单选题You work as the enterprise exchange administrator at Xxx .The Xxx network is running in a Microsoft Exchange Server 2010 environment.Xxx has a distribution group named KingData.You receive instruction from Xxx to allow an employee Mia Hamm to review all mail to KingData and approve it.How can you ensure that the above goal is achieved but at the same time Mia Hamm must not be able to change group membership?()AYou must modify the properties of KingDataBYou must enable folder redirection.CYou must allocate Mia Hamm as a group moderator for KingData.DYou must implement recipient filtering.
单选题
You work as the enterprise exchange administrator at Xxx .The Xxx network is running in a Microsoft Exchange Server 2010 environment.Xxx has a distribution group named KingData.You receive instruction from Xxx to allow an employee Mia Hamm to review all mail to KingData and approve it.How can you ensure that the above goal is achieved but at the same time Mia Hamm must not be able to change group membership?()
A
You must modify the properties of KingData
B
You must enable folder redirection.
C
You must allocate Mia Hamm as a group moderator for KingData.
D
You must implement recipient filtering.
参考解析
解析:
暂无解析
相关考题:
You work as the enterprise exchange administrator at Xxx .The Xxx network consists of a domain named xxx .Xxx currently makes use of Exchange 2000 Server and Exchange Server 2003 Service Pack 2 (SP2) in their messaging system.You receive instruction from Xxx to migrate the messaging system to Exchange Server 2010 with Client Access server, Mailbox server and Hub Transport servers. What actions must you take?()A、You should take away the Exchange 2000 Server servers in the environment.B、You should configure EdgeSync synchronization in the environment.C、You should run the setup /NewProvisionedServer in the environment.D、You should run the Migration Preparation Tool from the other servers in the environment.
You work as the enterprise exchange administrator at Xxx .The Xxx network is running in a Microsoft Exchange Server 2010 environment.The Xxx network has two Mailbox servers named XXX-EX01 and XXX-EX02.You are busy implementing a database availability group (DAG). What actions must you take to guarantee mailbox databases replications on XXX-EX01 and XXXEX02?()A、You must implement a custom Send connectorB、You must install the Active Directory Connector (ADC)C、You must change the Database pathsD、You must change the membership list of the DAG
You work as the enterprise exchange administrator at Xxx .Xxx is using Microsoft Exchange Server 2010 as their messaging solution.What actions must you take to disable notifications by text messages to mobile devices?()A、You must set up a Group Policy Object.B、You must set up an Outlook Web App Mailbox policy.C、You must change the properties of the public folder database.D、You must set up recipient filtering.
You work as the enterprise exchange administrator at Xxx .Xxx is using Microsoft Exchange Server 2010 as their messaging solution.The Xxx network contains a server named XXXEX10 that contains a mailbox named KingMail.What action must you take to shift the transaction log files of KingMail?()A、You should use the msiexec.exe.B、You should use the ServerManagerCmd.exe -IP Exchange-All.xml.C、You should use the Move-DatabasePath.D、You should use the Move-SBSDataStore KingMail cmdlet.
You work as the enterprise exchange administrator at Xxx .Xxx is using Microsoft Exchange Server 2010 as their messaging solution.How can you to configure Outlook Web App (OWA) to block Xxx employees from changing passwords?()A、You must use IP Block list.B、You must change the properties of the OWA virtual directory.C、You must use an Outlook Web App Mailbox policy.D、You must set up recipient filtering.
You work as the enterprise exchange administrator at Xxx .Xxx is using Microsoft Exchange Server 2007 as their messaging solution.Xxx has acquired a new mailbox server named XXX-EX03 that is running Exchange Server 2010. How can you shift the mail boxed to XXX-EX03?()A、You must use the New-MoveRequest cmdlet.B、You must use the Exchange Server Jetstress 2010.C、You must use the Exchange Server Remote Connectivity Analyzer (ExRCA).D、You must use the ServerManagerCmd.exe -IP Exchange-All.xml.
You work as the enterprise exchange administrator at Xxx .The Xxx network is running in a Microsoft Exchange Server 2010 environment.How can you find out about the mailboxes that exceeds 2 GB in size?()A、You must use the Get-MailboxStatistics cmdlet.B、You must use the Test-Mailflow cmdlet.C、You must use the Get-StoreUsageStatistics.D、You must use the Test-ServiceHealth cmdlet.
You work as the enterprise exchange administrator at Xxx .Xxx is using Microsoft Exchange Server 2010 as their messaging solution.What actions must you take to change the Exchange-specific cost for a site link?()A、You must configure the host (A) resource records.B、You must add and configure an IPSec Enforcement Network policy.C、You must create an Outlook Web App Mailbox policy.D、You must use the Set-ADSiteLink cmdlet.
You work as the enterprise exchange administrator at Xxx .Xxx is using Microsoft Exchange Server 2010 as their messaging solution.The Xxx employees at Xxx use Outlook Web App to access their mailboxes.You receive a complaint from a Xxx employee named Mia Hamm that her mailbox is unavailable.What actions must you take to resolve this problem?()A、You must change the WEB Outlook Provider.B、You must change Mia Hamm’s mailbox features.C、You must change the EXPR Outlook Provider.D、You must change the DNS forwarding.
You work as the enterprise exchange administrator at Xxx .The Xxx network consists of a domain named xxx .Xxx is using Microsoft Exchange Server 2010 as their messaging solution. What actions must you take to stop a user named Mia Hamm from removing information from her mailbox?()A、You must use log transactions.B、You must use a legal hold.C、You must use Outlook Protection Rules.D、You must use the Set-Mailbox Mia Hamm -LitigationHoldEnabled $true.
You work as the enterprise exchange administrator at Xxx .The Xxx network consists of a domain named xxx .The Xxx network has a mail server named XXX-EX01.What actions must you take to do an unattended installation of Exchange Server 2010 server on XXXEX01?()A、You should add recipient filter.B、You should add create Send connectors.C、You should run setup /ps.D、You should add setup.com in the script.
You work as the enterprise exchange administrator at Xxx .Xxx is using Microsoft Exchange Server 2010 as their messaging solution. The Xxx contains an Exchange Server 2010 Mailbox server named XXX- EX02.What actions must you take to check when last employees logged on to XXX- EX02?()A、You must configure real time block lists (RBLs).B、You must use the Exchange Server User Monitor (ExMon).C、You must use the Get-MailboxStatistics.D、You must use the administrator audit logging.
You work as the enterprise exchange administrator at Xxx .The Xxx network consists of a domain named xxx .Xxx has an Exchange Server 2010 server named XXX-EX01 that has the Hub Transport server role installed.What actions must you take to allow XXX-EX01 to receive e-mail from the Internet?()A、You must change the properties of the MSExchangePOP3 (TCP-in) Windows Firewall rule.B、You must create and export a filter from the Exchange Management Console.C、You must select the Anonymous user’s permission group for the Default XXX-EX01 Receive connector.D、You must configure Outlook Anywhere.
You work as the enterprise exchange administrator at Xxx .The Xxx network consists of a domain named xxx .What actions must you take to use administrative delegation on a series of cmdlets?()A、You must implement log transactionsB、You must set up new management roleC、You must implement Mailbox journalingD、You must set up a Role Based Access Control (RBAC) role
You work as the enterprise exchange administrator at Xxx .Xxx is using Microsoft Exchange Server 2010 as their messaging solution.The Xxx network contains a Mailbox server named XXX-EX10.What action must you take to have mailboxes retained for 8 weeks after deletion?()A、You must create a legal hold.B、You must change the mailbox database properties.C、You must create Transport Protection Rules.D、You must create Personal archives.
You work as the enterprise exchange administrator at Xxx .Xxx is using Microsoft Exchange Server 2010 as their messaging solution.The Xxx network has a DNS server named XXX-SR04.What actions must you take to have the Hub Transport servers do not use XXX-SR04 to resolve names on the Internet?()A、You must change the DNS forwarding.B、You must change the Hub Transport server object properties.C、You must change the Transport Protection Rules.D、You must set the Net.TCP Port Sharing service to Automatic.
You work as the enterprise exchange administrator at Xxx .The Xxx network consists of a domain named xxx .What actions must you take to allow a room mailbox to automatically take requests for meetings?()A、You must use log transactions.B、You must use Calendar Repair Assistant (CRA).C、You must select the resource booking attendant.D、You must set up Task Scheduler.
You work as the enterprise exchange administrator at Xxx .The Xxx network is running in a Microsoft Exchange Server 2010 environment.You are responsible for managing a Mailbox server named XXX-EX02.The employees at Xxx use Microsoft Office Outlook 2010 to access to the Exchange environment.What actions must you take to determine the amount of lag for connections to XXX- EX02?()A、You must use the Test-Mailflow cmdlet.B、You must use the MSExchangeTransport diagnostic logging.C、You must use the Test-ServiceHealth cmdlet.D、You must use the Test-OutlookConnectivity cmdlet.
You work as the enterprise exchange administrator at Xxx .Xxx is using Microsoft Exchange Server 2010 as their messaging solution.Which of the following options can be you in order to change the permissions settings for a public folder?()A、You must use the Active Directory Users and Computers.B、You must use the Microsoft Office Outlook.C、You must use the Mail Flow Troubleshooter.D、You must use the Exchange Server Jetstress 2010.
You work as the enterprise exchange administrator at Xxx .The Xxx network is running in a Microsoft Exchange Server 2010 environment.You are responsible for managing an Exchange Server 2010 server named XXX-EX02.What command can be used to determine if the employees can utilize Outlook Anywhere to access XXXEX02?()A、You must use the Test-ImapConnectivity cmdlet.B、You must use the Test-OutlookConnectivity cmdlet.C、You must use the Get-MessageTrackingReport cmd.D、You must use the Exchange Remote Connectivity Analyzer.
You work as the enterprise exchange administrator at Xxx .Xxx is using Microsoft Exchange Server 2010 as their messaging solution.What action must you take to restrict the amount of data in a particular public folder only without impacting on the other public folders?()A、You must use the equipment mailbox.B、You must use the Mail Flow Troubleshooter.C、You must use the Public Folder Management Console.D、You must use the Exchange Server Jetstress 2010.
You work as the enterprise exchange administrator at Xxx .The Xxx network consists of a domain named xxx .Xxx is using Microsoft Exchange Server 2010 as their messaging solution.You have to have the Application Identifier of xxx stored in a DNS record.The Application Identifier is used for the federated trust.What actions must you take on the DNS?()A、You must set up recipient filtering.B、You must set up a Host (A).C、You must use a TXT record.D、You must use a Pointer (PTR) record.E、You must use a Mail exchange (MX) record.
单选题You work as the enterprise exchange administrator at Xxx .Xxx is using Microsoft Exchange Server 2010 as their messaging solution.The Xxx contains an Exchange Server 2010 Mailbox server named XXX-EX02.What actions must you take to check when last employees logged on to XXX-EX02?()AYou must configure real time block lists (RBLs).BYou must use the Exchange Server User Monitor (ExMon).CYou must use the Get-MailboxStatistics.DYou must use the administrator audit logging.
单选题You work as the enterprise exchange administrator at Xxx .Xxx is using Microsoft Exchange Server 2010 as their messaging solution.Which of the following options can be you in order to change the permissions settings for a public folder?()AYou must use the Active Directory Users and Computers.BYou must use the Microsoft Office Outlook.CYou must use the Mail Flow Troubleshooter.DYou must use the Exchange Server Jetstress 2010.
单选题You work as the enterprise exchange administrator at Xxx .Xxx is using Microsoft Exchange Server 2007 as their messaging solution.Xxx has acquired a new mailbox server named XXX-EX03 that is running Exchange Server 2010. How can you shift the mail boxed to XXX-EX03?()AYou must use the New-MoveRequest cmdlet.BYou must use the Exchange Server Jetstress 2010.CYou must use the Exchange Server Remote Connectivity Analyzer (ExRCA).DYou must use the ServerManagerCmd.exe -IP Exchange-All.xml.
单选题You work as the enterprise exchange administrator at Xxx .The Xxx network consists of a domain named xxx .Xxx is using Microsoft Exchange Server 2010 as their messaging solution.You have to have the Application Identifier of xxx stored in a DNS record.The Application Identifier is used for the federated trust.What actions must you take on the DNS?()AYou must set up recipient filtering.BYou must set up a Host (A).CYou must use a TXT record.DYou must use a Pointer (PTR) record.EYou must use a Mail exchange (MX) record.
单选题You work as the enterprise exchange administrator at Xxx .The Xxx network consists of a domain named xxx .The Xxx network has a mail server named XXX-EX01.What actions must you take to do an unattended installation of Exchange Server 2010 server on XXXEX01?()AYou should add recipient filter.BYou should add create Send connectors.CYou should run setup /ps.DYou should add setup.com in the script.
单选题You work as the enterprise exchange administrator at Xxx .The Xxx network consists of a domain named xxx .What actions must you take to use administrative delegation on a series of cmdlets?()AYou must implement log transactionsBYou must set up new management roleCYou must implement Mailbox journalingDYou must set up a Role Based Access Control (RBAC) role