单选题You need to design a method to modify the current e-mail ordering system. Which will be used until Fourth Coffee deploys the Web-based ordering application. Your solution must address business concerns and improve security. What should you do?()AConfigure the mail server to disallow SMTP relayingBInstruct customers to obtain digital certificates from a trusted commercial authority (CA), and digitally sign all order e-mail messages. Reject unsigned order e-mail messagesCProvide customers with a public encryption key, and instruct them to encrypt all order e-mail messages. Reject unencrypted e-mail messagesDImplement an e-mail filtering solution, and add customer e-mail addresses to the list of allowed addresses. Reject e-mail messages from other addresses

单选题
You need to design a method to modify the current e-mail ordering system. Which will be used until Fourth Coffee deploys the Web-based ordering application. Your solution must address business concerns and improve security. What should you do?()
A

Configure the mail server to disallow SMTP relaying

B

Instruct customers to obtain digital certificates from a trusted commercial authority (CA), and digitally sign all order e-mail messages. Reject unsigned order e-mail messages

C

Provide customers with a public encryption key, and instruct them to encrypt all order e-mail messages. Reject unencrypted e-mail messages

D

Implement an e-mail filtering solution, and add customer e-mail addresses to the list of allowed addresses. Reject e-mail messages from other addresses


参考解析

解析: 暂无解析

相关考题:

You are creating a class that performs complex financial calculations.The class contains a method named GetCurrentRate that retrieves the current interest rate and a variable named currRate that stores the current interest rate.You write serialized representations of the class.You need to write a code segment that updates the currRate variable with the current interest ratewhen an instance of the class is deserialized.Which code segment should you use?()A.B.C.D.

Your company has a single Active Directory Domain Services (AD DS) domain and 1,000 Windows Vista computers.  You are planning to deploy Windows 7 and a custom application.   You have the following requirements:   The application must be available to only a specific group of users. You must be able to monitor application usage.   You need to design a deployment method for the custom application that meets the requirements.  Which deployment method should you use in your design?()A、software installation in Group PolicyB、startup scripts in Group PolicyC、Microsoft Application Virtualization (App-V)D、baseline Windows 7 image that includes the custom application

You have a server that runs Windows Server 2008. The server has the Windows SharePoint Services (WSS) server role installed. The server is configured to accept incoming e-mail. You create a new document library.  You need to ensure that any user can send e-mail to the document library. What should you do?()A、Modify the RSS setting for the document library.B、Modify the permissions for the document library.C、Modify the incoming e-mail settings for the document library.D、Enable anonymous authentication for the Web application.

You need to design the retrieval of advertising statistics without compromising security. What should you do?()A、Design a Notification Services solution that sends the advertising statistics to specified subscribers by e-mail.B、Design a SQL Server Web service that runs a stored procedure to return the statistics on a call from the advertisers application.C、Design a Database Mail solution that sends the advertising statistics to e-mail addresses that are specified in a table.D、Design a stored procedure to return the statistics on a call from the advertisers application.E、Design a user-defined function to return the statistics on a call from the advertisers application.

You use Microsoft .NET Framework 4 to create a Windows Presentation Foundation (WPF) application. The application uses the background worker process (BWP). When the user clicks a button, the background worker executes a method named DoCalculations asynchronously. You need to implement a progress bar on the user interface (UI) that informs the user of the progress of DoCalculations. Which two actions should you perform?()A、Modify the Value property of the progress bar in DoCalculations.B、Modify the Value property of the progress bar in the ProgressChanged event handler of the background worker.C、Modify the Value property of the progress bar in the RunWorkerCompleted event handler of the background worker.D、Call the ReportProgress method of the background worker in DoCalculations.E、Call the ReportProgress method of the background worker in the DoWork event handler of the background worker.

You have an Exchange organization.All servers in the organization have Exchange Server 2010 Service Pack l (SP1) installed.An external user reports that when he sends e-mail messages to the organization, they are not received.You suspect that the e-mail messages he sends are incorrectly identified as spam.You need to identify which anti-spam filter is blocking the e-mail messages. What should you do?()A、Modify the protocol logging level, and then review the protocol logs.B、Modify the connectivity log settings, and then review the connectivity logs.C、Modify the message tracking settings, and then review the message tracking logs.D、Enable pipeline tracing, and then review the trace.

You are developing a WCF service. The service includes an operation names GetProduct. You need to ensure that GetProduct will accept a POST request and will indicate that the returned data is XML.   Which two actions should you perform?()A、Add the WebGet attribute to the service contract.B、Set WebOperationContext.Current.OutgoingRequest.ContentType to "text/xml" in the GetProduct method.C、Add the WebInvoke attribute to the service contract.D、Set WebOperationContext.Current.OutgoingResponse.ContentType to "text/xml" in the GetProduct method.

You need to design a method to log changes that are made to servers and domain controllers. You also need to track when administrators modify local security account manager objects on servers. What should you do?()A、Enable failure audit for privilege user and object access on all servers and domain controllersB、Enable success audit for policy change and account management on all servers and domain controllersC、Enable success audit for process tracking and logon events on all servers and domain controllersD、Enable failure audit for system events and directory service access on all servers and domain controllers

You have an DNS server that runs Windows Server 2003 Service Pack 2 (SP2). You need to ensure that an e-mail message is sent to the administrator if the DNS server service stops. You create a script that sends e-mail when the script is executed.  What should you do next?()A、Install the POP3 service on the DNS server.B、Modify the DNS Server service dependencies.C、Modify the DNS Server service Recovery options.D、Install the Universal Description, Discovery, and Integration (UDDI) services on the DNS server.

You need to design a method to address the chief information officer’s security concerns. What should you do?()A、Configure Windows Management Instrumentation (WMI) filtering options in the Default Domain Policy GPOB、Use the gpresult commandC、Use Mbsacli.exeD、Configure software restriction policy options in the Default Domain Policy GPO

You need to design an e-mail access strategy for remote users. What should you do? () A、 Instruct remote users to connect to their e-mail by using RPCB、 Instruct remote users to connect to Outlook Web Access by using only HTTPSC、 Instruct remote users to connect to the company network by using PPTP connectionsD、 Instruct remote users to connectd to their e-mail by using RPC over HTTP Configure the HTTP servers to require encryption.

Your company has an Exchange Server 2010 Hub Transport server named Hub1.Hub1 receives all e-mail sent to the company from the Internet.You install the anti-spam agents on Hub1.You need to ensure that Hub1 only accepts messages sent to e-mail addresses listed in ActiveDirectory.What should you do?()A、Modify the properties of the Sender Filtering agent.B、Modify the properties of the Recipient Filtering agent.C、Modify the properties of the default Accepted Domain.D、Modify the properties of the default Receive Connector.

You are developing a custom-collection class.You need to create a method in your class. You need to ensure that the method you create in your class returns a type that is compatible with the Foreach statement. Which criterion should the method meet?()A、The method must return a type of either IEnumerator or IEnumerable.B、The method must return a type of IComparable.C、The method must explicitly contain a collection.D、The method must be the only iterator in the class.

You have a portable computer that runs Windows 7. Windows Backup is configured to run every day at15:00. You need to prevent backups from automatically running when the computer is running on thebattery.  What should you do?()A、From Backup and Restore, click Change settings.B、From Task Scheduler, modify the AutomaticBackup task.C、From Power Options, modify the settings of the current power plan.D、From the local computer policy, modify the power management settings.

Your application uses two threads, named threadOne and threadTwo. You need to modify the code to prevent the execution of threadOne until threadTwo completes execution. What should you do?()A、 Configure threadOne to run at a lower priority.B、 Configure threadTwo to run at a higher priority.C、 Use a WaitCallback delegate to synchronize the threads.D、 Call the Sleep method of threadOne. E、 Call the SpinLock method of threadOne.

ou have an DNS server that runs Windows Server 2003 Service Pack 2 (SP2).You need to ensure that an e-mail message is sent to the administrator if the DNS server service stops.You create a script that sends e-mail when the script is executed. What should you do next?()A、Install the POP3 service on the DNS server. B、Modify the DNS Server service dependencies. C、Modify the DNS Server service Recovery options. D、Install the Universal Description, Discovery, and Integration (UDDI) services on the DNS server.

You have an Exchange Server 2010 organization named contoso.com.Your company acquires a company named Fabrikam, Inc. You plan to create new mailboxes for each user from Fabrikam.You need to ensure that each new mailbox can receive e-mail messages sent to fabrikam.com.The solution must not prevent the organization from receiving e-mails sent to contoso.com. What should you do?()A、Create an accepted domain and then create a new e-mail address policy.B、Create a remote domain and then modify the default e-mail address policy.C、Create a Receive connector and then create a managed folder mailbox policy.D、Modify the default accepted domain and then modify the default e-mail address policy.

You have an Exchange Server 2010 organization that contains an accepted domain named fabrikam.com.You need to automatically forward to another server all e-mail messages sent to fabrikam.com recipients who do not exist in the organization. Which properties should you modify?()A、accepted domainB、default e-mail address policyC、default Receive connectorD、default remote domain

Your company acquires a new Internet domain name.You need to ensure that all users can receive e-mail messages sent to the new domain name.Which two actions should you perform?()A、Create a sharing policy.B、Create a remote domain.C、Create an accepted domain.D、Create an e-mail address policy.E、Modify the properties of the default Receive connector.

You have an Exchange organization.All servers in the organization have Exchange Server 2010 Service Pack 1 (SP1) installed.You need to identify why a remote SMTP server rejects e-mail sent from the organization. What should you do?()A、Modify the diagnostic logging level on the MSExchangeTransportService object, and then review the Application event logB、Modify the connectivity log settings on the Transport server, and then review the connectivity logs.C、Modify the message tracking settings on the Transport server, and then review the message tracking logs.D、Modify the protocol logging level on the Send connectors, and then review the protocol logs.

单选题You have a computer that runs Windows 7. You generate a System Diagnostic Report and receive thefollowing warning message: The Graphics rating for the system is poor and may be the cause of performance problems. You need to increase the graphics performance of the computer without modifyingthe current hardware or drivers.  What should you do?()AFrom Personalization, modify the screen saver.BFrom Indexing Options, modify the Advanced options.CFrom Performance Options, modify the visual effects.DFrom Performance Options, modify the processor scheduling.

单选题You develop a service application named PollingService that periodically calls long-running procedures.These procedures are called from the DoWork method.You use the following service application code:   When you attempt to start the service, you receive the following error message: Could not start the PollingService service on the local computer.Error 1053: The service did not respond to the start or control request in a timely fashion. You need to modify the service application code so that the service starts properly.What should you do?()A Move the loop code into the constructor of the service class from the OnStart method.B Drag a timer component onto the design surface of the service. Move the calls to the long-running procedure from the OnStart method into the Tick event procedure of the timer, set the Enabled property of the timer to True, and call the Start method of the timer in the OnStart method.C Add a class-level System.Timers.Timer variable to the service class code. Move the call to the DoWork method into the Elapsed event procedure of the timer, set the Enabled property of the timer to True, and call the Start method of the timer in the OnStart method.D Move the loop code from the OnStart method into the DoWork method.

单选题You are developing a Windows Presentation Foundation (WPF) application.You need to display HTML content from a Web page on the WPF form. What should you do?()AAdd a FlowDocumentReader control to the design surface. Then create a FlowDocument control.BAdd a DocumentViewer control to the design surface. Then create a FixedDocument control.CAdd a WebBrowser control to the design surface. Then use the Navigate method to navigate the URI object.DAdd a ContentControl control to the design surface. Then reference a WebClient object to return an HTML string.

单选题You have an Exchange Server 2010 Service Pack 1 organization named contoso.com.All users have the  contoso.com e-mail address suffix. You discover that both anonymous and authenticated users can post content to a public folder named Folder1 by sending e-mail messages to folder1@contoso.com.You need to prevent all users from posting content to Folder1 by sending e-mail.What should you do?()AFrom Outlook Web App (OWA), modify the properties of Folder1.BFrom the Exchange Management Shell, modify the permissions of the default Receive connector.CFrom the Public Folder Management Console, modify the properties of Folder1.DFrom the Exchange Management Console, modify the properties of the Public Folder database.

单选题You have an Exchange Server 2003 organization. You install a new Exchange Server 2010 server in the organization. You need to ensure that you can modify the default e-mail address policy by using the Exchange Management Console (EMC) What should you do?()ARun the Set-EmailAddressPolicy cmdlet.BRun the Update-EmailAddressPolicy cmdlet.CFrom the Exchange System Manager, modify the properties of the default recipient policy.DFrom the EMc, select the E-mail Address Policies tab, right-click Default Policy, and then click apply.

单选题You have an Exchange Server 2010 organization named contoso.com.Your company acquires a company named Fabrikam, Inc. You plan to create new mailboxes for each user from Fabrikam.You need to ensure that each new mailbox can receive e-mail messages sent to fabrikam.com.The solution must not prevent the organization from receiving e-mails sent to contoso.com. What should you do?()ACreate an accepted domain and then create a new e-mail address policy.BCreate a remote domain and then modify the default e-mail address policy.CCreate a Receive connector and then create a managed folder mailbox policy.DModify the default accepted domain and then modify the default e-mail address policy.

单选题You are developing a custom-collection class.You need to create a method in your class. You need to ensure that the method you create in your class returns a type that is compatible with the Foreach statement. Which criterion should the method meet?()AThe method must return a type of either IEnumerator or IEnumerable.BThe method must return a type of IComparable.CThe method must explicitly contain a collection.DThe method must be the only iterator in the class.