You have an Exchange Server 2010 organization.
You have a global security group named Legal that contains all the members of your companys legaldepartment.
The companys security policy states that the Legal group must be able to search all mailboxes for e-mailmessages that contain specific keywords.
You need to recommend a solution for the organization that complies with the security policy.
What should you include in the solution?()
A.a Discovery Management role group
B.a legal hold
C.administrator audit logging
D.Mailbox journaling
您可能感兴趣的试卷
你可能感兴趣的试题
You have an Exchange Server 2010 organization that contains Windows Mobile 5.0 devices. Your company plans to replace all mobile devices with Windows Mobile 6.5 devices.
You need to identify which users accessed their mailboxes by using Windows Mobile 5.0 devices in thepast month.
What should you do?()
A.Create a Data Collector Set.
B.Install and run the Exchange Server User Monitor (ExMon).
C.Export and review the Internet Information Services (IIS) logs.
D.Enable User Agent logging, and then review the agent logs.
You have an Exchange Server 2010 organization.
You plan to delegate Exchange administrative rights to some users in the organization.
You need to recommend a solution that tracks all changes made to the Exchange organization.
What should you include in the solution?()
A.administrator audit logging
B.circular logging
C.diagnostic logging
D.Windows Security Auditing
You have an Exchange Server 2010 organization that contains five Hub Transport servers, five Mailboxservers and one Edge Transport server.
You need to provide a solution to ensure that users can prevent legitimate inbound e-mail messages frombeing classified as spam.
What should you do?()
A.Enable sender filtering.
B.Enable Sender ID filtering.
C.Configure a custom MailTip.
D.Configure safelist aggregation.
You have an Exchange Server 2010 organization.
Your companys security policy states that users must not be able to encrypt e-mail messages by usingOutlook Web App (OWA).
You need to recommend a client access solution that meets the requirements of the security policy.
What should you include in the solution?()
A.managed folder mailbox policies
B.multiple OWA virtual directories
C.OWA segmentation
D.WebReady Document Viewing
You have an Exchange 2010 organization.
Your companys security policy states that all connections to Outlook Web App (OWA) must use smartcard authentication.
You need to recommend a solution to meet the security policy requirements.
Which two possible ways to achieve this goal should you recommend?()
A.Require certificate-based authentication for all Internet-facing Client Access servers.
B.Require Windows Integrated Authentication for all Internet-facing Client Access servers.
C.Deploy an Edge Transport server, and then disable Windows Integrated Authentication.
D.Deploy a server that runs Microsoft Internet Security and Acceleration (ISA) Server,and then enableKerberos constrained delegation.
You have an Exchange Server 2010 organization. You deploy an Edge Transport server.
You need to implement a message hygiene solution that meets the following requirements:
.Users must be able to receive e-mail from external recipients who have been added to their Safe SendersLists
.The Edge Transport server must block all e-mail sent to invalid addresses inside the organization
What should you do first?()
A.Enable sender filtering.
B.Create Send connectors.
C.Configure real-time block lists (RBLs).
D.Configure EdgeSync synchronization.
Your network contains two Exchange Server 2010 Edge Transport servers and five Exchange Server2010 Hub Transport servers.
All e-mail sent from your organization to the Internet is transferred by the Edge Transport servers. You need to recommend a security solution for the organization to meet the following requirements:.Ensure that users can send encrypted messages to any other organization on the Internet
.Ensure that all Exchange-related communication between Hub Transport servers and Edge Transportservers is encrypted
What should you recommend?()
A.Deploy IPsec.
B.Deploy SMTP over SSL.
C.Implement Domain Security.
D.Implement Secure/Multipurpose Internet Mail Extensions (S/MIME).
You have an Exchange Server 2010 organization.
You plan to delegate administration of the organization.
You have a group named Technicians that contains all the level-two technicians in the organization. You need to ensure that the Technicians group can manage the properties of all the mailbox databases. The solution must minimize the number of permissions assigned to the Technicians group.
Which management role should you assign to the Technicians group?()
A.Help Desk
B.Organization Management
C.Recipient Management
D.Server Management
You have an Exchange Server 2010 organization.
You plan to provide users with the ability to schedule meetings.
You need to recommend a scheduling solution that meets the following requirements:.Ensures that users can schedule conference rooms for meetings
.Ensures that conference room owners can change the settings of meetings scheduled by users
What should you include in the solution?()
A.Managed Folder Assistant
B.public folders
C.resource mailboxes
D.room list distribution groups
You have an Exchange Server 2010 organization that contains multiple Hub Transport servers. You need to recommend a message hygiene solution to meet the following requirements:
.Block servers that are known to send spam
.Minimize administrative effort
What should you recommend?()
A.an IP Block list
B.IP Block list providers
C.recipient filtering
D.sender filtering
最新试题
Your company has an Exchange 2010 organization that contains multiple Hub Transport servers. You have a line-of-business application that relays e-mail messages by using a Hub Transport servernamed Hub1. The application only supports sending e-mail to a single SMTP server. You need to ensure that the application can relay e-mail messages if Hub1 fails. What should you do?()
Your network contains a single Active Directory forest. The forest contains two domain trees named contoso.com and fabrikam.com. You have an Exchange Server 2010 organization. The e-mail addresses for the organization are configured as shown in the following table. You need to ensure that all outbound e-mail messages from fabrikam.com appear to originate fromcontoso.com. Users in contoso.com must be able to send e-mail messages to users in fabrikam.com by using the address format alias@fabrikam.com. What should you do first?()
You have an Exchange Server 2010 organization named contoso.com. The organization contains two Client Access servers named CAS1 and CAS2 that are in a Client Accessserver array. All internal and external users connect to their mailboxes by using mail.contoso.com. You need to install a certificate on the Client Access servers to meet the following requirements:.Support 500 client computers that are not joined to the Active Directory domain .Support clients that use Microsoft Office Outlook in Cached Exchange Mode, Autodiscover, andExchange ActiveSync.Minimize client and user support costsWhat should you do?()
Your network contains two Active Directory sites. The sites connect to each other by using a WAN link. You plan to deploy two Exchange Server 2010 Mailbox servers and two Client Access servers in eachsite. Each site will contain a Client Access array. You need to recommend a solution to deploy Hub Transport servers. The solution must meet the following requirements:.Continue to deliver e-mail messages to users in other sites if a single Hub Transport server fails .Support the planned Client Access array deployment.Minimize the number of Exchange serversWhat are two possible ways to achieve this goal?()
You work as a exchange administrator at TestKing.com. The TestKing.com network contains an internalnetwork as well as a perimeter network. The primeter network contains an Exchange Server 2010 EdgeTransport Server named TESTKING-EX.During the course of day you receive an instruction form the CIO to formulate a remote managementsolution for TESTKING-EX01 based on the set criteria below:You need to ensure that management traffic is encypted.You nedd to ensure that remote administration is permitted fron the Internet network.You need to ensure that Exchange Management Console (EMC) is supported.What should you do?()
You have an Exchange Server 2010 organization. The network contains two Mailbox servers that are configured in a database availability group (DAG). You plan to implement a disaster recovery solution. You need to recommend a solution that ensures that the active mailbox database copy is unaffected bythe backup process. You want to achieve this goal while minimizing costs. What should you recommend?()
Your network contains two data centers named Datacenter1 and Datacenter2. An Active Directory site exists for each data center. The data centers connect to the Internet by using a direct link. The data centers connect to each other by using a high-speed WAN link. You plan to deploy Exchange Server 2010 Mailbox servers in both data centers. You need to plan message routing to meet the following requirements:.Ensure outbound delivery of e-mail messages if a single server fails .Automatically load balance the Hub Transport server in each site .Deploy the minimum number of serversWhat should you include in the plan?()
You have an Exchange Server 2010 organization. The organization contains two servers named Server1 and Server2. Server1 and Server2 have the Mailbox server role and the Hub Transport server role installed. Server 1 and Server2 are members of a database availability group (DAG). You need to plan the deployment of Client Access servers to meet the following requirements: .Users must be able to access their mailboxes if a single server fails .Users must not attempt to connect to a failed server What should you include in your plan?()
Your network contains an Exchange Server 2010 server. You need to plan a mailbox sharing solution for the organization to meets the following requirements:.Ensure that assistants can read and modify the e-mail messages of their managers.Ensure that assistants can impersonate their managers when they send e-mail messages What should you include in the plan?()
You have an Exchange Server 2010 organization. An Edge Transport server sends and receives all e- mail messages from the Internet. You notice that some servers on the Internet identify e-mail messages from your organization as spam. You need to minimize the possibility that e-mail messages sent from your organization are identified as spam. What should you do?()