Question number 32 from proprofs.com
You are planning a network where in a Windows Server 2003 will act as router. You will be hosting a Web server that should not be placed in the internal network as you do not want public HTTP traffic to be entering your internal network. You also have an Intranet Web server that will not only be a part of the internal network but will also be integrated with the rest of the domain controllers for Windows Integrated authentication, as only employees will be allowed to access this Intranet Web server. All these employees will be using pre-assigned IP addresses. You are required to place these two servers and configure restrictions such that the rest of the networks? security is not compromised. All traffic entering the network will have to first pass through the firewall. Each of the choice represents a part of the solution. Choose all that apply to form a complete solution
A. Configure Port Address Translation (PAT) for the Intranet Web server.
B. Configure Network Address Translation (NAT) for the HTTP server.
C. Place the HTTP server in the DMZ.
D. Place the Intranet Web Server in the DMZ.
E. Configure external interface of the router or firewall to discard all inbound packets except from known IP address list.
C and D can be discounted right away as the question states that all traffic must pass through the firewall. That leaves us with A, B and E. I can understand E, as the security shouldnt be compromised. But choice A, what's PAT got to with security?? B looks kinda correct. Could some one please explain A and B to me.
BTW, they reckon A, B and E are the correct choices.
Might as well add another question here. Question 38>>
You have asked by your supervisor to arrive at a solution for authenticating users as well computers not only over the domain based LAN of the Windows Server 2003 network but also for the entire enterprise-wide network. Which of the following solutions best suits this scenario?
A. Use Certificate based authentication.
B. Use Kerberos.
C. Use token-based authentication.
D. Use smart cards
The question seems to mean that there are non-MS devices on the network as well. So out goes kerberos. What about the rest? Cant we use token-based and smart card based authentication? The stated answer is A.