Company.com network consists of a single Active Directory domain named  Company.com.Company.com has an Exchange Server 2010 organization.The Company.com employees use Microsoft Office Outlook 2007 to connect to their mailboxes.RPC over HTTP and Auto discover are configured on Microsoft Office Outlook 2007. A new Company.com security policy requires that the employees connected to the domain does not need authentication when using Outlook Anywhere.However, those not connected t the domain needs to be authentication when using Outlook Anywhere.The employees need to comply with the new Company.com security policy.  What should you do?()A、You should consider using Basic authentication on Outlook Anywhere and set up only Basic authentication on the RPC virtual directory.B、You should consider using NTLM authentication on Outlook Anywhere and set up Basic authentication and NTLM authentication on the RPC virtual directory.C、You should consider using NTLM authentication on Outlook Anywhere and set up only Basic authentication on the RPC virtual directory.D、You should consider using Basic authentication on Outlook Anywhere and set up Basic authentication and NTLM authentication on the RPC virtual directory.

Company.com network consists of a single Active Directory domain named  Company.com.Company.com has an Exchange Server 2010 organization.The Company.com employees use Microsoft Office Outlook 2007 to connect to their mailboxes.RPC over HTTP and Auto discover are configured on Microsoft Office Outlook 2007. A new Company.com security policy requires that the employees connected to the domain does not need authentication when using Outlook Anywhere.However, those not connected t the domain needs to be authentication when using Outlook Anywhere.The employees need to comply with the new Company.com security policy.  What should you do?()

  • A、You should consider using Basic authentication on Outlook Anywhere and set up only Basic authentication on the RPC virtual directory.
  • B、You should consider using NTLM authentication on Outlook Anywhere and set up Basic authentication and NTLM authentication on the RPC virtual directory.
  • C、You should consider using NTLM authentication on Outlook Anywhere and set up only Basic authentication on the RPC virtual directory.
  • D、You should consider using Basic authentication on Outlook Anywhere and set up Basic authentication and NTLM authentication on the RPC virtual directory.

相关考题:

You work as a network Exchange administrator at Company.com.The Company.com network currently consists of an internal network and perimeter network.The Company.com organization makes use of Microsoft Exchange Server 2010 as their messaging solution.Company.com has recently deployed a new server to the perimeter network which runs Microsoft Windows Server 2008 R2.During the course of the business week you receive instruction from Company.com to install the Microsoft Exchange Server Edge Transport server role on the server in the perimeter network. What should you do?()A、You should consider having the ImportEdgeConfig.ps1 script run on the existing Exchange Server 2010 server.B、You should consider having TCP port 88 and TCP port 3268 opened on the firewall between the perimeter network and the internal network.C、You should consider having the new server joined to an Active Directory domain.D、You should consider having the Active Directory Lightweight Directory Services installed on the new server in the perimeter network.

Company.com has decided to implement VPN for all network traffic. How might this might affect HACMP?()  A、 Only the heartbeat IP network can exist in a VPN style network.B、 HACMp must have separate VPN’s for all ’non-service’ and ’service’ adapter networks.C、 If a VPN is used for IP traffic the heartbeating must be done over disk connections.D、 HACMP can exist in a VPN network environment,but special considerations must be addressed.

During Company.com planning session,Company.com presents the details of the current  Network design. The network design serves four separate company facilities, each on as separate subnet. As part of a disaster recovery plan, the customer is evaluating the use of HACMP. Specifically, the have reviewed IPAT via IP aliasing and are questioning the number of IP subnets required.  Given the customer’s current configuration,what is the recommended minimum number of IP subnets that would be required?()A、 4B、 5C、 6D、 8

You work as a network Exchange administrator at Company.com.The Company.com network currently consists of a single Active Directory forest containing a single domain named Company.com.The Company.com organization makes use of Microsoft Exchange Server 2010 as their messaging solution.During the course of the business week you receive instruction from Company.com to ensure that a newly created room mailbox automatically accepts meeting requests.What should you do?()A、You should consider having a managed folder mailbox policy assigned.B、You should consider having the resource booking attendant enabled.C、You should consider having the mailbox permissions modified.D、You should consider having the moderation for the mailbox enabled.

You work as the enterprise exchange administrator at Company.com.The Company.com network consists of a single Active Directory domain named Company.com.Company.com has an Exchange Server 2010 organization.A new Company.com policy prohibits the users from changing their password by using Outlook Web App (OWA). What should you do?()A、The best option is to set up an Outlook Web App Mailbox policy so that the users comply with the Company.com policy.B、The best option is to set up a Group Policy Object so that the users comply with the Company.com policy.C、The best option is to change the authentication settings of the OWA virtual directory so that the users comply with the Company.com policy.D、The best option is to change the authentication settings of the IISADMPWD virtual directory so that the users comply with the Company.com policy.

You work as a network exchange administrator at Company.com.the Company.com network currently consists of a single active directory forest containing a single domain named Company.com.The Company.com organization makes use of microsoft exchange server 2010 as their messaging solution.The Company.com organization currently makes use of a computer named -ex01 which hosts a single mailbox database named kingdatabase.during the course of the business week you receive instruction from Company.com to have the transaction log files of kingdatabase moved.What should you do?()A、You should consider having the Set-ExchangeServer cmdlet used.B、You should consider having the Set-MailboxDatabase cmdlet used.C、You should consider having the Move-DatabasePath cmdlet used.D、You should consider having the Move-Mailbox cmdlet used.

You work as a network Exchange administrator at Company.com.The Company.com network currently consists of a single Active Directory forest containing a single domain named Company.com.The Company.com organization makes use of Microsoft Exchange Server 2010 as their messaging solution.During the course of the business week you receive instruction from Company.com to prevent the network users from accessing public folder using Outlook Web App (OWA) whilst ensuring you solution prevents the users using Office Outlook to access public folders.What should you do?()A、You should consider having the default Outlook Web App Mailbox policy modified.B、You should consider having the properties of the public folder database modified.C、You should consider having a managed folder mailbox policy created.D、You should consider having the properties of the OWA virtual directory modified.

You are the administrator of Company.com’s Windows 2000 Network.  Your routed TCP/IP network consists of 10 Windows 2000 Server computers and 75 Windows 2000 Professional computers. All computers are in the Company.com domain. Your network uses TCP/IP as the only network protocol. You are installing 10 new Windows 2000 Professional computers. You want to enable the new computers to use host names to connect to shared resources on the network. You configure a TCP/IP address, a gateway address and a subnet mask on each new computer.   You want to complete the configuration to allow the computers to communicate on the network.  What should you do?()A、Configure a HOSTS file.B、Configure a LMHOSTS file.C、Configure a WINS server database.D、Configure a DHCP server address.E、Configure at least one DNS address.

You work as the enterprise exchange administrator at Company.com.The Company.com network consists of a single Active Directory domain named Company.com.Company.com has an Exchange Server 2010 organization.A new Company.com security policy prohibits the employees to send certain words between them.What should you do?()A、The best option is to create an Outlook Protection Rule to comply with the Company.com security policy.B、The best option is to set up a content filtering feature to comply with the Company.com security policy.C、The best option is to create a transport rule to comply with the Company.com security policy.D、The best option is to set up a sender reputation feature to comply with the Company.com security policy.

You work as a network Exchange administrator at Company.com.The Company.com network  currently consists of a single Active Directory forest containing a single domain named Company.com.The Company.com organization makes use of Microsoft Exchange Server 2010 as their messaging solution.The Company.com network users have been configured by Company.com to have the @Company.com email address suffix.During the course of the business week you receive instruction from Company.com to configure a public folder named KingPublic for the Internet users to post content by sending e-mail to KingPublic@Company.com.  What should you do?()A、You should consider having a new mail contact created which has the e-mail address KingPublic@Company.com.You should then have a transport rule created.B、You should consider having a new mailbox created which has the e-mail address KingPublic@Company.com.You should then have a transport rule created.C、You should consider having mail enabled for KingPublic.D、You should consider having the author role assigned to Anonymous.

You work as a network Exchange administrator at Company.com.The Company.com network currently consists of a single Active Directory forest containing a single domain named Company.com.The Company.com organization makes use of Microsoft Exchange Server 2010 as their messaging solution.During the course of the business week you receive instruction from Company.com to ensure that all the network users are able to automatically schedule the use of a projector.What should you do?()A、You should consider having the schedule for the Managed Folder Assistant modified.B、You should consider having the properties of the Calendar managed default folder modified.C、You should consider having a new Sharing policy created.D、You should consider having an equipment mailbox created.

Company.com has employed you as their Exchange administrator.The Company.com network contains an Exchange Server 2010 Organization.You are responsible for managing the Company.com network.You receive an instruction from management to reject e-mail messages that have a spam confidence level (SCL) of 5.You thus decide to configure the organization to accomplish this task. What should you do?()A、You should consider configuring the sender reputation.B、You should consider configuring the sender filtering.C、You should consider configuring the content filtering.D、You should consider configuring the recipient filtering.

You work as a network Exchange administrator at Company.com.The Company.com network currently consists of a single Active Directory forest containing a single domain named Company.com.The Company.com organization makes use of Microsoft Exchange Server 2010 as their messaging solution.During the course of the business week you receive instruction from Company.com to ensure that the network users are able to open a resource mailbox. What should you do?()A、You should consider having a new Sharing policy crated from the Exchange Management Console (EMC).B、You should consider having the Resource Delegated parameter set for the resource mailbox from the Exchange Management Shell.C、You should consider having the password for the account associated to the resource mailbox reset from Active Directory Users And Computers console.You should then have the password provided to the network users .D、You should consider having the properties of the resource mailbox modified from Microsoft Office Outlook.

You work as the enterprise exchange administrator at company.com.the company.com network consists of a single active directory domain named company.com.company.com has an exchange server 2010 organization.a new company.com security policy prohibits the employees to send certain words in internal e-mail communications.what should you do?()A、the best option is to change the properties of a send connector to comply with the company.com security policy.B、the best option is to set up a content filtering feature to comply with the company.com security policy.C、the best option is to create a transport rule to comply with the company.com security policy.D、the best option is to set up a sender reputation feature to comply with the company.com security policy.

You work as a network Exchange administrator at Company.com.The Company.com network currently consists of a single Active Directory forest containing a single domain named Company.com.The Company.com organization makes use of Microsoft Exchange Server 2010 as their messaging solution.Company.com has recently created a distribution group for the network users.During the course of the business week you receive instruction from Company.com to ensure that the newly added users are able to add their mailboxes to the distribution group.What should you do?()A、You should consider having the security settings of the distribution group modified.B、You should consider having the authentication settings of the ECP virtual directory modified.C、You should consider having the group scope of the distribution group modified.D、You should consider having the approval mode of the distribution group modified.

单选题You work as a network exchange administrator at Company.com.the Company.com network currently consists of a single active directory forest containing a single domain named Company.com.The Company.com organization makes use of microsoft exchange server 2010 as their messaging solution.The Company.com organization currently makes use of a computer named -ex01 which hosts a single mailbox database named kingdatabase.during the course of the business week you receive instruction from Company.com to have the transaction log files of kingdatabase moved.What should you do?()AYou should consider having the Set-ExchangeServer cmdlet used.BYou should consider having the Set-MailboxDatabase cmdlet used.CYou should consider having the Move-DatabasePath cmdlet used.DYou should consider having the Move-Mailbox cmdlet used.

单选题You work as the enterprise exchange administrator at Company.com.The Company.com network consists of a single Active Directory domain named Company.com.Company.com has an Exchange Server 2010 organization.A new Company.com security policy prohibits the employees to send certain words between them.What should you do?()AThe best option is to create an Outlook Protection Rule to comply with the Company.com security policy.BThe best option is to set up a content filtering feature to comply with the Company.com security policy.CThe best option is to create a transport rule to comply with the Company.com security policy.DThe best option is to set up a sender reputation feature to comply with the Company.com security policy.

单选题During Company.com planning session,Company.com presents the details of the current  Network design. The network design serves four separate company facilities, each on as separate subnet. As part of a disaster recovery plan, the customer is evaluating the use of HACMP. Specifically, the have reviewed IPAT via IP aliasing and are questioning the number of IP subnets required.  Given the customer’s current configuration,what is the recommended minimum number of IP subnets that would be required?()A 4B 5C 6D 8

单选题You work as a network Exchange administrator at Company.com.The Company.com network currently consists of a single Active Directory forest containing a single domain named Company.com.The Company.com organization makes use of Microsoft Exchange Server 2010 as their messaging solution.Company.com has recently created a distribution group for the network users.During the course of the business week you receive instruction from Company.com to ensure that the newly added users are able to add their mailboxes to the distribution group.What should you do?()AYou should consider having the security settings of the distribution group modified.BYou should consider having the authentication settings of the ECP virtual directory modified.CYou should consider having the group scope of the distribution group modified.DYou should consider having the approval mode of the distribution group modified.

单选题You work as a network Exchange administrator at Company.com.The Company.com network currently consists of a single Active Directory forest containing a single domain named Company.com.The Company.com organization makes use of Microsoft Exchange Server 2010 as their messaging solution.During the course of the business week you receive instruction from Company.com to ensure that all the network users are able to automatically schedule the use of a projector.What should you do?()AYou should consider having the schedule for the Managed Folder Assistant modified.BYou should consider having the properties of the Calendar managed default folder modified.CYou should consider having a new Sharing policy created.DYou should consider having an equipment mailbox created.

单选题You work as a network Exchange administrator at Company.com.The Company.com network currently consists of a single Active Directory forest containing a single domain named Company.com.The Company.com organization makes use of Microsoft Exchange Server 2010 as their messagingsolution.During the course of the business week you receive instruction from Company.com to have a set of cmdlets grouped for administrative delegation of duties.What should you do?()AYou should consider having a new management role created.BYou should consider having a new role assignment policy created.CYou should consider having a managed folder mailbox policy created.DYou should consider having a new distribution group created.

单选题You work as a network Exchange administrator at Company.com.The Company.com network  currently consists of a single Active Directory forest containing a single domain named Company.com.The Company.com organization makes use of Microsoft Exchange Server 2010 as their messaging solution.The Company.com network users have been configured by Company.com to have the @Company.com email address suffix.During the course of the business week you receive instruction from Company.com to configure a public folder named KingPublic for the Internet users to post content by sending e-mail to KingPublic@Company.com.  What should you do?()AYou should consider having a new mail contact created which has the e-mail address KingPublic@Company.com.You should then have a transport rule created.BYou should consider having a new mailbox created which has the e-mail address KingPublic@Company.com.You should then have a transport rule created.CYou should consider having mail enabled for KingPublic.DYou should consider having the author role assigned to Anonymous.

多选题You work as a network Exchange administrator at Company.com.The Company.com network currently consists of a single Active Directory forest containing a single domain named Company.com.The Company.com organization makes use of Microsoft Exchange Server 2010 as their messaging solution.During the course of the business week you receive instruction from Company.com to ensure that the network users are able to open a resource mailbox. What should you do?()AYou should consider having a new Sharing policy crated from the Exchange Management Console (EMC).BYou should consider having the Resource Delegated parameter set for the resource mailbox from the Exchange Management Shell.CYou should consider having the password for the account associated to the resource mailbox reset from Active Directory Users And Computers console.You should then have the password provided to the network users .DYou should consider having the properties of the resource mailbox modified from Microsoft Office Outlook.

单选题You work as a network Exchange administrator at Company.com.The Company.com network currently consists of an internal network and perimeter network.The Company.com organization makes use of Microsoft Exchange Server 2010 as their messaging solution.Company.com has recently deployed a new server to the perimeter network which runs Microsoft Windows Server 2008 R2.During the course of the business week you receive instruction from Company.com to install the Microsoft Exchange Server Edge Transport server role on the server in the perimeter network. What should you do?()AYou should consider having the ImportEdgeConfig.ps1 script run on the existing Exchange Server 2010 server.BYou should consider having TCP port 88 and TCP port 3268 opened on the firewall between the perimeter network and the internal network.CYou should consider having the new server joined to an Active Directory domain.DYou should consider having the Active Directory Lightweight Directory Services installed on the new server in the perimeter network.

单选题Company.com has employed you as their Exchange administrator.The Company.com network contains an Exchange Server 2010 Organization.You are responsible for managing the Company.com network.You receive an instruction from management to reject e-mail messages that have a spam confidence level (SCL) of 5.You thus decide to configure the organization to accomplish this task. What should you do?()AYou should consider configuring the sender reputation.BYou should consider configuring the sender filtering.CYou should consider configuring the content filtering.DYou should consider configuring the recipient filtering.

多选题You are the administrator of Company.com’s Windows 2000 Network.  Your routed TCP/IP network consists of 10 Windows 2000 Server computers and 75 Windows 2000 Professional computers. All computers are in the Company.com domain. Your network uses TCP/IP as the only network protocol. You are installing 10 new Windows 2000 Professional computers. You want to enable the new computers to use host names to connect to shared resources on the network. You configure a TCP/IP address, a gateway address and a subnet mask on each new computer.   You want to complete the configuration to allow the computers to communicate on the network.  What should you do?()AConfigure a HOSTS file.BConfigure a LMHOSTS file.CConfigure a WINS server database.DConfigure a DHCP server address.EConfigure at least one DNS address.

多选题You work as a network Exchange administrator at Company.com.The Company.com network currently consists of a single Active Directory forest containing a single domain named Company.com.The Company.com organization makes use of Microsoft Exchange Server 2010 as their messaging solution.During the course of the business week you receive instruction from Company.com to prevent the network users from accessing public folder using Outlook Web App (OWA) whilst ensuring you solution prevents the users using Office Outlook to access public folders.What should you do?()AYou should consider having the default Outlook Web App Mailbox policy modified.BYou should consider having the properties of the public folder database modified.CYou should consider having a managed folder mailbox policy created.DYou should consider having the properties of the OWA virtual directory modified.

单选题You work as the enterprise exchange administrator at Company.com.The Company.com network consists of a single Active Directory domain named Company.com.Company.com has an Exchange Server 2010 organization.A new Company.com policy prohibits the users from changing their password by using Outlook Web App (OWA). What should you do?()AThe best option is to set up an Outlook Web App Mailbox policy so that the users comply with the Company.com policy.BThe best option is to set up a Group Policy Object so that the users comply with the Company.com policy.CThe best option is to change the authentication settings of the OWA virtual directory so that the users comply with the Company.com policy.DThe best option is to change the authentication settings of the IISADMPWD virtual directory so that the users comply with the Company.com policy.