单选题You need to design a configuration for the Microsoft Outlook Web Access servers. What should you do?()A Create a Network Load Balancing cluster that contains the Outlook Web Access serversB Create a Microsoft Cluster Server cluster that contains the Ou

题目
单选题
You need to design a configuration for the Microsoft Outlook Web Access servers. What should you do?()
A

Create a Network Load Balancing cluster that contains the Outlook Web Access servers

B

Create a Microsoft Cluster Server cluster that contains the Outlook Web Access servers

C

Create public DNS host (A) resource records for each Outlook Web Access server. Instruct each user to connect to the server that contains his or her mailbox

D

Install Microsoft Application Center 2000 on the Outlook Web Access servers. Create a Web cluster that contains all of the Outlook Web Access servers


相似考题

2. Company.com network consists of a single Active Directory domain named  Company.com.Company.com has an Exchange Server 2010 organization.The Company.com employees use Microsoft Office Outlook 2007 to connect to their mailboxes.RPC over HTTP and Auto discover are configured on Microsoft Office Outlook 2007. A new Company.com security policy requires that the employees connected to the domain does not need authentication when using Outlook Anywhere.However, those not connected t the domain needs to be authentication when using Outlook Anywhere.The employees need to comply with the new Company.com security policy.  What should you do?()A、You should consider using Basic authentication on Outlook Anywhere and set up only Basic authentication on the RPC virtual directory.B、You should consider using NTLM authentication on Outlook Anywhere and set up Basic authentication and NTLM authentication on the RPC virtual directory.C、You should consider using NTLM authentication on Outlook Anywhere and set up only Basic authentication on the RPC virtual directory.D、You should consider using Basic authentication on Outlook Anywhere and set up Basic authentication and NTLM authentication on the RPC virtual directory.

更多“You need to design a configuration for the Microsoft Outlook”相关问题
  • 第1题:

    You work as a Web Developer at Certkiller.com. You are in the process of creating a Webapplication using Microsoft ASP.NET 3.5.  An exception management framework is not used in the Web application. You need to ensure thatthe application log the unhandled exceptions automatically to the event log. You need to configurethe Web.config file to accomplish this. Identify the configuration that will assist you in thisscenario?()

    • A、You should consider using the <healthMonitoring enabled="true"/> configuration.
    • B、You should consider using the <deployment retail="true"/> configuration.
    • C、You should consider using the <customErrors mode="On"/> configuration.
    • D、You should consider using the <trace enabled="true"/> configuration.

    正确答案:A

  • 第2题:

    You are evaluating the implementation of two Hyper-V hosts for the Web servers. You need to design a solution that will move the Web servers automatically between the Hyper-V hosts based on the physical resources available. Which software should you include in the design?()

    • A、Microsoft System Center Operations Manager
    • B、Microsoft System Center Virtual Machine Manager
    • C、Microsoft System Center Data Protection Manager
    • D、Microsoft System Center Configuration Manager

    正确答案:A,B

  • 第3题:

    You use Microsoft Visual Studio 2010 and Microsoft .NET Framework 4 to create a Windows Presentation Framework (WPF) application. You have a company logo that must appear on multiple forms in the application. The logo design changes frequently. You need to ensure that when the logo image is changed, you only need to update a single location. What should you do?()

    • A、 Define the image as a page resource. 
    • B、 Define the image as an application resource.
    • C、 Save the image on a network drive. 
    • D、 Include the image as an embedded resource.

    正确答案:B

  • 第4题:

    You need to ensure that all servers meet the company’s security requirements. Which tool should you use?()

    • A、Microsoft Baseline Security Analyzer (MBSA)
    • B、Microsoft Security Assessment Tool (MSAT)
    • C、Resultant Set of Policy (RSoP)
    • D、Security Configuration Wizard (SCW)

    正确答案:A

  • 第5题:

    Your company has a single Active Directory Domain Services (AD DS) domain with Windows Server 2008 R2 member servers and 1,000 Windows 7 client computers. You are designing the deployment of a custom application.   You have the following requirements:   The application must be available to only users who need it. Minimize network traffic during deployment.   You need to design a deployment strategy that meets the requirements.   Which deployment method should you use?()

    • A、RemoteApp and Desktop Connections
    • B、software installation in Group Policy
    • C、Microsoft Application Virtualization (App-V)
    • D、Microsoft System Center Configuration Manager 2007

    正确答案:A

  • 第6题:

    You have an Exchange Server 2010 organization.You need to create Personal Archives. Which tool should you use?()

    • A、Active Directory Users and Computers
    • B、Exchange Control Panel (ECP)
    • C、Exchange Management Console (EMC)
    • D、Microsoft Office Outlook

    正确答案:C

  • 第7题:

    You need to design a strategy to ensure that all servers are in compliance with the business requirements for maintaining security patches. What should you do?()

    • A、Log on to a domain controller and run the Resultant Set of Policy wizard in planning mode on the domain
    • B、Log on to each server and run Security Configuration and Analysis to analyze the security settings by using a custom security template
    • C、Create a logon script to run the secedit command to analyze all servers in the domain
    • D、Run the Microsoft Baseline Security Analyzer (MBSA) on a server to scan for Windows vulnerabilities on all servers in the domain

    正确答案:D

  • 第8题:

    单选题
    You need to recommend a configuration design for the new VMs. The design must ensure that operating systems can be deployed to the new VMs. What should you include in the recommendation?()
    A

    virtual machine queue (VMQ)

    B

    Virtual Machine Chimney

    C

    a synthetic network adapter

    D

    an emulated network adapter


    正确答案: D
    解析: 暂无解析

  • 第9题:

    单选题
    You have an Exchange Server 2010 organization.Users access their e-mail from the Internet by using Outlook Web App.You need to prevent users from downloading ZIP files from Outlook Web App.The solution must ensure that users can download ZIP files by using Microsoft Office Outlook. What should you do?()
    A

    Configure the Content Filter agent.

    B

    Configure the Attachment Filter agent.

    C

    Create a managed folder mailbox policy.

    D

    Create an Outlook Web App Mailbox policy.


    正确答案: D
    解析: 暂无解析

  • 第10题:

    多选题
    You are evaluating the implementation of two Hyper-V hosts for the application servers. You need to design a solution that will move the application servers automatically between the Hyper-V hosts based on the physical resources available. The solution must minimize the number of Microsoft System Center products deployed to the network. Which software should you include in the design?()
    A

    Microsoft System Center Operations Manager

    B

    Microsoft System Center Virtual Machine Manager

    C

    Microsoft System Center Data Protection Manager

    D

    Microsoft System Center Configuration Manager


    正确答案: D,C
    解析: 暂无解析

  • 第11题:

    单选题
    You work as a Web Developer at Certkiller.com. You are in the process of creating a Webapplication using Microsoft ASP.NET 3.5.  An exception management framework is not used in the Web application. You need to ensure thatthe application log the unhandled exceptions automatically to the event log. You need to configurethe Web.config file to accomplish this. Identify the configuration that will assist you in thisscenario?()
    A

    You should consider using the <healthMonitoring enabled=true/> configuration.

    B

    You should consider using the <deployment retail=true/> configuration.

    C

    You should consider using the <customErrors mode=On/> configuration.

    D

    You should consider using the <trace enabled=true/> configuration.


    正确答案: D
    解析: 暂无解析

  • 第12题:

    单选题
    You need to design the deployment of antivirus software. What should you do?()
    A

    Install the antivirus software on each mailbox storage server

    B

    Install the antivirus software on each Outlook Web Access server

    C

    Install the antivirus software on one Outlook Web Access server at each office

    D

    Install the antivirus software on a back-end server that contains no mailboxes


    正确答案: C
    解析: 暂无解析

  • 第13题:

    Your company has a single Active Directory Domain Services (AD DS) domain and 1,000 client computers.  You are planning to deploy Windows 7 Enterprise to the client computers.    You need to design a zero-touch installation strategy.()

    • A、unattended installation
    • B、custom Windows 7 image on DVD
    • C、Windows Deployment Services (WDS)
    • D、Microsoft System Center Configuration Manager 2007 R2

    正确答案:D

  • 第14题:

    You need to design a strategy for providing e-mail access to the subsidiary users. What should you do?()

    • A、Deploy POP3 and IMAP4 services on Exchange front-end servers. Make the front-end servers accessible from the Internet by means of POP3, IMAP4, and SMTP only
    • B、Deploy Microsoft Outlook Web Access on Exchange mailbox servers. Make the mailbox servers accessible from the Internet by means of HTTPS and SMTP only
    • C、Deploy Microsoft Outlook Web Access on Exchange front-end servers. Make the front-end servers accessible from the Internet by means of HTTPS only
    • D、Deploy an additional Exchange mailbox server that contains all subsidiary mailboxes. Deploy Microsoft Outlook Web Access on the server. Make the server accessible from the Internet by means of HTTPS only

    正确答案:C

  • 第15题:

    You need to recommend a solution for managing the GPOs that supports the company's planned changes.   What should you include in the recommendation?()

    • A、Group Policy Management Console (GPMC) and Authorization Manager
    • B、Group Policy Management Console (GPMC) and Microsoft SharePoint Foundation 2010
    • C、Microsoft Desktop Optimization Pack (MDOP)
    • D、Microsoft System Center Configuration Manager

    正确答案:C

  • 第16题:

    You need to design a strategy for remote client computer access that meets all business and technical requirements. What should you do?()

    • A、Configure the HTTP virtual server on the Exchange front-end server to require a secure connection. Instruct the sales personnel to use Microsoft Outlook Web Access to connect to the Exchange front-end server
    • B、Configure the back-end Exchange servers to use static ports for RPC connections. Open the required ports on the firewall. Install Microsoft Outlook 2003 on the portable computers and configure it to connect to the Exchange back-end server using a MAPI connection
    • C、Configure the Exchange front-end server to require secure connections from IMAP4 client computers. Install Microsoft Outlook 2003 on the portable computers and configure it to use a secure IMAP4 connection
    • D、Configure the Exchange servers to support RPC over HTTPS. Install Microsoft outlook 2003 on the portable computers and configure it to use RPC over HTTPS

    正确答案:D

  • 第17题:

    You are evaluating the implementation of two Hyper-V hosts for the application servers. You need to design a solution that will move the application servers automatically between the Hyper-V hosts based on the physical resources available. The solution must minimize the number of Microsoft System Center products deployed to the network. Which software should you include in the design?()

    • A、Microsoft System Center Operations Manager
    • B、Microsoft System Center Virtual Machine Manager
    • C、Microsoft System Center Data Protection Manager
    • D、Microsoft System Center Configuration Manager

    正确答案:A,B

  • 第18题:

    You need to recommend a configuration design for the new VMs. The design must ensure that operating systems can be deployed to the new VMs. What should you include in the recommendation?()

    • A、virtual machine queue (VMQ)
    • B、Virtual Machine Chimney
    • C、a synthetic network adapter
    • D、an emulated network adapter

    正确答案:D

  • 第19题:

    单选题
    You need to design a security strategy for a remote e-mail access. What should you do?()
    A

    Require remote users to access e-mails by using Outlook Mobile Access

    B

    Require Outlook Web Access users to install the secure MIME ActiveX-Control and to encrypt all messages

    C

    On Outlook Web Access servers that accept connections from the Internet configure IIS to require SSL for all connections

    D

    On Outlook Web Access servers that accept connections from the Internet configure IIS to require Integrated Windows Authentication


    正确答案: A
    解析: 暂无解析

  • 第20题:

    单选题
    You are planning to upgrade Internet Explorer.   You have the following requirements:   Create a report that identifies which computers are successfully upgraded. Do not install additional software on the client computers.   You need to design a deployment method that meets the requirements.   What should you do?()
    A

    Use Internet Explorer Administration Kit (IEAK) and Group Policy.

    B

    Use Microsoft System Center Configuration Manager.

    C

    Use Windows Server Update Services (WSUS).

    D

    Use Microsoft System Center Essentials.


    正确答案: D
    解析: 暂无解析

  • 第21题:

    单选题
    You are planning a Windows 7 deployment infrastructure for a new company.   You have the following requirements:   Three domains  10,000 client computers No user interaction   You need to recommend a deployment infrastructure.   What should you recommend?()
    A

    Deploy Microsoft Deployment Toolkit (MDT) 2010. Design a zero-touch installation.

    B

    Deploy Microsoft System Center Virtual Machine Manager. Design a lite-touch installation.

    C

    Deploy Microsoft System Center Operations Manager 2007 R2. Design a lite-touch installation. 

    D

    Deploy Microsoft System Center Configuration Manager 2007 R2. Design a zero-touch installation.


    正确答案: B
    解析: 暂无解析

  • 第22题:

    单选题
    You need to design a configuration for the Microsoft Outlook Web Access servers. What should you do?()
    A

    Create a Network Load Balancing cluster that contains the Outlook Web Access servers

    B

    Create a Microsoft Cluster Server cluster that contains the Outlook Web Access servers

    C

    Create public DNS host (A) resource records for each Outlook Web Access server. Instruct each user to connect to the server that contains his or her mailbox

    D

    Install Microsoft Application Center 2000 on the Outlook Web Access servers. Create a Web cluster that contains all of the Outlook Web Access servers


    正确答案: C
    解析: 暂无解析

  • 第23题:

    单选题
    You need to design a method to monitor the security configuration of the IIS server to meet the requirements in the written security policy. What should you do?()
    A

    Log on to a domain controller and run the Resultant Set of Policy wizard in planning mode on the IIS server computer account

    B

    Run the Microsoft Baseline Security Analyzer (MBSA) on the IIS server and scan for vulnerabilities in Windows and IIS checks

    C

    Run Security Configuration and Analysis to analyze the IIS server’s security settings by using a custom security template

    D

    On the IIS server, run the gpresult command from a command prompt and analyze the output


    正确答案: A
    解析: 暂无解析

  • 第24题:

    单选题
    You are performing a test deployment of Microsoft Enterprise Desktop virtualization (MED-V) 2.0. You discover that applications deployed by using MED-V run much slower than expected. You need to recommend configuration changes to improve the performance of the MED-V workspace applications. Which configuration changes should you recommend?()
    A

    Disable cached mode in Outlook 2010

    B

    Add exclusions to Forefront EndPoint Protection

    C

    Add URL exclusions to the Forefront TMG Client

    D

    Modify the network settings in SharePoint Workspace 2010


    正确答案: C
    解析: 暂无解析