You have an Exchange Server 2010 organization.
You have a global security group named Legal that contains all the members of your companys legaldepartment.
The companys security policy states that the Legal group must be able to search all mailboxes for e-mailmessages that contain specific keywords.
You need to recommend a solution for the organization that complies with the security policy.
What should you include in the solution?()
A.a Discovery Management role group
B.a legal hold
C.administrator audit logging
D.Mailbox journaling
您可能感兴趣的试卷
你可能感兴趣的试题
You have an Exchange Server 2010 organization that contains Windows Mobile 5.0 devices. Your company plans to replace all mobile devices with Windows Mobile 6.5 devices.
You need to identify which users accessed their mailboxes by using Windows Mobile 5.0 devices in thepast month.
What should you do?()
A.Create a Data Collector Set.
B.Install and run the Exchange Server User Monitor (ExMon).
C.Export and review the Internet Information Services (IIS) logs.
D.Enable User Agent logging, and then review the agent logs.
You have an Exchange Server 2010 organization.
You plan to delegate Exchange administrative rights to some users in the organization.
You need to recommend a solution that tracks all changes made to the Exchange organization.
What should you include in the solution?()
A.administrator audit logging
B.circular logging
C.diagnostic logging
D.Windows Security Auditing
You have an Exchange Server 2010 organization that contains five Hub Transport servers, five Mailboxservers and one Edge Transport server.
You need to provide a solution to ensure that users can prevent legitimate inbound e-mail messages frombeing classified as spam.
What should you do?()
A.Enable sender filtering.
B.Enable Sender ID filtering.
C.Configure a custom MailTip.
D.Configure safelist aggregation.
You have an Exchange Server 2010 organization.
Your companys security policy states that users must not be able to encrypt e-mail messages by usingOutlook Web App (OWA).
You need to recommend a client access solution that meets the requirements of the security policy.
What should you include in the solution?()
A.managed folder mailbox policies
B.multiple OWA virtual directories
C.OWA segmentation
D.WebReady Document Viewing
You have an Exchange 2010 organization.
Your companys security policy states that all connections to Outlook Web App (OWA) must use smartcard authentication.
You need to recommend a solution to meet the security policy requirements.
Which two possible ways to achieve this goal should you recommend?()
A.Require certificate-based authentication for all Internet-facing Client Access servers.
B.Require Windows Integrated Authentication for all Internet-facing Client Access servers.
C.Deploy an Edge Transport server, and then disable Windows Integrated Authentication.
D.Deploy a server that runs Microsoft Internet Security and Acceleration (ISA) Server, and then enableKerberos constrained delegation.
You have an Exchange Server 2010 organization. You deploy an Edge Transport server.
You need to implement a message hygiene solution that meets the following requirements:
.Users must be able to receive e-mail from external recipients who have been added to their Safe SendersLists
.The Edge Transport server must block all e-mail sent to invalid addresses inside the organization
What should you do first?()
A.Enable sender filtering.
B.Create Send connectors.
C.Configure real-time block lists (RBLs).
D.Configure EdgeSync synchronization.
Your network contains two Exchange Server 2010 Edge Transport servers and five Exchange Server2010 Hub Transport servers.
All e-mail sent from your organization to the Internet is transferred by the Edge Transport servers. You need to recommend a security solution for the organization to meet the following requirements:.Ensure that users can send encrypted messages to any other organization on the Internet
.Ensure that all Exchange-related communication between Hub Transport servers and Edge Transportservers is encrypted
What should you recommend?()
A.Deploy IPsec.
B.Deploy SMTP over SSL.
C.Implement Domain Security.
D.Implement Secure/Multipurpose Internet Mail Extensions (S/MIME).
You have an Exchange Server 2010 organization.
You plan to delegate administration of the organization.
You have a group named Technicians that contains all the level-two technicians in the organization. You need to ensure that the Technicians group can manage the properties of all the mailbox databases. The solution must minimize the number of permissions assigned to the Technicians group.
Which management role should you assign to the Technicians group?()
A.Help Desk
B.Organization Management
C.Recipient Management
D.Server Management
You have an Exchange Server 2010 organization.
You plan to provide users with the ability to schedule meetings.
You need to recommend a scheduling solution that meets the following requirements:.Ensures that users can schedule conference rooms for meetings
.Ensures that conference room owners can change the settings of meetings scheduled by users
What should you include in the solution?()
A.Managed Folder Assistant
B.public folders
C.resource mailboxes
D.room list distribution groups
You have an Exchange Server 2010 organization that contains multiple Hub Transport servers. You need to recommend a message hygiene solution to meet the following requirements:.Block servers that are known to send spam.Minimize administrative effort
What should you recommend?()
A.an IP Block list
B.IP Block list providers
C.recipient filtering
D.sender filtering
最新试题
You have an Exchange Server 2003 organization. All users connect to their mailboxes by using Microsoft Office Outlook. You start to transition the organization to new Exchange Server 2010 servers. The new servers are on a secured subnet that is separated by a firewall. You will move half of the mailboxes to the new servers. Client Access servers and Mailbox servers are on the secured subnet. Client computers on the network can access the Client Access servers. You need to recommend a solution that allows users to connect to Public Folders by using Outlook or Outlook Web App (OWA). What should you include in the solution?()
Your company has an Active Directory forest. The network contains Exchange Server 2007 Service Pack 1 (SP1) and Exchange Server 2003 ServicePack 2 (SP2) servers. All domain controllers run Windows Server 2003 (x86) Service Pack 1 (SP1). You plan to deploy Exchange Server 2010 on the network. You need to recommend changes to the servers so that you can deploy Exchange Server 2010 servers. What should you upgrade first?()
Your network contains a single Active Directory forest. The forest contains two domain trees named contoso.com and fabrikam.com. You have an Exchange Server 2010 organization. The e-mail addresses for the organization are configured as shown in the following table. You need to ensure that all outbound e-mail messages from fabrikam.com appear to originate fromcontoso.com. Users in contoso.com must be able to send e-mail messages to users in fabrikam.com by using the address format alias@fabrikam.com. What should you do first?()
Your company has an Active Directory forest named contoso.com. You plan to deploy an Exchange Server 2010 organization that will contain two servers. Each server will have the Client Access server role, the Hub Transport server role, and the Mailbox serverrole installed. You plan to add both servers to a database availability group (DAG). You need to recommend a high-availability solution for the Client Access server role. Your solution must ensure that users are not prompted to authenticate if a Client Access server becomesunavailable. What should you recommend?()
You have an Exchange Server 2010 organization. Your company has a relationship with another company. The partner company has an Exchange Server 2010 organization. You need to recommend a security solution to meet the following requirements: .Ensure that all e-mail delivery between your servers and the partner companys servers is encrypted.Ensure that all communication between your servers and the partner companys servers is authenticatedWhat should you include in the solution?()
You work as a exchange administrator at TestKing.com. The TestKing.com network contains an internalnetwork as well as a perimeter network. The primeter network contains an Exchange Server 2010 EdgeTransport Server named TESTKING-EX.During the course of day you receive an instruction form the CIO to formulate a remote managementsolution for TESTKING-EX01 based on the set criteria below:You need to ensure that management traffic is encypted.You nedd to ensure that remote administration is permitted fron the Internet network.You need to ensure that Exchange Management Console (EMC) is supported.What should you do?()
You deploy multiple Mailbox servers. Each Mailbox server contains a copy of a mailbox database named DB1. You need to recommend a solution that allows administrators to remove corrupt messages that have been replicated before the corrupt messages are applied to each copy of DB1.What should you recommend?()
Your network contains two Active Directory sites named Site1 and Site2. Only Site1 can be accessed from the Internet. You have an Exchange Server 2010 organization. You deploy a Client Access server in Site1 and enable Windows Integrated Authentication for OutlookWeb App (OWA). In Site2, you deploy a Mailbox server and a Client Access server. You need to configure the Exchange organization to meet the following requirements:.Allow users to access their mailboxes from the Internet by using OWA .Prevent authentication prompts from displaying when users connect to OWA by using domain- joined computers that are connected to the internal network What should you do?()
You have an Exchange organization that contains Exchange 2000 Server Service Pack 3 (SP3),Exchange Server 2003 Service Pack 2 (SP2), and Exchange Server 2007 Service Pack 1 (SP1) servers. You need to transition the organization to Exchange Server 2010. What should you do first?()
Your company has a main office and 10 branch offices. Each office connects to the Internet by using a direct link. The main office connects to the branch offices by using a WAN link. You plan to deploy Exchange Server 2010 servers in each office. You need to design Active Directory to meet the following Exchange Server 2010 requirements:.Users must be able to access their mailboxes if a single domain controller fails .Users must be able to send e-mail messages to the Internet if a WAN link fails What should you include in the design?()