单选题A user states that all their incoming mail is showing that it is behind three hours. All other users have the correct time. Which of the following should the technician check?()AThe system’s local time settingsBThe system’s O/S version and patch statusCThe system’s network configurationDThe mail server’s configuration

单选题
A user states that all their incoming mail is showing that it is behind three hours. All other users have the correct time. Which of the following should the technician check?()
A

The system’s local time settings

B

The system’s O/S version and patch status

C

The system’s network configuration

D

The mail server’s configuration


参考解析

解析: 暂无解析

相关考题:

● 下列电子邮件地址正确的是(61) 。(61)A.mail.test.com@user B .user @ mail.test.comC .http://mail.test.com D.http: \\mail.test.com

● 下列电子邮件地址正确的是 (21) 。(21)A.mail.test.com@user B.user @ mail.test.comC.http://mail.test.com D.http: \\mail.test.com

下列选项中,正确的邮件地址格式是()。 A.user@mail.comB.user.mail.comC.@user.mail.comD.mail.com@user

A user reports it takes a long time to load all applications and the hard drive LED is showing constant activity. Which of the following is MOST likely the issue?() A. The processor is faulty.B. The file system is fragmented.C. The modem drivers are corrupt.D. The power supply is faulty.

某用户的计算机主机域名是hot mail.com,用户名为User l,那么他的E-mail地址为()。A.hot mail.com@User lB.User l@hot mail.comC.User l.hot mail@comD.User l.com@hot mail

A user reports it takes a long time to load all applications and the hard drive LED is showing constant activity. Which of the following is MOST likely the issue?()A、The processor is faulty.B、The file system is fragmented.C、The modem drivers are corrupt.D、The power supply is faulty.

A user states that all their incoming mail is showing that it is behind three hours. All other users have the correct time. Which of the following should the technician check?()A、The system’s local time settingsB、The system’s O/S version and patch statusC、The system’s network configurationD、The mail server’s configuration

A user calls the system administrator and states that they can no longer access the file server they had been working on all morning. To trouble shoot this problem,  which step should the administrator take FIRST?()A、 Reboot the file server.B、 Ask the user what they were doing when they noticed the problem.C、 Ask the user to reboot their PC.D、 Ask the user to ping the default gateway and report the response times back to the administrator.

The following entry has been added to the syslog.conf file: *.emerg;mail,daemon.crit @ sysadmin  Which of the following will result from this entry?()A、 All messages at the emerg priority level and below from all facilities and messages at the crit priority level and below from the mail and daemon facilities are sent to the TTY of the user sysadmin. B、 All messages at the emerg priority level and above from all facilities, all messages at any priority level from the mail facility, and all messages at the crit priority level and above from the daemon facilities are sent to the remote host sysadmin. C、 All messages at the emerg priority level and above from all facilities and messages at the crit priority level and above from the mail and daemon facilities are sent to the remote host sysadmin. D、 All messages at the emerg priority level and above from all facilities except for the mail facility and messages at the crit priority level and above from the daemon facility are sent to the TTY of the user sysadmin.

Which of the following statements is used to revoke all DML privileges on table EMPLOYEE from user TOM?()A、REVOKE ALL PRIVILEGES FROM USER tomB、REVOKE ALL ON EMPLOYEE FROM USER tomC、REVOKE EXECUTE ON EMPLOYEE FROM USER tomD、REVOKE PRIVILEGES ON EMPLOYEE FROM USER tom

You have an Exchange Server 2010 organization that contains 1,500 mailboxes.The Average size of each mailbox is a 750 MB.All users run either Microsoft Office Outlook 2010 or Outlook Web App to access their e-mail.All users who run Outlook 2010 are configured to use Cached Exchange Mode.You need to configure a mailbox solution for the organization to meet the following requirements:  (1)Ensure that administrators can search and find any message  (2)Reduce the size of the offline store (OST) for each user  (3)Provide access to all e-mail messages by using either Outlook 2010 or Outlook Web App  What should you do?()A、Create a Personal Archive for each user and then create a retention policy.Instruct users to compact the OST file.B、Create a personal folder (PST) file for each user.Store all PST files on a network share. Instruct users to compact the OST file.C、Create a second disabled user account and a second mailbox for each user.Configure Journal rules to journal all the messages for each user to the users second mailboxD、Create a new disabled user account and a new mailbox named Journaling Mailbox. Configure journal rules to journal all the messages for each user to Journaling Mailbox.

单选题You have an Exchange Server 2010 organization that contains 1,500 mailboxes. The average sizeeach mailbox is a 750 MB. All users run either Microsoft Office Outlook 2010 or Outlook Web App to access their e-mail. All users who run Outlook 2010 are configured to use Cached Exchange Mode. You need to configure a mailbox solution for the organization to meet the following requirements: Ensure that administrators can search and find any message Reduce the size of the offline store (OST) for each user Provide access to all e-mail messages by using either Outlook 2010 or Outlook Web App  What should you do()?ACreate a Personal Archive for each user and then create a retention policy. Instruct users to compact the OST file.BCreate a personal folder (PST) file for each user. Store all PST files on a network share. Instruct users to compact the OST file.CCreate a second disabled user account and a second mailbox for each user. Configure journal rules to journal all the messages for each user to the user¯s second mailboxDCreate a new disabled user account and a new mailbox named Journaling Mailbox. Configure journal rules to journal all the messages for each user to Journaling Mailbox.of

单选题Which remote access VPN addressing technique supports a static IP address to support a specific application?()A Use a static ip addresses based on incoming user policies.B Use DHCP to assign addresses based on incoming user policies.C Deploy a clientless model to assign a unique address to the user.D Deploy RADIUS or LDAP to assign the address to the user.

单选题You have a hosted Exchange organization.All servers in the organization have Exchange Server 2010 Service Pack l (SP1) installed.The organization contains a distribution group named Group1.You need to ensure that a user named User1 can review and approve all messages sent to Group1. What should you do?()AModify the Managed By list for Group1.BCreate a new journal rule and specify User1 as the journal recipient.CModify the mail flow settings for User1.DModify the mail flow settings for Group1.

单选题A user reports it takes a long time to load all applications and the hard drive LED is showing constant activity. Which of the following is MOST likely the issue?()AThe processor is faulty.BThe file system is fragmented.CThe modem drivers are corrupt.DThe power supply is faulty.

单选题You manage a server that runs Windows Server 2008. You have installed the Windows SharePointServices (WSS) server role on the server. The server is configured to accept incoming mail. Tostreamline the process, you create a new document library. You have to make sure that any user can sendemail to the document library. What should you do to achieve this task?()AChange the incoming email settings for the document libraryBEnable basic user authentication for the document libraryCModify the document library settings to accept emails from SMTP serversDChange the permissions for the document library

单选题The following entry has been added to the syslog.conf file: *.emerg;mail,daemon.crit @ sysadmin  Which of the following will result from this entry?()A All messages at the emerg priority level and below from all facilities and messages at the crit priority level and below from the mail and daemon facilities are sent to the TTY of the user sysadmin. B All messages at the emerg priority level and above from all facilities, all messages at any priority level from the mail facility, and all messages at the crit priority level and above from the daemon facilities are sent to the remote host sysadmin. C All messages at the emerg priority level and above from all facilities and messages at the crit priority level and above from the mail and daemon facilities are sent to the remote host sysadmin. D All messages at the emerg priority level and above from all facilities except for the mail facility and messages at the crit priority level and above from the daemon facility are sent to the TTY of the user sysadmin.

单选题下列选项中,正确的邮件地址格式是()。Auser@mail.comBuser.mail.comC@user.mail.comDmail.com@user

单选题You have an Exchange Server 2010 organization.A user named User1 connects to his mailbox by using Microsoft Office Outlook.User1 reports that he is unable to send encrypted e-mail messages to an external recipient named User2.You verify that User1 and User2 have e-mail encryption certificates.You need to ensure that User1 can send encrypted e-mail messages to User2.What should you do first?()AInstruct User2 to add a delegateBInstruct User2 to send a signed e-mail message to User1.CInstruct User1 to send a signed e-mail message to User2.DInstruct User1 to modify the sensitivity settings of the e-mail message

单选题A user states that email is not being received. Which of the following protocols should thetechnician check for incoming mail?()ASMTPBPOP3CNNTPDHTTP

单选题You have a server that runs Windows Server 2008. The server has the Windows SharePoint Services (WSS) server role installed. The server is configured to accept incoming e-mail. You create a new document library.  You need to ensure that any user can send e-mail to the document library. What should you do?()AModify the RSS setting for the document library.BModify the permissions for the document library.CModify the incoming e-mail settings for the document library.DEnable anonymous authentication for the Web application.

单选题Which remote access VPN addressing technique supports a static IP address to support a specific application?()AUse a staticip addresses based on incoming user policies.BUse DHCP to assign addresses based on incoming user policies.CDeploy a clientless model to assign a unique address to the user.DDeploy RADIUS or LDAP to assign the address to the user.

单选题Charts showing the coast of Mexico are produced by the United States().ANational Geospatial-Intelligence AgencyBCoast GuardCNaval ObservatoryDNational Ocean Service

单选题Your network contains Exchange Server 2010 servers.  All users access their mailboxes by using Outlook Web App (OWA). Your companys compliance policy states the following: .All e-mail messages that contain customer contracts must be stored for three years .Users must be able to classify e-mail messages that relate to customer contracts .Users must be able to move e-mail messages to any folder  You need to recommend a solution that supports the requirements of the compliance policy.  What should you recommend?()AManaged Folder mailbox policiesBan OWA mailbox policyCPersonal Archives and an Archive policyDRetention Policy Tags and a Retention Policy

单选题You manage 40 computers that run Microsoft Windows Vista.  You use Microsoft Windows Calendar to publish a calendar to a shared network location. You need to allow users to automatically view the most recent calendar updates.  What should you do? ()AInstruct all users to configure a calendar subscription that has an update interval of 15 minutes.BInstruct all users to perform calendar synchronization for all shared calendar subscriptions. CInstruct all users to map a network drive to the folder that holds the shared calendar. Import the .ics file for the shared calendar.DUse e-mail messages to deploy the .ics file for the shared calendar to each user. Instruct each user to import the .ics file that is attached to the e-mail message.

单选题procmail是一种()。AMTA(Mail Transfer Agent)BMDA(Mail Delivery Agent)CMMA(Mail Man Agent)DMUA(Mail User Agent)

单选题A user calls the system administrator and states that they can no longer access the file server they had been working on all morning. To trouble shoot this problem,  which step should the administrator take FIRST?()A Reboot the file server.B Ask the user what they were doing when they noticed the problem.C Ask the user to reboot their PC.D Ask the user to ping the default gateway and report the response times back to the administrator.