Configure Server Products
BackBy — March 20, 2008
These questions are based on 70-557 – TS: Microsoft Forefront Client and Server, Configuring
Self Test Software Practice Test
Objective: Configure server products.
Sub-objective: Configure reporting services.
Single answer, multiple-choice.
You are the network administrator for your company. You deploy Microsoft Forefront Client Security (FCS) on client computers in your company's network. You want to identify whether Automatic Updates are turned on and how they are configured on client computers. You open Client Security reporting Web server.
Which should you do next?
- Review the Security Summary report.
- Review the Security State Assessment Summary report.
- Review the Deployment Summary report
- Review the Connectivity Summary report.
B. Review the Security State Assessment Summary report.
You should review the Security State Assessment Summary report to achieve the objective in this scenario. The Security State Assessment Summary report displays the results of the most recent security state assessment (SSA) scan and historical scan information. Some of the security checks measured by the Security State Assessment report include checking the version of Windows used in client computers; checking if the Automatic Updates feature is enabled and how it is configured; and identifying unnecessary services such as Telnet or World Wide Web Publishing Service enabled in client computers. Administrators can take the necessary security actions after analyzing the security state reports. To access this report and other Client Security summary reports, open the Forefront Client Security console and click your desired summary link in the Dashboard tab. The summary report will then be displayed in the reporting Web server.
You should not review the Security Summary report to achieve the objective in this scenario. The Security Summary displays current numbers and 30-day trends for alerts, malware detections, computers reporting issues and summaries of the security state assessment scans. The Security Summary report also includes the Policy Deployment status chart and the Connectivity summary status chart.
You should not review the Deployment Summary report to achieve the objective in this scenario. The Deployment Summary report generates the deployment status reports for Spyware Definitions, Virus Definitions, Antimalware Engine, Vulnerabilities Engine and Vulnerabilities Definitions.
You should not review the Connectivity Summary report to achieve the objective in this scenario. The Connectivity Summary section in the reporting Web server reports how often a computer contacts the FCS collection server.