Tìm kiếm:
TRANG NHÀ
Giới thiệu VNEDU.ORG
Điều khoản và bản quyền
Liên lạc VNEDU
TRẮC NGHIỆM TRỰC TUYẾN
---Công Cụ:---
Soạn Biểu thức
Bảng màu HTML
Ký hiệu đặc biệt 01
Ký hiệu đặc biệt 02
Ký hiệu đặc biệt 03
Ký hiệu đặc biệt 04
Ký hiệu đặc biệt 05
Ký hiệu đặc biệt 06
Ký hiệu đặc biệt 07
Ký hiệu đặc biệt [Toán]
Tin Học   ||  Căn Bản    Văn Phòng    Hệ Thống - Mạng    Phần Mềm Ứng Dụng    Kỹ thuật số    Lập trình    SQL  

Microsoft Exchange Server 2010 - Test 63
Ngày làm bài: Hôm nay lúc 18:30:05 (Server time)
Số câu hỏi: 10.   Tổng điểm: 10
Yêu cầu hoàn thành: 60 phút.
Thời gian còn lại: 
Cỡ chữ câu hỏi:  Cỡ chữ đáp án:


1-
Company.com has recently configured an exchange server named ex01 with a single mailbox database. Company.comis aware that the network users user microsoft office outlook and outlook web app.
During your routine maintenance you discover that the network users are unable to restore e-mail messages from the Recover Deleted Items folder. During the course of the business week you receive instruction from Company.com to ensure that the network users are able to restore e-mail messages from the Recover Deleted Items folder.
What should you do?
  A - 
You should consider having a management rolecreated and assigned to all users from the Exchange Management Shell.
  B - 
You should consider having a retention policy created and assigned to all users from the Exchange Management Shell.
  C - 
You should consider having the propertiesof the mailbox database modified from the Exchange Management Console (EMC).
  D - 
You should consider having the properties of the Mailbox server object modified from the Exchange Management Console (EMC).
2-
Company.com has recently configured the mailbox server as members of a database availability group (DAG) with a public folder database. During the course of the business week you receive instruction from Company.com to create a new Active Directory site and install Exchange server in the site whilst ensuring the public folders are stored on servers in both sites.
What should you do?
  A - 
You should consider having clustered continuous replication (CCR) configured on two servers in the new site.
You should then have the replication settings for all public folder databases modified.
  B - 
You should consider having the standby continuous replication (SCR) configured on a server in the new site.
You should then have the Enable-StorageGroupCopycmdlet run from a server in the new site.
  C - 
You should consider having a public folder database created on a server in the new site.
You should then have the replication settings for all public folders modified.
  D - 
You should consider having a public folder database created on a server in the new site.
You should then have the set-DatabaseAvailabilityGroup cmdlet run from a server in the new site.
3-
The Company.com organization makes use of Microsoft Exchange Server 2010 as their messaging solution. During the course ofthe business week you receive instruction from Company.com to create Personal Archives for the users with mailboxes.
What should you do?
  A - 
You should consider having the Exchange Management Console (EMC) tool used.
  B - 
You should consider having Microsoft Office Outlook tool used.
  C - 
You should consider having Active Directory Users and Computers tool used.
  D - 
You should consider having the Exchange Control Panel (ECP) tool used.
4-
The Company.com Exchange organization configuration is shown in the table below: Company.com has additionallydeployed a new client access server named -ex04 and has successfully updates the required dns records for -ex04.
During the course of the business week you receive instruction from Company.com to ensure that the network users on -ex03 are able to successfully access their mailboxes using exchange activesync.
What should you do?
  A - 
you should consider having the set-activesyncvirtualdirectory -identity "server3\ microsoft-server-activesync (default web site)" -basicauthentication:$true command run from the exchange management shell on -ex03
  B - 
you should consider having the authentication type for the microsoft-server-activesync virtual directory set t ntlm on -ex01.
  C - 
you should consider having the new- activesyncdeviceaccessrule-query string * -characteristic device model -accesslevel allow command run from the exchange mangement shell on -ex04.
  D - 
you should consider having the authentication type for the microsoft-server-activesync virtual directory set to anonymous on -ex01.
5-
Company.com has recently deployed a computer named -ex01 which has the client access, hub transport and mailbox server roles installed. during the course of the business week you receive instruction from Company.com to ensure that the network users are able to send and receive e-mail using windows live mail or microsoft office outlook express.
What should you do?
  A - 
You should consider having the propertiesof the MSExchangePOP3 (TCP-in) Windows Firewall rule modified.
  B - 
You should consider having the properties of the MSExchangeMailSubmission -RPC (TCP-in) Windows Firewall rule modified.
  C - 
You should consider having the SMTP server feature installed and configured.
  D - 
You should consider having the Microsoft Exchange POP3 service started. You should then have the startup type set to Automatic.
6-
The Company.com organization makes use of Microsoft Exchange Server 2010 as their messaging solution.
During the course ofthe business week you receive instruction from Company.com to prevent the network user named Rory Allen from downloading attachments which are larger than 50 KB when making use ofExchange ActiveSync whilst ensuring your solution affects no other users.
What should you do?
  A - 
You should consider having the properties of Rory Allen's mailbox modified.
  B - 
You should consider having the properties ifthe default Exchange ActiveSync Mailbox policy modified.
  C - 
You should consider having a new ActiveSynce Device Access rule created.
  D - 
You should consider having a new Exchange ActiveSync Mailbox policy created.
7-
The Company.com network currently consists of a single Active Directory forest containing a single domain named Company.com.
The Company.com organization makes use of Microsoft Exchange Server 2010 as their messaging solution. During the course ofthe business week you receive instruction from Company.com to install a new Exchange server tothe network whilst ensuring that the network users are able to connect from the Internet to the new server using Exchange ActiveSync.
What should you do?
  A - 
You should consider having the external URL for the Microsoft-Server-ActiveSync virtual directory modified.
  B - 
You should consider having the internal URL for the Microsoft-Server-ActiveSync virtual directory modified.
  C - 
You should consider having the Windows Integrated Authentication enabled for the Microsoft-Server-ActiveSync virtual directory.
  D - 
You should consider having the Anonymous authentication enabled for the Microsoft-Server-ActiveSync virtual directory.
8-
Company.com has an Exchange Server 2010 organization. the Company.com contains an exchange server 2010 client access server named -ex12.
Company.com has an employee named andy booth. he uses exchange activesync to down load attachment. you have received instructions from the cio to limit andy booth's attachments size; however your action should not in any way affect the other employees at Company.com.
What should you do?
  A - 
The best option is to set up a new managed content setting.
  B - 
The best option is to change Andy Booth's message size restrictions.
  C - 
The best option is to set up a new Exchange ActiveSync mailbox policy.
  D - 
The best option is to change the default Exchange ActiveSync mailbox policy.
9-
The Company.com contains an exchange server 2010 client access server named -ex13. the mobile clients at Company.com are configured to either run windows mobile 5.0, windows mobile 6.1 or windows mobile 6.5. the mobile users use the internet to connect to -ex13, using mail.Company.com. you have received instructions from the cio to equip -ex13 with a certificate. however, the mobile users need to connect to -ex13 from the internet via exchange activesync.
What should you do?
  A - 
You should consider including Company.com in the certificate.
  B - 
You should consider including -ex13.Company.com in the certificate.
  C - 
You should consider including EAS.Company.com in the certificate.
  D - 
You should consider including mail.Company.com in the certificate.
10-
Company.com has an Exchange Server 2010 organization. the Company.com contains two exchange server 2010 client access server named -ex14 and -ex15 that has imap4installed. remote users from the internet make use of imap4 to connect to -ex14 and -ex15. you have received instructions from the cio not to allow the users to use imap4 to connect to their mailboxes on -ex15.
What should you do?
  A - 
the best option is to change the imap4 retrieval settings on -ex15.
  B - 
the best option is to access the -ex15 and disable the imap4 mailbox feature for the mailboxes.
  C - 
the best option is to configure the windows firewall on -ex14 to block tcp port 25 and 110.
  D - 
the best option is to configure the windows firewall on -ex14 to block tcp port 110 and 995.
 
[Người đăng: Thành Lãm - ST]
Ghé thăm Kênh của Vị Sư "hai lần chết đi sống lại"
Tu Si Chau Soc Thon

https://www.youtube.com/channel/UCoyC9WTTVR-M3qpTKKEXGnQ

Chau Soc Thon Official Channel


Phong Bảo Official
Phong Bao Official
Xem Nhiều nhất
Trắc Nghiệm An Toàn Bảo Mật Thông Tin - Bài 11
Trắc Nghiệm Mạng Máy Tính - Bài 25
Trắc Nghiệm An Toàn Bảo Mật Thông Tin - Bài 10
Trắc Nghiệm Hệ Thống Thông Tin Quản Lý - Bài 04
Trắc Nghiệm An Toàn Bảo Mật Thông Tin - Bài 01
Trắc Nghiệm An Toàn Bảo Mật Thông Tin - Bài 15
Trắc Nghiệm An Toàn Bảo Mật Thông Tin - Bài 29
Trắc Nghiệm An Toàn Bảo Mật Thông Tin - Bài 07
Trắc Nghiệm An Toàn Bảo Mật Thông Tin - Bài 27
Trắc Nghiệm An Toàn Bảo Mật Thông Tin - Bài 20
Trắc Nghiệm An Toàn Bảo Mật Thông Tin - Bài 13
Trắc Nghiệm An Toàn Bảo Mật Thông Tin - Bài 12
Trắc nghiệm Quản Trị Mạng - Bài 07
Trắc Nghiệm An Toàn Bảo Mật Thông Tin - Bài 14
Trắc Nghiệm An Toàn Bảo Mật Thông Tin - Bài 09
Trắc Nghiệm Hệ Thống Thông Tin Quản Lý - Bài 01
Trắc Nghiệm Bảo Trì Hệ Thống - Bài 01
Trắc Nghiệm Mạng Máy Tính - Bài 39
Trắc nghiệm Phân Tích Thiết Kế Hệ Thống - Bài 03
Trắc Nghiệm An Toàn Bảo Mật Thông Tin - Bài 02
Đề Xuất
Cơ Sở Điều Khiển Tự Động - Bài 10
CCNA Exam 640 - 802 - Test 57
CCNA Exam 640 - 802 - Test 33
Trắc Nghiệm Mạng Máy Tính - Bài 06
Trắc nghiệm Phân Tích Thiết Kế Hệ Thống - Bài 12
Trắc Nghiệm Mạng Máy Tính - Bài 17
CCNA Exam 640 - 802 - Test 25
Trắc nghiệm Windows Server 2008 - Bài 26
Microsoft Exchange Server 2010 - Test 09
Trắc Nghiệm An Toàn Bảo Mật Thông Tin - Bài 69
Trắc Nghiệm Mạng Máy Tính - Bài 20
Microsoft Exchange Server 2010 - Test 31
CCNA Exam 640 - 802 - Test 35
CCNA Exam 640-607 - Test 19
Microsoft Exchange Server 2010 - Test 84
Trắc Nghiệm An Toàn Bảo Mật Thông Tin - Bài 33
Microsoft Exchange Server 2010 - Test 55
Trắc Nghiệm An Toàn Bảo Mật Thông Tin - Bài 05
CCNA Exam 640 - 802 - Test 21
Trắc nghiệm Windows Server 2008 - Bài 23
Phát triển hệ thống: TRƯƠNG HỮU ĐỨC - Phiên bản 3.0 - © Copyright 2013 - 2024 - VNEDU.ORG

free counters