单选题You have an Exchange Server 2010 organization.  Your network is separated from the Internet by a firewall.  You need to identify the ports that must be opened on the firewall to allow clients from the Internet to usethe following connections methods:.Outlook Anywhere .Outlook Web App (OWA).Exchange ActiveSync .IMAP4 over Secure Sockets Layer (SSL) Which TCP ports should you identify?()A25, 443 and 993B26, 443 and 995C25, 80, 143, and 3269D80, 143, 443, and 389

单选题
You have an Exchange Server 2010 organization.  Your network is separated from the Internet by a firewall.  You need to identify the ports that must be opened on the firewall to allow clients from the Internet to usethe following connections methods:.Outlook Anywhere .Outlook Web App (OWA).Exchange ActiveSync .IMAP4 over Secure Sockets Layer (SSL) Which TCP ports should you identify?()
A

25, 443 and 993

B

26, 443 and 995

C

25, 80, 143, and 3269

D

80, 143, 443, and 389


参考解析

解析: 暂无解析

相关考题:

Your network contains one active directory domain. You have a member server that runs windows server 2008. You need to immediately disable all incoming connections to the server. What should you do?() A.From the services snap-in disable the IP helper.B.From the services snp-in disable the net logon service.C.From windows firewall. Enable the block all connections option on the public profile.D.From the windows firewall, enable the block all connections option on the domain profile.

Your computer uses both wired and wireless network connections. The networks are not connected to each other.You disallow incoming connections in Microsoft Windows Firewall. You create a shared folder. Users on the wireless network cannot access the shared folder. You need to allow access to the shared folder from the wireless network. You also need to maintain the security of the wired network.What should you do?()A.AB.BC.CD.D

Your network consists of an Active Directory forest that contains two sites named Site1 and Site2. From the Internet, users can only access servers in Site1. You have an Exchange Server 2007 organization.  Each site contains servers that run the Client Access server role, the Mailbox server role, and the HubTransport server role.  You plan to transition the organization to Exchange Server 2010.  You need to recommend the server role that you must transition first to Exchange Server 2010. Your solution must provide the least amount of downtime for users in the organization.  Which servers should you transition first?()A、the Client Access servers in Site1B、the Client Access servers in Site2C、the Hub Transport servers in Site1D、the Hub Transport servers in Site2

Your network contains an internal network and a perimeter network that are separated by a firewall. The perimeter network contains an Exchange Server 2010 Edge Transport server.  You plan to deploy an internal Exchange Server 2010 organization that meets the following requirements:.Support EdgeSync synchronization .Support encrypted delivery of outbound e-mail messages to the Edge Transport server .Minimize the attack surface of the internal network  Which TCP ports should you allow from the internal network to the perimeter network?()A、3389 and 25B、3389 and 636C、50636 and 25D、50636 and 135

You have an Exchange Server 2010 organization.  All users on the network connect to their mailboxes by using Microsoft Office Outlook. Your companys compliance policy states that: .A copy of e-mail messages sent to the human resources department from the Internet must be archived.All archived e-mail messages must be stored on a third-party archival server  You need to recommend a solution that meets the requirements of the compliance policy.  What should you include in the solution?()A、journal rulesB、personal archivesC、Retention PoliciesD、Transport Protection Rules

You have an Exchange Server 2010 organization.  The organization contains a global security group named Group1.  You plan to deploy a monitoring solution for the Exchange servers in your organization.  You need to recommend a solution that allows members of Group1 to monitor the performance of Exchange Server 2010 servers.  Your solution must prevent members of Group1 from modifying the configurations of the Exchanges Server 2010 organization.  What should you include in the solution?()A、Delegation of Control WizardB、Federation TrustsC、Reliability MonitorD、Role Based Access Control (RBAC)

You have a VPN server that runs Windows Server 2003 Service Pack 2 (SP2). The VPN server supports only PPTP connections. A firewall protects the VPN server from the Internet. From a remote computer connected to the Internet, you attempt to connect to the VPN server. During the connection attempt, you receive a message that your user name and password are being verified. You then receive the following error message: “Error 721: The remote computer is not responding.”You need to ensure that you can establish a VPN connection to the VPN server from the Internet.  What should you do?()A、On the VPN server, enable LAN routing.B、On the VPN server, create a demand-dial interface.C、On the firewall, allow inbound connections that use TCP port 1701.D、On the firewall, allow inbound connections that use Generic Route Encapsulation (GRE) protocol 47.

You have an Exchange Server 2010 organization.  An Edge Transport server sends and receives all e- mail messages from the Internet.  You notice that some servers on the Internet identify e-mail messages from your organization as spam. You need to minimize the possibility that e-mail messages sent from your organization are identified asspam.  What should you do?()A、Implement Microsoft Forefront Security for Exchange Server.B、Create SenderID TXT records for the Edge Transport servers.C、Configure the Edge Transport servers to use a real-time block list (RBL).D、Install a server certificate from a trusted third-party certification authority (CA).

You have an Exchange Server 2010 organization.  You plan to deploy a monitoring solution for Exchange Server 2010.  You need to recommend a solution to track the usage of ActiveSync clients and to analyze usage trends.  What should you include in the solution?()A、Internet Information Server log filesB、Exchange Server Mail Flow TroubleshooterC、Exchange Server Performance TroubleshooterD、Microsoft System Center Configuration Manager

You have an Exchange Server 2010 organization.  The organization contains a global security group named Group1.  You plan to deploy a monitoring solution for the Exchange servers in your organization.  You need to recommend a solution that allows members of Group1 to monitor the performance of Exchange Server 2010 servers.  Your solution must prevent members of Group1 from modifying the configurations of the ExchangesServer 2010 organization.  What should you include in the solution?()A、Delegation of Control WizardB、Federation TrustsC、Reliability MonitorD、Role Based Access Control (RBAC)

You have an Exchange Server 2010 organization.  Your network is separated from the Internet by a firewall.  You need to identify the ports that must be opened on the firewall to allow clients from the Internet to usethe following connections methods:.Outlook Anywhere .Outlook Web App (OWA).Exchange ActiveSync .IMAP4 over Secure Sockets Layer (SSL) Which TCP ports should you identify?()A、25, 443 and 993B、26, 443 and 995C、25, 80, 143, and 3269D、80, 143, 443, and 389

You work as the enterprise exchange administrator at Xxx .The Xxx network consists of a domain named xxx .Xxx has an Exchange Server 2010 server named XXX-EX01 that has the Hub Transport server role installed.What actions must you take to allow XXX-EX01 to receive e-mail from the Internet?()A、You must change the properties of the MSExchangePOP3 (TCP-in) Windows Firewall rule.B、You must create and export a filter from the Exchange Management Console.C、You must select the Anonymous user’s permission group for the Default XXX-EX01 Receive connector.D、You must configure Outlook Anywhere.

You work as the exchange administrator at TestKing.com. The TestKing.com network contains an Exchange Server 2010 Organization. You are responsible for managing the Exchange network forTestKing.com. All servers on the TestKing.com network are configured to run Exchange Server 2010.At present the network is separated from the Internet by means of a firewall. You receive an instructionform management to ensure that customers from the Internet to use Outlook Anywhere, Outlook Web App(OWA), Exchange ActivSync as well as IMAP4 over Secure Sockets Layer (SSL). You thus need todetermine the TCP ports that you need to open. What should you do?()A、You should consider opening port 25, port 80, port 143 as well as port 3269.B、You should consider opening port 25, port 443 as well as port 993.C、You should consider opening port 80, port 143, port 443 as well as port 389.D、You should consider opening port 26, port 443 as well as port 995.

Your network contains two Active Directory sites named Site1 and Site2. Only Site1 can be accessed from the Internet. You have an Exchange Server 2010 organization.  You deploy a Client Access server in Site1 and enable Windows Integrated Authentication for OutlookWeb App (OWA).  In Site2, you deploy a Mailbox server and a Client Access server.  You need to configure the Exchange organization to meet the following requirements: .Allow users to access their mailboxes from the Internet by using OWA  .Prevent authentication prompts from displaying when users connect to OWA by using domain- joinedcomputers that are connected to the internal network  What should you do?()A、Modify the Exchange virtual directory on the Client Access server in Site1.B、Modify the Exchange virtual directory on the Client Access server in Site2.C、Modify the OWA virtual directory on the Client Access server in Site1.D、Modify the OWA virtual directory on the Client Access server in Site2.

Your network contains two Active Directory sites named Site1 and Site2. Only Site1 can be accessed from the Internet. You have an Exchange Server 2010 organization.  You deploy a Client Access server in Site1 and enable Windows Integrated Authentication for OutlookWeb App (OWA).  In Site2, you deploy a Mailbox server and a Client Access server.  You need to configure the Exchange organization to meet the following requirements: .Allow users to access their mailboxes from the Internet by using OWA  .Prevent authentication prompts from displaying when users connect to OWA by using domain- joined computers that are connected to the internal network  What should you do?()A、Modify the Exchange virtual directory on the Client Access server in Site1.B、Modify the Exchange virtual directory on the Client Access server in Site2.C、Modify the OWA virtual directory on the Client Access server in Site1.D、Modify the OWA virtual directory on the Client Access server in Site2.

单选题You have an Exchange Server 2010 organization.  The organization contains a global security group named Group1.  You plan to deploy a monitoring solution for the Exchange servers in your organization.  You need to recommend a solution that allows members of Group1 to monitor the performance ofExchange Server 2010 servers.  Your solution must prevent members of Group1 from modifying the configurations of the ExchangesServer 2010 organization.  What should you include in the solution?()ADelegation of Control WizardBFederation TrustsCReliability MonitorDRole Based Access Control (RBAC)

单选题You have an Exchange Server 2010 organization.  The organization contains a global security group named Group1.  You plan to deploy a monitoring solution for the Exchange servers in your organization.  You need to recommend a solution that allows members of Group1 to monitor the performance of Exchange Server 2010 servers.  Your solution must prevent members of Group1 from modifying the configurations of the ExchangesServer 2010 organization.  What should you include in the solution?()ADelegation of Control WizardBFederation TrustsCReliability MonitorDRole Based Access Control (RBAC)

单选题Your network contains an internal network and a perimeter network that are separated by a firewall. The perimeter network contains an Exchange Server 2010 Edge Transport server.  You plan to deploy an internal Exchange Server 2010 organization that meets the following requirements:.Support EdgeSync synchronization .Support encrypted delivery of outbound e-mail messages to the Edge Transport server .Minimize the attack surface of the internal network  Which TCP ports should you allow from the internal network to the perimeter network?()A3389 and 25B3389 and 636C50636 and 25D50636 and 135

单选题You have an Active Directory domain named contoso.com.You have an Exchange Server 2010  organization that contains a Client Access server named CAS1.Users connect to CAS1 from the Internet by using mail.contoso.com.The organization contains the following mobile clients:  (1)Windows Mobile 5.0 (2)Windows Mobile 6.1  (3)Windows Mobile 6.5  You plan to install a certificate on CAS1.You need to ensure that all clients can connect to CAS1 from the Internet by using Exchange ActiveSync.Which name should you include in the certificate?()Acontoso.comBCAS1.contoso.comCEAS.contoso.comDmail.contoso.com

单选题You work as the exchange administrator at TestKing.com. The TestKing.com network contains an Exchange Server 2010 Organization. You are responsible for managing the Exchange network forTestKing.com. All servers on the TestKing.com network are configured to run Exchange Server 2010.At present the network is separated from the Internet by means of a firewall. You receive an instructionform management to ensure that customers from the Internet to use Outlook Anywhere, Outlook Web App(OWA), Exchange ActivSync as well as IMAP4 over Secure Sockets Layer (SSL). You thus need todetermine the TCP ports that you need to open. What should you do?()AYou should consider opening port 25, port 80, port 143 as well as port 3269.BYou should consider opening port 25, port 443 as well as port 993.CYou should consider opening port 80, port 143, port 443 as well as port 389.DYou should consider opening port 26, port 443 as well as port 995.

单选题Your network contains two Active Directory sites named Site1 and Site2. Only Site1 can be accessed from the Internet. You have an Exchange Server 2010 organization.  You deploy a Client Access server in Site1 and enable Windows Integrated Authentication for OutlookWeb App (OWA).  In Site2, you deploy a Mailbox server and a Client Access server.  You need to configure the Exchange organization to meet the following requirements:.Allow users to access their mailboxes from the Internet by using OWA  .Prevent authentication prompts from displaying when users connect to OWA by using domain- joinedcomputers that are connected to the internal network  What should you do?()AModify the Exchange virtual directory on the Client Access server in Site1.BModify the Exchange virtual directory on the Client Access server in Site2.CModify the OWA virtual directory on the Client Access server in Site1.DModify the OWA virtual directory on the Client Access server in Site2.

单选题Your network consists of an Active Directory forest that contains two sites named Site1 and Site2. From the Internet, users can only access servers in Site1. You have an Exchange Server 2007 organization.  Each site contains servers that run the Client Access server role, the Mailbox server role, and the HubTransport server role.  You plan to transition the organization to Exchange Server 2010.  You need to recommend the server role that you must transition first to Exchange Server 2010. Your solution must provide the least amount of downtime for users in the organization.  Which servers should you transition first?()Athe Client Access servers in Site1Bthe Client Access servers in Site2Cthe Hub Transport servers in Site1Dthe Hub Transport servers in Site2

单选题You have an Exchange Server 2010 organization.  An Edge Transport server sends and receives all e- mail messages from the Internet.  You notice that some servers on the Internet identify e-mail messages from your organization as spam. You need to minimize the possibility that e-mail messages sent from your organization are identified asspam.  What should you do?()AImplement Microsoft Forefront Security for Exchange Server.BCreate SenderID TXT records for the Edge Transport servers.CConfigure the Edge Transport servers to use a real-time block list (RBL).DInstall a server certificate from a trusted third-party certification authority (CA).

单选题You have an Exchange Server 2010 organization.  All users on the network connect to their mailboxes by using Microsoft Office Outlook. Your companys compliance policy states that: .A copy of e-mail messages sent to the human resources department from the Internet must be archived .All archived e-mail messages must be stored on a third-party archival server  You need to recommend a solution that meets the requirements of the compliance policy.  What should you include in the solution?()Ajournal rulesBpersonal archivesCRetention PoliciesDTransport Protection Rules

单选题You have an Exchange Server 2010 organization.  The organization contains a global security group named Group1.  You plan to deploy a monitoring solution for the Exchange servers in your organization.  You need to recommend a solution that allows members of Group1 to monitor the performance of Exchange Server 2010 servers.  Your solution must prevent members of Group1 from modifying the configurations of the Exchanges Server 2010 organization.  What should you include in the solution?()ADelegation of Control WizardBFederation TrustsCReliability MonitorDRole Based Access Control (RBAC)

单选题You have an Exchange Server 2010 organization.  Your network is separated from the Internet by a firewall.  You need to identify the ports that must be opened on the firewall to allow clients from the Internet to usethe following connections methods:.Outlook Anywhere .Outlook Web App (OWA) .Exchange ActiveSync .IMAP4 over Secure Sockets Layer (SSL) Which TCP ports should you identify?()A25, 443 and 993B26, 443 and 995C25, 80, 143, and 3269D80, 143, 443, and 389

单选题Your network contains two Active Directory sites named Site1 and Site2. Only Site1 can be accessed from the Internet. You have an Exchange Server 2010 organization.  You deploy a Client Access server in Site1 and enable Windows Integrated Authentication for OutlookWeb App (OWA).  In Site2, you deploy a Mailbox server and a Client Access server.  You need to configure the Exchange organization to meet the following requirements: .Allow users to access their mailboxes from the Internet by using OWA  .Prevent authentication prompts from displaying when users connect to OWA by using domain- joined computers that are connected to the internal network  What should you do?()AModify the Exchange virtual directory on the Client Access server in Site1.BModify the Exchange virtual directory on the Client Access server in Site2.CModify the OWA virtual directory on the Client Access server in Site1.DModify the OWA virtual directory on the Client Access server in Site2.

单选题You have a VPN server that runs Windows Server 2003 Service Pack 2 (SP2). The VPN server supports only PPTP connections. A firewall protects the VPN server from the Internet. From a remote computer connected to the Internet, you attempt to connect to the VPN server. During the connection attempt, you receive a message that your user name and password are being verified. You then receive the following error message: “Error 721: The remote computer is not responding.”You need to ensure that you can establish a VPN connection to the VPN server from the Internet.  What should you do?()AOn the VPN server, enable LAN routing.BOn the VPN server, create a demand-dial interface.COn the firewall, allow inbound connections that use TCP port 1701.DOn the firewall, allow inbound connections that use Generic Route Encapsulation (GRE) protocol 47.