You have an Exchange Server 2010 organization.
All users access their mailboxes by using Outlook Web App (OWA).
You need to plan a solution to reduce the number of e-mail messages that are accidentally sent todistribution groups that contain company executives.
What should you include in the plan?()
A.custom MailTips
B.dynamic distribution groups
C.Outlook Protection Rules
D.sharing policies
您可能感兴趣的试卷
你可能感兴趣的试题
Your company has a main office and 10 branch offices. You have an Exchange Server 2010 organization.
All Exchange servers are installed on virtual machines.
You need to create a monitoring plan for the Exchange servers that meets the following requirements:.Identify Exchange server errors
.Provide alerts when Exchange services are stopped.Produce statistical analysis and reporting
Which tool should you include in the plan?()
A.Microsoft System Center Service Manager
B.Microsoft System Center Operations Manager
C.Microsoft System Center Configuration Manager
D.Microsoft System Center Virtual Machine Manager
You have an Exchange Server 2010 organization.
The organization contains a global security group named Group1.
You plan to deploy a monitoring solution for the Exchange servers in your organization.
You need to recommend a solution that allows members of Group1 to monitor the performance ofExchange Server 2010 servers.
Your solution must prevent members of Group1 from modifying the configurations of the ExchangesServer 2010 organization.
What should you include in the solution?()
A.Delegation of Control Wizard
B.Federation Trusts
C.Reliability Monitor
D.Role Based Access Control (RBAC)
You have an Exchange Server 2010 organization.
You need to recommend a solution that prevents the permanent deletion of e-mail messages from themailboxes of employee who have been dismissed from the company.
What should you recommend?()
A.Implement managed folders.
B.Implement a legal hold for each mailbox.
C.Implement a Retention Policy for each mailbox.
D.Implement an Outlook Protection Rule for each mailbox.
You have an Exchange Server 2010 organization.
You have a global security group named Legal that contains all the members of your companys legaldepartment.
The companys security policy states that the Legal group must be able to search all mailboxes for e-mailmessages that contain specific keywords.
You need to recommend a solution for the organization that complies with the security policy.
What should you include in the solution?()
A.a Discovery Management role group
B.a legal hold
C.administrator audit logging
D.Mailbox journaling
You have an Exchange Server 2010 organization that contains Windows Mobile 5.0 devices. Your company plans to replace all mobile devices with Windows Mobile 6.5 devices.
You need to identify which users accessed their mailboxes by using Windows Mobile 5.0 devices in thepast month.
What should you do?()
A.Create a Data Collector Set.
B.Install and run the Exchange Server User Monitor (ExMon).
C.Export and review the Internet Information Services (IIS) logs.
D.Enable User Agent logging, and then review the agent logs.
You have an Exchange Server 2010 organization.
You plan to delegate Exchange administrative rights to some users in the organization.
You need to recommend a solution that tracks all changes made to the Exchange organization.
What should you include in the solution?()
A.administrator audit logging
B.circular logging
C.diagnostic logging
D.Windows Security Auditing
You have an Exchange Server 2010 organization that contains five Hub Transport servers, five Mailboxservers and one Edge Transport server.
You need to provide a solution to ensure that users can prevent legitimate inbound e-mail messages frombeing classified as spam.
What should you do?()
A.Enable sender filtering.
B.Enable Sender ID filtering.
C.Configure a custom MailTip.
D.Configure safelist aggregation.
You have an Exchange Server 2010 organization.
Your companys security policy states that users must not be able to encrypt e-mail messages by usingOutlook Web App (OWA).
You need to recommend a client access solution that meets the requirements of the security policy.
What should you include in the solution?()
A.managed folder mailbox policies
B.multiple OWA virtual directories
C.OWA segmentation
D.WebReady Document Viewing
You have an Exchange 2010 organization.
Your companys security policy states that all connections to Outlook Web App (OWA) must use smartcard authentication.
You need to recommend a solution to meet the security policy requirements.
Which two possible ways to achieve this goal should you recommend?()
A.Require certificate-based authentication for all Internet-facing Client Access servers.
B.Require Windows Integrated Authentication for all Internet-facing Client Access servers.
C.Deploy an Edge Transport server, and then disable Windows Integrated Authentication.
D.Deploy a server that runs Microsoft Internet Security and Acceleration (ISA) Server, and then enableKerberos constrained delegation.
You have an Exchange Server 2010 organization. You deploy an Edge Transport server.
You need to implement a message hygiene solution that meets the following requirements:
.Users must be able to receive e-mail from external recipients who have been added to their Safe SendersLists
.The Edge Transport server must block all e-mail sent to invalid addresses inside the organization
What should you do first?()
A.Enable sender filtering.
B.Create Send connectors.
C.Configure real-time block lists (RBLs).
D.Configure EdgeSync synchronization.
最新试题
You have an Exchange Server 2010 organization. Your company has a relationship with another company. The partner company has an Exchange Server 2010 organization. You need to recommend a security solution to meet the following requirements: .Ensure that all e-mail delivery between your servers and the partner companys servers is encrypted.Ensure that all communication between your servers and the partner companys servers is authenticatedWhat should you include in the solution?()
Your company has two main offices named Main1 and Main2. An Active Directory site exists for each office. Users connect locally to servers in both offices. The offices connect to each other by using a high-speed WAN link. You plan to deploy Exchange Server 2010. You need to plan the deployment of Mailbox servers to meet the following requirements:.Ensure that users can access their mailbox from a server in their site, if a single Mailbox server fails .Ensure that users can access their mailboxes remotely if a site fails .Minimize the number of serversHow many Mailbox servers should you include in the plan?()
You have an Exchange Server 2010 organization. You plan to deploy two new Mailbox servers. Both Mailbox servers will be members of a database availability group (DAG). You need to recommend a hard-disk configuration for the new servers. Your recommendation must meet the following requirements:.Maximize write performance.Prevent a switchover if a single disk failsWhich disk configuration should you recommend?()
Your network contains an Exchange Server 2010 server. You need to plan a mailbox sharing solution for the organization to meets the following requirements:.Ensure that assistants can read and modify the e-mail messages of their managers.Ensure that assistants can impersonate their managers when they send e-mail messages What should you include in the plan?()
Your company has an Active Directory forest. The network contains Exchange Server 2007 Service Pack 1 (SP1) and Exchange Server 2003 ServicePack 2 (SP2) servers. All domain controllers run Windows Server 2003 (x86) Service Pack 1 (SP1). You plan to deploy Exchange Server 2010 on the network. You need to recommend changes to the servers so that you can deploy Exchange Server 2010 servers. What should you upgrade first?()
Your network contains an internal network and a perimeter network. The internal network contains an Active Directory forest. The forest contains a single domain. You plan to deploy 10 Edge Transport servers on the perimeter network. You need to recommend a solution for the Edge Transport server deployment. The solution must meet the following requirements:.Allow administrators to apply a single security policy to all Edge Transport servers .Reduce the administrative overhead that is required to manage servers.Minimize the attack surface of the internal network What should you recommend?()
Your network consists of an Active Directory forest that contains two sites named Site1 and Site2. From the Internet, users can only access servers in Site1. You have an Exchange Server 2007 organization. Each site contains servers that run the Client Access server role, the Mailbox server role, and the HubTransport server role. You plan to transition the organization to Exchange Server 2010. You need to recommend the server role that you must transition first to Exchange Server 2010. Your solution must provide the least amount of downtime for users in the organization. Which servers should you transition first?()
You have an Exchange Server 2010 organization. The organization contains two servers named Server1 and Server2. Server1 and Server2 have the Mailbox server role and the Hub Transport server role installed. Server 1 and Server2 are members of a database availability group (DAG). You need to plan the deployment of Client Access servers to meet the following requirements: .Users must be able to access their mailboxes if a single server fails .Users must not attempt to connect to a failed server What should you include in your plan?()
Your company has a main office and 10 branch offices. Each office connects to the Internet by using a direct link. The main office connects to the branch offices by using a WAN link. You plan to deploy Exchange Server 2010 servers in each office. You need to design Active Directory to meet the following Exchange Server 2010 requirements:.Users must be able to access their mailboxes if a single domain controller fails .Users must be able to send e-mail messages to the Internet if a WAN link fails What should you include in the design?()
You deploy multiple Mailbox servers. Each Mailbox server contains a copy of a mailbox database named DB1. You need to recommend a solution that allows administrators to remove corrupt messages that have been replicated before the corrupt messages are applied to each copy of DB1.What should you recommend?()