网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
You need to design a strategy for providing e-mail access to the subsidiary users. What should you do?()
A

Deploy POP3 and IMAP4 services on Exchange front-end servers. Make the front-end servers accessible from the Internet by means of POP3, IMAP4, and SMTP only

B

Deploy Microsoft Outlook Web Access on Exchange mailbox servers. Make the mailbox servers accessible from the Internet by means of HTTPS and SMTP only

C

Deploy Microsoft Outlook Web Access on Exchange front-end servers. Make the front-end servers accessible from the Internet by means of HTTPS only

D

Deploy an additional Exchange mailbox server that contains all subsidiary mailboxes. Deploy Microsoft Outlook Web Access on the server. Make the server accessible from the Internet by means of HTTPS only


参考答案

参考解析
解析: 暂无解析
更多 “单选题You need to design a strategy for providing e-mail access to the subsidiary users. What should you do?()A Deploy POP3 and IMAP4 services on Exchange front-end servers. Make the front-end servers accessible from the Internet by means of POP3, IMAP4, and SMTP onlyB Deploy Microsoft Outlook Web Access on Exchange mailbox servers. Make the mailbox servers accessible from the Internet by means of HTTPS and SMTP onlyC Deploy Microsoft Outlook Web Access on Exchange front-end servers. Make the front-end servers accessible from the Internet by means of HTTPS onlyD Deploy an additional Exchange mailbox server that contains all subsidiary mailboxes. Deploy Microsoft Outlook Web Access on the server. Make the server accessible from the Internet by means of HTTPS only” 相关考题
考题 You need to design the retrieval of advertising statistics without compromising security. What should you do?()A、Design a Notification Services solution that sends the advertising statistics to specified subscribers by e-mail.B、Design a SQL Server Web service that runs a stored procedure to return the statistics on a call from the advertisers application.C、Design a Database Mail solution that sends the advertising statistics to e-mail addresses that are specified in a table.D、Design a stored procedure to return the statistics on a call from the advertisers application.E、Design a user-defined function to return the statistics on a call from the advertisers application.

考题 You need to design a security strategy for VPN2. Your solution must meet business requirements. What should you do?()A、Create and configure a new security template. Import the template into the Default Domain Policy Group Policy object (GPO)B、Install Internet Authentication Service (IAS) on RAS1. Configure VPN2 to be the RADIUS client of RAS1. Configure the remote access policy on VPN2C、Create and configure a new security template. Import the template into the local policy on VPN2D、Move VPN2 into the VPN Servers OU. Configure the remote access policy on VPN2

考题 You need to design an access control strategy for the marketing application. You solution must minimize impact on server and network performance. What should you do?()A、Require client computers to connect to the marketing application by using a VPN connectionB、Use IPSec to encrypt communications between the servers in the New York and Atlanta officesC、Require the high security setting on Terminal Services connections to the marketing applicationD、Configure all marketing application Web pages to require SSL

考题 You need to design a security strategy for the DHCP servers in the Seattle office. Which two actions should you perform?()A、Disable all unnecessary services on each DHCP serverB、Modify the discretionary access control lists (DACLs) in Active Directory so that only members of the Enterprise Admins security group can authorize additional DHCP serversC、Use an IPSec policy that allows only the packets necessary for DHCP and domain membership for each DHCP serverD、Install a digital certificate for SSL on each DHCP server

考题 You need to design an e-mail access strategy for remote users. What should you do? () A、 Instruct remote users to connect to their e-mail by using RPCB、 Instruct remote users to connect to Outlook Web Access by using only HTTPSC、 Instruct remote users to connect to the company network by using PPTP connectionsD、 Instruct remote users to connectd to their e-mail by using RPC over HTTP Configure the HTTP servers to require encryption.

考题 You need to design a Security strategy for the wireless network at all resort locations.What should you do?()A、Connect the wireless access points to a dedicated subnet. Allow the subnet direct access to the Internet,but not to the company network.Require company users to establish a VPN to access company resourcesB、Install Internet Authentication Service (IAS) on a domain controller.Configure the wireless access points to require IEEE 802.1x authenticationC、Establish IPSec policies on all company servers to request encryption from all computers that connect from the wireless IP networksD、Configure all wireless access points to require the Wired Equivalent Privacy (WEP) protocol for all connections. Use a Group Policy object (GPO) to distribute the WEP keys to all computers in the domain

考题 Your network contains an Exchange Server 2010 server.  You need to plan a mailbox sharing solution for the organization to meets the following requirements: .Ensure that assistants can read and modify the e-mail messages of their managers .Ensure that assistants can impersonate their managers when they send e-mail messages  What should you include in the plan?()A、Full Access and Send As permissionsB、Full Access and send on behalf of permissionsC、Role Based Access Control (RBAC) assignments and Send As permissionsD、Role Based Access Control (RBAC) assignments and send on behalf of permissions

考题 You need to design a strategy for providing e-mail access to the subsidiary users. What should you do?()A、Deploy POP3 and IMAP4 services on Exchange front-end servers. Make the front-end servers accessible from the Internet by means of POP3, IMAP4, and SMTP onlyB、Deploy Microsoft Outlook Web Access on Exchange mailbox servers. Make the mailbox servers accessible from the Internet by means of HTTPS and SMTP onlyC、Deploy Microsoft Outlook Web Access on Exchange front-end servers. Make the front-end servers accessible from the Internet by means of HTTPS onlyD、Deploy an additional Exchange mailbox server that contains all subsidiary mailboxes. Deploy Microsoft Outlook Web Access on the server. Make the server accessible from the Internet by means of HTTPS only

考题 Your company has a main office and a branch office. Your network contains a single Active Directory domain. The functional level of the domain is Windows Server 2008 R2. An Active Directory site exists for each office. All servers run Windows Server 2008 R2. You plan to deploy file servers in each office.   You need to design a file sharing strategy to meet the following requirements: èUsers in bothoffices must be able to access the same files.   èUsers in both offices must use the same Universal Naming Convention (UNC) path to access files.   èThe design must reduce the amount of bandwidth used to access files. èUsers must be able to access files even if a server fails. What should you include in your design?()A、A stand-alone DFS namespace that uses replication.B、A domain-based DFS namespace that uses replication.C、A multi-site failover cluster that contains a server located in the main office and another server located in the branch office.D、A Network Load Balancing cluster that contains a server located in the main office and another server  located in the branch office.

考题 You are designing a security strategy for users who need remote access to the corporate network. What should you do?()A、Configure Internet Authentication Service (IAS) for accounting.B、Configure the server running Routing and Remote Access to support L2TP.C、Configure the server running Routing and Remote Access to restrict dial-in traffic to the NewApp servers only.D、Create a separate account for remote access users. Configure these accounts to access the NewApp server only.

考题 You need to recommend an IP addressing strategy for the client computers in the new sales office. What should you recommend implementing in the new sales office?()A、DHCP server rolesB、the DirectAccess featureC、the Network Policy Server (NPS) role serviceD、the Remote Access Service role service

考题 You are planning to move streaming media content to Windows Azure Storage.   You need to recommend an approach for providing worldwide users the fastest possible access to the content. Which two actions should you recommend?()A、 Use a Shared Access Signature.B、 Use Windows Azure page blob storage.C、 Use Windows Azure block blob storage.D、 Use the Windows Azure Content Delivery Network (CDN).

考题 单选题You are designing a security strategy for users who need remote access to the corporate network.  What should you do?()A  Configure Internet Authentication Service (IAS) for accounting.B  Configure the server running Routing and Remote Access to support L2TP.C  Configure the server running Routing and Remote Access to restrict dial-in traffic to the NewApp servers only.D  Create a separate account for remote access users. Configure these accounts to access the NewApp server only.

考题 单选题You need to design a security strategy for a remote e-mail access. What should you do?()A Require remote users to access e-mails by using Outlook Mobile AccessB Require Outlook Web Access users to install the secure MIME ActiveX-Control and to encrypt all messagesC On Outlook Web Access servers that accept connections from the Internet configure IIS to require SSL for all connectionsD On Outlook Web Access servers that accept connections from the Internet configure IIS to require Integrated Windows Authentication

考题 单选题You need to design an access control strategy for the Payment folder for the Sales Managers group. What should you do?()A Use IPSec in transport modeB Use Encrypting File System (EFS) over Web Distributed Authoring and Versioning (WebDAV)C Use PEAP-EAP-TLSD Use Encrypting File System (EFS) remote encryption

考题 单选题You need to design security for messages exchanged between Northwind Traders employees and its vendors. What should you do?()A Require employees to access e-mail only over connections that use SSLB Place Exchange mailbox stores on NTFS volumes. Use Encrypting File System (EFS) to encrypt the storesC Use the internal certification authority (CA) to issue certificates to all employees. Require employees to digitally sign outbound e-mailD Use the internal certification authority (CA) to issue certificates to all employees and vendors. Instruct employees and vendors to use secure MIME to encrypt all e-mail sent between them

考题 多选题You need to design a strategy to increase security for the client computers in the finance department. Which two actions should you perform?()AEnable automatic certificate enrollmentBEnforce smart card logonsCEnable Encrypting File System (EFS) for offline filesDEnable a screen saver password

考题 单选题You are designing a Windows 7 virtual desktop infrastructure.You have the following requirements:   Provide access to Remote Desktop Services RemoteApp sources from multiple remote desktop servers.  Support network load balancing.  Support reconnection to existing sessions on virtual desktops.    You need to specify a design that meets the requirements.   What should you include in your design?()A Remote Desktop GatewayB Remote Desktop Connection BrokerC Windows Deployment ServicesD Windows Virtual PC and Windows XP Mode

考题 单选题You need to design the consolidation strategy for the Promotions and Partners databases. You want to choose a strategy that results in the best database performance while maintaining the permissions of end users in each database.What consolidation strategy should you choose?()A Place each database in a separate instance running on SQL2.B Place each database in a separate instance running on SQL3.C Place both databases in a single instance running on SQL2.D Place both databases in a single instance running on SQL3.

考题 单选题You need to design a group membership strategy for the EditorialAdmins group. What should you do?()A Move the EditorialAdmins group to the Servers OU in the editorial departmentB Move the members of the EditorialAdmins group to the Editorial OUC Move the members of the EditorialAdmins group to the New York OUD Move the EditorialAdmins group to the New York OU

考题 多选题You need to design an access control strategy for the external and intranet Web sites. Which two actions should you perform?()AEnable SSL on the external Web site by using a Microsoft cryptographic service provider (CSP)BEnable Microsoft .NET Passport authentication on the external Web site. Use Passport Level 0 with SSL on the external Web siteCEnable SSL on the external Web site by using a commercial digital certificateDEnable SSL on the intranet Web site by using an internal server certificateEEnable SSL on the external Web site by using an internal server certificate

考题 单选题You need to design the deployment of antivirus software. What should you do?()A Install the antivirus software on each mailbox storage serverB Install the antivirus software on each Outlook Web Access serverC Install the antivirus software on one Outlook Web Access server at each officeD Install the antivirus software on a back-end server that contains no mailboxes

考题 单选题You need to design access to e-mail by Internet users. What should you do?()A Configure front-end servers to use HTTP to communicate with back-end serversB Configure the internal firewall to allow IPSec traffic between front-end and back-end Exchange serversC Require all users to encrypt all outbound e-mail messagesD Issue digital certificates to all remote users. Require the certificates to be used when authenticating to Outlook Web Access

考题 单选题You need to recommend an IP addressing strategy for the client computers in the new sales office. What should you recommend implementing in the new sales office?()A DHCP server rolesB the DirectAccess featureC the Network Policy Server (NPS) role serviceD the Remote Access Service role service