A.Configure the Mailbox Features settings.
B.Configure the Resource Policy settings.
C.Enable the Resource Booking Attendant.
D.Configure the Resource In-Policy Requests settings.
E.Configure the Mail Flow settings.
F.Configure the Account settings.
您可能感兴趣的试卷
你可能感兴趣的试题
A.Configure the Mailbox Features settings.
B.Configure the Mail Flow settings.
C.Enable the Resource Booking Attendant.
D.Configure the Resource Information settings.
E.Configure the Resource In-Policy Requests settings.
F.Configure the Resource Policy settings.
A.Remove the default mailbox database from Server1.
B.Modify the GUID for Server1.
C.Remove the object for Server1 from DAG1.
D.Disable log truncation for the mailbox databases in DAG1.
A.a distribution group
B.a mailbox
C.a mail-enabled contact
D.a sharing policy
A.Move-Mailbox
B.Export-Mailbox
C.Set-MoveRequest
D.New-MoveRequest
A.Active Directory Users and Computers
B.Exchange Control Panel (ECP)
C.Exchange Management Console (EMC)
D.Microsoft Office Outlook
A.Set-MailboxDatabase
B.Set-MailboxServer
C.Set-OrganizationConfig
D.Set-RetentionPolicy
A.Create a new management role entry for the role group.
B.Create a management role assignment policy and associate the policy to the role group.
C.Create a management scope and associate the scope to the role group.Set a recipient filter for the management scope.
D.Remove the branch office administrators from the Domain Admins group.Add the branch office recipients to the role group.
A.Configure all domain controllers as Global Catalog servers.
B.Install the Exchange Server 2010 Administration Tools on a domain controller.
C.Force the replication of the Active Directory Domain partition between all domain controllers.
D.Force the replication of the Active Directory Configuration partition between all domain controllers.
You have an Exchange Server 2010 organization. The network contains the computers shown in the following table.
You need to identify the computers that can run the Exchange Server 2010 management tools.
Which two computers should you identify?()
A.Computer1
B.Computer2
C.Computer3
D.Computer4
E.Computer5
A.IIS 6 Management Console Microsoft .NET Framework 3.5.1
B.IIS 6 Metabase Remote Server Administration Tools
C.Internet Explorer 8 Windows Process Activation Service
D.Management Service Microsoft Message Queue (MSMQ) Server
最新试题
Your company has a main office and a branch office. All branch office administrators are members of a custom management role group.The role group is configured to allow members to manage recipients.The branch office administrators are also members of The Domain Admins security group. The organization contains one Exchange Server 2010 server. You discover that the branch office administrators can manage recipients in both offices. You need to ensure that the branch office administrators can manage recipients in their assigned branch office only.What should you do?()
You have an Exchange organization.All servers in the organization have Exchange Server 2010 Service Pack 1 (SP1) installed. The organization contains two Mailbox servers named Server1 and Server2.Each Mailbox server has one mailbox database and one public folder database. You discover that all users create public folders on Server1 only. You need to ensure that all users create public folders on Server2 only. What should you do?()
You work as the exchange administrator at company.com.the company.com network contains an exchange server 2010 organization.you are responsible for managing the exchange network for company.com.the company.com network contains two mailbox servers named -ex01 and -ex02 as well as a mailbox database named -ex03.-ex01 and -ex02 are members of a database availability group named tkdag and contain a copy of -ex03.during the course of the week you receive an instruction from the cio to remove the -ex03 mailbox database from -ex01.what should you do?()
You have a hosted Exchange organization that contains 10,000 mailboxes.All servers in the organization have Exchange Server 2010 Service Pack 1 (SP1) installed. You need to retrieve the following information for the organization: (1)The IP addresses of all client connections (2)The network latency for all MAPI connections (3)The version of Microsoft Outlook that is used to access all of the mailboxes What should you use?()
You have an Exchange Server 2010 organization that contains 20 mailbox databases. You configure each database to retain all deleted items for 30 days.You need to ensure that all items that pass the retention period are permanently deleted daily between 02:00 and 06:00. Which cmdlet should you use?()
You have an Exchange Server 2010 organization.You have a user named User1 and a user named User2. You need to ensure that User1 can add User2 to the From field when he sends e-mail messages. Messages that have User2 in the From field must display only User2 as the message sender to recipients Who receive the messages. What should you use?()
You have an Exchange Server 2010 organization. The network contains the computers shown in the following table.You need to identify the computers that can run the Exchange Server 2010 management tools. Which two computers should you identify?()
You have an Exchange organization.All servers in the organization have Exchange Server 2010 Service Pack 1 (SP1) installed. All users have Windows Mobile 6.5 devices that connect to the organization by using Exchange ActiveSync. A user named User1 reports that she lost her device and successfully performed a remote wipe of the device. User1 later reports that she located her device. User1 configures the device to connect to Exchange ActiveSync and discovers that the connection fails. You need to ensure that User1 can connect her device by using Exchange ActiveSync. What should you do?()
You have an Exchange Server 2010 Service Pack 1 (SP1) server that hosts a public folder database named PUBLIC.You need to move the transaction log files of PUBLIC. Which cmdlet should you run?()
Your network contains one Exchange Server 2010 Service Pack 1 (SP1) Client Access server named Server1. You have a user named User1. You need to limit the size of the attachments that User1 can download by using Windows Mobile 6.5 devices. What should you do first?()