单选题Some users report they cannot receive messages from some external senders.You suspect that there is some anti-spam activity blocking those messages.You need to identify what is blocking the messages.You will activate and review the logs of one of the following:()AProtocol loggingBConnectivity logsCMessage trackingDPipeline tracing

单选题
Some users report they cannot receive messages from some external senders.You suspect that there is some anti-spam activity blocking those messages.You need to identify what is blocking the messages.You will activate and review the logs of one of the following:()
A

Protocol logging

B

Connectivity logs

C

Message tracking

D

Pipeline tracing


参考解析

解析: 暂无解析

相关考题:

You have an Exchange Server 2010 organization.You acquire a new Internet domain name.Users report that they cannot receive e-mail sent to the new domain name.You verify that all users have the new domain name configured as an e-mail address suffix.You need to ensure that users can receive e-mail sent from the Internet to the new domain name. What should you create?()A、an Authoritative Accepted DomainB、an External Relay Accepted DomainC、a new Receive connectorD、a remote domain

You have a print server that runs Windows Server 2003 Service Pack 2 (SP2). Users report that print jobs are not printing. Users also report that they do not receive any error messages. You notice a large number of jobs in the print queue. You attempt to delete some jobs from the queue and notice that the jobs remain in the queue. You need to ensure that users can print successfully. What should you do? ()A、Restart the Print Spooler service.B、Pause the printer, and then restart the printer.C、Take ownership of the printer, and then delete the print jobs.D、Assign the Manage Documents permission to the users connected to the printer.

You have an Exchange organization.All servers in the organization have Exchange Server 2010 Service Pack l (SP1) installed.An external user reports that when he sends e-mail messages to the organization, they are not received.You suspect that the e-mail messages he sends are incorrectly identified as spam.You need to identify which anti-spam filter is blocking the e-mail messages. What should you do?()A、Modify the protocol logging level, and then review the protocol logs.B、Modify the connectivity log settings, and then review the connectivity logs.C、Modify the message tracking settings, and then review the message tracking logs.D、Enable pipeline tracing, and then review the trace.

In one of your online transaction processing (OLTP) applications, most users frequently modify the values, including the key values, of the application tables. Some users generate application reports by using multiple application tables.  What is the best table structure that you can use to gain optimal performance?()A、heap tableB、object tableC、external tableD、clustered tableE、global temporary tableF、index­organized table (IOT)

You receive complaints from users regarding the high waiting time for their transactions. Oninvestigation, you find that some users are not committing their transactions though they are  notperforming any activity for a long time. As a result, SQL statements need to wait for row-level locks.  Which two actions could you take to prevent this locking problem in the future()A、Decrease the IDLE_TIME resource limit in the profile assigned to the blocking users.B、Use Database Resource Manager to automatically log out sessions that block others and are idle.C、Set the limit in the profile of blocking users to control the number of blocks to be accessed in a session.D、Decrease the maximum number of interested transaction list (ITL) slots for the segments on which the blocking user performs the transaction

One of the users in the PROD database, Adams, complains that his update on the table, TRANS, is taking an unusually long time to complete. You find that the table gets locked by another database user before Adams starts his transactions, and you are unable to contact the user holding the table lock. As Adams is updating some crucial rows in the table, he should get the highest priority. Which method would you use to overcome this problem?()A、execute the command, ALTER SESSION KILL .., to kill the blocking sessionB、execute the DBMS_SESSION.KILL_SESSION procedure to kill the blocking sessionC、execute the command, ALTER SYSTEM KILL SESSION .., to kill the blocking sessionD、execute the command, ALTER SESSION UNLOCK .., to release the lock for the blocking sessionE、execute the command, ALTER SYSTEM UNLOCK SESSION .., to release the lock for the blocking session

You have an Exchange Server 2010 organization named contoso.com.All users configure internal and external Out Of Office messages.You need to ensure that internal Out Of Office messages are sent to senders from the fabrikam.com domain. What should you create and configure?()A、a new accepted domainB、a new Receive connectorC、a new remote domainD、a new Send connector

You have a print server that runs Windows Server 2003 Service Pack 2 (SP2). Users report that print jobs are not printing. Users also report that they do not receive any error messages. Younotice a large number of jobs in the print queue. You attempt to delete some jobs from the queue and notice that the jobs remain in the queue. You need to ensure that users can print successfully. What should you do? ()A、Restart the Print Spooler service.B、Pause the printer, and then restart the printer.C、Take ownership of the printer, and then delete the print jobs.D、Assign the Manage Documents permission to the users connected to the printer.

You have an Exchange Server 2010 organization.  An Edge Transport server sends and receives all e- mail messages from the Internet.  You notice that some servers on the Internet identify e-mail messages from your organization as spam. You need to minimize the possibility that e-mail messages sent from your organization are identified asspam.  What should you do?()A、Implement Microsoft Forefront Security for Exchange Server.B、Create SenderID TXT records for the Edge Transport servers.C、Configure the Edge Transport servers to use a real-time block list (RBL).D、Install a server certificate from a trusted third-party certification authority (CA).

You install a new Exchange Server 2010 organization that contains a single server named erver1.Users report that they receive a large number of unsolicited commercial email (UCE) messages.You need to reduce the amount of UCE messages that users in the organization receive.What should you do?()A、Create a journal rule and then create an Outlook Protection RuleB、Create a Transport Protection Rule and then create a journal ruleC、Run the AntispamCommon.ps1 script and then create a Transport Protection RuleD、Run the Install-AntispamAgents.ps1 script and then configure all transport agents

You have a computer that runs Windows 7. You need to identify which applications were installed during thelast week.  What should you do?()A、From Reliability Monitor, review the informational events.B、From System Information, review the Software Environment.C、From Performance Monitor, review the System Diagnostics Report.D、From Performance Monitor, run the System Performance Data Collector Set.

Some users report they cannot receive messages from some external senders.You suspect that there is some anti-spam activity blocking those messages.You need to identify what is blocking the messages.You will activate and review the logs of one of the following:()A、Protocol loggingB、Connectivity logsC、Message trackingD、Pipeline tracing

You are the network administrator for The network consists of a single Active Directory domain named All servers run Windows Server 2003. One domain controller on the network is configured as a certification authority (CA). The network contains a Web server that runs IIS 6.0 and hosts a secure intranet site. The server also hosts other sites that do not require HTTPS. You configure a server certificate on the IIS server by using a certificate from your internal CA. All users are required to connect to the intranet site by using HTTPS. Some users report that they cannot connect to the secure intranet site by using HTTPS. You confirm that all users can connect to the nonsecure sites hosted on the Web server by using HTTP. You want to view the failed HTTPS requests. What should you do?()A、Review the log files created by IIS on the Web server.B、Review the security log in Event Viewer on the Web server.C、Review the security log in Event Viewer on the ca.D、Review the contents of the Failed Requests folder on the ca.

单选题A customer has a WebTrade application that initially uses the embedded LDAP to authenticate users. To enhance security, the customer decides to use OAM to authenticate some of the users against an external LDAP store. For this to work, a customer configured an OAMAuthenticator, but was not sure what to select for the Control Flag. What Control Flag should the customer choose?()AOPTIONALBREQUISITECREQUIREDDSUFFICIENTEMANDATORY

单选题In context, what is the best version of the underlined portion of sentence 10 (reproduced below)?For instance, in some schools they paid kids to read books one summer.Ain some schools where theyBsome schools are where theyCsome schools implemented programs thatDprograms in some schools were where theyEin some school programs they

单选题Some users report they cannot receive messages from some external senders.You suspect that there is some anti-spam activity blocking those messages.You need to identify what is blocking the messages.You will activate and review the logs of one of the following:()AProtocol loggingBConnectivity logsCMessage trackingDPipeline tracing

单选题You have an Exchange Server 2010 organization.You acquire a new Internet domain name.Users report that they cannot receive e-mail sent to the new domain name.You verify that all users have the new domain name configured as an e-mail address suffix.You need to ensure that users can receive e-mail sent from the Internet to the new domain name. What should you create?()Aan Authoritative Accepted DomainBan External Relay Accepted DomainCa new Receive connectorDa remote domain

单选题You are debugging a Windows Communication Foundation (WCF) service. The service uses signed and encrypted messages.You need to configure logging so that you can read the contents of the messages. What should you do?()ASet maxSizeMessagesToLog to 10BSet logMessageAtServiceLevel to true.CSet maxMessagesToLog to 10.DSet logMessageAtTransportLevel to true.

单选题You have an Exchange Server 2010 organization named contoso.com.All users configure internal and external Out Of Office messages.You need to ensure that internal Out Of Office messages are sent to senders from the fabrikam.com domain. What should you create and configure?()Aa new accepted domainBa new Receive connectorCa new remote domainDa new Send connector

单选题One of the users in the PROD database, Adams, complains that his update on the table, TRANS, is taking an unusually long time to complete. You find that the table gets locked by another database user before Adams starts his transactions, and you are unable to contact the user holding the table lock. As Adams is updating some crucial rows in the table, he should get the highest priority. Which method would you use to overcome this problem?()Aexecute the command, ALTER SESSION KILL .., to kill the blocking sessionBexecute the DBMS_SESSION.KILL_SESSION procedure to kill the blocking sessionCexecute the command, ALTER SYSTEM KILL SESSION .., to kill the blocking sessionDexecute the command, ALTER SESSION UNLOCK .., to release the lock for the blocking sessionEexecute the command, ALTER SYSTEM UNLOCK SESSION .., to release the lock for the blocking session

单选题You have an Exchange Server 2010 organization.  An Edge Transport server sends and receives all e- mail messages from the Internet.  You notice that some servers on the Internet identify e-mail messages from your organization as spam. You need to minimize the possibility that e-mail messages sent from your organization are identified asspam.  What should you do?()AImplement Microsoft Forefront Security for Exchange Server.BCreate SenderID TXT records for the Edge Transport servers.CConfigure the Edge Transport servers to use a real-time block list (RBL).DInstall a server certificate from a trusted third-party certification authority (CA).

单选题You have a print server that runs Windows Server 2003 Service Pack 2 (SP2). Users report that print jobs are not printing. Users also report that they do not receive any error messages. Younotice a large number of jobs in the print queue. You attempt to delete some jobs from the queue and notice that the jobs remain in the queue. You need to ensure that users can print successfully. What should you do? ()ARestart the Print Spooler service.BPause the printer, and then restart the printer.CTake ownership of the printer, and then delete the print jobs.DAssign the Manage Documents permission to the users connected to the printer.

单选题You need to include a disclaimer to all sent messages in your organization. Some of the users require message encryption.How do you make sure that disclaimer can be included in encrypted messages?()AInstruct the users to use IRM encryption method onlyBInstruct the users to use S/MIME encryption method onlyCUsing command New-ExchangeCertificate cmdletDUsing the Set-ExchangeServer cmdlet

单选题You have an Exchange organization.All servers in the organization have Exchange Server 2010 Service Pack l (SP1) installed.An external user reports that when he sends e-mail messages to the organization, they are not received.You suspect that the e-mail messages he sends are incorrectly identified as spam.You need to identify which anti-spam filter is blocking the e-mail messages. What should you do?()AModify the protocol logging level, and then review the protocol logs.BModify the connectivity log settings, and then review the connectivity logs.CModify the message tracking settings, and then review the message tracking logs.DEnable pipeline tracing, and then review the trace.

单选题Your network contains an Active Directory Rights Management Services (AD RMS) cluster.   You have several custom policy templates. The custom policy templates are updated frequently.   Some users report that it takes as many as 30 days to receive the updated policy templates.   You need to ensure that users receive the updated custom policy templates within seven days.   What should you do()AModify the registry on the AD RMS servers.BModify the registry on the users   computers.CChange the schedule of the AD RMS Rights Policy Template Management (Manual) scheduled task.DChange the schedule of the AD RMS Rights Policy Template Management (Automated) scheduled  task.

单选题Your network contains a public computer that runs Windows 7. Multiple users log on to the computer byusing a local user account named User1. Users report that they can log on to some secure Web sites byusing credentials that were saved by other users. You need to prevent forms-based credentials from beingsaved on the computer.  What should you do?()ARemove all generic credentials from Windows Vault.BRemove all Windows credentials from Windows Vault.CModify the Windows Internet Explorer certificates settings.DModify the Windows Internet Explorer AutoComplete settings.

单选题You install a new Exchange Server 2010 organization that contains a single server named erver1.Users report that they receive a large number of unsolicited commercial email (UCE) messages.You need to reduce the amount of UCE messages that users in the organization receive.What should you do?()ACreate a journal rule and then create an Outlook Protection RuleBCreate a Transport Protection Rule and then create a journal ruleCRun the AntispamCommon.ps1 script and then create a Transport Protection RuleDRun the Install-AntispamAgents.ps1 script and then configure all transport agents

单选题You have a print server that runs Windows Server 2003 Service Pack 2 (SP2). Users report that print jobs are not printing. Users also report that they do not receive any error messages. You notice a large number of jobs in the print queue. You attempt to delete some jobs from the queue and notice that the jobs remain in the queue. You need to ensure that users can print successfully. What should you do? ()ARestart the Print Spooler service.BPause the printer, and then restart the printer.CTake ownership of the printer, and then delete the print jobs.DAssign the Manage Documents permission to the users connected to the printer.