多选题You need to configure connectors between each routing group. What are two possible ways to achieve this goal?()ACreate and configure SMTP connectors between the routing groups. Do not create additional connectors between the routing groupsBCreate and configure routing group connectors between the routing groups. Do not create additional connectors between routing groupsCCreate and configure low-cost group connectors and high-cost SMTP connectors between the routing groupsDCreate and configure high-cost routing group connectors and low-cost SMTP connectors between the routing groups

多选题
You need to configure connectors between each routing group. What are two possible ways to achieve this goal?()
A

Create and configure SMTP connectors between the routing groups. Do not create additional connectors between the routing groups

B

Create and configure routing group connectors between the routing groups. Do not create additional connectors between routing groups

C

Create and configure low-cost group connectors and high-cost SMTP connectors between the routing groups

D

Create and configure high-cost routing group connectors and low-cost SMTP connectors between the routing groups


参考解析

解析: 暂无解析

相关考题:

You are the network administrator responsible for testing and deploying new service packs for Windows 2000. Your forest has two trees, with four domains in each tree, as shown in the exhibit.For the testing of each service pack, you plan to deploy the service pack to the support.IS.contoso.com domain and the support.IS.litware.com domain, but to no other domains. You plan to use a Group Policy to configure and administer the service pack package. You need to minimize the complexity and administration of the service pack package, and to minimize network traffic between the domains.You create a Microsoft Windows Installer package for the service pack. What should you do to configure the Group Policy?A.Configure the Windows Installer package in a Group Policy for the litware.com and contoso.com domainsB.Configure the Windows Installer package in a Group Policy for the support.IS.litware.com and support.IS.contoso.com domains.C.Configure two sites, with one tree in each site. Configure the Windows Installer package in a Group Policy for each site.D.Configure one site that contains both trees. Configure the Windows Installer package in a Group Policy for the site.

Exhibit:You are creating a composite control for capturing user address information in a Web application. You define a number of properties that the user can set at design time. You need to group these properties in the Properties dialog box. In addition, you need to ensure that when users click on a particular property, they receive a short explanation of that property. The properties are shown in the exhibit. Which two actions should you perform?()A. Attach the Category attribute class to the controls class definition. Set its value to UserAddress. Mark the class as public.B. Attach the Browsable attribute class to each property in the group. Set its value to True. Mark the property as private.C. Attach the Category attribute class to each property in the group. Set its value to UserAddress. Mark the property as public.D. Attach the Description attribute class to each property in the group. Set each value to a description of the given property.E. Attach the DefaultProperty attribute class to each property in the group. Set each value to a description of the given property.

You installed WebLogic, SOA Suite, and Oracle Service Bus on a machine and want to use the  WebLogic Node Manager to start servers for each product. Which statement is true?()A、You need to install a separate node manager for each Middleware Home that has a unique and  minor WebLogic Version Number.B、You need to install and configure only one instance of Node Manager for all products,  regardless of the WebLogic version number.C、You need to install and configure a separate Node Manager for each domain of each product  want to run on the machine.D、You need to install one Node Manager but use separate SSL certificates for each product when  securing the network communication to the machine.

you have 10 standalone servers that run windows server 2008. You install WSUS on a server named server1. You need to configure all of the servers to receive updates from server1. What should you do?()A、Configure the windows update settings on each server by using control panel.B、Run the wuauclt.exe /detectnow command on each server.C、Run the wuauclt.exe /reauthorization command on each server.D、Configure the windows update settings on each server by using local group policy.

You install three servers that run Windows Server 2003 Service Pack 2 (SP2). The servers are on the same subnet.You get the IP configuration for the servers as shown in the following table. You need to ensure that you can establish communication between the three servers. What should you do?()A、Modify the IP address on Server3. B、Modify the IP address on Server1. C、Configure the hosts file on each server. D、Modify the default gateway for each server.

You are preparing to install an operating system on virtual machines (VMs) in a Hyper-V environment. You need to configure each VM so that you can perform a network-based operating system installation. What should you do for each VM?()A、Add a Network Adapter.B、Add a Legacy Network Adapter.C、Configure a static MAC address.D、Configure a dynamic MAC address.

You are a network administrator for your company. The network consists of a single Active Directory domain. All servers run Windows Server 2003. The company’s main office is in Barcelona, and it has branch offices in Paris and London. The company has no immediate plans to expand or relocate the offices.   The company wants to connect the office networks by using a frame relay WAN connection and Routing and Remote Access servers that are configured with frame relay WAN adapters. Computers in each office will be configured to use the local Routing and Remote Access server as a default gateway. You are planning the routing configuration for the Routing and Remote Access servers.   You need to allow computers in Barcelona, Paris, and London to connect to computers in any office. You want to minimize routing traffic on the WAN connection.   What should you do?  ()A、 At each office, add the OSPF routing protocol to Routing and Remote Access, add the WAN adapter to the OSPF routing protocol, and deploy OSPF as a single-area internetwork.B、 At each office, add the RIP version 2 routing protocol to Routing and Remote Access, and configure the WAN adapter to use RIP version 2. Configure the outgoing packet protocol as RIP version 2 broadcast and the incoming packet protocol as RIP version 1 and 2.C、 At each office, add the RIP version 2 routing protocol to Routing and Remote Access, and configure the WAN adapter to use RIP version 2. Configure the outgoing packet protocol as RIP version 2 multicast and the incoming packet protocol as RIP version 2 only.D、 At each office, configure the Routing and Remote Access server with static routes to the local networks at the other two offices.

You are the network administrator for your company. The network consists of a single Active Directory domain with three sites named Site1, Site2, and Site3. The sites and site links are configured to use Site2 to connect Site1 and Site3. Each site contains three Windows Server 2003 domain controllers. A domaincontroller in each site is configured as a preferred bridgehead server. All user and group accounts are created in Site1. Several new users start work in Site2. When they attempt to log on to the network, the logon fails. You confirm that the user accounts are created and are visible in Site1 and Site2. You discover that the preferred IP bridgehead server in Site2 failed. You repair the server and confirm that replication is successful to Site2. You need to ensure that the failure of a single domain controller in any site will not interfere with Active Directory replication between sites.  What are two possible ways to achieve this goal?()A、 Configure an IP site link between Site1 and Site3.B、 Configure two domain controllers in each site as preferred IP bridgehead servers.C、 Configure two domain controllers in each site as preferred SMTP bridgehead servers.D、 Configure each site to have no preferred bridgehead servers.E、 Configure an SMTP site link between each of the sites. Assign a cost of 200 to the SMTP site link.

Your company has a main office and 10 branch offices. Each office has a direct link to the Internet.  Each branch office has a WAN link that connects to the main office. Your network consists of an Active Directory forest. Each office is configured as an Active Directory site.  You plan to deploy an Exchange Server 2010 Hub Transport server in each site. You need to design a message routing solution to meet the following requirements: .Branch office connections to the Internet must be used to deliver e-mail  .Branch office servers must use the WAN link to the main office to deliver e-mail to other branch offices.Branch office servers must be prevented from sending e-mail to the Internet by using the WAN link to themain office .The solution must minimize administrative overhead What should you include in the solution?()A、one Send connector for each siteB、one SMTP site link for each siteC、two Send connectors for each siteD、10 Send connectors for each site

You are the network administrator for your company. The network consists of a single Active Directory domain. All servers run Windows Server 2003. All client computers run Windows XP Professional.You install and configure a single server to run Windows Server Update Services (WSUS). You configure the appropriate Group Policy settings to specify separate WSUS target groups for client and server computers. You need to ensure that computers automatically assign themselves to the correct computer group.  What should you do?()A、In the WSUS console, configure Computer Options so that Use group policy or registry settings on computers is selected.B、In the WSUS console, configure Computer Options so that Use the Move Computers Task in Windows Server Update Services is selected.C、In the WSUS console, create the appropriate computer groups.D、Create organizational units (OUs) for each group.

You deploy mobile devices that run Microsoft Windows Mobile 5.0.   A Microsoft Windows Server 2003 server that runs Routing and Remote Access is configured to allow virtual private network (VPN) connections that are as secure as possible.   You need to connect the Windows Mobilebased devices to the VPN server. You also need to ensure that both ends of the VPN tunnel are authenticated.  Which two actions should you perform?()A、Select L2TP/IPSec on each Windows Mobilebased device.B、Obtain and install a certificate on each Windows Mobilebased device.C、Configure the appropriate pre-shared key on each Windows Mobilebased device.D、Select Point-to-Point Tunneling Protocol (PPTP) on each Windows Mobilebased device.

You have 10 stand alone servers taht run Windows Server 2008. You install WSUS on a server named Server1. You need to configure all of the servers to receive updates from Server1  What should you do()?  A、configure the windows Update Settings on each server by using control panelB、Run the wuauclt.exe /detectnow command on each serverC、Run the wuauclt.exe /reauthorization command on each serverD、Configure the Windows Update settings on each server by using local group policy.

You are designing a remote access strategy to meet the business and technical Requirement.  What should you do?()A、 Configure each server running Routing and Remote Access as a RADIUS Client.B、 Add a Remote Access policy to each server running Routing and Remote Access. Configure the Access method as VPN access.C、 Add a Remote Access policy to each server running Routing and Remote Access. Configure the Access method as dialup access.D、 Add a Remote Access policy to each server running Routing and Remote Access. Configure the Access method as wireless access.

our company has computers in multiple locations that use IPv4 and IPv6. Each location is protected by a firewall that performs symmetric NAT. You need to allow peer-to-peer communication between all locations. What should you do?()A、configure dynamic NAT on the firewall.B、configure the firewall to allow the use of teredo.C、Configure a link local IPv6 address for the internal interface of the firewall.D、Configure a global IPv6 address for the external interface of the firewall.

Your network contains two data centers named Datacenter1 and Datacenter2. An Active Directory site exists for each data center.  The data centers connect to the Internet by using a direct link.  The data centers connect to each other by using a high-speed WAN link.  You plan to deploy Exchange Server 2010 Mailbox servers in both data centers. You need to plan message routing to meet the following requirements:.Ensure outbound delivery of e-mail messages if a single server fails .Automatically load balance the Hub Transport server in each site .Deploy the minimum number of servers What should you include in the plan?()A、In each data center, deploy one Hub Transport server. Create and configure one Send connector.B、In each data center, deploy two Hub Transport servers. Create and configure one Send connector.C、In each data center, deploy one Edge Transport server. Create and configure two Send connectors.D、In each data center, deploy two Edge Transport servers. Create and configure two Send connectors.

Your company has computers in multiple locations that use IPv4 and IPv6. Each location is protected by a firewall that performs symmetric NAT. You need to allow peer-to-peer communication between all locations. What should you do? ()A、Configure dynamic NAT on the firewallB、Configure the firewall to allow the use of TeredoC、Configure a link local IPv6 address for the internal interface of the firewallD、Configure a global IPv6 address for the external interface of the firewall

You are a database administrator for your company. The company uses a SQL Server 2005 database. A full backup of the database is made each night. Transaction log backups are made each morning and each afternoon. You notice that the database transaction log file grows very large throughout the day. You need to minimize the size of the transaction log file. You also need to minimize data loss in the event of a failure. What should you do?()A、Decrease the amount of time between transaction log backups.B、Configure the database to use the simple recovery model.C、Configure the RECOVERY INTERVAL option to be a smaller value.D、Run DBCC SHRINKFILE on the transaction log file.

You are a network adminstrator for your company. You install an intranet application on three Windows Server 2003 computers. You configure the servers as a Network Load Balancing cluster. You configure each server with two network adapters. One network adapter provides client computers access to the servers. The second network adapter is for cluster communications. Cluster communications is on a separate network segment.   The network team wants to reduce the cluster’s vulnerability to attack. These servers need to be highly available. The network team decides that the Network Load Balancing cluster needs to filter IP ports. The team wants the cluster to allow only the ports that are required for the intranet application.   You need to implement filtering so that only the intranet application ports are available on the cluster. You need to achieve this goal by using the minimum amount of administrative effort.   What should you do?  ()A、 Use Network Load Balancing Manager to configure port rules. Allow only the intranet application ports on the cluster IP address.B、 Use TCP/IP filtering on each server. Configure only the intranet application ports on the network adapter that provides client computers access to the servers.C、 Use TCP/IP filtering on each server. Configure only the intranet application ports on both of the network adapters.D、 Configure Routing and Remote Access on each server. Use Routing and Remote Access input filters to allow only the intranet application ports on the network adapter that provides client computers access to the servers.

You need to identify each help desk user who bypasses the new corporate security policy. What should you do?()A、Configure Audit Special Logon and define Special Groups.B、Configure Audit Other Privilege Use Events and define Special Groups.C、Configure Audit Sensitive Privilege Use and configure auditing for the HelpDesk group.D、Configure Audit Object Access and modify the auditing settings for the HelpDesk group.

You need to ensure that SMTP e-mail messages can be delivered when the messages are sent to addresses that end with @fourthcoffee.com and are intended for the Exchange Server 5.5 environment. Which three courses of action should you perform?()A、Create mail-enabled contacts in the fourthcoffee.com domain for each Exchange Server 5.5 recipient. Establish the e-mail address to have an address that ends with @oldmail.fourthcoffee.comB、Create mail-enabled contacts in the fourthcoffee.com domain for each Exchange Server 5.5 recipient. Establish the e-mail address to have an address that ends with @fourthcoffee.comC、Configure each Exchange Server 5.5 recipient to have an address e-mail address that ends with @oldmail.fourthcoffee.com. Set the @oldmail.fourthcoffee.com address to be the default reply addressD、Configure each Exchange Server 5.5 recipient to have an additional e-mail address that ends with @oldmail.fourthcoffee.com. Set the @fourthcoffee.com address to be the default reply addressE、Configure each Exchange Server 5.5 recipient to use a single SMTP address that ends with @oldmail.fourthcoffee.comF、Configure an SMTP connector between the Exchange Server 2003 routing group at the Sydney office and the Exchange Server 5.5 site at the Sydney office. Configure the connector namespace to be oldmail.fourthcoffee.comG、Configure an SMTP connector between the Exchange Server 2003 routing group at the Sydney office and the Exchange Server 5.5 site at the Sydney office. Configure the connector namespace to be fourthcofee.com

单选题You are a network administrator for your company. The network consists of a single Active Directory domain. All servers run Windows Server 2003. The company’s main office is in Barcelona, and it has branch offices in Paris and London. The company has no immediate plans to expand or relocate the offices.   The company wants to connect the office networks by using a frame relay WAN connection and Routing and Remote Access servers that are configured with frame relay WAN adapters. Computers in each office will be configured to use the local Routing and Remote Access server as a default gateway. You are planning the routing configuration for the Routing and Remote Access servers.   You need to allow computers in Barcelona, Paris, and London to connect to computers in any office. You want to minimize routing traffic on the WAN connection.   What should you do?  ()A At each office, add the OSPF routing protocol to Routing and Remote Access, add the WAN adapter to the OSPF routing protocol, and deploy OSPF as a single-area internetwork.B At each office, add the RIP version 2 routing protocol to Routing and Remote Access, and configure the WAN adapter to use RIP version 2. Configure the outgoing packet protocol as RIP version 2 broadcast and the incoming packet protocol as RIP version 1 and 2.C At each office, add the RIP version 2 routing protocol to Routing and Remote Access, and configure the WAN adapter to use RIP version 2. Configure the outgoing packet protocol as RIP version 2 multicast and the incoming packet protocol as RIP version 2 only.D At each office, configure the Routing and Remote Access server with static routes to the local networks at the other two offices.

单选题You are designing a remote access strategy to meet the business and technical Requirement.  What should you do?()A Configure each server running Routing and Remote Access as a RADIUS Client.B Add a Remote Access policy to each server running Routing and Remote Access. Configure the Access method as VPN access.C Add a Remote Access policy to each server running Routing and Remote Access. Configure the Access method as dialup access.D Add a Remote Access policy to each server running Routing and Remote Access. Configure the Access method as wireless access.

单选题You are a network adminstrator for your company. You install an intranet application on three Windows Server 2003 computers. You configure the servers as a Network Load Balancing cluster. You configure each server with two network adapters. One network adapter provides client computers access to the servers. The second network adapter is for cluster communications. Cluster communications is on a separate network segment.   The network team wants to reduce the cluster’s vulnerability to attack. These servers need to be highly available. The network team decides that the Network Load Balancing cluster needs to filter IP ports. The team wants the cluster to allow only the ports that are required for the intranet application.   You need to implement filtering so that only the intranet application ports are available on the cluster. You need to achieve this goal by using the minimum amount of administrative effort.   What should you do?  ()A Use Network Load Balancing Manager to configure port rules. Allow only the intranet application ports on the cluster IP address.B Use TCP/IP filtering on each server. Configure only the intranet application ports on the network adapter that provides client computers access to the servers.C Use TCP/IP filtering on each server. Configure only the intranet application ports on both of the network adapters.D Configure Routing and Remote Access on each server. Use Routing and Remote Access input filters to allow only the intranet application ports on the network adapter that provides client computers access to the servers.

单选题You have an Exchange Server 2010 organization that contains 20 mailbox databases. You configure each database to retain all deleted items for 30 days.You need to ensure that all items that pass the retention period are permanently deleted daily between 02:00 and 06:00. Which cmdlet should you use?()ASet-MailboxDatabaseBSet-MailboxServerCSet-OrganizationConfigDSet-RetentionPolicy

单选题Your network contains two data centers named Datacenter1 and Datacenter2. An Active Directory site exists for each data center.  The data centers connect to the Internet by using a direct link.  The data centers connect to each other by using a high-speed WAN link.  You plan to deploy Exchange Server 2010 Mailbox servers in both data centers. You need to plan message routing to meet the following requirements:.Ensure outbound delivery of e-mail messages if a single server fails .Automatically load balance the Hub Transport server in each site .Deploy the minimum number of servers What should you include in the plan?()AIn each data center, deploy one Hub Transport server. Create and configure one Send connector.BIn each data center, deploy two Hub Transport servers. Create and configure one Send connector.CIn each data center, deploy one Edge Transport server. Create and configure two Send connectors.DIn each data center, deploy two Edge Transport servers. Create and configure two Send connectors.

单选题You deploy an Exchange organization.All servers in the organization have Exchange Server 2010 Service Pack 1 (SP1) installed.The organization contains two Hub Transport servers.The network contains two Active Directory sites named Site1 and Site2.Each site contains one Hub Transport server.Each site has a direct connection to the Internet.You need to configure message routing for the organization to meet the following requirements:   (1)E-mail messages sent to a SMTP domain named nwtraders.com must be delivered from Site2.   (2)If Site2 is unavailable, e-mail messages sent to nwtraders.com must be delivered from Sitel.  (3)E-mail messages sent to all other SMTP domains must be delivered from Sitel only.  What should you do?()ACreate two Send connectors.Assign one Hub Transport server as a source server to each Send connector.Configure the connectors as Scoped send connectors.BCreate one Send connector.Assign both Hub Transport servers as source servers.Configure the connector as a Scoped send connector.CCreate one Send connector.Assign both Hub Transport servers as source servers.Configure the address spaces for the connector, and then configure the costs for the address spaces.DCreate two Send connectors. Assign one Hub Transport server as a source server to each Send connector.Configure the address spaces for each connector.

单选题You are designing a remote access strategy to meet the business and technical Requirement. What should you do?()AConfigure each server running Routing and Remote Access as a RADIUS Client.  BAdd a Remote Access policy to each server running Routing and Remote Access. Configure the Access method as VPN access.  CAdd a Remote Access policy to each server running Routing and Remote Access. Configure the Access method as dialup access.  DAdd a Remote Access policy to each server running Routing and Remote Access. Configure the Access method as wireless access.