网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
A user states that all their incoming mail is showing that it is behind three hours. All other users have the correct time. Which of the following should the technician check?()
A

The system’s local time settings

B

The system’s O/S version and patch status

C

The system’s network configuration

D

The mail server’s configuration


参考答案

参考解析
解析: 暂无解析
更多 “单选题A user states that all their incoming mail is showing that it is behind three hours. All other users have the correct time. Which of the following should the technician check?()A The system’s local time settingsB The system’s O/S version and patch statusC The system’s network configurationD The mail server’s configuration” 相关考题
考题 ● 下列电子邮件地址正确的是(61) 。(61)A.mail.test.com@user B .user @ mail.test.comC .http://mail.test.com D.http: \\mail.test.com

考题 ● 下列电子邮件地址正确的是 (21) 。(21)A.mail.test.com@user B.user @ mail.test.comC.http://mail.test.com D.http: \\mail.test.com

考题 下列选项中,正确的邮件地址格式是()。 A.user@mail.comB.user.mail.comC.@user.mail.comD.mail.com@user

考题 A user reports it takes a long time to load all applications and the hard drive LED is showing constant activity. Which of the following is MOST likely the issue?() A. The processor is faulty.B. The file system is fragmented.C. The modem drivers are corrupt.D. The power supply is faulty.

考题 某用户的计算机主机域名是hot mail.com,用户名为User l,那么他的E-mail地址为()。A.hot mail.com@User lB.User l@hot mail.comC.User l.hot mail@comD.User l.com@hot mail

考题 A user reports it takes a long time to load all applications and the hard drive LED is showing constant activity. Which of the following is MOST likely the issue?()A、The processor is faulty.B、The file system is fragmented.C、The modem drivers are corrupt.D、The power supply is faulty.

考题 A user states that all their incoming mail is showing that it is behind three hours. All other users have the correct time. Which of the following should the technician check?()A、The system’s local time settingsB、The system’s O/S version and patch statusC、The system’s network configurationD、The mail server’s configuration

考题 A user calls the system administrator and states that they can no longer access the file server they had been working on all morning. To trouble shoot this problem,  which step should the administrator take FIRST?()A、 Reboot the file server.B、 Ask the user what they were doing when they noticed the problem.C、 Ask the user to reboot their PC.D、 Ask the user to ping the default gateway and report the response times back to the administrator.

考题 The following entry has been added to the syslog.conf file: *.emerg;mail,daemon.crit @ sysadmin  Which of the following will result from this entry?()A、 All messages at the emerg priority level and below from all facilities and messages at the crit priority level and below from the mail and daemon facilities are sent to the TTY of the user sysadmin. B、 All messages at the emerg priority level and above from all facilities, all messages at any priority level from the mail facility, and all messages at the crit priority level and above from the daemon facilities are sent to the remote host sysadmin. C、 All messages at the emerg priority level and above from all facilities and messages at the crit priority level and above from the mail and daemon facilities are sent to the remote host sysadmin. D、 All messages at the emerg priority level and above from all facilities except for the mail facility and messages at the crit priority level and above from the daemon facility are sent to the TTY of the user sysadmin.

考题 Which of the following statements is used to revoke all DML privileges on table EMPLOYEE from user TOM?()A、REVOKE ALL PRIVILEGES FROM USER tomB、REVOKE ALL ON EMPLOYEE FROM USER tomC、REVOKE EXECUTE ON EMPLOYEE FROM USER tomD、REVOKE PRIVILEGES ON EMPLOYEE FROM USER tom

考题 You have an Exchange Server 2010 organization that contains 1,500 mailboxes.The Average size of each mailbox is a 750 MB.All users run either Microsoft Office Outlook 2010 or Outlook Web App to access their e-mail.All users who run Outlook 2010 are configured to use Cached Exchange Mode.You need to configure a mailbox solution for the organization to meet the following requirements:  (1)Ensure that administrators can search and find any message  (2)Reduce the size of the offline store (OST) for each user  (3)Provide access to all e-mail messages by using either Outlook 2010 or Outlook Web App  What should you do?()A、Create a Personal Archive for each user and then create a retention policy.Instruct users to compact the OST file.B、Create a personal folder (PST) file for each user.Store all PST files on a network share. Instruct users to compact the OST file.C、Create a second disabled user account and a second mailbox for each user.Configure Journal rules to journal all the messages for each user to the users second mailboxD、Create a new disabled user account and a new mailbox named Journaling Mailbox. Configure journal rules to journal all the messages for each user to Journaling Mailbox.

考题 单选题You have an Exchange Server 2010 organization that contains 1,500 mailboxes. The average sizeeach mailbox is a 750 MB. All users run either Microsoft Office Outlook 2010 or Outlook Web App to access their e-mail. All users who run Outlook 2010 are configured to use Cached Exchange Mode. You need to configure a mailbox solution for the organization to meet the following requirements: Ensure that administrators can search and find any message Reduce the size of the offline store (OST) for each user Provide access to all e-mail messages by using either Outlook 2010 or Outlook Web App  What should you do()?A Create a Personal Archive for each user and then create a retention policy. Instruct users to compact the OST file.B Create a personal folder (PST) file for each user. Store all PST files on a network share. Instruct users to compact the OST file.C Create a second disabled user account and a second mailbox for each user. Configure journal rules to journal all the messages for each user to the user¯s second mailboxD Create a new disabled user account and a new mailbox named Journaling Mailbox. Configure journal rules to journal all the messages for each user to Journaling Mailbox.of

考题 单选题Which remote access VPN addressing technique supports a static IP address to support a specific application?()A  Use a static ip addresses based on incoming user policies.B  Use DHCP to assign addresses based on incoming user policies.C  Deploy a clientless model to assign a unique address to the user.D  Deploy RADIUS or LDAP to assign the address to the user.

考题 单选题You have a hosted Exchange organization.All servers in the organization have Exchange Server 2010 Service Pack l (SP1) installed.The organization contains a distribution group named Group1.You need to ensure that a user named User1 can review and approve all messages sent to Group1. What should you do?()A Modify the Managed By list for Group1.B Create a new journal rule and specify User1 as the journal recipient.C Modify the mail flow settings for User1.D Modify the mail flow settings for Group1.

考题 单选题A user reports it takes a long time to load all applications and the hard drive LED is showing constant activity. Which of the following is MOST likely the issue?()A The processor is faulty.B The file system is fragmented.C The modem drivers are corrupt.D The power supply is faulty.

考题 单选题You manage a server that runs Windows Server 2008. You have installed the Windows SharePointServices (WSS) server role on the server. The server is configured to accept incoming mail. Tostreamline the process, you create a new document library. You have to make sure that any user can sendemail to the document library. What should you do to achieve this task?()A Change the incoming email settings for the document libraryB Enable basic user authentication for the document libraryC Modify the document library settings to accept emails from SMTP serversD Change the permissions for the document library

考题 单选题The following entry has been added to the syslog.conf file: *.emerg;mail,daemon.crit @ sysadmin  Which of the following will result from this entry?()A  All messages at the emerg priority level and below from all facilities and messages at the crit priority level and below from the mail and daemon facilities are sent to the TTY of the user sysadmin. B  All messages at the emerg priority level and above from all facilities, all messages at any priority level from the mail facility, and all messages at the crit priority level and above from the daemon facilities are sent to the remote host sysadmin. C  All messages at the emerg priority level and above from all facilities and messages at the crit priority level and above from the mail and daemon facilities are sent to the remote host sysadmin. D  All messages at the emerg priority level and above from all facilities except for the mail facility and messages at the crit priority level and above from the daemon facility are sent to the TTY of the user sysadmin.

考题 单选题下列选项中,正确的邮件地址格式是()。A user@mail.comB user.mail.comC @user.mail.comD mail.com@user

考题 单选题You have an Exchange Server 2010 organization.A user named User1 connects to his mailbox by using Microsoft Office Outlook.User1 reports that he is unable to send encrypted e-mail messages to an external recipient named User2.You verify that User1 and User2 have e-mail encryption certificates.You need to ensure that User1 can send encrypted e-mail messages to User2.What should you do first?()A Instruct User2 to add a delegateB Instruct User2 to send a signed e-mail message to User1.C Instruct User1 to send a signed e-mail message to User2.D Instruct User1 to modify the sensitivity settings of the e-mail message

考题 单选题A user states that email is not being received. Which of the following protocols should thetechnician check for incoming mail?()A SMTPB POP3C NNTPD HTTP

考题 单选题You have a server that runs Windows Server 2008. The server has the Windows SharePoint Services (WSS) server role installed. The server is configured to accept incoming e-mail. You create a new document library.  You need to ensure that any user can send e-mail to the document library. What should you do?()A Modify the RSS setting for the document library.B Modify the permissions for the document library.C Modify the incoming e-mail settings for the document library.D Enable anonymous authentication for the Web application.

考题 单选题Which remote access VPN addressing technique supports a static IP address to support a specific application?()A Use a staticip addresses based on incoming user policies.B Use DHCP to assign addresses based on incoming user policies.C Deploy a clientless model to assign a unique address to the user.D Deploy RADIUS or LDAP to assign the address to the user.

考题 单选题Charts showing the coast of Mexico are produced by the United States().A National Geospatial-Intelligence AgencyB Coast GuardC Naval ObservatoryD National Ocean Service

考题 单选题Your network contains Exchange Server 2010 servers.  All users access their mailboxes by using Outlook Web App (OWA). Your companys compliance policy states the following: .All e-mail messages that contain customer contracts must be stored for three years .Users must be able to classify e-mail messages that relate to customer contracts .Users must be able to move e-mail messages to any folder  You need to recommend a solution that supports the requirements of the compliance policy.  What should you recommend?()A Managed Folder mailbox policiesB an OWA mailbox policyC Personal Archives and an Archive policyD Retention Policy Tags and a Retention Policy

考题 单选题You manage 40 computers that run Microsoft Windows Vista.  You use Microsoft Windows Calendar to publish a calendar to a shared network location. You need to allow users to automatically view the most recent calendar updates.  What should you do? ()A Instruct all users to configure a calendar subscription that has an update interval of 15 minutes.B Instruct all users to perform calendar synchronization for all shared calendar subscriptions. C Instruct all users to map a network drive to the folder that holds the shared calendar. Import the .ics file for the shared calendar.D Use e-mail messages to deploy the .ics file for the shared calendar to each user. Instruct each user to import the .ics file that is attached to the e-mail message.

考题 单选题procmail是一种()。A MTA(Mail Transfer Agent)B MDA(Mail Delivery Agent)C MMA(Mail Man Agent)D MUA(Mail User Agent)

考题 单选题A user calls the system administrator and states that they can no longer access the file server they had been working on all morning. To trouble shoot this problem,  which step should the administrator take FIRST?()A  Reboot the file server.B  Ask the user what they were doing when they noticed the problem.C  Ask the user to reboot their PC.D  Ask the user to ping the default gateway and report the response times back to the administrator.