网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
You deploy a mobile messaging solution with Microsoft Exchange Server 2003 Service Pack 2.   All remote users use mobile devices that run Microsoft Windows Mobile 5.0 with Microsoft Messaging and Security Feature Pack (MSFP).   A remote user reports the loss of a Windows Mobilebased device.   You need to ensure that the information from the Microsoft Exchange ActiveSync (EAS) server is no longer available on the Windows Mobilebased device.   What should you do?()
A

Recreate the Active Directory remote user account.

B

Perform a remote wipe on the Windows Mobilebased device of the remote user.

C

On the Properties tab of the remote user account, disable the user-initiated synchronization option.

D

On the Device Security Settings tab, configure the Wipe device after failed attempts option to a value of zero.


参考答案

参考解析
解析: 暂无解析
更多 “单选题You deploy a mobile messaging solution with Microsoft Exchange Server 2003 Service Pack 2.   All remote users use mobile devices that run Microsoft Windows Mobile 5.0 with Microsoft Messaging and Security Feature Pack (MSFP).   A remote user reports the loss of a Windows Mobilebased device.   You need to ensure that the information from the Microsoft Exchange ActiveSync (EAS) server is no longer available on the Windows Mobilebased device.   What should you do?()A Recreate the Active Directory remote user account.B Perform a remote wipe on the Windows Mobilebased device of the remote user.C On the Properties tab of the remote user account, disable the user-initiated synchronization option.D On the Device Security Settings tab, configure the Wipe device after failed attempts option to a value of zero.” 相关考题
考题 You need to recommend a backup solution for the VMs that meets the museum's technical requirements.   What should you include in the recommendation?()A、On each VM, perform a full server backup by using Windows Server Backup.B、On each physical node, perform a full server backup by using Windows Server Backup.C、Deploy Microsoft System Center Data Protection Manager 2010 and create a new protection group.D、Deploy Microsoft System Center Virtual Machine Manager (VMM) 2008 R2 and schedule checkpoints.

考题 You work as the enterprise exchange administrator at Xxx .Xxx is using Microsoft Exchange Server 2010 as their messaging solution.A new Xxx usage policy prohibits the employees from using certain words in internal e-mail messaging.What actions must you take to have the policy implemented?()A、You must set up an IP Block list.B、You must set up sender filtering.C、You must set up managed folders.D、You must build a transport rule

考题 You work as the enterprise exchange administrator at Xxx .Xxx is using Microsoft Exchange Server 2010 as their messaging solution.What actions must you take to disable notifications by text messages to mobile devices?()A、You must set up a Group Policy Object.B、You must set up an Outlook Web App Mailbox policy.C、You must change the properties of the public folder database.D、You must set up recipient filtering.

考题 You deploy a mobile messaging solution with Microsoft Exchange Server 2003 Service Pack 2.   All remote users use mobile devices that run Microsoft Windows Mobile 5.0 with Microsoft Messaging and Security Feature Pack (MSFP).   A remote user reports the loss of a Windows Mobilebased device.   You need to ensure that the information from the Microsoft Exchange ActiveSync (EAS) server is no longer available on the Windows Mobilebased device.   What should you do?()A、Recreate the Active Directory remote user account.B、Perform a remote wipe on the Windows Mobilebased device of the remote user.C、On the Properties tab of the remote user account, disable the user-initiated synchronization option.D、On the Device Security Settings tab, configure the Wipe device after failed attempts option to a value of zero.

考题 You work as the enterprise exchange administrator at TestKing.com. TestKing.com makes use of Microsoft Exchange Server messaging solution. The TestKing.com network consists of a single ActiveDirectory domain named testking.com. TestKing.com is configured to run in an Exchange 2010 environment. A new TestKing.com security policyrequires that only approved mobile devices can connect via the Exchange ActiveSync.  You have receivedinstructions from the CIO to stop specified mobile devices to connect to the Exchange servers. What should you do?()A、The best option is to create a new Exchange ActiveSync device access role.B、The best option is to create a new Exchange ActiveSync policy.C、The best option is to create a new client throttling policy.D、The best option is to create a new Microsoft Server ActiveSync virtual directory.

考题 You need to recommend a technology to deploy and manage updates of Business_App for the public relations users. The solution must meet the company’s corporate requirements. Which technology should you recommend?()A、Microsoft System Center Virtualization ManagerB、Microsoft UpdateC、Microsoft Enterprise Desktop Virtualization (MED-V)D、Microsoft Application Virtualization (App-V)

考题 You deploy mobile devices that run Microsoft Windows Mobile 5.0 with Microsoft Messaging and Security Feature Pack. A server that runs Microsoft Exchange Server 2003 Service Pack 2 is configured by using the default installation settings.   Company security policy requires a complex password for unlocking the Windows Mobilebased devices.   You need to ensure that the Windows Mobilebased devices that perform Microsoft ActiveSync synchronization meet the company security policy.   Which two actions should you perform?()A、Enter all mobile device users in the Exceptions list.B、Enable the Require both numbers and letters option.C、Enable the Allow access to devices that do not fully support password settings option.D、Enable the Minimum password length (characters) option. Configure a value of 6 or greater.

考题 You work as the enterprise exchange administrator at Xxx .Xxx is using Microsoft Exchange Server 2010 as their messaging solution.What actions must you take to change the Exchange-specific cost for a site link?()A、You must configure the host (A) resource records.B、You must add and configure an IPSec Enforcement Network policy.C、You must create an Outlook Web App Mailbox policy.D、You must use the Set-ADSiteLink cmdlet.

考题 You deploy a Microsoft Exchange mobile messaging solution that uses Microsoft Windows Mobile 5.0 with Microsoft Messaging and Security Feature Pack.   The messaging infrastructure is configured to support the remote wipe feature.   When an administrator attempts to perform a remote wipe of a Windows Mobilebased device, the administrator receives a 401 error message.   You need to ensure that the administrator is authorized to perform remote wipes only.   What should you do?()A、Grant the administrator membership in the Domain Administrators group.B、Grant the administrator membership in the Exchange Administrators group.C、Add the new administrator account to the Discretionary Access Control List (DACL) of the Microsoft Exchange ActiveSync Administration folder.D、Select the Directory Security tab of the Exchange Server administration Web site, and then configure Read, Write, and Directory Browsing permissions.

考题 You plan to deploy a RemoteApp solution. You plan to install the Remote Desktop Session Host (RD Session Host) role service on a server named Server1 You need to recommend a solution that prevents a single connection to Server1 from using more than 10 percent of the available CPU resources on the server. What should you include in the recommendation?()A、Windows System Resource Manager (WSRM)B、Microsoft System Center Operations ManagerC、Microsoft System Center Virtual Machine ManagerD、Microsoft Application Virtualization (App-V)

考题 A Microsoft Exchange mobile messaging solution uses Microsoft Windows Mobile 5.0 with  Microsoft Messaging and Security Feature Pack. You deploy the solution by using front-end and back-end servers. Microsoft Exchange Server 2003 Service Pack 2 is installed on the front-end server.   You need to use the remote wipe feature.   What should you do?()A、Install Microsoft Windows Server 2003 Service Pack 2 on all domain controllers. B、Install Microsoft Exchange Server 2003 Service Pack 2 on the back-end server. C、Install Microsoft Exchange Server ActiveSync Web Administration Tool on the front-end server.D、Install Microsoft Exchange Server ActiveSync Web Administration Tool on the back-end server.Reset Instructions Calculator. 

考题 You have an Exchange Server 2010 organization.  You plan to deploy a monitoring solution for Exchange Server 2010.  You need to recommend a solution to track the usage of ActiveSync clients and to analyze usage trends.  What should you include in the solution?()A、Internet Information Server log filesB、Exchange Server Mail Flow TroubleshooterC、Exchange Server Performance TroubleshooterD、Microsoft System Center Configuration Manager

考题 You deploy mobile devices that run Microsoft Windows Mobile 5.0.   Company security policy requires an authentication process that is stronger than a user name and password combination.   You need to ensure that Microsoft ActiveSync sessions use an authentication process that meets the company security policy.   What should you do?()A、Deploy a two-factor authentication process.B、Deploy a single-factor authentication process.C、Deploy a simple PIN policy for the Windows Mobilebased devices.D、Deploy a complex PIN policy for the Windows Mobilebased devices.

考题 You deploy a mobile messaging solution by using front-end and back-end servers that run Microsoft Exchange Server 2003 Service Pack 2. Certificates are installed on all Microsoft Windows Mobilebased devices.   You need to allow devices that run Microsoft Windows Mobile 5.0 to perform certificate-based authentication for Microsoft Exchange ActiveSync.   What should you do?()A、Configure the front-end server for Kerberos Constrained Delegation (KCD).B、Configure a Routing Group Connector between the front-end and back-end servers.C、Configure the Windows Mobilebased devices with a Point-to-Point Protocol (PPTP) connection.D、Configure the Windows Mobilebased devices to use Extensible Authentication Protocol (EAP) and either a smart card or a certificate.

考题 You work as the enterprise exchange administrator at Xxx .Xxx is using Microsoft Exchange Server 2010 as their messaging solution.What actions must you take to allow a user named Mia Hamm to access the resource mailbox?()A、You must change the resource mailbox’s propertiesB、You must use log transactionsC、You must use Outlook Protection RulesD、You must use the Set-Mailbox Mia Hamm -LitigationHoldEnabled $true

考题 You deploy a mobile messaging solution by using front-end and back-end servers that run Microsoft Exchange Server 2003 Service Pack 2.   Company policy requires that all Microsoft Windows Mobilebased devices must support Microsoft Exchange ActiveSync communication that is Federal Information Processing Standard compliant.   You need to deploy the Windows Mobilebased devices.   What should you use?()A、Microsoft Windows Mobile 5.0B、Microsoft Windows Mobile 2003 for Pocket PCC、Microsoft Windows Mobile 2003 Second EditionD、Microsoft Windows Mobile 5.0 with Microsoft Messaging and Security Feature Pack

考题 You deploy a server that runs Microsoft Exchange Server 2003 Service Pack  2. You also deploy mobile devices that run Microsoft Windows Mobile 5.0 with the Microsoft Messaging and Security Feature Pack.   You need to ensure that the Windows Mobilebased devices are as secure as possible from brute force password attacks.   What should you do?()A、Set the Microsoft ActiveSync synchronization schedule on the mobile devices to five-minute intervals.B、Enable the Wipe devices after failed attempts option and specify a valid value for the option.C、Configure the Default Domain Group Policy object to enable Password complexity.D、Configure the Default Domain Group Policy object to specify a valid value for the Account Lockout Threshold.

考题 You deploy a mobile messaging solution with Microsoft Exchange Server 2003 Service Pack 2.   The company security policy requires complex passwords on all the Microsoft Windows Mobilebased devices.   You provide a Microsoft Windows Mobile 5.0 smartphonebased device to a new user. The first time the user uses the device, the user is not prompted for a password. You need to ensure that the user is prompted for a password.   What should you do?()A、Instruct the user to set a PIN on the mobile device.B、Instruct the user to perform Microsoft Exchange ActiveSync synchronization Over-The-Air (OTA).C、On the Device Security Settings tab, select the Require both numbers and letters option.D、Add the user account of the user to the Exceptions list on the Device Security Settings tab.

考题 You work as the enterprise exchange administrator at Xxx .Xxx is using Microsoft Exchange Server 2010 as their messaging solution.Which of the following options can be you in order to change the permissions settings for a public folder?()A、You must use the Active Directory Users and Computers.B、You must use the Microsoft Office Outlook.C、You must use the Mail Flow Troubleshooter.D、You must use the Exchange Server Jetstress 2010.

考题 You work as the enterprise exchange administrator at Xxx .Xxx is using Microsoft Exchange Server 2010 as their messaging solution.What actions must you take to allow employees to change their passwords by utilizing Microsoft Windows but not Outlook Web App?()A、You must up an IP Block list.B、You must use an Outlook Web App Mailbox policy.C、You must set up the Segmentation tab settings.D、You must set up recipient filtering.

考题 单选题You work as the enterprise exchange administrator at Xxx .Xxx is using Microsoft Exchange Server 2010 as their messaging solution.Which of the following options can be you in order to change the permissions settings for a public folder?()A You must use the Active Directory Users and Computers.B You must use the Microsoft Office Outlook.C You must use the Mail Flow Troubleshooter.D You must use the Exchange Server Jetstress 2010.

考题 单选题You deploy a mobile messaging solution with Microsoft Exchange Server 2003 Service Pack 2.   All remote users use mobile devices that run Microsoft Windows Mobile 5.0 with Microsoft Messaging and Security Feature Pack (MSFP).   A remote user reports the loss of a Windows Mobilebased device.   You need to ensure that the information from the Microsoft Exchange ActiveSync (EAS) server is no longer available on the Windows Mobilebased device.   What should you do?()A Recreate the Active Directory remote user account.B Perform a remote wipe on the Windows Mobilebased device of the remote user.C On the Properties tab of the remote user account, disable the user-initiated synchronization option.D On the Device Security Settings tab, configure the Wipe device after failed attempts option to a value of zero.

考题 多选题You deploy a mobile messaging solution with Microsoft Exchange Server 2003 Service Pack 2.   When the application is running, it must not be able to access protected registry keys.   You need to ensure that the application meets the outlined requirement. What are two possible ways to achieve this goal?()AUse Microsoft Windows Mobile 5.0 Pocket PC Phone Edition operating system.BUse Microsoft Windows Mobile 2003 for Pocket PC operating system.CUse Microsoft Windows Mobile 5.0 for Smartphone operating system.DUse Microsoft Windows Mobile 2003 for Smartphone operating system.

考题 多选题You deploy mobile devices that run Microsoft Windows Mobile 5.0 Pocket PC Phone Edition.   You need to prevent the device screen from turning dark when users view documents.   Which two actions should you perform?()AConfigure the backlight brightness setting to maximum.BDisplay the soft input panel (SIP) when users read documents.CIncrease the value of the Turn off device if not used for option.DIncrease the value of the Turn off backlight if device is not used for option.

考题 单选题You deploy mobile devices that run Microsoft Windows Mobile 5.0. Users store a price list in Microsoft Office Excel Mobile files on the devices.   Users install a new mobile application on the devices.   A user reports that the device performs slowly after the installation. All attempts to remove the application fail.   You need to remove the application without losing the saved price list.   What should you do?()A Copy the price list to an external storage card and perform a hard reset.B Copy the price list by using a Desktop ActiveSync and perform a soft reset.C Copy the price list to another Windows Mobilebased device by using Bluetooth and perform a soft reset.D Move the price list to the Program Files directory on the Windows Mobilebased device and perform a hard reset.

考题 单选题You deploy mobile devices that run Microsoft Windows Mobile 5.0.   Company security policy requires an authentication process that is stronger than a user name and password combination.   You need to ensure that Microsoft ActiveSync sessions use an authentication process that meets the company security policy.   What should you do?()A Deploy a two-factor authentication process.B Deploy a single-factor authentication process.C Deploy a simple PIN policy for the Windows Mobilebased devices.D Deploy a complex PIN policy for the Windows Mobilebased devices.

考题 单选题You deploy a mobile messaging solution by using front-end and back-end servers that run Microsoft Exchange Server 2003 Service Pack 2.   Company policy requires that all Microsoft Windows Mobilebased devices must support Microsoft Exchange ActiveSync communication that is Federal Information Processing Standard compliant.   You need to deploy the Windows Mobilebased devices.   What should you use?()A Microsoft Windows Mobile 5.0B Microsoft Windows Mobile 2003 for Pocket PCC Microsoft Windows Mobile 2003 Second EditionD Microsoft Windows Mobile 5.0 with Microsoft Messaging and Security Feature Pack

考题 单选题You work as the enterprise exchange administrator at Xxx .Xxx is using Microsoft Exchange Server 2010 as their messaging solution.What actions must you take to disable notifications by text messages to mobile devices?()A You must set up a Group Policy Object.B You must set up an Outlook Web App Mailbox policy.C You must change the properties of the public folder database.D You must set up recipient filtering.