单选题You need to design an administrative model that meets the business and technical requirements. What should you do?()AAssign permissions to manage Mailbox and Exchange Server configuration to the server-admins groupBAssign permissions to manage Mailbox and Exchange Server configuration to the domain-admins groupCAssign permissions to manage Mailboxes to the server-admins group. Assign permissions to manage Exchange Servers configuration to the domain-admins groupDAssign permissions to manage Mailboxes to the domain-admins group. Assign permissions to manage Exchange Servers configuration to the server-admins group
单选题
You need to design an administrative model that meets the business and technical requirements. What should you do?()
A
Assign permissions to manage Mailbox and Exchange Server configuration to the server-admins group
B
Assign permissions to manage Mailbox and Exchange Server configuration to the domain-admins group
C
Assign permissions to manage Mailboxes to the server-admins group. Assign permissions to manage Exchange Servers configuration to the domain-admins group
D
Assign permissions to manage Mailboxes to the domain-admins group. Assign permissions to manage Exchange Servers configuration to the server-admins group
参考解析
解析:
暂无解析
相关考题:
The purpose of the systems analysis phase is to build a logical model of the new system.The first step is(71),where you investigate business processes and document what the new system must do to satisfy users. This step continues the investigation that began during the(72). You use the fact-finding results to build business models,data and process models,and object models. The deliverable for the systems analysis phase is the(73),which describes management and user requirements,costs and benefits,and outlines alternative development strategies.The purpose of the systems design phase is to create a physical model that will satisfy all documented requirements for the system. During the systems design phase,you need to determine the(74),which programmers will use to transform the logical design into program modules and code. The deliverable for this phase is the(75),which is presented to management and users for review and approval.A.system charterB.system scope definitionC.system blueprintD.system requirements document
The purpose of the systems analysis phase is to build a logical model of the new system.The first step is(71),where you investigate business processes and document what the new system must do to satisfy users. This step continues the investigation that began during the(72). You use the fact-finding results to build business models,data and process models,and object models. The deliverable for the systems analysis phase is the(73),which describes management and user requirements,costs and benefits,and outlines alternative development strategies.The purpose of the systems design phase is to create a physical model that will satisfy all documented requirements for the system. During the systems design phase,you need to determine the(74),which programmers will use to transform the logical design into program modules and code. The deliverable for this phase is the(75),which is presented to management and users for review and approval.A.systems planning phaseB.systems modeling phaseC.systems analysis phaseD.systems design phase
As part of your design, you are evaluating whether a second-level organizational unit (OU) structure is required. Which factor necessitates the need for a second-level OU structure?()A、 Audit policy settingsB、 Software deployment needsC、 Client operating systems in useD、 Delegation of administrative authority
You work as the enterprise exchange administrator at TestKing.com. TestKing.com makes use of Microsoft Exchange Server messaging solution. The TestKing.com network consists of a single ActiveDirectory domain named testking.com. TestKing.com is configured to run an exchange 2010 environment. You are planning to design the installation of numerous Mailbox servers. TestKing.com Service LevelAgreement (SLA) requires the following: * The servers need to support 1,500 concurrent connections to mailboxes.* The servers need to maintain a latency of less than 20 milliseconds. You ensure deployment success you need to ensure that your design comply with the Service LevelAgreement (SLA) of TestKing.com. What should you do?()A、The best option is to use the Exchange Server User Monitor (ExMon) tool to check if your design meets the requirements.B、The best option is to use the Exchange Server Load Generator (LoadGen) 2010 tool to check if your design meets the requirements.C、The best option is to use the Exchange Server Connectivity Analyzer (ExRCA) tool to check if your design meets the requirements.D、The best option is to use the Exchange Server Jetstress 2010 tool to check if you design meets there quirements.
You need to design an administrative model for the Exchange Server environment. What should you do?()A、Create a single organizational unit (OU). Place the user accounts for each office in the OU. Delegate control over the OU to the office’s server administrators and the central IT staffB、Create a single Exchange administrative group. Place all Exchange servers into that administrative group. Assign permissions for the administrative group to the officer’s server administrators and the central IT staffC、Create an Exchange administrative group for each office. Place the Exchange severs for each office into that office’s administrative group. Assign permissions for the administrative group to the office’s server administrators. Allow the central IT staff to manage user mailboxesD、Create an organizational unit (OU) for each office. Place the user accounts for each office into the appropriate OU. Delegate control over each OU to the office’s server administrators. Allow the central IT staff to manager user mailboxes
You need to design a PKI that meets business requirements. What should you do?()A、Move ATLCA1 offline and create an enterprise subordinate CA to issue certificatesB、Create a stand-alone subordinate CA to issue certificatesC、Use a qualified subordinate CAD、Configure certificate template access control lists (ACLs) on ATLCA1
You have an Exchange Server 2010 organization. You design a deployment of multiple Mailbox servers. Your companys Service Level Agreement (SLA) states that servers must support 1,000 concurrent connections to mailboxes while maintaining an RPC latency of less than 20 milliseconds. You need to verify that your design meets the requirements of the SLA before you deploy servers in the production environment. Which tool should you use?()A、Exchange Server Jetstress 2010B、Exchange Server User Monitor (ExMon)C、Exchange Server Load Generator (LoadGen) 2010D、Exchange Server Remote Connectivity Analyzer (ExRCA)
You have an Exchange Server 2010 organization that contains two Hub Transport servers. You need to design a recovery plan for the Hub Transport servers that meets the following requirements:.Restores all Windows settings .Restores all Exchange configurations.Minimizes administrative effort What should you include in the plan?()A、.Retention of Exchange server computer accounts in Active Directory .Backup and recovery of Windows system stateA recovery installation of Exchange Server 2010B、.Retention of Exchange server computer accounts in Active Directory .Backup and recovery of transport queues.A custom installation of Exchange Server 2010C、Recovery of Windows system state.Backup and recovery of transport queues.A typicalinstallation of Exchange Server 2010D、Backup and recovery of Windows system state.A repair installation of Windows Server 2008.A typical installation of Exchange Server 2010
You need to design an administrative model that meets the business and technical requirements. What should you do?()A、Assign permissions to manage Mailbox and Exchange Server configuration to the server-admins groupB、Assign permissions to manage Mailbox and Exchange Server configuration to the domain-admins groupC、Assign permissions to manage Mailboxes to the server-admins group. Assign permissions to manage Exchange Servers configuration to the domain-admins groupD、Assign permissions to manage Mailboxes to the domain-admins group. Assign permissions to manage Exchange Servers configuration to the server-admins group
You need to design a domain model that meets the company business and security requirements for controlling access to the new Web-based ordering application. What should you do?()A、Create a child OU within the existing domainB、Create a child domain of the existing domainC、Create a new domain in a new forest. Configure the new domain to trust the existing domainD、Create a new tree in the existing forest. Configure the new domain to trust the existing domain
You need to recommend a solution for managing App1. The solution must require the minimum amount of administrative effort.What should you include in the recommendation?()A、Group Policy Administrative TemplatesB、Group Policy PreferencesC、Group Policy Software SettingsD、Windows Remote Management (WinRM)
Your company has a single Active Directory Domain Services (AD DS) domain with Windows Server 2008 R2 member servers and 1,000 Windows 7 client computers. You are designing the deployment of a custom application. You have the following requirements: The application must be available to only users who need it. Minimize network traffic during deployment. You need to design a deployment strategy that meets the requirements. Which deployment method should you use?()A、RemoteApp and Desktop ConnectionsB、software installation in Group PolicyC、Microsoft Application Virtualization (App-V)D、Microsoft System Center Configuration Manager 2007
You need to design an administrative model for Exchange Server 2003. What should you?()A、Create an administrative group for each office. Place each Exchange server that is managed by an office technician into that Office’s administrative group. Assign the central IT group full control over all administrative groups. Assign each office technician control over his or her office’s administrative groupsB、Create one administrative group. Place all Exchange servers in the administrative group. Assign the central IT group full control over the administrative group. Make each office technician a member fo the local Backup Operators group on each group they manageC、Create an administrative group for each office. Place one Exchange server in each group. Assign the central IT group and each office technician full control over each administrative groupD、Create one administrative group for all Exchange front-end servers. Assign each office technician control over this administrative group. Create another administrative group for all Exchange back-end servers. Assign the central IT group control over this administrative group
As part of your design, you are evaluating whether a second-level organizational unit (OU) structure is required. Which factor necessitates the need for a second-level OU structure?()A、Audit policy settingsB、Software deployment needs C、Client operating systems in useD、Delegation of administrative authority
You need to recommend an administrative solution for the help desk technicians that meets the museum’s technical requirements What should you recommend?()A、Add the help desk technicians to the Domain Admins group.B、Add the help desk technicians to the Accounts Operators group.C、Assign permissions for the Groups OU and the Branch1 OU to the help desk technicians.D、Assign permissions for the domain object and the Users container to the help desk technicians.
You need to design a password policy that meets business requirements. What should you do? Select all that apply.()A、Increase the number of passwords that are rememberedB、Disable reversible encryptionC、Set the minimum password age to zero daysD、Increase the maximum password age
单选题You are developing an ASP.NET MVC 2 application. A view contains a form that allows users to submit their first name. You need to display the value that is submitted, and you must ensure that your code avoids cross-site scripting. Which code segment should you use?()A%: Model.FirstName %B%= Model.FirstName % C% Response.Write(Model.FirstName) % D% Response.Write(HttpUtility.HtmlDecode(Model.FirstName)) %
单选题You need to design an administrative model that meets all business and technical requirements. What should you do?()APlace the mailboxes for each region on a separate server. Create an administrative group for each region. Assign each regional technician Exchange Full Administrator permission over that region’s administrative groups. Assign the main office IT staff Exchange Full Administrator permission over each administrative group.BPlace the mailboxes for each region on a separate server. Create an administrative group for each region. Assign each regional technician Exchange Full Administrator permission over all administrative groups. Assign the main office IT staff Exchange Full Administrator permission over each administrative groupCPlace the mailboxes from multiple regions on each server. Create an administrative group for each server. Assign each regional technician Exchange Full Administrator permission over the administrative groups that contain servers that hold mailboxes for that region. Assign the main office IT staff Exchange Full Administrator permission over each administrative groupDPlace the mailboxes from multiple regions on each server. Create a single administrative group for all servers. Assign each regional technician and the main office IT Staff Exchange Full Administrator permission over the administrative group
单选题You are planning to upgrade Internet Explorer. You have the following requirements: Create a report that identifies which computers are successfully upgraded. Do not install additional software on the client computers. You need to design a deployment method that meets the requirements. What should you do?()AUse Internet Explorer Administration Kit (IEAK) and Group Policy.BUse Microsoft System Center Configuration Manager.CUse Windows Server Update Services (WSUS).DUse Microsoft System Center Essentials.
单选题You need to design an authentication solution for Terminal Services that meets the business requirements.What should you do?()AConfigure the terminal server to use smart cardsBConfigure IPSec to permit only Remote Desktop Protocol (RDP) connections to the terminal serverCDeny the Remote Desktop Users group access to the terminal serverDRestrict treyresearch.com users from logging on locally to the terminal server
单选题You are designing a Windows 7 virtual desktop infrastructure.You have the following requirements: Provide access to Remote Desktop Services RemoteApp sources from multiple remote desktop servers. Support network load balancing. Support reconnection to existing sessions on virtual desktops. You need to specify a design that meets the requirements. What should you include in your design?()ARemote Desktop GatewayBRemote Desktop Connection BrokerCWindows Deployment ServicesDWindows Virtual PC and Windows XP Mode
单选题You design a Business Intelligence (BI) solution by using SQL Server 2008. The solution contains a SQL Server 2008 Analysis Services (SSAS) database. A measure group in the database contains log entries of manufacturing events. These events include accidents, machine failures, production capacity metrics, and other activities. You need to implement a data mining model that meets the following requirements: Predict the frequency of different event types. Identify short-term and long-term patterns. Which algorithm should the data mining model use?()A the Microsoft Time Series algorithmB the Microsoft Decision Trees algorithmC the Microsoft Linear Regression algorithmD the Microsoft Logistic Regression algorithm
单选题You need to recommend a NAP enforcement method that meets the companyˉs security requirements. Which method should you recommend?()A802.1XBDHCPCIPSecDVPN
单选题As part of your design, you are evaluating whether a second-level organizational unit (OU) structure is required. Which factor necessitates the need for a second-level OU structure?()A Audit policy settingsB Software deployment needsC Client operating systems in useD Delegation of administrative authority
单选题You are creating a Windows Forms Application by using the .NET Framework 3.5.You plan to design a control for the application.You need to ensure that the control meets the following requirements: (1)Contains the DataGridView, BindingSource, and BindingNavigator controls. (2)Exposes the properties of the BindingSource control. (3)Protects the properties of the DataGridView and BindingNavigator controls. What sholud you do?()AExtend the Control class.BExtend the ContainerControl class.CCreate protected accesses for each control property.DCreate public accesses for the properties of the BindingSource control.