单选题Some users report they cannot receive messages from some external senders.You suspect that there is some anti-spam activity blocking those messages.You need to identify what is blocking the messages.You will activate and review the logs of one of the following:()AProtocol loggingBConnectivity logsCMessage trackingDPipeline tracing

单选题
Some users report they cannot receive messages from some external senders.You suspect that there is some anti-spam activity blocking those messages.You need to identify what is blocking the messages.You will activate and review the logs of one of the following:()
A

Protocol logging

B

Connectivity logs

C

Message tracking

D

Pipeline tracing


参考解析

解析: 暂无解析

相关考题:

2.I prefer _______ a small gift that has some thought behind it rather than some money.A. to receive; to gettingB. receiving; gettingC. to receive ; getD. receiving; get

Museums receive some of their financial support in the _____ of admissions fees.A: wayB: styleC: formD: shape

is a mechanism used for protecting the users outside of network from accessing some non-authorized computer resources.A.Network CardB.protocolC.FirewallD.Router

EIGRP is being used as the routing protocol on the PassGuide network. Whiletroubleshooting some network connectivity issues,you notice a large number of EIGRP SIA(StuckinActive)messages. What causes these SIA routes()A、The neighboring router stops receiving ACK packets from this router.B、The neighboring router starts receiving route updates from this router.C、The neighboring router is too busy to answer the query(generally caused by high CPU utilization).D、The neighboring router is having memory problems and cannot allocate the memory to process the query or build the reply packet.

You have an Exchange Server 2010 organization named contoso.com that contains a mail-enabled group named Group1. Users from outside the organization report that e-mail messages sent to group1@contoso.com generate a non-delivery report (NDR).You need to ensure that users outside the organization can successfully send e-mail to group1 @ contoso.com. What should you modify?()A、the authentication settings for the Client Receive connectorB、the message delivery restrictions for Group1C、the moderation settings for Group1D、the remote IP address range for the Client Receive connector

You have an Exchange Server 2010 organization.You acquire a new Internet domain name.Users report that they cannot receive e-mail sent to the new domain name.You verify that all users have the new domain name configured as an e-mail address suffix.You need to ensure that users can receive e-mail sent from the Internet to the new domain name. What should you create?()A、an Authoritative Accepted DomainB、an External Relay Accepted DomainC、a new Receive connectorD、a remote domain

You have an Exchange Server 2010 server that contains a single mailbox database.All users run Microsoft Office Outlook and Outlook Web App.You discover that users cannot restore e-mail messages from the Recover Deleted Items folder.You need to ensure that users can restore e-mail messages from the Recover Deleted Items folder.What should you do?()A、From the Exchange Management Console (EMC), modify the properties of the mailbox databaseB、From the Exchange Management Console (EMC), modify the properties of the Mailbox server objectC、From the Exchange Management Shell, create a management role and then assign the role to all usersD、From the Exchange Management Shell, create a retention policy and then assign the policy to all users

You have an Exchange Server 2010 organization named contoso.com.All users configure internal and external Out Of Office messages.You need to ensure that internal Out Of Office messages are sent to senders from the fabrikam.com domain. What should you create and configure?()A、a new accepted domainB、a new Receive connectorC、a new remote domainD、a new Send connector

TestKing.com uses SQL Server 2005. Users report that report execution is slow. You investigate and discover that some queries do not use optimal execution plans. You also notice that some optimizer statistics are missing and others are out of date.  You need to correct the problem so that reports execute more quickly. Which two Transact-SQL statements should you use?()A、DBCC CHECKTABLEB、ALTER INDEX REORGANIZEC、UPDATE STATISTICSD、CREATE STATISTICSE、DBCC SHOW STATISTICSF、DBCC UPDATEUSAGE

You have a print server that runs Windows Server 2003 Service Pack 2 (SP2). Users report that print jobs are not printing. Users also report that they do not receive any error messages. Younotice a large number of jobs in the print queue. You attempt to delete some jobs from the queue and notice that the jobs remain in the queue. You need to ensure that users can print successfully. What should you do? ()A、Restart the Print Spooler service.B、Pause the printer, and then restart the printer.C、Take ownership of the printer, and then delete the print jobs.D、Assign the Manage Documents permission to the users connected to the printer.

Your network contains an Active Directory Rights Management Services (AD RMS) cluster.   You have several custom policy templates. The custom policy templates are updated frequently.   Some users report that it takes as many as 30 days to receive the updated policy templates.   You need to ensure that users receive the updated custom policy templates within seven days.   What should you do()A、Modify the registry on the AD RMS servers.B、Modify the registry on the users   computers.C、Change the schedule of the AD RMS Rights Policy Template Management (Manual) scheduled task.D、Change the schedule of the AD RMS Rights Policy Template Management (Automated) scheduled  task.

Your network contains a public computer that runs Windows 7. Multiple users log on to the computer byusing a local user account named User1. Users report that they can log on to some secure Web sites byusing credentials that were saved by other users. You need to prevent forms-based credentials from beingsaved on the computer.  What should you do?()A、Remove all generic credentials from Windows Vault.B、Remove all Windows credentials from Windows Vault.C、Modify the Windows Internet Explorer certificates settings.D、Modify the Windows Internet Explorer AutoComplete settings.

You have an Exchange Server 2010 organization named Contoso.com that contains a mail-enabled Domain Local group named Group1.Users from outside the organization report that all e-mail messages sent to group1@contoso.com generate a non-delivery-report (NDR).You need to ensure that users from outside the organization send e-mail to group1@contoso.com. What should you modify for group1?()A、Advanced settingsB、Group scopeC、Group typeD、The mail flow settings

You install a new Exchange Server 2010 organization that contains a single server named erver1.Users report that they receive a large number of unsolicited commercial email (UCE) messages.You need to reduce the amount of UCE messages that users in the organization receive.What should you do?()A、Create a journal rule and then create an Outlook Protection RuleB、Create a Transport Protection Rule and then create a journal ruleC、Run the AntispamCommon.ps1 script and then create a Transport Protection RuleD、Run the Install-AntispamAgents.ps1 script and then configure all transport agents

You have an Exchange Server 2010 organization named Contoso, Ltd.The organization contains an Edge Transport server.Users from a company named Fabrikam, Inc.send messages over the Internet by using the @fabrikam.com e-mail address suffix.You need to ensure that messages sent from Fabrikam users to Contoso users have the @contoso.com e-mail address suffix in the source address. What should you create?()A、a Receive connectorB、an accepted domainC、an address rewrite entryD、an e-mail address policy

You install an Exchange Server 2010 Hub Transport server named Hub1.You need to ensure that Hub1 can receive e-mail messages sent from Internet hosts.What should you do?()A、Enable the Anonymous users permission group for the Client Hub1 Receive connector.B、Enable the Anonymous users permission group for the Default Hub1 Receive connector.C、Create a Receive connector and set the intended use to Client.Modify the port for the connector.D、Create a Receive connector and set the intended use to Custom.Modify the remote IP addresses range for the connector.

Your company uses SQL Server 2005. Users report that report execution is slow. You investigate and discover that some queries do not use optimal execution plans. You also notice that some optimizer statistics are missing and others are out of date. You need to correct the problem so that reports execute more quickly. Which two Transact-SQL statements should you use?()A、 DBCC CHECKTABLE B、 ALTER INDEX REORGANIZE C、 UPDATE STATISTICS D、 CREATE STATISTICS E、 DBCC SHOW_STATISTICS F、 DBCC UPDATEUSAGE

You have an Exchange organization named Contoso, Ltd.All servers in the organization have Exchange Server 2010 Service Pack 1 (SP1) installed.The organization contains an Edge Transport server.  Users from a company named Fabrikam, Inc.send e-mail messages over the Internet by using the fabnkam.come-mail address suffix. Contoso acquires Fabrikam. You need to ensure that messages sent from Fabrikam users to Contoso users have the contoso.com e-mail address suffix in their source address.  What should you create?()A、an accepted domainB、an address rewrite entryC、an e-mail address policyD、a Receive connector

单选题You have an Exchange Server 2010 organization named Contoso, Ltd.The organization contains an Edge Transport server.Users from a company named Fabrikam, Inc.send messages over the Internet by using the @fabrikam.com e-mail address suffix.You need to ensure that messages sent from Fabrikam users to Contoso users have the @contoso.com e-mail address suffix in the source address. What should you create?()Aa Receive connectorBan accepted domainCan address rewrite entryDan e-mail address policy

单选题You have an Exchange Server 2010 organization named Contoso.com that contains a mail-enabled Domain Local group named Group1.Users from outside the organization report that all e-mail messages sent to group1@contoso.com generate a non-delivery-report (NDR).You need to ensure that users from outside the organization send e-mail to group1@contoso.com. What should you modify for group1?()AAdvanced settingsBGroup scopeCGroup typeDThe mail flow settings

多选题TestKing.com uses SQL Server 2005. Users report that report execution is slow. You investigate and discover that some queries do not use optimal execution plans. You also notice that some optimizer statistics are missing and others are out of date.  You need to correct the problem so that reports execute more quickly. Which two Transact-SQL statements should you use?()ADBCC CHECKTABLEBALTER INDEX REORGANIZECUPDATE STATISTICSDCREATE STATISTICSEDBCC SHOW STATISTICSFDBCC UPDATEUSAGE

单选题You need to include a disclaimer to all sent messages in your organization. Some of the users require message encryption.How do you make sure that disclaimer can be included in encrypted messages?()AInstruct the users to use IRM encryption method onlyBInstruct the users to use S/MIME encryption method onlyCUsing command New-ExchangeCertificate cmdletDUsing the Set-ExchangeServer cmdlet

单选题Ten users at your office run an accounting application on their Windows NT Workstation 4.0 computers. The application stores its data in a shared network folder named Accdata on a Windows 2000 Server computer named Server1. You upgrade all 10 computers to Windows 2000 Professional and verify that all applications are compatible with Windows 2000. After the upgrade, some users report that they are receiving intermittent data-corruption error messages. They are also receiving data file-version mismatch error messages. When these errors occur, your only method of recovery is to restore the entire contents of the Accdata folder from a known good backup copy.  You need to prevent these errors from occurring in the future. What should you do? ()AConfigure Accdata folder to allow a maximum of one user.BConfigure the Accdata folder to disable client caching.CCreate a group policy that removes the Bypass Traverse Checking user right on server1.DCreate a group policy that increases the amount of idle time required before a session   disconnects on server1.

单选题You are using Windows 2000 Professional on your desktop computer. You are working on the company’s financial report and you want other users on the network to able to modify your documents for the report. You want users to share the financial report folder on the network. Because the network contains confidential information you want to prevent users from the enabling off line access for the network share that contains the financial report. What should you do?()AUse Windows Explorer to receive the offline filesBUsing the Windows Explorer, disable the cache for the reports on the network shareCUse the Windows NT explorer to grant the special access for the reports on the network  shareDUse the synchronization manager to configure synchronization not to occur when users are  connected to the LAN connection.

单选题You have an Exchange Server 2010 organization.You acquire a new Internet domain name.Users report that they cannot receive e-mail sent to the new domain name.You verify that all users have the new domain name configured as an e-mail address suffix.You need to ensure that users can receive e-mail sent from the Internet to the new domain name. What should you create?()Aan Authoritative Accepted DomainBan External Relay Accepted DomainCa new Receive connectorDa remote domain

单选题You have an Exchange Server 2010 organization named contoso.com that contains a mail-enabled group named Group1. Users from outside the organization report that e-mail messages sent to group1@contoso.com generate a non-delivery report (NDR).You need to ensure that users outside the organization can successfully send e-mail to group1 @ contoso.com. What should you modify?()Athe authentication settings for the Client Receive connectorBthe message delivery restrictions for Group1Cthe moderation settings for Group1Dthe remote IP address range for the Client Receive connector

单选题Why do some frogs change the pitch of its calls?ATo be different from others.BTo attract a female frog.CTo tend out messages.DTo go against traffic noises.