第1题:
For data transmission to be successful,sending and receiving devices must follow a set of communication rules for the exchange of information. These rules are known as( ).
A.E-mail B.Intemet C.network D.protocols
第2题:
第3题:
When setting an access point to a non-root role, what two parameters,other than Role in theRadio Network,must be configured on the SSID Manager page?()
第4题:
A Windows Communication Foundation (WCF) service is responsible for transmitting XML documents between systems. The service has the following requirements: It must minimize the transmission size by attaching the XML document as is without using escape characters or base64 encoding. It must interoperate with systems that use SOAP but are not built on the .NET plafform. You need to configure the service to support these requirements. Which message encoding should you use?()
第5题:
You have an Exchange Server 2010 organization that contains Windows Mobile 5.0 devices. Your company plans to replace all mobile devices with Windows Mobile 6.5 devices. You need to identify which users accessed their mailboxes by using Windows Mobile 5.0 devices in thepast month. What should you do?()
第6题:
You work as the enterprise exchange administrator at Xxx .Xxx is using Microsoft Exchange Server 2010 as their messaging solution.The Xxx network has a DNS server named XXX-SR04.What actions must you take to have the Hub Transport servers do not use XXX-SR04 to resolve names on the Internet?()
第7题:
Create a Group Policy object (GPO) to enable the System objects: Strengthen default permission ofinternal systems objects setting.
Create a Group Policy object (GPO) to enable the System cryptography: Use FIPS compliant algorithms for encryption, hashing, and signing setting.
Implement IPsec security in the iSCSI Initiator Properties. Set up inbound and outbound rules by using Windows Firewall.
Implement mutual Microsoft Challenge Handshake Authentication Protocol (MS-CHAPv2) authentication in the iSCSI Initiator Properties. Set up inbound and outbound rules by using Windows Firewall.
第8题:
You must create a legal hold.
You must change the mailbox database properties.
You must create Transport Protection Rules.
You must create Personal archives.
第9题:
Addresses used for NAT pools should never overlap.
If more than one rule-set matches traffic, the rule-set with the most specific context takes precedence.
If traffic matches two rules within the same rule-set, both rules listed in the configuration are applied.
Dynamic source NAT rules take precedence over static source NAT rules.
第10题:
You must set up a new ActiveSync Device Access rule.
You must set up a managed folder mailbox policy.
You must set up a new role assignment policy.
You must set up Outlook Protection Rules.
第11题:
Add the Known Type attribute to the data contract.Set a default value in each of the data member declarations.
Add the Known Type attribute to the data contract.Set the Order property of each data member to unique integer value.
Set the Emit Default Value property of each data member to false.
Set the Is Required property of each data member to true.
第12题:
第13题:
第14题:
第15题:
You work as the exchange administrator at Testking.com. The TestKing.com network contains an Exchange Server 2010 Organization. You are responsible for managing the Exchange network for TestKing.com. Currently Microsoft Office Outlook is used by all TestKing.com users to connect to their mailboxes. Thecompliance policy of the organization states that a copy of messages sent to the Finance department fromthe Internet is archived. The archived e-mails need to be stored on a third-party archival server. You areinstructed to recommend a solution that will comply with the set criteria. What should you do?()
第16题:
Windows Communication Foundation (WCF) application uses a data contract that has several data members. You need the application to throw a Serialization Exception if any of the data members are not present when a serialized instance of the data contract is deserialized. What should you do?()
第17题:
You work as the enterprise exchange administrator at Xxx .The Xxx network consists of a domain named xxx .Xxx is using Microsoft Exchange Server 2010 as their messaging solution. What actions must you take to stop a user named Mia Hamm from removing information from her mailbox?()
第18题:
The transmission is aborted and an alarm sounds to indicate this data must be provided by the operator
The transmission is not initiated and ERROR is indicated on the display readout
The transmission will be made with default information provided automatically
The receiving station will poll the DSC unit of the vessel in distress to download the necessary information
第19题:
You must change recipient filtering.
You must change the DNS forwarding.
You must change the Outlook Protection Rules.
You must change the EXPR Outlook Provider’s properties.
第20题:
You must implement Outlook Protection Rules.
You must implement Transport Protection Rules.
You must set up a Public Folder Management Console.
You must deselect the IMAP4 mailbox feature in XXX-EX15.
第21题:
Use Windows Server AppFabric.
Use the Windows Azure AppFabric Service Bus.
Use the Windows Azure AppFabric Access Control Service.
Use a Windows Communication Foundation (WCF) service in a Windows Azure role that relays to the internal web service
第22题:
You must set up a Group Policy Object.
You must set up an Outlook Web App Mailbox policy.
You must change the properties of the public folder database.
You must set up recipient filtering.
第23题:
It involves the use of a deadly poison.
It is a costly event which rarely occurs.
The hunters have set rules to follow.
The hunters have to go through strict training.