Create a Network Load Balancing cluster that contains the Outlook Web Access servers
Create a Microsoft Cluster Server cluster that contains the Outlook Web Access servers
Create public DNS host (A) resource records for each Outlook Web Access server. Instruct each user to connect to the server that contains his or her mailbox
Install Microsoft Application Center 2000 on the Outlook Web Access servers. Create a Web cluster that contains all of the Outlook Web Access servers
第1题:
You work as a Web Developer at Certkiller.com. You are in the process of creating a Webapplication using Microsoft ASP.NET 3.5. An exception management framework is not used in the Web application. You need to ensure thatthe application log the unhandled exceptions automatically to the event log. You need to configurethe Web.config file to accomplish this. Identify the configuration that will assist you in thisscenario?()
第2题:
You are evaluating the implementation of two Hyper-V hosts for the Web servers. You need to design a solution that will move the Web servers automatically between the Hyper-V hosts based on the physical resources available. Which software should you include in the design?()
第3题:
You use Microsoft Visual Studio 2010 and Microsoft .NET Framework 4 to create a Windows Presentation Framework (WPF) application. You have a company logo that must appear on multiple forms in the application. The logo design changes frequently. You need to ensure that when the logo image is changed, you only need to update a single location. What should you do?()
第4题:
You need to ensure that all servers meet the company’s security requirements. Which tool should you use?()
第5题:
Your company has a single Active Directory Domain Services (AD DS) domain with Windows Server 2008 R2 member servers and 1,000 Windows 7 client computers. You are designing the deployment of a custom application. You have the following requirements: The application must be available to only users who need it. Minimize network traffic during deployment. You need to design a deployment strategy that meets the requirements. Which deployment method should you use?()
第6题:
You have an Exchange Server 2010 organization.You need to create Personal Archives. Which tool should you use?()
第7题:
You need to design a strategy to ensure that all servers are in compliance with the business requirements for maintaining security patches. What should you do?()
第8题:
virtual machine queue (VMQ)
Virtual Machine Chimney
a synthetic network adapter
an emulated network adapter
第9题:
Configure the Content Filter agent.
Configure the Attachment Filter agent.
Create a managed folder mailbox policy.
Create an Outlook Web App Mailbox policy.
第10题:
Microsoft System Center Operations Manager
Microsoft System Center Virtual Machine Manager
Microsoft System Center Data Protection Manager
Microsoft System Center Configuration Manager
第11题:
You should consider using the <healthMonitoring enabled=true/> configuration.
You should consider using the <deployment retail=true/> configuration.
You should consider using the <customErrors mode=On/> configuration.
You should consider using the <trace enabled=true/> configuration.
第12题:
Install the antivirus software on each mailbox storage server
Install the antivirus software on each Outlook Web Access server
Install the antivirus software on one Outlook Web Access server at each office
Install the antivirus software on a back-end server that contains no mailboxes
第13题:
Your company has a single Active Directory Domain Services (AD DS) domain and 1,000 client computers. You are planning to deploy Windows 7 Enterprise to the client computers. You need to design a zero-touch installation strategy.()
第14题:
You need to design a strategy for providing e-mail access to the subsidiary users. What should you do?()
第15题:
You need to recommend a solution for managing the GPOs that supports the company's planned changes. What should you include in the recommendation?()
第16题:
You need to design a strategy for remote client computer access that meets all business and technical requirements. What should you do?()
第17题:
You are evaluating the implementation of two Hyper-V hosts for the application servers. You need to design a solution that will move the application servers automatically between the Hyper-V hosts based on the physical resources available. The solution must minimize the number of Microsoft System Center products deployed to the network. Which software should you include in the design?()
第18题:
You need to recommend a configuration design for the new VMs. The design must ensure that operating systems can be deployed to the new VMs. What should you include in the recommendation?()
第19题:
Require remote users to access e-mails by using Outlook Mobile Access
Require Outlook Web Access users to install the secure MIME ActiveX-Control and to encrypt all messages
On Outlook Web Access servers that accept connections from the Internet configure IIS to require SSL for all connections
On Outlook Web Access servers that accept connections from the Internet configure IIS to require Integrated Windows Authentication
第20题:
Use Internet Explorer Administration Kit (IEAK) and Group Policy.
Use Microsoft System Center Configuration Manager.
Use Windows Server Update Services (WSUS).
Use Microsoft System Center Essentials.
第21题:
Deploy Microsoft Deployment Toolkit (MDT) 2010. Design a zero-touch installation.
Deploy Microsoft System Center Virtual Machine Manager. Design a lite-touch installation.
Deploy Microsoft System Center Operations Manager 2007 R2. Design a lite-touch installation.
Deploy Microsoft System Center Configuration Manager 2007 R2. Design a zero-touch installation.
第22题:
Create a Network Load Balancing cluster that contains the Outlook Web Access servers
Create a Microsoft Cluster Server cluster that contains the Outlook Web Access servers
Create public DNS host (A) resource records for each Outlook Web Access server. Instruct each user to connect to the server that contains his or her mailbox
Install Microsoft Application Center 2000 on the Outlook Web Access servers. Create a Web cluster that contains all of the Outlook Web Access servers
第23题:
Log on to a domain controller and run the Resultant Set of Policy wizard in planning mode on the IIS server computer account
Run the Microsoft Baseline Security Analyzer (MBSA) on the IIS server and scan for vulnerabilities in Windows and IIS checks
Run Security Configuration and Analysis to analyze the IIS server’s security settings by using a custom security template
On the IIS server, run the gpresult command from a command prompt and analyze the output
第24题:
Disable cached mode in Outlook 2010
Add exclusions to Forefront EndPoint Protection
Add URL exclusions to the Forefront TMG Client
Modify the network settings in SharePoint Workspace 2010