You work as the enterprise exchange administrator at Company.com.The Company.com network consists of a single Active Directory domain named Company.com.Company.com has an Exchange
Server 2010 organization.Company.com contains an exchange server 2010 server named -sr15 that has the following roles installed: client access, hub transport, and mailbox server.the Company.com also has a windows server 2008 r2 certification authority (ca).Company.com has merged with another company named Courseware Publishers that contains an internal root C A.You have received instructions from the CIO to install a certificate to create the federated trust as well as to reduce the cost.
What should you do?()
A.You need to set up a computer certificate request on -sr15; thereafter you should submit the request to a third-party trusted ca
B.You need to use -sr15 and generate a self-signed certificate
C.You need to use request a computer certificate from the Company.com.com ca from -sr15
D.You need to set up a computer certificate request on -sr15; thereafter you should submit the request to courseware publishers ca
您可能感兴趣的试卷
你可能感兴趣的试题
A.You should consider changing the EWS virtual directory.
B.You should consider changing the Federation Trust.
C.You should consider changing the Organizational Relationship.
D.You should consider changing the default sharing policy.
A.You should consider using the Exchange Remote Connectivity Analyzer.
B.You should consider checking the properties of the WEB Outlook Provider.
C.You should consider using the Mail Flow Troubleshooter.
D.You should consider using the Test-OwaConnectivity cmdlet.
A.the best option is to run the performance monitor on -sr11 and -sr12 to gather the rpc performance data.
B.the best option is to run the message tracking viewer on -sr11 and -sr12 to gather the rpc performance data.
C.the best option is to run the exchange troubleshooting assistant on -sr11 and -sr12 to gather the rpc performance data.
D.the best option is to run the mail flow troubleshooter on -sr12 and -sr13 to gather the rpc performance data.
Company.com network consists of a single Active Directory domain named
Company.com.Company.com has an Exchange Server 2010 organization.The Company.com employees use Microsoft Office Outlook 2007 to connect to their mailboxes.RPC over HTTP and Auto discover are configured on Microsoft Office Outlook 2007. A new Company.com security policy requires that the employees connected to the domain does not need authentication when using Outlook Anywhere.However, those not connected t the domain needs to be authentication when using Outlook Anywhere.The employees need to comply with the new Company.com security policy.
What should you do?()
A.You should consider using Basic authentication on Outlook Anywhere and set up only Basic authentication on the RPC virtual directory.
B.You should consider using NTLM authentication on Outlook Anywhere and set up Basic authentication and NTLM authentication on the RPC virtual directory.
C.You should consider using NTLM authentication on Outlook Anywhere and set up only Basic authentication on the RPC virtual directory.
D.You should consider using Basic authentication on Outlook Anywhere and set up Basic authentication and NTLM authentication on the RPC virtual directory.
A.The best option is to change the RPC virtual directory from the Internet Information Services (IIS) Manager.
B.The best option is to change the properties of the WEB Outlook Provider from the Exchange Management Shell.
C.The best option is to change the RPC virtual directory from the Autodiscover virtual directory.
D.The best option is to change the properties of the EXPR Outlook Provider from the Exchange Management Shell.
A.You should consider using Outlook Anywhere and configure it.
B.You should consider creating and set up a Client Access array.
C.You should consider renaming the OWA virtual directory to Exchange.
D.You should consider the Switchover Server option.
A.The best option is to inform Rory Allen to change the sensitivity settings of the e-mail message.
B.The best option is to inform the external recipient client to add a delegate.
C.The best option is to inform the external recipient client to send a signed e-mail message to Rory Allen.
D.The best option is to inform Rory Allen to send a signed e-mail message to the external recipient client.
A.You should consider changing the OWA virtual directory’s authentication settings.
B.You should consider issuing the employees a certificate.
C.You should consider using a third-party ca for -ex11.
D.You should consider importing a root CA certificate for each employee.
A.you should consider running the test-imapconnectivity cmdlet from -ex10.
B.You should consider using Telnet to connect to TCP port 587 from a client computer.
C.You should consider using Telnet to connect to TCP port 143 from a client computer.
D.you should consider running the test-outlookconnectivity cmdlet from -ex10.
A.The best option is to run the Get-MailboxDatabase from the Exchange Management Shell.
B.The best option is to run the Get-MailboxStatistics from the Exchange Management Shell.
C.The best option is to create and export a filter from the Exchange Management Console.
D.The best option is to run the Remote Connectivity Analyzer from the Exchange Management Console.
最新试题
You have an Exchange organization named nwtraders.com.All servers in the organization have Exchange Server 2010 Service Pack 1 (SPl) installed.Your company acquires another company named Contoso, Ltd. You plan to create new mailboxes for each user from Contoso. You need to ensure that each new mailbox can receive e-mail messages sent to contoso.com.Which two objects should you create?()
Your network contains one Exchange Server 2010 Service Pack 1 (SP1) Client Access server named Server1. You have a user named User1. You need to limit the size of the attachments that User1 can download by using Windows Mobile 6.5 devices. What should you do first?()
You have an Exchange organization.All servers in the organization have Exchange Server 2010 Service Pack 1 (SP1) installed.All servers run Windows Server 2008 R2.The organization contains Mailbox servers, Client Access servers, and Hub Transport servers only. You need to ensure that you can review any changes made by administrators to the Exchange configuration.The solution must identify which administrator performed each change. What should you do?()
You have an Exchange organization.All servers in the organization have Exchange Server 2010 Service Pack 1 (SP1) installed. The organization contains a database availability group (DAG) named DAG1.DAG1 contains three Mailbox servers including a server named Server1. Server1 fails.You restore Server1.You need to ensure that Server1 can replicate mailbox databases from DAG1. What should you do first?()
You have an Exchange organization.All servers in the organization have Exchange Server 2010 Service Pack 1 (SP1) installed.You need to ensure that an equipment mailbox can be scheduled for meetings that occur during working hours only. What should you do from the properties of the mailbox?()
You have an Exchange Server 2010 organization.You need to ensure that you can install the Exchange Server 2010 administration tools on a desktop computer that runs Windows 7. What should you install first?()
Your network contains two Exchange Server 2010 Service Pack 1 (SP1) Mailbox servers. You create a database availability group (DAG).You need to install all of the Failover Clustering components on to the Mailbox servers. What should you do?()
You have an Exchange Server 2010 Service Pack 1 (SP1) Mailbox server that contains multiple mailbox databases. You need to ensure that you are notified when deleted mailboxes are purged from the server.What should you do?()
You have an Exchange organization.All servers in the organization have Exchange Server 2010 Service Pack 1 (SP1) installed.The network contains an internal root certification authority (CA).Users on the network use Outlook Anywhere.A Client Access server uses a wildcard certificate issued by a trusted third-party root CA.You need to ensure that users can send and receive encrypted e-mail messages by using S/MIME. What should you do?()
You have an Exchange Server 2010 organization. The network contains the computers shown in the following table.You need to identify the computers that can run the Exchange Server 2010 management tools. Which two computers should you identify?()