Custom Search

News World

Dec 27, 2008

FAQ - Windows Server 2003 – 04

1. What three properties can IIS use to distinguish between multiple virtual Web sites on a single server?
IP address, host header, and port number.


2. What four types of sites can you set up in IIS?
Web sites (HTTP), FTP sites, NNTP sites, and SMTP sites.


3. What is the primary use for an IIS SMTP site?
To allow Web applications running on the IIS server to send e-mail.

4. How can you prevent anonymous users from accessing a particular file on an IIS Web site?
Configure NTFS permissions on the file and specify the users and groups that should have access to it.


5. What is the default TCP port for an IIS Web site?
Port 80.


6. Why are FTP sites used when HTTP offers similar file download capabilities?
FTP sites offer upload capability and are more easily used by automated upload and download scripts that many organizations use to exchange data on a regular basis.


7. What client software enables users to interact with an NNTP site?
Any newsreader software, including Outlook Express and Outlook.


8. What client software enables users to interact with an FTP site?
Any FTP client software. Microsoft includes a command-line FTP client with Windows, and third-party vendors offer graphical FTP clients, such as Cute FTP.


9. How can you configure a Web site to save information about user activity to a log file?
On the Web site’s properties, ensure that the Enable logging check box is selected.


10. What happens if a user tries to access a Web site that is uniquely identified by a host header, but the user’s proxy server removes the HTTP 1.1 headers from the request?
The Web server will not be able to identify the intended site and will direct the user to the Web site that uses the same IP address but does not have a host header configured. That generally means that the user will be directed to the Default Web site.


11. What two types of remote connections are most commonly used with RRAS?
Dial-up and VPN (virtual private network).


12. What two VPN protocols does RRAS support?
Point-to-Point Tunneling Protocol (PPTP) and Layer 2 Tunneling Protocol (L2TP).


13. What two protocols are necessary to create an encrypted VPN with clients who are not PPTP-compatible?
L2TP is used to create the virtual connection, and IP Security (IPSec) is used to encrypt the contents of the tunnel.


14. How can you monitor the users who are currently dialed in to an RRAS server?
By using the RRAS console to monitor remote client connections.


15. How can you centralize the remote access policies for several RRAS servers?
By configuring RRAS to use a RADIUS server instead of the default Windows authentication method.


16. What standard protocol does IAS use?
Remote Authentication Dial-In User Service, or RADIUS.


17. How does RRAS authenticate users through IAS?
By forwarding the user’s logon credentials and other information to IAS and asking IAS if the user is permitted to connect.


18. What service must already be present in order for IAS to operate?
IAS reads remote access policies from the local server, which requires RRAS to be installed. IAS also works with Active Directory (AD) and uses AD user accounts in its authentication process.


19. How can IAS be used to forward RADIUS requests to another RADIUS server?
IAS can act as a RADIUS proxy, receiving RADIUS requests from a remote access server and forwarding those requests to another RADIUS server based on certain information about the user who is attempting to connect.


20. How can IAS help monitor your remote access utilization?
IAS supports accounting, which can create log files that detail the remote access activity on your RRAS servers.

No comments:

IT Conversations

Moneycontrol Latest News

Latest new pages on Computer Hope

Latest from Infoworld

Door Lock

Door Lock Import Top Door Lock from China Contact Quality Manufacturers Now