Place the mailboxes for each region on a separate server. Create an administrative group for each region. Assign each regional technician Exchange Full Administrator permission over that region’s administrative groups. Assign the main office IT staff Exchange Full Administrator permission over each administrative group.
Place the mailboxes for each region on a separate server. Create an administrative group for each region. Assign each regional technician Exchange Full Administrator permission over all administrative groups. Assign the main office IT staff Exchange Full Administrator permission over each administrative group
Place the mailboxes from multiple regions on each server. Create an administrative group for each server. Assign each regional technician Exchange Full Administrator permission over the administrative groups that contain servers that hold mailboxes for that region. Assign the main office IT staff Exchange Full Administrator permission over each administrative group
Place the mailboxes from multiple regions on each server. Create a single administrative group for all servers. Assign each regional technician and the main office IT Staff Exchange Full Administrator permission over the administrative group
第1题:
You work as the enterprise exchange administrator at TestKing.com. TestKing.com makes use of Microsoft Exchange Server messaging solution. The TestKing.com network consists of a single ActiveDirectory domain named testking.com. TestKing.com is configured to run an exchange 2010 environment. You are planning to design the installation of numerous Mailbox servers. TestKing.com Service LevelAgreement (SLA) requires the following: * The servers need to support 1,500 concurrent connections to mailboxes.* The servers need to maintain a latency of less than 20 milliseconds. You ensure deployment success you need to ensure that your design comply with the Service LevelAgreement (SLA) of TestKing.com. What should you do?()
第2题:
You need to design a PKI that meets business requirements. What should you do?()
第3题:
You need to design a method to implement account policies that meets the requirements in the written security policy. What should you do?()
第4题:
You have an Exchange Server 2010 organization that contains two Hub Transport servers. You need to design a recovery plan for the Hub Transport servers that meets the following requirements: .Restores all Windows settings .Restores all Exchange configurations.Minimizes administrative effort What should you include in the plan?()
第5题:
You have an Exchange Server 2010 organization that contains two Hub Transport servers. You need to design a recovery plan for the Hub Transport servers that meets the following requirements:.Restores all Windows settings .Restores all Exchange configurations.Minimizes administrative effort What should you include in the plan?()
第6题:
You need to design a domain model that meets the company business and security requirements for controlling access to the new Web-based ordering application. What should you do?()
第7题:
You need to design a password policy that meets business requirements. What should you do? Select all that apply.()
第8题:
Remote Desktop Gateway
Remote Desktop Connection Broker
Windows Deployment Services
Windows Virtual PC and Windows XP Mode
第9题:
Install and configure a stand-alone root certification authorative (CA) that is trusted by all company client computers. Issue encryption certificates to all developers
Install and configure root certification authority (CA) that is trusted by all company client computers. Issue code-signing certificates to all developers
Purchase a root certification from a trusted commercial certification authority (CA). Install the root certificated on all developers’ computers
Purchase a code-signing certificate from a trusted commercial certification authority (CA). Install the certificate on all company client computers
第10题:
administrator audit logging
circular logging
diagnostic logging
Windows Security Auditing
第11题:
You need to design an administrative model for the Exchange Server environment. What should you do?()
第12题:
You are designing a remote administration solution that meets business requirements. You need to specify client or server software that will be required. What should you do?()
第13题:
You need to design a method to log changes that are made to servers and domain controllers. You also need to track when administrators modify local security account manager objects on servers. What should you do?()
第14题:
You need to use the Event Viewer window to review the event logs for only critical and error events. You also need the maximum amount of detail for each of these events. What should you do? ()
第15题:
You need to design an administrative model that meets the business and technical requirements. What should you do?()
第16题:
You need to design an administrative model for Exchange Server 2003. What should you?()
第17题:
Create two Report Builder models.Include the four frequently used tables in the first model and all the tables in the second model.
Create a Report Builder model by using all the tables.Create a perspective within the model to use only the four frequently used tables.
Create a Report Builder model by using all the tables. Create two folders.Place the four frequently used tables in the first folder and the remaining tables in the second folder.
Create two Data Source Views.Include all the tables in one Data Source View and the four frequently used tables in the other Data Source View.Create two Report Builder models so that each model uses one of the Data Source Views.
第18题:
the Microsoft Time Series algorithm
the Microsoft Decision Trees algorithm
the Microsoft Linear Regression algorithm
the Microsoft Logistic Regression algorithm
第19题:
On all domain controllers, implement registry access auditing for all registry keys that are considered sensitive by the company’s written security policy
On all client computers, implement logon auditing for all user account logons
On all client computers, configure registry access auditing for all registry keys that are considered sensitive by the company’s written security policy
On all domain controllers, implement logon auditing for all user account logons
第20题:
Create a storage group for each office. Within each storage group, create a single database
Create a storage group for each region. Within each storage group, create a single database
Create a storage group for each region. Within each storage group, create separate databases for each office in that region
Create a single storage group. Within that storage group, create a separate database for each office