Çâåçäû è Ñ - Ãëàâíàÿ Òåë: +7 495 363 36 86
e-mail: info@stars-s.ru
Ìîñêâà, Ëåíèíãðàäñêèé ïð-êò, ä. 5, ñòð. 2
Ïëàí ïðîåçäà
ÂÅÐÑÈß ÄËß ÑËÀÁÎÂÈÄßÙÈÕÂÅÐÑÈß ÄËß ÑËÀÁÎÂÈÄßÙÈÕ

-->
Òåñòèðîâàíèå

Óñëîâèÿ òåñòèðîâàíèÿ
Microsoft òåñòû, ýêçàìåíû
Microsoft Windows Server 2012
Microsoft Windows Server 2008
MS Windows 2003
MS Windows 7/8
MS Exchange Server
MS SQL Server
MS Internet Services
MS Visual Studio 2008
MS Visual Studio 2010/2012
MS Visual C++ è Visual C#.NET Development
MS Visual Basic 6.0 è VB.NET Development
MS Solutions Framework
MS Internet/Intranet Application Development
MS SharePoint 2010 / 2013
NEW
MS System Center
Microsoft Lync Server
Òåñòû, ýêçàìåíû äðóãèõ âåíäîðîâ â Prometric è Pearson VUE

Òåñò ¹70-088: Implementing and Supporting Microsoft® Proxy Server 2.0

Ïðîäîëæèòåëüíîñòü:
ßçûêè òåñòà: English
Online òåñò:
Êîë-âî âîïðîñîâ:
Ìèí.ïðîõîäíîé áàëë:

Òåìû:
Key to the matrix:
The course includes material to prepare you for this task.
¤ The course includes some material to prepare you for this task. You will need to supplement the course with additional work.

Skills measured by exam 70-088 Course
836
Course
1503
Course
1603
Choose a secure access strategy for various situations. Access includes outbound access by users to the Internet and inbound access to your Web site. Considerations include:
  • Translating addresses from the internal network to the Local Address Table (LAT)
  • Controlling anonymous access
  • Controlling access by known users and groups
  • Setting protocol permissions
  • Auditing protocol access
  • Setting Microsoft Windows NT® security parameters
Plan an Internet site or an intranet site for stand-alone servers, single-domain environments, and multiple-domain environments. Tasks include:
  • Choosing appropriate connectivity methods
  • Choosing services
  • Using Microsoft Proxy Server in an intranet that has no access to the Internet
  • Choosing hardware
Choose a strategy to balance Internet access across multiple Proxy Server computers. Strategies include:
  • Using DNS
  • Using arrays
  • Using Cache Array Routing Protocol (CARP)
Choose a rollout plan for integrating a Proxy Server with an existing corporate environment.
Choose a fault tolerance strategy. Strategies include:
  • Using arrays
  • Using routing
Create a LAT.
Configure server authentication. Authentication options include:
  • Anonymous logon
  • Basic authentication
  • Microsoft Windows NT Challenge/Response authentication
Configure Windows NT to support Microsoft Proxy Server.
Configure the various Proxy Server services.
Configure Microsoft Proxy Server for Internet access. Situations include:
  • Configuring Proxy Server to provide Internet access through a dial-up connection to an ISP.
  • Configuring Proxy Server to act as an IPX gateway.
  • Configuring multiple Microsoft Proxy Servers for Internet access.
  • Configuring multiple Proxy Servers spread across several different geographic locations.
Select and use software configuration management tools (for example, Control Panel, Windows NT Setup, Regedt32).
Configure auditing.
Given a scenario, decide which user interface to use to perform administrative tasks.
Identify the licensing requirements for a given Proxy Server site.  
Configure Proxy Server arrays.
Configure arrays to provide fault-tolerance for Web Proxy client requests.
Use packet filtering to prevent unauthorized access. Tasks include:
  • Using packet filtering to enable a specific protocol.
  • Configuring packet filter alerting and logging.
Configure hierarchical caching.
Grant or restrict access to the Internet for selected outbound users and groups who use the various Proxy Server services to access the Internet.
Grant or restrict access to specific Internet sites for outbound users.
Choose the location, size, and type of caching for the Web Proxy service.
Configure active caching and passive caching.
Implement Web publishing to enable reverse proxying.
Back up and restore Proxy Server configurations.
Implement reverse hosting.
Use the Proxy Server client Setup program to configure client computers.
Configure Proxy Server and Proxy Server client computers to use the Proxy Server services. Configurations include:
  • Microsoft Internet Explorer client computers
  • Netscape Navigator client computers
  • Macintosh® client computers
  • UNIX client computers
  • Client computers on an IPX-only network
¤
Configure a RAS server to route Internet requests.
Write JavaScript to configure a Web browser.  
Change settings in Mspclnt.ini.
Configure Proxy Server to log errors when they occur.
Monitor performance of various functions by using Microsoft Windows NT Performance Monitor. Functions include HTTP and FTP sessions.
Analyze performance issues. Performance issues include:
  • Identifying bottlenecks
  • Identifying network-related performance issues
  • Identifying disk-related performance issues
  • Identifying CPU-related performance issues
  • Identifying memory-related performance issues
Optimize performance for various purposes. Purposes include:
  • Increasing throughput
  • Optimizing routing
Use Performance Monitor logs to identify the appropriate configuration. ¤
Perform Internet traffic analysis by using Windows NT Server tools.
Monitor current sessions.
Resolve Proxy Server and Proxy Server client installation problems.
Resolve Proxy Server and Proxy Server client access problems.
Resolve Proxy Server client computer problems.
Resolve security problems.
Resolve caching problems.
Troubleshoot a WINS server to provide client access to Proxy Servers. ¤
Troubleshoot hardware-related problems such as network interfaces and disk drives.
Troubleshoot Internet/intranet routing hardware and software. Software includes Microsoft Routing and Remote Access Service (RRAS).


  Î íàñ|ASTRA LINUX|KASPERSKY|CITRIX|MICROSOFT|POSTGRES|CISCO|≡ Âåíäîðû|Ïîèñê

   Òåë: +74953633686 email: info@stars-s.ru

   125040, Ìîñêâà, Ëåíèíãðàäñêèé ïðîñïåêò, ä. 5, ñòð. 2, ïîä. 5, îôèñ "Çâåçäû è Ñ"

  © Ó÷åáíûé öåíòð "Çâåçäû è Ñ", 1991-2022, Îôåðòà