单选题You use Microsoft Windows Mail to download e-mail messages to your Inbox.  You need to minimize the receipt of e-mail messages that attempt to acquire private financial information.  What should you do?()ACreate an Inbox rule that moves potentially malicious email to the Junk Mail folder. BConfigure the Parental Controls Web restriction setting to High.CConfigure the phishing filter to move the e-mail messages to the Junk Mail folder. DConfigure Windows Defender to perform a custom scan of potentially malicious email.

单选题
You use Microsoft Windows Mail to download e-mail messages to your Inbox.  You need to minimize the receipt of e-mail messages that attempt to acquire private financial information.  What should you do?()
A

Create an Inbox rule that moves potentially malicious email to the Junk Mail folder. 

B

Configure the Parental Controls Web restriction setting to High.

C

Configure the phishing filter to move the e-mail messages to the Junk Mail folder. 

D

Configure Windows Defender to perform a custom scan of potentially malicious email.


参考解析

解析: 暂无解析

相关考题:

The major problem with E-mail is that it is(71)easy to use that people can become(72)with messages(73)they can possibly answer in a day. In addition, mail boxes require some management to(74)messages or archive those that might be required later. Senders don't always know about your E-mail backlog and often send(75)messages.A.tooB.soC.veryD.much

The major problem with E-mail is that it is (1) easy to use that people can become (2) with messages. (3) they can possibly answer in a day. In addition, mail boxes require some management to (4) messages or archive those that might be required later. Senders don't always know about your E-mail backlog and often send (5) messages.A.tooB.soC.veryD.much

Your portable computer has a built-in secondary display on the lid.  You need to display your e-mail messages, calendar, and contacts on the secondary display.  What should you do? ()A、Configure the e-mail, calendar, and contacts gadgets to be displayed on Microsoft Windows Sidebar.B、Configure the e-mail, calendar, and contacts gadgets to be displayed on Microsoft Windows Sideshow.C、Configure desktop shortcuts to Microsoft Windows Mail, Microsoft Windows Calendar, and Microsoft Windows Contacts.D、Configure Quick Launch shortcuts to Microsoft Windows Mail, Microsoft Windows Calendar, and Microsoft Windows Contacts.

Company.com network consists of a single Active Directory domain named Company.com.Company.com has an Exchange Server 2010 organization.The Company.com employees use Microsoft Office Outlook to connect to their mailboxes.A Company.com employee named Rory Allen complains that he is unable to send encrypted e-mail messages to an external recipient client.Furthermore, both of these users use e-mail encryption certificates.Rory Allen needs to send encrypted e-mail messages to the external recipient client.What should you do?()A、The best option is to inform Rory Allen to change the sensitivity settings of the e-mail message.B、The best option is to inform the external recipient client to add a delegate.C、The best option is to inform the external recipient client to send a signed e-mail message to Rory Allen.D、The best option is to inform Rory Allen to send a signed e-mail message to the external recipient client.

Which three features of the IMAP are available on a Cisco Unity Express module?()A、Download e-mail messages as attachments to voice-mail messages. B、Access voice-mail messages from general delivery mailboxes (GDM)s. C、Access voice-mail messages over the network or download them selectively. D、Delete voice-mail messages or mark them as read or unread in a manner similar to e-mail messages. E、View instant messages and voice-mail messages from a single integrated e-mail type client using IMAP. F、Play voice-mail locally using standard media players without requiring a connection to Cisco Unity Express.

You have an Exchange Server 2010 Mailbox server.All users use Microsoft Office Outlook 2010 to access their mailboxes.You implement a policy that automatically deletes e-mail messages that are older than 90 days.You need to provide users with an alternate location to store email messages that are older than 90 days.Administrators must be able to find the messages in both locations when they perform multi-mailbox searches.What should you create?()A、a .pst file for each user that is stored in a shared folderB、a Personal Archive for each userC、a journal ruleD、a Retention Policy

You are employed as the enterprise exchange administrator at TestKing.com. TestKing.com makes use of Microsoft Exchange Server messaging solution. You are responsible for managing the Exchange Server2010 organization. TestKing.com makes use of an Edge Transport server to send and receive e-mail messages. You discover that a number of servers on the Internet classify e-mail messages from your organization asspam. You receive an instruction from management to reduce the likelihood of e-mails sent by theorganization to be classified as spam. What should you do?()A、You should consider installing a server certificte from a trusted third-party certification authority (CA).B、You should consider implementing Microsoft Forefront Security for Exchange Server.C、You should consider creating SenderID TXT records for the Edge Transport servers.D、You should consider configuring the Edge Trasport servers to make use of real-time block list (RBL).

You use Microsoft Windows Mail to download e-mail messages to your Inbox.  You need to minimize the receipt of e-mail messages that attempt to acquire private financial information.  What should you do?()A、Create an Inbox rule that moves potentially malicious email to the Junk Mail folder. B、Configure the Parental Controls Web restriction setting to High.C、Configure the phishing filter to move the e-mail messages to the Junk Mail folder. D、Configure Windows Defender to perform a custom scan of potentially malicious email.

You add a particular e-mail address to the Blocked Senders list in the Microsoft Windows Mail application. You still receive messages from this e-mail address.  You need to prevent the receipt of all e-mail messages from this e-mail address.  What should you do?()A、Configure the junk e-mail filtering setting to High.B、Remove the senders e-mail address from the Safe Senders list.C、Add the senders e-mail domain name to the Blocked Senders list.D、Configure the Microsoft Windows Mail application to delete suspected junk e-mail permanently.

You have an Exchange Server 2010 organization.  An Edge Transport server sends and receives all e- mail messages from the Internet.  You notice that some servers on the Internet identify e-mail messages from your organization as spam. You need to minimize the possibility that e-mail messages sent from your organization are identified asspam.  What should you do?()A、Implement Microsoft Forefront Security for Exchange Server.B、Create SenderID TXT records for the Edge Transport servers.C、Configure the Edge Transport servers to use a real-time block list (RBL).D、Install a server certificate from a trusted third-party certification authority (CA).

You use a mobile device that runs Microsoft Windows Mobile 5.0 Pocket PC Phone Edition. You perform the following tasks:   Read e-mail messages and attachments. Edit Microsoft Word documents.  Review Microsoft PowerPoint presentations. Chat through Microsoft Pocket MSN.  Read information through Microsoft Pocket Internet Explorer.   When you attempt to open a custom line-of-business (LOB) application, you receive a low memory error.   You need to open the LOB application to enter new sales information.   What are two possible ways to achieve this goal?()A、Move all applications to an external storage card.B、Perform a soft reset of the Windows Mobilebased device.C、Perform a hard reset of the Windows Mobilebased device.D、Stop all applications by using the Running Programs list.

You work as the enterprise exchange administrator at Xxx .The Xxx network consists of a domain named xxx .Xxx is using Microsoft Exchange Server 2010.The Xxx network contains a server named XXX-EX10 configured with the following roles. (1)Client Access Role  (2)Hub Transport Role  (3)Mailbox Server Roles  What action must you take to guarantee e-mail availability to Xxx users who are are utilizing regular mail clients like Microsoft Outlook Express or Windows Live Mail?()A、You should use Security/Multipurpose Internet Mail Extensions (S/MIME).B、You should use the Windows Management Instrumentation Command-line (WMIC).C、You should use the Automatic setting of the Microsoft Exchange POP3 service.D、You should use the setup /NewProvisionedServer.

You have an Exchange Server 2010 organization.You discover that many large e-mail messages prevent average-size e-mail messages from being sent to the Internet.You need to delete the large messages from the Hub Transport servers. Which tool should you use?()A、Exchange Control Panel (ECP)B、message trackingC、Queue ViewerD、Windows Explorer

Your network contains an Exchange Server 2010 server.All users access their mailboxes by using only Microsoft Office Outlook 2007.You configure a policy to archive all e-mail messages located in the Entire Mailbox 365 days after they are received.You need to ensure that all members of a department named Sales can retain some e-mail messages for five years. What should you create first?()A、a linked mailboxB、a managed custom folderC、a message classificationD、an Outlook Protection Rule

You manage 40 computers that run Microsoft Windows Vista.  You use Microsoft Windows Calendar to publish a calendar to a shared network location. You need to allow users to automatically view the most recent calendar updates.  What should you do? ()A、Instruct all users to configure a calendar subscription that has an update interval of 15 minutes.B、Instruct all users to perform calendar synchronization for all shared calendar subscriptions. C、Instruct all users to map a network drive to the folder that holds the shared calendar. Import the .ics file for the shared calendar.D、Use e-mail messages to deploy the .ics file for the shared calendar to each user. Instruct each user to import the .ics file that is attached to the e-mail message.

You work as the enterprise exchange administrator at Company.com.The Company.com network consists of a single Active Directory domain named Company.com.Company.com has an Exchange Server 2010 organization.Due to numerous large e-mail messages, the average-size e-mail messages cannot reaches the Internet.You have received instructions to remove large messages from the Hub Transport servers.What should you do?()A、You should use the Queue Viewer tool.B、You should use the Exchange Control Panel (ECP) tool.C、You should use the message tracking tool.D、You should use the Windows Explorer tool.

单选题You work as the enterprise exchange administrator at Company.com.The Company.com network consists of a single Active Directory domain named Company.com.Company.com has an Exchange Server 2010 organization.Due to numerous large e-mail messages, the average-size e-mail messages cannot reaches the Internet.You have received instructions to remove large messages from the Hub Transport servers.What should you do?()AYou should use the Queue Viewer tool.BYou should use the Exchange Control Panel (ECP) tool.CYou should use the message tracking tool.DYou should use the Windows Explorer tool.

单选题You are employed as the enterprise exchange administrator at TestKing.com. TestKing.com makes use of Microsoft Exchange Server messaging solution. You are responsible for managing the Exchange Server2010 organization. TestKing.com makes use of an Edge Transport server to send and receive e-mail messages. You discover that a number of servers on the Internet classify e-mail messages from your organization asspam. You receive an instruction from management to reduce the likelihood of e-mails sent by theorganization to be classified as spam. What should you do?()AYou should consider installing a server certificte from a trusted third-party certification authority (CA).BYou should consider implementing Microsoft Forefront Security for Exchange Server.CYou should consider creating SenderID TXT records for the Edge Transport servers.DYou should consider configuring the Edge Trasport servers to make use of real-time block list (RBL).

单选题You deploy mobile devices that run Microsoft Windows Mobile 5.0. Users will use MSN Messenger on the devices.   You need to ensure that users use their corporate e-mail accounts to sign in to the MSN Messenger service.   What should you do?()AInstruct users to register for an MSN Messenger e-mail account.BInstruct users to reset the passwords for their domain user accounts.CInstruct users to clear all saved passwords on their Windows Mobilebased devices.DInstruct users to register for a valid MSN Messenger account by using their corporate e-mail addresses.

单选题You have a computer that runs Windows XP Professional. You use Microsoft Outlook Express to download e-mail messages. You need to copy the e-mail messages, Outlook Express settings, and Internet Explorer settings to a new computer that runs Windows XP Professional. What should you do?()ACopy all *.dbx files from the old computer to the new computer. BEstablish a Remote Assistance session from the old computer to the new computer.CBack up the system state on the old computer. Restore the system state on the new computer. DRun the File and Settings Transfer Wizard on the old computer. Run the File and Settings Transfer Wizard on the new computer.

多选题Which three features of the IMAP are available on a Cisco Unity Express module?()ADownload e-mail messages as attachments to voice-mail messages.BAccess voice-mail messages from general delivery mailboxes (GDM)s.CAccess voice-mail messages over the network or download them selectively.DDelete voice-mail messages or mark them as read or unread in a manner similar to e-mail messages.EView instant messages and voice-mail messages from a single integrated e-mail type client using IMAP.FPlay voice-mail locally using standard media players without requiring a connection to Cisco Unity Express.

单选题You have an Exchange Server 2010 organization.You discover that many large e-mail messages prevent average-size e-mail messages from being sent to the Internet.You need to delete the large messages from the Hub Transport servers. Which tool should you use?()AExchange Control Panel (ECP)Bmessage trackingCQueue ViewerDWindows Explorer

单选题You have an Exchange Server 2010 organization.A user named User1 connects to his mailbox by using Microsoft Office Outlook.User1 reports that he is unable to send encrypted e-mail messages to an external recipient named User2.You verify that User1 and User2 have e-mail encryption certificates.You need to ensure that User1 can send encrypted e-mail messages to User2.What should you do first?()AInstruct User2 to add a delegateBInstruct User2 to send a signed e-mail message to User1.CInstruct User1 to send a signed e-mail message to User2.DInstruct User1 to modify the sensitivity settings of the e-mail message

单选题Company.com network consists of a single Active Directory domain named Company.com.Company.com has an Exchange Server 2010 organization.The Company.com employees use Microsoft Office Outlook to connect to their mailboxes.A Company.com employee named Rory Allen complains that he is unable to send encrypted e-mail messages to an external recipient client.Furthermore, both of these users use e-mail encryption certificates.Rory Allen needs to send encrypted e-mail messages to the external recipient client.What should you do?()AThe best option is to inform Rory Allen to change the sensitivity settings of the e-mail message.BThe best option is to inform the external recipient client to add a delegate.CThe best option is to inform the external recipient client to send a signed e-mail message to Rory Allen.DThe best option is to inform Rory Allen to send a signed e-mail message to the external recipient client.

单选题Your network contains 20 offices. Each office contains 1,000 users.  The users access their e-mail messages by using Microsoft Office Outlook. You have an Exchange Server 2010 organization.  You need to recommend an Exchange Server solution that meets the following requirements: .Ensures that users in each office download the list of recipients for their office only  .Ensures that users in each office can send e-mail messages to any user in the organization  What should you recommend?()ACreate 20 new address lists and 20 offline address books (OABs).BCreate 20 new managed folder mailbox policies and 20 e-mail address policies.CCreate 20 new dynamic distribution groups, and then create 20 new global address lists (GALs).DCreate 20 new mailbox databases, and then move the mailboxes from each office to a separatemailbox database.

单选题You are an administrator in a company that has a Main Office and 5 branch offices.In every branch office exist a Hub Transport server, and only in Main Office exists an Edge server.You add a disclaimer to all internal and external e-mail messages sent by users in the company. You discover that e-mail messages sent from one of Branch Offices do not include the disclaimer.You need to ensure that all e-mail messages include disclaimer.What should you do?()ARestart Microsoft Exchange System AttendantBModify cache settings of Branch Offices Hub Transport ServerCForce Active Directory replication on the Branch Office Domain ControllerDExport all transport rules from the Hub Transport Server in Main Office import the transport rules in the branch office Hub Transport Server

单选题You work as the enterprise exchange administrator at Xxx .The Xxx network consists of a domain named xxx .Xxx is using Microsoft Exchange Server 2010.The Xxx network contains a server named XXX-EX10 configured with the following roles. (1)Client Access Role  (2)Hub Transport Role  (3)Mailbox Server Roles  What action must you take to guarantee e-mail availability to Xxx users who are are utilizing regular mail clients like Microsoft Outlook Express or Windows Live Mail?()AYou should use Security/Multipurpose Internet Mail Extensions (S/MIME).BYou should use the Windows Management Instrumentation Command-line (WMIC).CYou should use the Automatic setting of the Microsoft Exchange POP3 service.DYou should use the setup /NewProvisionedServer.

单选题You manage 40 computers that run Microsoft Windows Vista.  You use Microsoft Windows Calendar to publish a calendar to a shared network location. You need to allow users to automatically view the most recent calendar updates.  What should you do? ()AInstruct all users to configure a calendar subscription that has an update interval of 15 minutes.BInstruct all users to perform calendar synchronization for all shared calendar subscriptions. CInstruct all users to map a network drive to the folder that holds the shared calendar. Import the .ics file for the shared calendar.DUse e-mail messages to deploy the .ics file for the shared calendar to each user. Instruct each user to import the .ics file that is attached to the e-mail message.