A.You should consider running the Set-MailboxDatabase cmdlet from the Exchange Management Shell.
B.You should consider changing the properties of every mailbox database from the Exchange Management Console (EMC).
C.You should consider changing the properties of every Client Access server object from the Exchange Management Console (EMC).
D.You should consider running the Set-Mailbox cmdlet from the Exchange Management Shell.
您可能感兴趣的试卷
你可能感兴趣的试题
A.Your best option would be to have the Network Load Balancing feature installed on every server.Thereafter a second IP address should be assigned to every network adapter.
B.Your best option would be to have two new records created for the Client Access server from the DNS manager.
C.Your best option would be to have a hardware load balancer deployed. Then a DNS record should be created for the virtual IP address. Thereafter a Client Access server array should be configured.
D.Your best option would e to have a new service named Client Access Server created and a new IP address allocated from the Failover Cluster Manager.
A.you should consider having -ex01 and -ex02 added to a database availability group (dag).
B.you should consider having -ex01 added to the
C.you should consider having -ex02 added to the public folder referrals for examwaysa.
D.you should consider having -ex01 and -ex02 added to a client access server array.
A.you should consider adding -ex01 and -ex02 to a database availability group (dag)
B.you should consider changing the folder limitations from the properties of KINGDATA
C.you should consider adding -ex02 from the properties of kingdata
D.you should consider adding -ex01 and -ex02 to a client access server array
A.This can be accomplished by restoring the mailbox database to KINGDATABASE,Then the mailbox should be restored.Thereafter the New-MoveRequest cmdlet should be run.
B.This can be accomplished by restoring the mailbox database to a Recovery Mailbox database. Then the mailbox should be restored.Thereafter the Export-Mailbox cmdlet should be run.
C.This can be accomplished by restoring the mailbox database to KINGDATABASE, Thereafter the Move-Mailbox cmdlet should be run.
D.This can be accomplished by restoring the mailbox database to a Recovery Mailbox database. Thereafter the Connect-Mailbox cmdlet should be run.
A.Your first step should be to create a Client Access server array.
B.Your first step should be to create a database availability group (DAG).
C.Your first step should be to create a recovery storage group.
D.Your first step should be to create a Recovery Mailbox database.
A.You should consider creating a database availability group (DAG). Then a backup of the mailbox database file should be restored. Thereafter the Export-Mailbox cmdlet should be run.
B.You should consider creating a new Mailbox Recovery Database. Then a backup of the database file should be restored. Thereafter the Export-Mailbox cmdlet should be run.
C.You should consider creating a new Mailbox Recovery Database. Then a backup of the database file should be restored. Thereafter the Restore-Mailbox cmdlet should be run.
D.You should consider creating a database availability group (DAG). Then a backup of the mailbox database file should be restored. Thereafter the Restore-Mailbox cmdlet should be run.
A.you should consider having the computer account for -ex05 removed from the active directory
B.you should consider running the clean-mailboxdatabase cmdlet on all kingdag members except -ex05
C.you should consider having -ex05 removed from kingdag
D.You should consider having all mailbox database copies removed from KINGDAG
A.You should consider creating a database availability group (DAG). Thereafter -ex03 and mbx2 should be added to the dag.
B.You should consider creating a public folder database on -ex04.Thereafter the replication settings should be changed on every public folder.
C.You should consider creating a public folder database on -ex04.Thereafter the replication settings should be changed on the public folder database.
D.You should consider creating a Failover Cluster.Thereafter -ex03 and -ex04 should be added to the failover cluster.
A.Your best option would be to right-click the database copy from the Exchange Management Console (EMC).Thereafter you should select Remove.
B.your best option would be to run clean-mailboxdatabase -identity -ex03 from the exchange management shell.
C.Your best option would be to right-click TKDAG from the Exchange Management Console (EMC).Then the Manage Database Availability Group Membership should be selected thereafter -ex01 should be removed from the list and manage clicked.
D.your best option would be to run remove-mailboxdatabase -identity -ex03\-ex01 from the exchange management shell.
A.you should consider running the set-mailboxdatabasecopy -identity -db01\-ex05 - truncationlagtime 4.0:0:0 command.
B.you should consider running the set-mailboxdatabasecopy -identity -db01\-ex06 -replaylagtime 4.0:0:0 command.
C.you should consider running the set-mailboxdatabasecopy -identity -db01\-ex06 - truncationlagtime 4.0:0:0 command.
D.you should consider running the set-mailboxdatabasecopy -identity -db01\-ex05 -replaylagtime 4.0:0:0 command.
最新试题
You have an Exchange Server 2010 organization. The network contains the computers shown in the following table.You need to identify the computers that can run the Exchange Server 2010 management tools. Which two computers should you identify?()
You have an Exchange organization.All servers in the organization have Exchange Server 2010 Service Pack 1 (SP1) installed.All servers run Windows Server 2008 R2.The organization contains Mailbox servers, Client Access servers, and Hub Transport servers only.You need to identify which user accounts are associated with the largest mailboxes in the organization. What should you do?()
You have an Exchange Server 2010 Service Pack 1 (SP1) server that hosts a public folder database named PUBLIC.You need to move the transaction log files of PUBLIC. Which cmdlet should you run?()
You have a hosted Exchange organization.All servers in the organization have Exchange Server 2010 Service Pack 1 (SP1) installed.You need to prevent a user named User1 from using Outlook Web App (OWA) to access his mailbox. What should you do?()
You have an Exchange Server 2010 organization.You have a user named User1 and a user named User2. You need to ensure that User1 can add User2 to the From field when he sends e-mail messages. Messages that have User2 in the From field must display only User2 as the message sender to recipients Who receive the messages. What should you use?()
You have an Exchange organization.All servers in the organization have Exchange Server 2010 Service Pack 1 (SP1) installed. You need to ensure that an administrator can recover hard-deleted e-mail messages from a user’s mailbox until the deleted item retention period has elapsed.All expired e-mail messages must be deleted when the retention period has elapsed. What should you do?()
You have an Exchange organization.All servers in the organization have Exchange Server 2010 Service Pack l (SP1) installed.An external user reports that when he sends e-mail messages to the organization, they are not received.You suspect that the e-mail messages he sends are incorrectly identified as spam.You need to identify which anti-spam filter is blocking the e-mail messages. What should you do?()
You have an Exchange Server 2010 organization that contains five Mailbox servers.Your Active Directory domain contains five domain controllers in a single site. You create a new mailbox database.You notice that the database fails to mount. You need to ensure that the database mounts as soon as possible. What should you do?()
You have an Exchange organization.All servers in the organization have Exchange Server 2010 Service Pack 1 (SP1) installed. You need to ensure that you can restore a mailbox deleted from a mailbox database if the mailbox was deleted up to six months earlier.Th solution must not require a database backup. What should you do?()
Your network contains one Exchange Server 2010 Service Pack 1 (SP1) Client Access server named Server1. You have a user named User1. You need to limit the size of the attachments that User1 can download by using Windows Mobile 6.5 devices. What should you do first?()