单选题You need to design an administrative model that meets all business and technical requirements. What should you do?()A Place the mailboxes for each region on a separate server. Create an administrative group for each region. Assign each regional technic

题目
单选题
You need to design an administrative model that meets all business and technical requirements. What should you do?()
A

Place the mailboxes for each region on a separate server. Create an administrative group for each region. Assign each regional technician Exchange Full Administrator permission over that region’s administrative groups. Assign the main office IT staff Exchange Full Administrator permission over each administrative group.

B

Place the mailboxes for each region on a separate server. Create an administrative group for each region. Assign each regional technician Exchange Full Administrator permission over all administrative groups. Assign the main office IT staff Exchange Full Administrator permission over each administrative group

C

Place the mailboxes from multiple regions on each server. Create an administrative group for each server. Assign each regional technician Exchange Full Administrator permission over the administrative groups that contain servers that hold mailboxes for that region. Assign the main office IT staff Exchange Full Administrator permission over each administrative group

D

Place the mailboxes from multiple regions on each server. Create a single administrative group for all servers. Assign each regional technician and the main office IT Staff Exchange Full Administrator permission over the administrative group


相似考题
参考答案和解析
正确答案: D
解析: 暂无解析
更多“You need to design an administrative model that meets all bu”相关问题
  • 第1题:

    You work as the enterprise exchange administrator at TestKing.com. TestKing.com makes use of Microsoft Exchange Server messaging solution. The TestKing.com network consists of a single ActiveDirectory domain named testking.com. TestKing.com is configured to run an exchange 2010 environment.  You are planning to design the installation of numerous Mailbox servers. TestKing.com Service LevelAgreement (SLA) requires the following: * The servers need to support 1,500 concurrent connections to mailboxes.* The servers need to maintain a latency of less than 20 milliseconds. You ensure deployment success you need to ensure that your design comply with the Service LevelAgreement (SLA) of TestKing.com. What should you do?()

    • A、The best option is to use the Exchange Server User Monitor (ExMon) tool to check if your design meets the requirements.
    • B、The best option is to use the Exchange Server Load Generator (LoadGen) 2010 tool to check if your design meets the requirements.
    • C、The best option is to use the Exchange Server Connectivity Analyzer (ExRCA) tool to check if your design meets the requirements.
    • D、The best option is to use the Exchange Server Jetstress 2010 tool to check if you design meets there quirements.

    正确答案:B

  • 第2题:

    You need to design a PKI that meets business requirements. What should you do?()

    • A、Move ATLCA1 offline and create an enterprise subordinate CA to issue certificates
    • B、Create a stand-alone subordinate CA to issue certificates
    • C、Use a qualified subordinate CA
    • D、Configure certificate template access control lists (ACLs) on ATLCA1

    正确答案:A

  • 第3题:

    You need to design a method to implement account policies that meets the requirements in the written security policy. What should you do?()

    • A、Create a GPO and link it to the New York OU, to the Denver OU, and to the Dallas OU.Configure the GPO with the required account policy settings
    • B、On all computers in the domain, configure the Local Security Policy7 with the required account policy settings
    • C、Configure the Default Domain Policy GPO with the required account policy settings
    • D、Configure the Default Domain Controllers Policy GPO with the required account policy settings

    正确答案:C

  • 第4题:

    You have an Exchange Server 2010 organization that contains two Hub Transport servers.  You need to design a recovery plan for the Hub Transport servers that meets the following requirements: .Restores all Windows settings .Restores all Exchange configurations.Minimizes administrative effort What should you include in the plan?()

    • A、.Retention of Exchange server computer accounts in Active Directory .Backup and recovery of Windows system stateA recovery installation of Exchange Server 2010
    • B、.Retention of Exchange server computer accounts in Active Directory .Backup and recovery of transport queues.A custom installation of Exchange Server 2010
    • C、Recovery of Windows system state.Backup and recovery of transport queues.A typical installation of Exchange Server 2010
    • D、Backup and recovery of Windows system state.A repair installation of Windows Server 2008.A typical installation of Exchange Server 2010

    正确答案:A

  • 第5题:

    You have an Exchange Server 2010 organization that contains two Hub Transport servers.  You need to design a recovery plan for the Hub Transport servers that meets the following requirements:.Restores all Windows settings .Restores all Exchange configurations.Minimizes administrative effort What should you include in the plan?()

    • A、.Retention of Exchange server computer accounts in Active Directory .Backup and recovery of Windows system stateA recovery installation of Exchange Server 2010
    • B、.Retention of Exchange server computer accounts in Active Directory .Backup and recovery of transport queues.A custom installation of Exchange Server 2010
    • C、Recovery of Windows system state.Backup and recovery of transport queues.A typicalinstallation of Exchange Server 2010
    • D、Backup and recovery of Windows system state.A repair installation of Windows Server 2008.A typical installation of Exchange Server 2010

    正确答案:A

  • 第6题:

    You need to design a domain model that meets the company business and security requirements for controlling access to the new Web-based ordering application. What should you do?()

    • A、Create a child OU within the existing domain
    • B、Create a child domain of the existing domain
    • C、Create a new domain in a new forest. Configure the new domain to trust the existing domain
    • D、Create a new tree in the existing forest. Configure the new domain to trust the existing domain

    正确答案:C

  • 第7题:

    You need to design a password policy that meets business requirements. What should you do? Select all that apply.()

    • A、Increase the number of passwords that are remembered
    • B、Disable reversible encryption
    • C、Set the minimum password age to zero days
    • D、Increase the maximum password age

    正确答案:A,C

  • 第8题:

    单选题
    You are designing a Windows 7 virtual desktop infrastructure.You have the following requirements:   Provide access to Remote Desktop Services RemoteApp sources from multiple remote desktop servers.  Support network load balancing.  Support reconnection to existing sessions on virtual desktops.    You need to specify a design that meets the requirements.   What should you include in your design?()
    A

    Remote Desktop Gateway

    B

    Remote Desktop Connection Broker

    C

    Windows Deployment Services

    D

    Windows Virtual PC and Windows XP Mode


    正确答案: C
    解析: 暂无解析

  • 第9题:

    单选题
    You need to design a security solution for the internally developed Web applications that meets business requirements. What should you do?()
    A

    Install and configure a stand-alone root certification authorative (CA) that is trusted by all company client computers. Issue encryption certificates to all developers

    B

    Install and configure root certification authority (CA) that is trusted by all company client computers. Issue code-signing certificates to all developers

    C

    Purchase a root certification from a trusted commercial certification authority (CA). Install the root certificated on all developers’ computers

    D

    Purchase a code-signing certificate from a trusted commercial certification authority (CA). Install the certificate on all company client computers


    正确答案: B
    解析: 暂无解析

  • 第10题:

    单选题
    You have an Exchange Server 2010 organization.  You plan to delegate Exchange administrative rights to some users in the organization.  You need to recommend a solution that tracks all changes made to the Exchange organization.  What should you include in the solution?()
    A

    administrator audit logging

    B

    circular logging

    C

    diagnostic logging

    D

    Windows Security Auditing


    正确答案: B
    解析: 暂无解析

  • 第11题:

    You need to design an administrative model for the Exchange Server environment. What should you do?()

    • A、Create a single organizational unit (OU). Place the user accounts for each office in the OU. Delegate control over the OU to the office’s server administrators and the central IT staff
    • B、Create a single Exchange administrative group. Place all Exchange servers into that administrative group. Assign permissions for the administrative group to the officer’s server administrators and the central IT staff
    • C、Create an Exchange administrative group for each office. Place the Exchange severs for each office into that office’s administrative group. Assign permissions for the administrative group to the office’s server administrators. Allow the central IT staff to manage user mailboxes
    • D、Create an organizational unit (OU) for each office. Place the user accounts for each office into the appropriate OU. Delegate control over each OU to the office’s server administrators. Allow the central IT staff to manager user mailboxes

    正确答案:B

  • 第12题:

    You are designing a remote administration solution that meets business requirements. You need to specify client or server software that will be required. What should you do?()

    • A、Ensure that all client computers have a graphical Telnet client installed
    • B、Ensure that all client computers have the Remote Desktop Connection client software installed
    • C、Ensure that all server computers have RCONSOLE installed and that it is configured to start automatically
    • D、Ensure that all server computers have Remote Administration (HTML) installed

    正确答案:B

  • 第13题:

    You need to design a method to log changes that are made to servers and domain controllers. You also need to track when administrators modify local security account manager objects on servers. What should you do?()

    • A、Enable failure audit for privilege user and object access on all servers and domain controllers
    • B、Enable success audit for policy change and account management on all servers and domain controllers
    • C、Enable success audit for process tracking and logon events on all servers and domain controllers
    • D、Enable failure audit for system events and directory service access on all servers and domain controllers

    正确答案:B

  • 第14题:

    You need to use the Event Viewer window to review the event logs for only critical and error events. You also need the maximum amount of detail for each of these events. What should you do? ()

    • A、Edit the filter for the Administrative Events view.
    • B、Create a custom view. Enable the Critical, Error, and Information level events. Select all logs.
    • C、Create a custom view. Select the Critical checkbox, Error checkbox, and Verbose checkbox. Select all logs.
    • D、Search for the Critical or Error string by using the Find option of the Administrative Events view.

    正确答案:C

  • 第15题:

    You need to design an administrative model that meets the business and technical requirements. What should you do?()

    • A、Assign permissions to manage Mailbox and Exchange Server configuration to the server-admins group
    • B、Assign permissions to manage Mailbox and Exchange Server configuration to the domain-admins group
    • C、Assign permissions to manage Mailboxes to the server-admins group. Assign permissions to manage Exchange Servers configuration to the domain-admins group
    • D、Assign permissions to manage Mailboxes to the domain-admins group. Assign permissions to manage Exchange Servers configuration to the server-admins group

    正确答案:D

  • 第16题:

    You need to design an administrative model for Exchange Server 2003. What should you?()

    • A、Create an administrative group for each office. Place each Exchange server that is managed by an office technician into that Office’s administrative group. Assign the central IT group full control over all administrative groups. Assign each office technician control over his or her office’s administrative groups
    • B、Create one administrative group. Place all Exchange servers in the administrative group. Assign the central IT group full control over the administrative group. Make each office technician a member fo the local Backup Operators group on each group they manage
    • C、Create an administrative group for each office. Place one Exchange server in each group. Assign the central IT group and each office technician full control over each administrative group
    • D、Create one administrative group for all Exchange front-end servers. Assign each office technician control over this administrative group. Create another administrative group for all Exchange back-end servers. Assign the central IT group control over this administrative group

    正确答案:A

  • 第17题:

    单选题
    You design a Business Intelligence (BI) solution by using SQL Server 2008. You plan to create a SQL Server 2008 Reporting Services (SSRS) solution. Developers generate random reports against a data source that contains 200 tables. Power users generate random reports against four of the 200 tables. You need to design a strategy for the SSRS solution to meet the following requirements: ·Uses minimum amount of development effort. ·Provides two sets of tables in SSRS to the developers group and the power users group. Which strategy should you use?()
    A

     Create two Report Builder models.Include the four frequently used tables in the first model and all the tables in the second model.

    B

     Create a Report Builder model by using all the tables.Create a perspective within the model to use only the four frequently used tables.

    C

     Create a Report Builder model by using all the tables. Create two folders.Place the four frequently used tables in the first folder and the remaining tables in the second folder.

    D

     Create two Data Source Views.Include all the tables in one Data Source View and the four frequently used tables in the other Data Source View.Create two Report Builder models so that each model uses one of the Data Source Views.


    正确答案: C
    解析: 暂无解析

  • 第18题:

    单选题
    You design a Business Intelligence (BI) solution by using SQL Server 2008. The solution contains a SQL Server 2008 Analysis Services (SSAS) database. A measure group in the database contains log entries of manufacturing events. These events include accidents, machine failures, production capacity metrics, and other activities. You need to implement a data mining model that meets the following requirements: Predict the frequency of different event types. Identify short-term and long-term patterns. Which algorithm should the data mining model use?()
    A

     the Microsoft Time Series algorithm

    B

     the Microsoft Decision Trees algorithm

    C

     the Microsoft Linear Regression algorithm

    D

     the Microsoft Logistic Regression algorithm


    正确答案: D
    解析: 暂无解析

  • 第19题:

    单选题
    The company wants to evaluate making all business office users administrators on their client computers. You need to design a method to ensure that this change can be made in a manner that meets business and security requirements. What should you do?()
    A

    On all domain controllers, implement registry access auditing for all registry keys that are considered sensitive by the company’s written security policy

    B

    On all client computers, implement logon auditing for all user account logons

    C

    On all client computers, configure registry access auditing for all registry keys that are considered sensitive by the company’s written security policy

    D

    On all domain controllers, implement logon auditing for all user account logons


    正确答案: A
    解析: 暂无解析

  • 第20题:

    单选题
    You need to design a storage strategy that meets all business and technical requirements. What should you do?()
    A

    Create a storage group for each office. Within each storage group, create a single database

    B

    Create a storage group for each region. Within each storage group, create a single database

    C

    Create a storage group for each region. Within each storage group, create separate databases for each office in that region

    D

    Create a single storage group. Within that storage group, create a separate database for each office


    正确答案: B
    解析: 暂无解析