server license and one client access license per client connection.
C One Proxy Server license.
D One Proxy Server license and one client access license per computer.

question 35

The computer named NYC01 has been granted anonymous access to your Web Proxy Server. By default an anonymous user uses an account named IUSER_NYC01. The IUSER_NYC01 account must have which user rights?

A Act as part of the operating system.
B Access this computer from the network.
C Log on as a service.
D Log on locally.

question 36

You want your internal users to use Internet mail from Microsoft Internet Explorer which is installed on their computers. Proxy Server has been installed on your network using the default settings. You install the WinSock Proxy client on all your client systems. What must you do next so that your users can use the Internet mail?

A Add Web Proxy service to all client computers.
B Add packet filters for the SMTP call and receive protocols.
C Nothing.

question 37

SunnyDale UNIX services has configured their UNIX boxes so that they can use Web Proxy service on the local Microsoft Windows NT Server. UNIX clients complain, however, that they cannot take advantage of any RealAudio sites. Which of the following is the most likely explanation?

A The Web browser on the UNIX computer is not configured to use the Proxy Server services for RealAudio.
B The Web Proxy service does not support the RealAudio protocol.
C The services file on the UNIX computer is not configured to use the RealAudio protocol.
D The client computer has been denied access to the RealAudio protocol in WinSock Proxy service.

question 38

If you are using Basic authentication in Proxy Server and basic authentication is enabled on a remote Web server you are accessing, which credentials will be forwarded to the remote Web server?

A The Proxy Server DNS name and a valid user name and password for the remote server.
B User name and password for the remote Web server.
C No authentication information is sent.
D Proxy Server does not support basic authentication.

question 39

You install a TelnetD server application on a Microsoft Windows NT computer on your internal network. What must you do to enable remote Internet users to use the TelnetD server on your internal network?

A Create a custom wspcfg.ini file for the TelnetD application and place it in the directory where the TelnetD.exe file is located.
B Add a [TelnetD] section to master mspclnt.ini file.
C Enable access control and grant access to the TelnetD application to the Everyone group.
D Create a custom wspcfg.ini file and place it in the Mspclnt directory on the TelnetD computer.

question 40

Your network uses laptop computers for some of your traveling sales force. Your sales people are complaining about not being able to use their WinSock applications from home to connect to their private ISP. What is the most likely cause of this problem?

A The IPX/SPX protocol is being used.
B The Web Proxy service is not installed on the laptop computers.
C The WinSock client on the laptop computers is not being disabled.
D The WinSock client on the laptop computers is not being enabled.

question 41

You have installed Proxy Server on the PDC in your company domain called DEVELOP and disabled access control for the Web Proxy service. In the WWW service you have disabled the Anonymous connection and enabled Basic and NTCR (NT CHALLENGE/RESPONSE). Which users will be allowed to use the Web Proxy service to access the lnternet?

A Only members of the Administrators group on the PDC of the DEVELOP domain.
B Anonymous users with a valid password.
C Users who are members of the Everyone group in the DEVELOP domain.
D Users with a valid user account and password in the DEVELOP domain.

question 42

Which utility would you use to change the Web Proxy service listen-on port setting?

A NT Service Manager.
B Internet Service Manager.
C Route.
D Remotmsp.

question 43

What is the recommended configuration when you have WINS services on your network and you add Microsoft Proxy Server 2.0 for Internet access?

A Make the Proxy Server computer a WINS client.
B Make the Proxy Server a WINS server.
C Reconfigure your DNS server to use WINS.
D Disable the WINS service.

question 44

You have enabled domain filtering on your company's Proxy Server. You have selected the 'Granted to' option under the Domain Filtering tab. You want to deny access to the entire research.org domain at a competitor's site. How should you set the domain filter to accomplish this?

A Deny access to *.research.org
B Deny access to research.org
C Deny access to *.research.org/*
D Deny access to *.research.*

question 45

The _________ protocol provides connectionless transport for the TCP/IP protocol suite.

A TCP
B HTTP
C FTP
D UDP

question 46

Your network, consisting of Microsoft Windows NT and Windows 95 computers, uses a Proxy Server computer to provide Internet access. A Microsoft Exchange Server computer on the internal network provides internal users with messaging connectivity. You do not want users on the internal network to use Microsoft Exchange Client to connect to mail servers on the Internet. What is the best way to achieve this?

A Enable dynamic packet filtering.
B Disable access control.
C Create packet filters for the POP3 protocol.
D Use the Disable=1 line in the [exchng32] and [mapisp32] section in the Mspclnt.ini file on the Proxy Server computer.

question 47

Dan's corporate network uses Microsoft Proxy Server 2.0 for Internet access. He wants to make sure that the current cache size is satisfactory. What information should he use?

A URL Commit Rate
B Proxy logs
C Disk queue length
D Cache Hit Ratio

question 48

Your Microsoft Windows NT network uses Microsoft Proxy Server 2.0 for Internet access. You want to create a list of the most frequently accessed Internet sites. For which service must you enable logging? (Choose two)

A The WWW service.
B The SOCKS Proxy Service.
C The Web Proxy service.
D The WinSock Proxy service.


question 49

Your company uses Routing and Remote Access Service (RRAS) to create virtual private networks (VPNs) over the Internet. You use Proxy Server with packet filtering enabled to access the Internet. You want to configure Proxy Server to provide secure communication with your company's remote branches. In which way can this be accomplished? (Choose two)

A By enabling IP forwarding on the Proxy Server's internal network card.
B By enabling PPP filtering on the Proxy Server computer.
C By adding a predefined packet filter for the PPTP Call protocol.
D By adding a predefined packet filter for the PPTP Receive protocol.


question 50

How much disk space will be required for the Web Proxy service cache on a network with 1000 users?

A 1000 MB
B 600 MB
C 500 MB
D 1100 MB