A.The best option is to set up an Outlook Web App Mailbox policy so that the users comply with the Company.com policy.
B.The best option is to set up a Group Policy Object so that the users comply with the Company.com policy.
C.The best option is to change the authentication settings of the OWA virtual directory so that the users comply with the Company.com policy.
D.The best option is to change the authentication settings of the IISADMPWD virtual directory so that the users comply with the Company.com policy.
您可能感兴趣的试卷
你可能感兴趣的试题
A.You should consider enabling and set up Outlook Anywhere.
B.You should consider setting up an Outlook Web App Mailbox policy.
C.You should consider changing Mia Hamm’s mailbox features.
D.You should consider removing Autodiscover record from the DNS zone.
A.The best option is to use an A record for FederatedSharing.Company.com.
B.The best option is to use an SRV record for _autodiscover._TCP._msdcs.Company.com.
C.The best option is to use an A record for autodiscover.Company.com.
D.The best option is to use an SRV record for _FederatedSharing._UDP._msdcs.Company.com.
A.The best option is to use an A record.
B.The best option is to use a CNAME record.
C.The best option is to use a TXT record.
D.The best option is to use a SRV record.
You work as the enterprise exchange administrator at Company.com.The Company.com network consists of a single Active Directory domain named Company.com.Company.com has an Exchange
Server 2010 organization.Company.com contains an exchange server 2010 server named -sr15 that has the following roles installed: client access, hub transport, and mailbox server.the Company.com also has a windows server 2008 r2 certification authority (ca).Company.com has merged with another company named Courseware Publishers that contains an internal root C A.You have received instructions from the CIO to install a certificate to create the federated trust as well as to reduce the cost.
What should you do?()
A.You need to set up a computer certificate request on -sr15; thereafter you should submit the request to a third-party trusted ca
B.You need to use -sr15 and generate a self-signed certificate
C.You need to use request a computer certificate from the Company.com.com ca from -sr15
D.You need to set up a computer certificate request on -sr15; thereafter you should submit the request to courseware publishers ca
A.You should consider changing the EWS virtual directory.
B.You should consider changing the Federation Trust.
C.You should consider changing the Organizational Relationship.
D.You should consider changing the default sharing policy.
A.You should consider using the Exchange Remote Connectivity Analyzer.
B.You should consider checking the properties of the WEB Outlook Provider.
C.You should consider using the Mail Flow Troubleshooter.
D.You should consider using the Test-OwaConnectivity cmdlet.
A.the best option is to run the performance monitor on -sr11 and -sr12 to gather the rpc performance data.
B.the best option is to run the message tracking viewer on -sr11 and -sr12 to gather the rpc performance data.
C.the best option is to run the exchange troubleshooting assistant on -sr11 and -sr12 to gather the rpc performance data.
D.the best option is to run the mail flow troubleshooter on -sr12 and -sr13 to gather the rpc performance data.
Company.com network consists of a single Active Directory domain named
Company.com.Company.com has an Exchange Server 2010 organization.The Company.com employees use Microsoft Office Outlook 2007 to connect to their mailboxes.RPC over HTTP and Auto discover are configured on Microsoft Office Outlook 2007. A new Company.com security policy requires that the employees connected to the domain does not need authentication when using Outlook Anywhere.However, those not connected t the domain needs to be authentication when using Outlook Anywhere.The employees need to comply with the new Company.com security policy.
What should you do?()
A.You should consider using Basic authentication on Outlook Anywhere and set up only Basic authentication on the RPC virtual directory.
B.You should consider using NTLM authentication on Outlook Anywhere and set up Basic authentication and NTLM authentication on the RPC virtual directory.
C.You should consider using NTLM authentication on Outlook Anywhere and set up only Basic authentication on the RPC virtual directory.
D.You should consider using Basic authentication on Outlook Anywhere and set up Basic authentication and NTLM authentication on the RPC virtual directory.
A.The best option is to change the RPC virtual directory from the Internet Information Services (IIS) Manager.
B.The best option is to change the properties of the WEB Outlook Provider from the Exchange Management Shell.
C.The best option is to change the RPC virtual directory from the Autodiscover virtual directory.
D.The best option is to change the properties of the EXPR Outlook Provider from the Exchange Management Shell.
A.You should consider using Outlook Anywhere and configure it.
B.You should consider creating and set up a Client Access array.
C.You should consider renaming the OWA virtual directory to Exchange.
D.You should consider the Switchover Server option.
最新试题
You have an Exchange organization.All servers in the organization have Exchange Server 2010 Service Pack 1 (SP1) installed.You need to identify why a remote SMTP server rejects e-mail sent from the organization. What should you do?()
You have an Exchange Server 2010 organization.You need to ensure that all users in the organization can view the availability of a company projector.What should you create for the projector?()
You have an Exchange Server 2010 Service Pack 1 organization named contoso.com.All users have the contoso.com e-mail address suffix. You discover that both anonymous and authenticated users can post content to a public folder named Folder1 by sending e-mail messages to folder1@contoso.com.You need to prevent all users from posting content to Folder1 by sending e-mail.What should you do?()
You have an Exchange organization.All servers in the organization have Exchange Server 2010 Service Pack 1 (SP1) installed. You need to ensure that each user who sends a meeting request to a room mailbox receives a custom message from the mailbox. What should you do from the properties of the mailbox?()
You work as the exchange administrator at company.com.the company.com network contains an exchange server 2010 organization.you are responsible for managing the exchange network for company.com.the company.com network contains two mailbox servers named -ex01 and -ex02 as well as a mailbox database named -ex03.-ex01 and -ex02 are members of a database availability group named tkdag and contain a copy of -ex03.during the course of the week you receive an instruction from the cio to remove the -ex03 mailbox database from -ex01.what should you do?()
You have an Exchange Server 2010 organization. The network contains the computers shown in the following table.You need to identify the computers that can run the Exchange Server 2010 management tools. Which two computers should you identify?()
You have a hosted Exchange organization.All servers in the organization have Exchange Server 2010 Service Pack 1 (SP1) installed.You need to prevent a user named User1 from using Outlook Web App (OWA) to access his mailbox. What should you do?()
You have a hosted Exchange organization that contains 10,000 mailboxes.All servers in the organization have Exchange Server 2010 Service Pack 1 (SP1) installed. You need to retrieve the following information for the organization: (1)The IP addresses of all client connections (2)The network latency for all MAPI connections (3)The version of Microsoft Outlook that is used to access all of the mailboxes What should you use?()
You have an Exchange organization.All servers in the organization have Exchange Server 2010 Service Pack 1 (SP1) installed.All servers run Windows Server 2008 R2.The organization contains Mailbox servers, Client Access servers, and Hub Transport servers only. You need to ensure that you can review any changes made by administrators to the Exchange configuration.The solution must identify which administrator performed each change. What should you do?()
You have an Exchange Server 2010 organization.You need to ensure that you can install the Exchange Server 2010 administration tools on a desktop computer that runs Windows 7. What should you install first?()