相关考题

单项选择题 You work as the enterprise exchange administrator at TestKing.com. TestKing.com makes use of Microsoft Exchange Server messaging solution. The TestKing.com network consists of a single ActiveDirectory domain named testking.com. TestKing.com is configured to run in an Exchange Server 2010 environment. TestKing.com contains 30 offices that consist of 1,500 users. AT present TestKing.com users make use of Microsoft Exchange Server to access their e-mail messages. During the course of day you receive an instruction from the CIO to ensure that users in their offices is only able download the list of recipients for their offiche as well asensuring that they are able to communicate to any other user in the orgranization via e-mail. What should you do?()

单项选择题 You work as the enterprise exchange administrator at TestKing.com. TestKing.com makes use of Microsoft Exchange Server messaging solution. The TestKing.com network consists of a single Active Directory domain named testking.com. TestKing.com is configured to run in an Exchange Server 2010 environment. You have received instructions from the CIO to deploy a public access solution. To accomplish this task you need to ensure that the admin department is able to send e-mail messages to public folders as well as prohibiting themfrom using Outlook Web App (OWA) to read any document in the public folders. What should you do?()

单项选择题 You work as the enterprise exchange administrator at TestKing.com. TestKing.com makes use of Microsoft Exchange Server messaging solution. The TestKing.com network consists of a single ActiveDirectory domain named testking.com. A firewall at Testking.com separates the internal network and a perimeter network. The perimeter networkcontains an Exchange Server 2010 Edge Transport server. You have received instructions from the CIO to install an internal Exchange Server 2010 with the followingcriteria: 1. The support of EdgeSync synchronizaiton and encrypted delivery of outbound e-mail messages to theEdge Transport server. 2. The minimization of the attack surface of the internal network. What should you do?()