A.The best option is to configure the settings on the Segmentation tab, in the properties of the OWA virtual directory so that the users comply with the Company.com policy.
B.The best option is to configure the settings on the Account tab, in the properties of the user accounts so that the users comply with the Company.com policy.
C.The best option is to configure the settings on the Mailbox Features tab, in the properties of the mailboxes so that the users comply with the Company.com policy.
D.The best option is to configure the settings on the Authentication tab, in the properties of the OWA virtual directory so that the users comply with the Company.com policy.
您可能感兴趣的试卷
你可能感兴趣的试题
A.The best option is to set up an Outlook Web App Mailbox policy.
B.The best option is to set up the Content Filter agent.
C.The best option is to set up a managed folder mailbox policy.
D.The best option is to set up the Attachment Filter agent.
A.You should consider installing the server’s root certificate into the Trusted Root Certification Authorities store on the Client Access server.
B.You should consider accessing the Exchange Management Console (EMC) and assign an Outlook Web App mailbox policy to Mia Hamm.
C.You should consider installing the server’s root certificate into the Trusted Root Certification Authorities store on Mia Hamm’s client workstation.
D.You should consider accessing the Exchange Management Console (EMC) and set up the logon format to use the user principal name (UPN), in the owa (Default Web Site) Properties.
A.you should first consider having a new mail folder created using microsoft office outlook. There after a journal rule should be created.
B.you should first consider having a new mail folder created using microsoft office outlook.There after use the inbox managed default folder to run the managed content settings wizard.
C.you should first consider having a managed custom folder created.thereafter a transport rule should be created.
D.you should first consider having a managed custom folder created.There after use the inbox managed default folder to run the managed content settings wizard.
A.The best option is to set up an Outlook Web App Mailbox policy so that the users comply with the Company.com policy.
B.The best option is to set up a Group Policy Object so that the users comply with the Company.com policy.
C.The best option is to change the authentication settings of the OWA virtual directory so that the users comply with the Company.com policy.
D.The best option is to change the authentication settings of the IISADMPWD virtual directory so that the users comply with the Company.com policy.
A.You should consider enabling and set up Outlook Anywhere.
B.You should consider setting up an Outlook Web App Mailbox policy.
C.You should consider changing Mia Hamm’s mailbox features.
D.You should consider removing Autodiscover record from the DNS zone.
A.The best option is to use an A record for FederatedSharing.Company.com.
B.The best option is to use an SRV record for _autodiscover._TCP._msdcs.Company.com.
C.The best option is to use an A record for autodiscover.Company.com.
D.The best option is to use an SRV record for _FederatedSharing._UDP._msdcs.Company.com.
A.The best option is to use an A record.
B.The best option is to use a CNAME record.
C.The best option is to use a TXT record.
D.The best option is to use a SRV record.
You work as the enterprise exchange administrator at Company.com.The Company.com network consists of a single Active Directory domain named Company.com.Company.com has an Exchange
Server 2010 organization.Company.com contains an exchange server 2010 server named -sr15 that has the following roles installed: client access, hub transport, and mailbox server.the Company.com also has a windows server 2008 r2 certification authority (ca).Company.com has merged with another company named Courseware Publishers that contains an internal root C A.You have received instructions from the CIO to install a certificate to create the federated trust as well as to reduce the cost.
What should you do?()
A.You need to set up a computer certificate request on -sr15; thereafter you should submit the request to a third-party trusted ca
B.You need to use -sr15 and generate a self-signed certificate
C.You need to use request a computer certificate from the Company.com.com ca from -sr15
D.You need to set up a computer certificate request on -sr15; thereafter you should submit the request to courseware publishers ca
A.You should consider changing the EWS virtual directory.
B.You should consider changing the Federation Trust.
C.You should consider changing the Organizational Relationship.
D.You should consider changing the default sharing policy.
A.You should consider using the Exchange Remote Connectivity Analyzer.
B.You should consider checking the properties of the WEB Outlook Provider.
C.You should consider using the Mail Flow Troubleshooter.
D.You should consider using the Test-OwaConnectivity cmdlet.
最新试题
You have an Exchange organization.All servers in the organization have Exchange Server 2010 Service Pack 1 (SP1) installed.You need to identify why a remote SMTP server rejects e-mail sent from the organization. What should you do?()
You have an Exchange Server 2010 Service Pack 1 organization named contoso.com.All users have the contoso.com e-mail address suffix. You discover that both anonymous and authenticated users can post content to a public folder named Folder1 by sending e-mail messages to folder1@contoso.com.You need to prevent all users from posting content to Folder1 by sending e-mail.What should you do?()
You have an Exchange organization.All servers in the organization have Exchange Server 2010 Service Pack 1 (SP1) installed. You need to ensure that each user who sends a meeting request to a room mailbox receives a custom message from the mailbox. What should you do from the properties of the mailbox?()
You have an Exchange Server 2010 organization. The network contains the computers shown in the following table.You need to identify the computers that can run the Exchange Server 2010 management tools. Which two computers should you identify?()
You have a hosted Exchange organization.All servers in the organization have Exchange Server 2010 Service Pack 1 (SP1) installed.You need to prevent a user named User1 from using Outlook Web App (OWA) to access his mailbox. What should you do?()
You have an Exchange Server 2010 organization.You need to ensure that all users in the organization can view the availability of a company projector.What should you create for the projector?()
Your network contains two Exchange Server 2010 Service Pack 1 (SP1) Mailbox servers. You create a database availability group (DAG).You need to install all of the Failover Clustering components on to the Mailbox servers. What should you do?()
You have an Exchange Server 2010 organization.You have a user named User1 and a user named User2. You need to ensure that User1 can add User2 to the From field when he sends e-mail messages. Messages that have User2 in the From field must display only User2 as the message sender to recipients Who receive the messages. What should you use?()
You have an Exchange organization.All servers in the organization have Exchange Server 2010 Service Pack 1 (SP1) installed. All users have Windows Mobile 6.5 devices that connect to the organization by using Exchange ActiveSync. A user named User1 reports that she lost her device and successfully performed a remote wipe of the device. User1 later reports that she located her device. User1 configures the device to connect to Exchange ActiveSync and discovers that the connection fails. You need to ensure that User1 can connect her device by using Exchange ActiveSync. What should you do?()
You have two Exchange Server 2010 Mailbox servers named Server1 and Server2.You need to move a users mailbox from Server 1 to Server 2.Your solution must minimize down time for the user.Which cmdlet should you run?()