单选题You need to design a configuration for the Microsoft Outlook Web Access servers. What should you do?()ACreate a Network Load Balancing cluster that contains the Outlook Web Access serversBCreate a Microsoft Cluster Server cluster that contains the Outlook Web Access serversCCreate public DNS host (A) resource records for each Outlook Web Access server. Instruct each user to connect to the server that contains his or her mailboxDInstall Microsoft Application Center 2000 on the Outlook Web Access servers. Create a Web cluster that contains all of the Outlook Web Access servers

单选题
You need to design a configuration for the Microsoft Outlook Web Access servers. What should you do?()
A

Create a Network Load Balancing cluster that contains the Outlook Web Access servers

B

Create a Microsoft Cluster Server cluster that contains the Outlook Web Access servers

C

Create public DNS host (A) resource records for each Outlook Web Access server. Instruct each user to connect to the server that contains his or her mailbox

D

Install Microsoft Application Center 2000 on the Outlook Web Access servers. Create a Web cluster that contains all of the Outlook Web Access servers


参考解析

解析: 暂无解析

相关考题:

You have an Exchange Server 2010 organization.You need to identify whether an administrator has made a configuration change in the Exchange organization.What should you run?()A、Get-EventLogLevelB、Get-ExchangeServerC、Exchange Best Practices AnalyzerD、Microsoft Baseline Security Analyzer (MBSA)

You need to recommend a solution for deploying App1. The solution must support the company’s  planned changes.   What should you include in the recommendation?()A、Group Policy Software InstallationB、Microsoft Application Virtualization (App-V)C、Microsoft Enterprise Desktop Virtualization (MED-V)D、Microsoft System Center Configuration Manager

Company.com network consists of a single Active Directory domain named  Company.com.Company.com has an Exchange Server 2010 organization.The Company.com employees use Microsoft Office Outlook 2007 to connect to their mailboxes.RPC over HTTP and Auto discover are configured on Microsoft Office Outlook 2007. A new Company.com security policy requires that the employees connected to the domain does not need authentication when using Outlook Anywhere.However, those not connected t the domain needs to be authentication when using Outlook Anywhere.The employees need to comply with the new Company.com security policy.  What should you do?()A、You should consider using Basic authentication on Outlook Anywhere and set up only Basic authentication on the RPC virtual directory.B、You should consider using NTLM authentication on Outlook Anywhere and set up Basic authentication and NTLM authentication on the RPC virtual directory.C、You should consider using NTLM authentication on Outlook Anywhere and set up only Basic authentication on the RPC virtual directory.D、You should consider using Basic authentication on Outlook Anywhere and set up Basic authentication and NTLM authentication on the RPC virtual directory.

Your organization has an Ac tive Directory Domain Services (AD DS) domain. All servers run Windows Server 2008 R2. You need to deploy Microsoft Application Virtualization (App - V) 4.6 in a stand - alone configuration. Which should you install?()A、Microsoft Application Virtualization Data baseB、Microsoft Application Virtualization Desktop ClientC、Microsoft System Center Application Virtualization Streaming ServerD、Microsoft System Center Application Virtualization Management Server

You work as a Web Developer at Certkiller.com. You are in the process of creating a Webapplication using Microsoft ASP.NET 3.5.  An exception management framework is not used in the Web application. You need to ensure thatthe application log the unhandled exceptions automatically to the event log. You need to configurethe Web.config file to accomplish this. Identify the configuration that will assist you in thisscenario?()A、You should consider using the healthMonitoring enabled="true"/ configuration.B、You should consider using the deployment retail="true"/ configuration.C、You should consider using the customErrors mode="On"/ configuration.D、You should consider using the trace enabled="true"/ configuration.

Your company has a single Active Directory Domain Services (AD DS) domain and 1,000 client computers.  You are planning to deploy Windows 7 Enterprise to the client computers.    You need to design a zero-touch installation strategy.()A、unattended installationB、custom Windows 7 image on DVDC、Windows Deployment Services (WDS)D、Microsoft System Center Configuration Manager 2007 R2

You are evaluating the implementation of two Hyper-V hosts for the Web servers. You need to design a solution that will move the Web servers automatically between the Hyper-V hosts based on the physical resources available. Which software should you include in the design?()A、Microsoft System Center Operations ManagerB、Microsoft System Center Virtual Machine ManagerC、Microsoft System Center Data Protection ManagerD、Microsoft System Center Configuration Manager

You need to design a strategy for providing e-mail access to the subsidiary users. What should you do?()A、Deploy POP3 and IMAP4 services on Exchange front-end servers. Make the front-end servers accessible from the Internet by means of POP3, IMAP4, and SMTP onlyB、Deploy Microsoft Outlook Web Access on Exchange mailbox servers. Make the mailbox servers accessible from the Internet by means of HTTPS and SMTP onlyC、Deploy Microsoft Outlook Web Access on Exchange front-end servers. Make the front-end servers accessible from the Internet by means of HTTPS onlyD、Deploy an additional Exchange mailbox server that contains all subsidiary mailboxes. Deploy Microsoft Outlook Web Access on the server. Make the server accessible from the Internet by means of HTTPS only

You use Microsoft Visual Studio 2010 and Microsoft .NET Framework 4 to create a Windows Presentation Framework (WPF) application. You have a company logo that must appear on multiple forms in the application. The logo design changes frequently. You need to ensure that when the logo image is changed, you only need to update a single location. What should you do?()A、Define the image as a page resource.B、Define the image as an application resource.C、Save the image on a network drive.D、Include the image as an embedded resource.

You need to recommend a solution for managing the GPOs that supports the company's planned changes.   What should you include in the recommendation?()A、Group Policy Management Console (GPMC) and Authorization ManagerB、Group Policy Management Console (GPMC) and Microsoft SharePoint Foundation 2010C、Microsoft Desktop Optimization Pack (MDOP)D、Microsoft System Center Configuration Manager

You need to ensure that all servers meet the company’s security requirements. Which tool should you use?()A、Microsoft Baseline Security Analyzer (MBSA)B、Microsoft Security Assessment Tool (MSAT)C、Resultant Set of Policy (RSoP)D、Security Configuration Wizard (SCW)

You need to design a strategy for remote client computer access that meets all business and technical requirements. What should you do?()A、Configure the HTTP virtual server on the Exchange front-end server to require a secure connection. Instruct the sales personnel to use Microsoft Outlook Web Access to connect to the Exchange front-end serverB、Configure the back-end Exchange servers to use static ports for RPC connections. Open the required ports on the firewall. Install Microsoft Outlook 2003 on the portable computers and configure it to connect to the Exchange back-end server using a MAPI connectionC、Configure the Exchange front-end server to require secure connections from IMAP4 client computers. Install Microsoft Outlook 2003 on the portable computers and configure it to use a secure IMAP4 connectionD、Configure the Exchange servers to support RPC over HTTPS. Install Microsoft outlook 2003 on the portable computers and configure it to use RPC over HTTPS

Your company has a single Active Directory Domain Services (AD DS) domain with Windows Server 2008 R2 member servers and 1,000 Windows 7 client computers. You are designing the deployment of a custom application.   You have the following requirements:   The application must be available to only users who need it. Minimize network traffic during deployment.   You need to design a deployment strategy that meets the requirements.   Which deployment method should you use?()A、RemoteApp and Desktop ConnectionsB、software installation in Group PolicyC、Microsoft Application Virtualization (App-V)D、Microsoft System Center Configuration Manager 2007

You are evaluating the implementation of two Hyper-V hosts for the application servers. You need to design a solution that will move the application servers automatically between the Hyper-V hosts based on the physical resources available. The solution must minimize the number of Microsoft System Center products deployed to the network. Which software should you include in the design?()A、Microsoft System Center Operations ManagerB、Microsoft System Center Virtual Machine ManagerC、Microsoft System Center Data Protection ManagerD、Microsoft System Center Configuration Manager

You have an Exchange Server 2010 organization.You need to create Personal Archives. Which tool should you use?()A、Active Directory Users and ComputersB、Exchange Control Panel (ECP)C、Exchange Management Console (EMC)D、Microsoft Office Outlook

You need to recommend a configuration design for the new VMs. The design must ensure that operating systems can be deployed to the new VMs. What should you include in the recommendation?()A、virtual machine queue (VMQ)B、Virtual Machine ChimneyC、a synthetic network adapterD、an emulated network adapter

You need to design a strategy to ensure that all servers are in compliance with the business requirements for maintaining security patches. What should you do?()A、Log on to a domain controller and run the Resultant Set of Policy wizard in planning mode on the domainB、Log on to each server and run Security Configuration and Analysis to analyze the security settings by using a custom security templateC、Create a logon script to run the secedit command to analyze all servers in the domainD、Run the Microsoft Baseline Security Analyzer (MBSA) on a server to scan for Windows vulnerabilities on all servers in the domain

单选题You need to design a security strategy for a remote e-mail access. What should you do?()ARequire remote users to access e-mails by using Outlook Mobile AccessBRequire Outlook Web Access users to install the secure MIME ActiveX-Control and to encrypt all messagesCOn Outlook Web Access servers that accept connections from the Internet configure IIS to require SSL for all connectionsDOn Outlook Web Access servers that accept connections from the Internet configure IIS to require Integrated Windows Authentication

单选题You need to recommend a configuration design for the new VMs. The design must ensure that operating systems can be deployed to the new VMs. What should you include in the recommendation?()Avirtual machine queue (VMQ)BVirtual Machine ChimneyCa synthetic network adapterDan emulated network adapter

单选题You are planning to upgrade Internet Explorer.   You have the following requirements:   Create a report that identifies which computers are successfully upgraded. Do not install additional software on the client computers.   You need to design a deployment method that meets the requirements.   What should you do?()AUse Internet Explorer Administration Kit (IEAK) and Group Policy.BUse Microsoft System Center Configuration Manager.CUse Windows Server Update Services (WSUS).DUse Microsoft System Center Essentials.

单选题You have an Exchange Server 2010 organization.Users access their e-mail from the Internet by using Outlook Web App.You need to prevent users from downloading ZIP files from Outlook Web App.The solution must ensure that users can download ZIP files by using Microsoft Office Outlook. What should you do?()AConfigure the Content Filter agent.BConfigure the Attachment Filter agent.CCreate a managed folder mailbox policy.DCreate an Outlook Web App Mailbox policy.

单选题You are planning a Windows 7 deployment infrastructure for a new company.   You have the following requirements:   Three domains  10,000 client computers No user interaction   You need to recommend a deployment infrastructure.   What should you recommend?()ADeploy Microsoft Deployment Toolkit (MDT) 2010. Design a zero-touch installation.BDeploy Microsoft System Center Virtual Machine Manager. Design a lite-touch installation.CDeploy Microsoft System Center Operations Manager 2007 R2. Design a lite-touch installation. DDeploy Microsoft System Center Configuration Manager 2007 R2. Design a zero-touch installation.

多选题You are evaluating the implementation of two Hyper-V hosts for the application servers. You need to design a solution that will move the application servers automatically between the Hyper-V hosts based on the physical resources available. The solution must minimize the number of Microsoft System Center products deployed to the network. Which software should you include in the design?()AMicrosoft System Center Operations ManagerBMicrosoft System Center Virtual Machine ManagerCMicrosoft System Center Data Protection ManagerDMicrosoft System Center Configuration Manager

单选题You work as a Web Developer at Certkiller.com. You are in the process of creating a Webapplication using Microsoft ASP.NET 3.5.  An exception management framework is not used in the Web application. You need to ensure thatthe application log the unhandled exceptions automatically to the event log. You need to configurethe Web.config file to accomplish this. Identify the configuration that will assist you in thisscenario?()AYou should consider using the healthMonitoring enabled=true/ configuration.BYou should consider using the deployment retail=true/ configuration.CYou should consider using the customErrors mode=On/ configuration.DYou should consider using the trace enabled=true/ configuration.

单选题You need to design a method to monitor the security configuration of the IIS server to meet the requirements in the written security policy. What should you do?()ALog on to a domain controller and run the Resultant Set of Policy wizard in planning mode on the IIS server computer accountBRun the Microsoft Baseline Security Analyzer (MBSA) on the IIS server and scan for vulnerabilities in Windows and IIS checksCRun Security Configuration and Analysis to analyze the IIS server’s security settings by using a custom security templateDOn the IIS server, run the gpresult command from a command prompt and analyze the output

单选题You need to design the deployment of antivirus software. What should you do?()AInstall the antivirus software on each mailbox storage serverBInstall the antivirus software on each Outlook Web Access serverCInstall the antivirus software on one Outlook Web Access server at each officeDInstall the antivirus software on a back-end server that contains no mailboxes

单选题You are performing a test deployment of Microsoft Enterprise Desktop virtualization (MED-V) 2.0. You discover that applications deployed by using MED-V run much slower than expected. You need to recommend configuration changes to improve the performance of the MED-V workspace applications. Which configuration changes should you recommend?()ADisable cached mode in Outlook 2010BAdd exclusions to Forefront EndPoint ProtectionCAdd URL exclusions to the Forefront TMG ClientDModify the network settings in SharePoint Workspace 2010