You have an Exchange Server 2010 organization that contains Windows Mobile 5.0 devices. Your company plans to replace all mobile devices with Windows Mobile 6.5 devices.
You need to identify which users accessed their mailboxes by using Windows Mobile 5.0 devices in thepast month.
What should you do?()
A.Create a Data Collector Set.
B.Install and run the Exchange Server User Monitor (ExMon).
C.Export and review the Internet Information Services (IIS) logs.
D.Enable User Agent logging, and then review the agent logs.
您可能感兴趣的试卷
你可能感兴趣的试题
You have an Exchange Server 2010 organization.
You plan to delegate Exchange administrative rights to some users in the organization.
You need to recommend a solution that tracks all changes made to the Exchange organization.
What should you include in the solution?()
A.administrator audit logging
B.circular logging
C.diagnostic logging
D.Windows Security Auditing
You have an Exchange Server 2010 organization that contains five Hub Transport servers, five Mailboxservers and one Edge Transport server.
You need to provide a solution to ensure that users can prevent legitimate inbound e-mail messages frombeing classified as spam.
What should you do?()
A.Enable sender filtering.
B.Enable Sender ID filtering.
C.Configure a custom MailTip.
D.Configure safelist aggregation.
You have an Exchange Server 2010 organization.
Your companys security policy states that users must not be able to encrypt e-mail messages by usingOutlook Web App (OWA).
You need to recommend a client access solution that meets the requirements of the security policy.
What should you include in the solution?()
A.managed folder mailbox policies
B.multiple OWA virtual directories
C.OWA segmentation
D.WebReady Document Viewing
You have an Exchange 2010 organization.
Your companys security policy states that all connections to Outlook Web App (OWA) must use smartcard authentication.
You need to recommend a solution to meet the security policy requirements.
Which two possible ways to achieve this goal should you recommend?()
A.Require certificate-based authentication for all Internet-facing Client Access servers.
B.Require Windows Integrated Authentication for all Internet-facing Client Access servers.
C.Deploy an Edge Transport server, and then disable Windows Integrated Authentication.
D.Deploy a server that runs Microsoft Internet Security and Acceleration (ISA) Server,and then enableKerberos constrained delegation.
You have an Exchange Server 2010 organization. You deploy an Edge Transport server.
You need to implement a message hygiene solution that meets the following requirements:
.Users must be able to receive e-mail from external recipients who have been added to their Safe SendersLists
.The Edge Transport server must block all e-mail sent to invalid addresses inside the organization
What should you do first?()
A.Enable sender filtering.
B.Create Send connectors.
C.Configure real-time block lists (RBLs).
D.Configure EdgeSync synchronization.
Your network contains two Exchange Server 2010 Edge Transport servers and five Exchange Server2010 Hub Transport servers.
All e-mail sent from your organization to the Internet is transferred by the Edge Transport servers. You need to recommend a security solution for the organization to meet the following requirements:.Ensure that users can send encrypted messages to any other organization on the Internet
.Ensure that all Exchange-related communication between Hub Transport servers and Edge Transportservers is encrypted
What should you recommend?()
A.Deploy IPsec.
B.Deploy SMTP over SSL.
C.Implement Domain Security.
D.Implement Secure/Multipurpose Internet Mail Extensions (S/MIME).
You have an Exchange Server 2010 organization.
You plan to delegate administration of the organization.
You have a group named Technicians that contains all the level-two technicians in the organization. You need to ensure that the Technicians group can manage the properties of all the mailbox databases. The solution must minimize the number of permissions assigned to the Technicians group.
Which management role should you assign to the Technicians group?()
A.Help Desk
B.Organization Management
C.Recipient Management
D.Server Management
You have an Exchange Server 2010 organization.
You plan to provide users with the ability to schedule meetings.
You need to recommend a scheduling solution that meets the following requirements:.Ensures that users can schedule conference rooms for meetings
.Ensures that conference room owners can change the settings of meetings scheduled by users
What should you include in the solution?()
A.Managed Folder Assistant
B.public folders
C.resource mailboxes
D.room list distribution groups
You have an Exchange Server 2010 organization that contains multiple Hub Transport servers. You need to recommend a message hygiene solution to meet the following requirements:
.Block servers that are known to send spam
.Minimize administrative effort
What should you recommend?()
A.an IP Block list
B.IP Block list providers
C.recipient filtering
D.sender filtering
You have an Exchange Server 2010 organization.
All users connect to their mailboxes by using Microsoft Office Outlook 2007 Service Pack 2 (SP2) andWindows 7.
Your companys security administrators deploy Outlook Protection Rules.
You need to recommend a client connection solution for the organization to ensure that Outlook ProtectionRules can be used.
What should you recommend?()
A.Upgrade all client computers to Outlook 2010.
B.Instruct all users to connect to Outlook Web App (OWA).
C.Instruct all users to install the Rights Management Service (RMS) client.
D.Instruct all users to install the Secure/Multipurpose Internet Mail Extensions (S/MIME) control.
最新试题
Your company has an Exchange 2010 organization that contains multiple Hub Transport servers. You have a line-of-business application that relays e-mail messages by using a Hub Transport servernamed Hub1. The application only supports sending e-mail to a single SMTP server. You need to ensure that the application can relay e-mail messages if Hub1 fails. What should you do?()
You have an Exchange Server 2003 organization. All users connect to their mailboxes by using Microsoft Office Outlook. You start to transition the organization to new Exchange Server 2010 servers. The new servers are on a secured subnet that is separated by a firewall. You will move half of the mailboxes to the new servers. Client Access servers and Mailbox servers are on the secured subnet. Client computers on the network can access the Client Access servers. You need to recommend a solution that allows users to connect to Public Folders by using Outlook or Outlook Web App (OWA). What should you include in the solution?()
You deploy multiple Mailbox servers. Each Mailbox server contains a copy of a mailbox database named DB1. You need to recommend a solution that allows administrators to remove corrupt messages that have been replicated before the corrupt messages are applied to each copy of DB1.What should you recommend?()
Your network contains two data centers named Datacenter1 and Datacenter2. An Active Directory site exists for each data center. The data centers connect to the Internet by using a direct link. The data centers connect to each other by using a high-speed WAN link. You plan to deploy Exchange Server 2010 Mailbox servers in both data centers. You need to plan message routing to meet the following requirements:.Ensure outbound delivery of e-mail messages if a single server fails .Automatically load balance the Hub Transport server in each site .Deploy the minimum number of serversWhat should you include in the plan?()
Your network contains an internal network and a perimeter network. The internal network contains an Active Directory forest. The forest contains a single domain. You plan to deploy 10 Edge Transport servers on the perimeter network. You need to recommend a solution for the Edge Transport server deployment. The solution must meet the following requirements:.Allow administrators to apply a single security policy to all Edge Transport servers .Reduce the administrative overhead that is required to manage servers.Minimize the attack surface of the internal network What should you recommend?()
You have an Exchange Server 2010 organization. An Edge Transport server sends and receives all e- mail messages from the Internet. You notice that some servers on the Internet identify e-mail messages from your organization as spam. You need to minimize the possibility that e-mail messages sent from your organization are identified as spam. What should you do?()
You work as the enterprise exchange administrator at TestKing.com. TestKing.com makes use ofMicrosoft Exchange Server messaging solution. The TestKing.com network consists of a single ActiveDirectory forest.The TestKing.com network contains the following:* Exchange Server 2007 Service Pack 1 (SP1) servers.* Exchange Server Service Pack 2 (SP2) servers.* Domain controllers running Windows Server 2003 Service Pack 1 (SP1).You need to install Exchange Server 2010 to the TestKing.com network; however, you need to changes tothe existing servers for the installation of the Exchange 2010 servers.What should you do?()
You have an Exchange Server 2010 organization. Company policy states that a copy of a users mailbox must be kept for one year after the user leaves the company. All user accounts are in an organizational unit (OU) named OU1. A compliance administrator plans to export the mailboxes to personal folders. You need to recommend a solution that allows the compliance administrator to meet the requirements ofthe company policy. What should you include in the solution?()
Your network contains an Active Directory forest. All domain controllers run Windows Server 2008. You have an Exchange organization that consists of the servers shown in the following table.You plan to implement moderated transport for distribution groups in the organization. You need to recommend changes to the organization to support the planned implementation. What should you recommend?()
Your network contains an Exchange Server 2010 server. You need to plan a mailbox sharing solution for the organization to meets the following requirements:.Ensure that assistants can read and modify the e-mail messages of their managers.Ensure that assistants can impersonate their managers when they send e-mail messages What should you include in the plan?()