网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
Some users report they cannot receive messages from some external senders.You suspect that there is some anti-spam activity blocking those messages.You need to identify what is blocking the messages.You will activate and review the logs of one of the following:()
A

Protocol logging

B

Connectivity logs

C

Message tracking

D

Pipeline tracing


参考答案

参考解析
解析: 暂无解析
更多 “单选题Some users report they cannot receive messages from some external senders.You suspect that there is some anti-spam activity blocking those messages.You need to identify what is blocking the messages.You will activate and review the logs of one of the following:()A Protocol loggingB Connectivity logsC Message trackingD Pipeline tracing” 相关考题
考题 2.I prefer _______ a small gift that has some thought behind it rather than some money.A. to receive; to gettingB. receiving; gettingC. to receive ; getD. receiving; get

考题 Museums receive some of their financial support in the _____ of admissions fees.A: wayB: styleC: formD: shape

考题 is a mechanism used for protecting the users outside of network from accessing some non-authorized computer resources.A.Network CardB.protocolC.FirewallD.Router

考题 EIGRP is being used as the routing protocol on the PassGuide network. Whiletroubleshooting some network connectivity issues,you notice a large number of EIGRP SIA(StuckinActive)messages. What causes these SIA routes()A、The neighboring router stops receiving ACK packets from this router.B、The neighboring router starts receiving route updates from this router.C、The neighboring router is too busy to answer the query(generally caused by high CPU utilization).D、The neighboring router is having memory problems and cannot allocate the memory to process the query or build the reply packet.

考题 You have an Exchange Server 2010 organization named contoso.com that contains a mail-enabled group named Group1. Users from outside the organization report that e-mail messages sent to group1@contoso.com generate a non-delivery report (NDR).You need to ensure that users outside the organization can successfully send e-mail to group1 @ contoso.com. What should you modify?()A、the authentication settings for the Client Receive connectorB、the message delivery restrictions for Group1C、the moderation settings for Group1D、the remote IP address range for the Client Receive connector

考题 You have an Exchange Server 2010 organization.You acquire a new Internet domain name.Users report that they cannot receive e-mail sent to the new domain name.You verify that all users have the new domain name configured as an e-mail address suffix.You need to ensure that users can receive e-mail sent from the Internet to the new domain name. What should you create?()A、an Authoritative Accepted DomainB、an External Relay Accepted DomainC、a new Receive connectorD、a remote domain

考题 You have an Exchange Server 2010 server that contains a single mailbox database.All users run Microsoft Office Outlook and Outlook Web App.You discover that users cannot restore e-mail messages from the Recover Deleted Items folder.You need to ensure that users can restore e-mail messages from the Recover Deleted Items folder.What should you do?()A、From the Exchange Management Console (EMC), modify the properties of the mailbox databaseB、From the Exchange Management Console (EMC), modify the properties of the Mailbox server objectC、From the Exchange Management Shell, create a management role and then assign the role to all usersD、From the Exchange Management Shell, create a retention policy and then assign the policy to all users

考题 You have an Exchange Server 2010 organization named contoso.com.All users configure internal and external Out Of Office messages.You need to ensure that internal Out Of Office messages are sent to senders from the fabrikam.com domain. What should you create and configure?()A、a new accepted domainB、a new Receive connectorC、a new remote domainD、a new Send connector

考题 TestKing.com uses SQL Server 2005. Users report that report execution is slow. You investigate and discover that some queries do not use optimal execution plans. You also notice that some optimizer statistics are missing and others are out of date.  You need to correct the problem so that reports execute more quickly. Which two Transact-SQL statements should you use?()A、DBCC CHECKTABLEB、ALTER INDEX REORGANIZEC、UPDATE STATISTICSD、CREATE STATISTICSE、DBCC SHOW STATISTICSF、DBCC UPDATEUSAGE

考题 You have a print server that runs Windows Server 2003 Service Pack 2 (SP2). Users report that print jobs are not printing. Users also report that they do not receive any error messages. Younotice a large number of jobs in the print queue. You attempt to delete some jobs from the queue and notice that the jobs remain in the queue. You need to ensure that users can print successfully. What should you do? ()A、Restart the Print Spooler service.B、Pause the printer, and then restart the printer.C、Take ownership of the printer, and then delete the print jobs.D、Assign the Manage Documents permission to the users connected to the printer.

考题 Your network contains an Active Directory Rights Management Services (AD RMS) cluster.   You have several custom policy templates. The custom policy templates are updated frequently.   Some users report that it takes as many as 30 days to receive the updated policy templates.   You need to ensure that users receive the updated custom policy templates within seven days.   What should you do()A、Modify the registry on the AD RMS servers.B、Modify the registry on the users   computers.C、Change the schedule of the AD RMS Rights Policy Template Management (Manual) scheduled task.D、Change the schedule of the AD RMS Rights Policy Template Management (Automated) scheduled  task.

考题 Your network contains a public computer that runs Windows 7. Multiple users log on to the computer byusing a local user account named User1. Users report that they can log on to some secure Web sites byusing credentials that were saved by other users. You need to prevent forms-based credentials from beingsaved on the computer.  What should you do?()A、Remove all generic credentials from Windows Vault.B、Remove all Windows credentials from Windows Vault.C、Modify the Windows Internet Explorer certificates settings.D、Modify the Windows Internet Explorer AutoComplete settings.

考题 You have an Exchange Server 2010 organization named Contoso.com that contains a mail-enabled Domain Local group named Group1.Users from outside the organization report that all e-mail messages sent to group1@contoso.com generate a non-delivery-report (NDR).You need to ensure that users from outside the organization send e-mail to group1@contoso.com. What should you modify for group1?()A、Advanced settingsB、Group scopeC、Group typeD、The mail flow settings

考题 You install a new Exchange Server 2010 organization that contains a single server named erver1.Users report that they receive a large number of unsolicited commercial email (UCE) messages.You need to reduce the amount of UCE messages that users in the organization receive.What should you do?()A、Create a journal rule and then create an Outlook Protection RuleB、Create a Transport Protection Rule and then create a journal ruleC、Run the AntispamCommon.ps1 script and then create a Transport Protection RuleD、Run the Install-AntispamAgents.ps1 script and then configure all transport agents

考题 You have an Exchange Server 2010 organization named Contoso, Ltd.The organization contains an Edge Transport server.Users from a company named Fabrikam, Inc.send messages over the Internet by using the @fabrikam.com e-mail address suffix.You need to ensure that messages sent from Fabrikam users to Contoso users have the @contoso.com e-mail address suffix in the source address. What should you create?()A、a Receive connectorB、an accepted domainC、an address rewrite entryD、an e-mail address policy

考题 You install an Exchange Server 2010 Hub Transport server named Hub1.You need to ensure that Hub1 can receive e-mail messages sent from Internet hosts.What should you do?()A、Enable the Anonymous users permission group for the Client Hub1 Receive connector.B、Enable the Anonymous users permission group for the Default Hub1 Receive connector.C、Create a Receive connector and set the intended use to Client.Modify the port for the connector.D、Create a Receive connector and set the intended use to Custom.Modify the remote IP addresses range for the connector.

考题 Your company uses SQL Server 2005. Users report that report execution is slow. You investigate and discover that some queries do not use optimal execution plans. You also notice that some optimizer statistics are missing and others are out of date. You need to correct the problem so that reports execute more quickly. Which two Transact-SQL statements should you use?()A、 DBCC CHECKTABLE B、 ALTER INDEX REORGANIZE C、 UPDATE STATISTICS D、 CREATE STATISTICS E、 DBCC SHOW_STATISTICS F、 DBCC UPDATEUSAGE

考题 You have an Exchange organization named Contoso, Ltd.All servers in the organization have Exchange Server 2010 Service Pack 1 (SP1) installed.The organization contains an Edge Transport server.  Users from a company named Fabrikam, Inc.send e-mail messages over the Internet by using the fabnkam.come-mail address suffix. Contoso acquires Fabrikam. You need to ensure that messages sent from Fabrikam users to Contoso users have the contoso.com e-mail address suffix in their source address.  What should you create?()A、an accepted domainB、an address rewrite entryC、an e-mail address policyD、a Receive connector

考题 单选题You have an Exchange Server 2010 organization named Contoso, Ltd.The organization contains an Edge Transport server.Users from a company named Fabrikam, Inc.send messages over the Internet by using the @fabrikam.com e-mail address suffix.You need to ensure that messages sent from Fabrikam users to Contoso users have the @contoso.com e-mail address suffix in the source address. What should you create?()A a Receive connectorB an accepted domainC an address rewrite entryD an e-mail address policy

考题 单选题You have an Exchange Server 2010 organization named Contoso.com that contains a mail-enabled Domain Local group named Group1.Users from outside the organization report that all e-mail messages sent to group1@contoso.com generate a non-delivery-report (NDR).You need to ensure that users from outside the organization send e-mail to group1@contoso.com. What should you modify for group1?()A Advanced settingsB Group scopeC Group typeD The mail flow settings

考题 多选题TestKing.com uses SQL Server 2005. Users report that report execution is slow. You investigate and discover that some queries do not use optimal execution plans. You also notice that some optimizer statistics are missing and others are out of date.  You need to correct the problem so that reports execute more quickly. Which two Transact-SQL statements should you use?()ADBCC CHECKTABLEBALTER INDEX REORGANIZECUPDATE STATISTICSDCREATE STATISTICSEDBCC SHOW STATISTICSFDBCC UPDATEUSAGE

考题 单选题You need to include a disclaimer to all sent messages in your organization. Some of the users require message encryption.How do you make sure that disclaimer can be included in encrypted messages?()A Instruct the users to use IRM encryption method onlyB Instruct the users to use S/MIME encryption method onlyC Using command New-ExchangeCertificate cmdletD Using the Set-ExchangeServer cmdlet

考题 单选题Ten users at your office run an accounting application on their Windows NT Workstation 4.0 computers. The application stores its data in a shared network folder named Accdata on a Windows 2000 Server computer named Server1. You upgrade all 10 computers to Windows 2000 Professional and verify that all applications are compatible with Windows 2000. After the upgrade, some users report that they are receiving intermittent data-corruption error messages. They are also receiving data file-version mismatch error messages. When these errors occur, your only method of recovery is to restore the entire contents of the Accdata folder from a known good backup copy.  You need to prevent these errors from occurring in the future. What should you do? ()A Configure Accdata folder to allow a maximum of one user.B Configure the Accdata folder to disable client caching.C Create a group policy that removes the Bypass Traverse Checking user right on server1.D Create a group policy that increases the amount of idle time required before a session   disconnects on server1.

考题 单选题You are using Windows 2000 Professional on your desktop computer. You are working on the company’s financial report and you want other users on the network to able to modify your documents for the report. You want users to share the financial report folder on the network. Because the network contains confidential information you want to prevent users from the enabling off line access for the network share that contains the financial report. What should you do?()A Use Windows Explorer to receive the offline filesB Using the Windows Explorer, disable the cache for the reports on the network shareC Use the Windows NT explorer to grant the special access for the reports on the network  shareD Use the synchronization manager to configure synchronization not to occur when users are  connected to the LAN connection. 

考题 单选题You have an Exchange Server 2010 organization.You acquire a new Internet domain name.Users report that they cannot receive e-mail sent to the new domain name.You verify that all users have the new domain name configured as an e-mail address suffix.You need to ensure that users can receive e-mail sent from the Internet to the new domain name. What should you create?()A an Authoritative Accepted DomainB an External Relay Accepted DomainC a new Receive connectorD a remote domain

考题 单选题You have an Exchange Server 2010 organization named contoso.com that contains a mail-enabled group named Group1. Users from outside the organization report that e-mail messages sent to group1@contoso.com generate a non-delivery report (NDR).You need to ensure that users outside the organization can successfully send e-mail to group1 @ contoso.com. What should you modify?()A the authentication settings for the Client Receive connectorB the message delivery restrictions for Group1C the moderation settings for Group1D the remote IP address range for the Client Receive connector

考题 单选题Why do some frogs change the pitch of its calls?A To be different from others.B To attract a female frog.C To tend out messages.D To go against traffic noises.