单选题You need to design a strategy for managing the messages that are sent to the customer service mailboxes. What should you do?()ACreate a separate storage group and database to contain the customer service mailboxes. Enable circular logging for this storage groupBCreate a separate storage group and database to contain the customer service mailboxes. Set the deleted item retention period for this database to zeroCPlace the customer service mailboxes on a new mailbox store in the storage group that contains the main office user mailboxes. Enable circular logging for this storage groupDPlace the customer service mailboxes on a new mailbox store in the storage group that contains the branch office user mailboxes. Set the deleted item retention period for this database to zero

单选题
You need to design a strategy for managing the messages that are sent to the customer service mailboxes. What should you do?()
A

Create a separate storage group and database to contain the customer service mailboxes. Enable circular logging for this storage group

B

Create a separate storage group and database to contain the customer service mailboxes. Set the deleted item retention period for this database to zero

C

Place the customer service mailboxes on a new mailbox store in the storage group that contains the main office user mailboxes. Enable circular logging for this storage group

D

Place the customer service mailboxes on a new mailbox store in the storage group that contains the branch office user mailboxes. Set the deleted item retention period for this database to zero


参考解析

解析: 暂无解析

相关考题:

You have recently created an application, and want to capture all debugging text messages generated by it.You would like these debugging messages to display on the command line. The application that you created contains the following code:Debug.WriteLine (Start the processing);Console.WriteLine (Generated by Console.WriteLine);Debug.WriteLine (End the processing);You need to ensure that you are able to capture all debugging messages to the command line.What should you do?()A.B.C.D.

A Windows Communication Foundation (WCF) service only accepts messages that are signed and encrypted. A client application is not receiving expected responses from the service. You need to enable logging to verify that the messages from the client are signed and encrypted. You also need to see what each message looks like before the message body is deserialized into a NET object. What should you do?()A.B.C.D.

You are developing WPF application for managing student information... btnSort and a DataGrid control named dgStudents on the design surface of the MainWindow.xaml properties : FirstName and LastName. You create the following code segment in the constructor of...The DataGrid control displays the list of students unsorted.You need to ensure that the list of students is sorted by last name.Which code segment should you add to the click event handler of the Button control?()A.B.C.D.

You are employed as the exchange administrator at Company.com.the Company.com network contains an exchange 2010 organization.you are responsible for managing an exchange server 2010 mailbox server named -ex01.You are in the process of implementing a policy that deletes e-mail messages automatically after 60 days.You receive an instruction from management to identify another location where users can store their messages after 60 days.However, administrators need to locate the e-mail messages in both locations when executing multi- mailbox searches. What should you do?()A、You should consider creating a Retention Policy.B、You should consider creating a.pst file for each user that is stored in a shared folder.C、You should consider creating a Personal Archive for each user.D、You should consider creating a journal rule.

You design a Business Intelligence (BI) solution by using SQL Server 2008. You plan to design the report strategy for a new report project that will be used by a financial application. The application uses five calculations that are implemented in Microsoft .NET Framework 3.5 assemblies. The assemblies are written in the C# language and use the static methods. You need to ensure that the calculations can be used by the expressions in all reports. You also need to ensure consistency within the reports by using the least amount of development effort. What should you do?()A、 Add a reference to the assemblies in the Report Properties References tab. B、 Write the calculation logic used by the calculations by using T-SQL functions. C、 Write the code of the calculation logic into the Report Properties Custom Code tab.D、 Write the calculation logic in each report by using the mathematical functions available natively to SQL Server 2008 Reporting Services (SSRS).

You need to design an access control strategy for the marketing application. You solution must minimize impact on server and network performance. What should you do?()A、Require client computers to connect to the marketing application by using a VPN connectionB、Use IPSec to encrypt communications between the servers in the New York and Atlanta officesC、Require the high security setting on Terminal Services connections to the marketing applicationD、Configure all marketing application Web pages to require SSL

You need to design an e-mail access strategy for remote users. What should you do? () A、 Instruct remote users to connect to their e-mail by using RPCB、 Instruct remote users to connect to Outlook Web Access by using only HTTPSC、 Instruct remote users to connect to the company network by using PPTP connectionsD、 Instruct remote users to connectd to their e-mail by using RPC over HTTP Configure the HTTP servers to require encryption.

You are debugging a Windows Communication Foundation (WCF) service. The service uses signed and encrypted messages.You need to configure logging so that you can read the contents of the messages. What should you do?()A、Set maxSizeMessagesToLog to 10B、Set logMessageAtServiceLevel to true.C、Set maxMessagesToLog to 10.D、Set logMessageAtTransportLevel to true.

You need to design a strategy for managing the messages that are sent to the customer service mailboxes. What should you do?()A、Create a separate storage group and database to contain the customer service mailboxes. Enable circular logging for this storage groupB、Create a separate storage group and database to contain the customer service mailboxes. Set the deleted item retention period for this database to zeroC、Place the customer service mailboxes on a new mailbox store in the storage group that contains the main office user mailboxes. Enable circular logging for this storage groupD、Place the customer service mailboxes on a new mailbox store in the storage group that contains the branch office user mailboxes. Set the deleted item retention period for this database to zero

You are developing a Windows Communication Foundation (WCF) service. You write a method named Submit that accepts messages of the type System.ServiceModel.Channels.Message. You need to process the body of the incoming messages multiple times in the method. Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)()A、Use the GetBody method of the Message class to read the content of the messages.B、Use the CreateBufferedCopy method of the Message class to load the messages into memory.C、Use the WriteBodyContents method of the BodyWriter class to make a copy of the messages.D、Use the CreateMessage method of the MessageBuffer class to make a copy of the messages.

You have an Exchange Server 2010 organization.You discover that many large e-mail messages prevent average-size e-mail messages from being sent to the Internet.You need to delete the large messages from the Hub Transport servers. Which tool should you use?()A、Exchange Control Panel (ECP)B、message trackingC、Queue ViewerD、Windows Explorer

Your company has a single Active Directory Domain Services (AD DS) domain with Windows Server 2008 R2 member servers and 1,000 Windows 7 client computers. You are designing the deployment of a custom application.   You have the following requirements:   The application must be available to only users who need it. Minimize network traffic during deployment.   You need to design a deployment strategy that meets the requirements.   Which deployment method should you use?()A、RemoteApp and Desktop ConnectionsB、software installation in Group PolicyC、Microsoft Application Virtualization (App-V)D、Microsoft System Center Configuration Manager 2007

You need to recommend a strategy for managing Windows Firewall that meets the companys technical requirements. What should you include in the recommendation?()A、domain-based Group Policy objects (GPOs)B、local Group Policy objects (GPOs)C、Starter Group Policy objects (GPOs)D、System Starter Group Policy objects (GPOs)

单选题You need to design an access control strategy for the Payment folder for the Sales Managers group. What should you do?()AUse IPSec in transport modeBUse Encrypting File System (EFS) over Web Distributed Authoring and Versioning (WebDAV)CUse PEAP-EAP-TLSDUse Encrypting File System (EFS) remote encryption

单选题You are employed as the exchange administrator at Company.com.the Company.com network contains an exchange 2010 organization.you are responsible for managing an exchange server 2010 mailbox server named -ex01.You are in the process of implementing a policy that deletes e-mail messages automatically after 60 days.You receive an instruction from management to identify another location where users can store their messages after 60 days.However, administrators need to locate the e-mail messages in both locations when executing multi- mailbox searches. What should you do?()AYou should consider creating a Retention Policy.BYou should consider creating a.pst file for each user that is stored in a shared folder.CYou should consider creating a Personal Archive for each user.DYou should consider creating a journal rule.

单选题Your company has client computers that run Windows XP Professional.   You are planning to install Windows 7 Enterprise on the existing client computers.   You have the following requirements:   Migrate user data and operating system components.  Encrypt and password-protect the migration store.   You need to design a user state migration strategy that supports the requirements. What should you do?()AUse a hard-link migration storeBUse a compressed migration storeCPerform an offline migration by using WindowsoldDPerform an offline migration by using Windows PE

单选题You need to design a strategy to meet the company’s requirements for e-mail. What should you do?()AConfigure and publish a certificate template that is suitable for S/MIME, Deploy a Group Policy object (GPO) so that a certificate that is based on this template is automatically issued to all domain usersBSpecify Group Policy objects (GPOs) and IPSec policies that require all client computers to use Kerberos authentication to connect to mail serversCFor each mail server, acquire an SSL server certificate from a commercial CA whose root certificate is already trustedDRequire IPSec encryption on all TCP connections that are used to send or receive e-mail messages

多选题You need to design a strategy to increase security for the client computers in the finance department. Which two actions should you perform?()AEnable automatic certificate enrollmentBEnforce smart card logonsCEnable Encrypting File System (EFS) for offline filesDEnable a screen saver password

单选题You need to recommend a Group Policy strategy for the Remote Desktop servers. What should you include in the recommendation?()Ablock inheritanceBloopback processingCsecurity filteringDWMI filtering

单选题Some users report they cannot receive messages from some external senders.You suspect that there is some anti-spam activity blocking those messages.You need to identify what is blocking the messages.You will activate and review the logs of one of the following:()AProtocol loggingBConnectivity logsCMessage trackingDPipeline tracing

单选题You need to recommend a strategy for managing the domain controllers in the branch offices thatmeets the company security requirements.What should you include in the recommendation?()AConfigure Administration Role Separation.BAdd the BranchAdmins group to the Domains Admins group.CAdd the BranchAdmins group to the Server Operators group.DAssign the permission for the domain controller computer objects to the BranchAdmins group.

单选题Your company has a single Active Directory Domain Services (AD DS) domain and 1,000 client computers.  You are planning to deploy Windows 7 Enterprise to the client computers.    You need to design a zero-touch installation strategy.()Aunattended installationBcustom Windows 7 image on DVDCWindows Deployment Services (WDS)DMicrosoft System Center Configuration Manager 2007 R2

单选题You need to design the consolidation strategy for the Promotions and Partners databases. You want to choose a strategy that results in the best database performance while maintaining the permissions of end users in each database.What consolidation strategy should you choose?()APlace each database in a separate instance running on SQL2.BPlace each database in a separate instance running on SQL3.CPlace both databases in a single instance running on SQL2.DPlace both databases in a single instance running on SQL3.

单选题You are designing a strategy for migrating domain user accounts to the new Windows Server 2003 Active Directory environment. You want to identify the minimum number of trust relationships that need to be manually created to perform this operation.  Which design should you use? ()A one external trust relationshipB two external trust relationshipsC six external trust relationshipsD twelve external trust relationshipsE one two-way cross-forest trust relationship

单选题You need to design a group membership strategy for the EditorialAdmins group. What should you do?()AMove the EditorialAdmins group to the Servers OU in the editorial departmentBMove the members of the EditorialAdmins group to the Editorial OUCMove the members of the EditorialAdmins group to the New York OUDMove the EditorialAdmins group to the New York OU

单选题You need to block messages from senders that do not comply sender policy framework (SPF).What do you need to implement?()AReceive connectorBSender ID FilteringCSender FilteringDSend connector