单选题Some users report they cannot receive messages from some external senders.You suspect that there is some anti-spam activity blocking those messages.You need to identify what is blocking the messages.You will activate and review the logs of one of the f

题目
单选题
Some users report they cannot receive messages from some external senders.You suspect that there is some anti-spam activity blocking those messages.You need to identify what is blocking the messages.You will activate and review the logs of one of the following:()
A

Protocol logging

B

Connectivity logs

C

Message tracking

D

Pipeline tracing


相似考题
参考答案和解析
正确答案: A
解析: 暂无解析
更多“单选题Some users report they cannot receive messages from some external senders.You suspect that there is some anti-spam activity blocking those messages.You need to identify what is blocking the messages.You will activate and review the logs of one of the f”相关问题
  • 第1题:

    You receive complaints from users regarding the high waiting time for their transactions. Oninvestigation, you find that some users are not committing their transactions though they are  notperforming any activity for a long time. As a result, SQL statements need to wait for row-level locks.  Which two actions could you take to prevent this locking problem in the future()

    • A、Decrease the IDLE_TIME resource limit in the profile assigned to the blocking users.
    • B、Use Database Resource Manager to automatically log out sessions that block others and are idle.
    • C、Set the limit in the profile of blocking users to control the number of blocks to be accessed in a session.
    • D、Decrease the maximum number of interested transaction list (ITL) slots for the segments on which the blocking user performs the transaction

    正确答案:A,B

  • 第2题:

    You have an Exchange Server 2010 organization named contoso.com.All users configure internal and external Out Of Office messages.You need to ensure that internal Out Of Office messages are sent to senders from the fabrikam.com domain. What should you create and configure?()

    • A、a new accepted domain
    • B、a new Receive connector
    • C、a new remote domain
    • D、a new Send connector

    正确答案:C

  • 第3题:

    You have an Exchange Server 2010 organization.  An Edge Transport server sends and receives all e- mail messages from the Internet.  You notice that some servers on the Internet identify e-mail messages from your organization as spam. You need to minimize the possibility that e-mail messages sent from your organization are identified asspam.  What should you do?()

    • A、Implement Microsoft Forefront Security for Exchange Server.
    • B、Create SenderID TXT records for the Edge Transport servers.
    • C、Configure the Edge Transport servers to use a real-time block list (RBL).
    • D、Install a server certificate from a trusted third-party certification authority (CA).

    正确答案:B

  • 第4题:

    You have a computer that runs Windows 7. You need to identify which applications were installed during thelast week.  What should you do?()

    • A、From Reliability Monitor, review the informational events.
    • B、From System Information, review the Software Environment.
    • C、From Performance Monitor, review the System Diagnostics Report.
    • D、From Performance Monitor, run the System Performance Data Collector Set.

    正确答案:A

  • 第5题:

    You are the network administrator for The network consists of a single Active Directory domain named All servers run Windows Server 2003. One domain controller on the network is configured as a certification authority (CA). The network contains a Web server that runs IIS 6.0 and hosts a secure intranet site. The server also hosts other sites that do not require HTTPS. You configure a server certificate on the IIS server by using a certificate from your internal CA. All users are required to connect to the intranet site by using HTTPS. Some users report that they cannot connect to the secure intranet site by using HTTPS. You confirm that all users can connect to the nonsecure sites hosted on the Web server by using HTTP. You want to view the failed HTTPS requests. What should you do?()

    • A、Review the log files created by IIS on the Web server.
    • B、Review the security log in Event Viewer on the Web server.
    • C、Review the security log in Event Viewer on the ca.
    • D、Review the contents of the Failed Requests folder on the ca.

    正确答案:A

  • 第6题:

    单选题
    In context, what is the best version of the underlined portion of sentence 10 (reproduced below)?For instance, in some schools they paid kids to read books one summer.
    A

    in some schools where they

    B

    some schools are where they

    C

    some schools implemented programs that

    D

    programs in some schools were where they

    E

    in some school programs they


    正确答案: C
    解析:
    代词they没有明确的先行词。A,B,D,E也都是这样的错误。尽管C项不是最简洁的,但是是最有效的且语法正确。

  • 第7题:

    单选题
    You have an Exchange Server 2010 organization.You acquire a new Internet domain name.Users report that they cannot receive e-mail sent to the new domain name.You verify that all users have the new domain name configured as an e-mail address suffix.You need to ensure that users can receive e-mail sent from the Internet to the new domain name. What should you create?()
    A

    an Authoritative Accepted Domain

    B

    an External Relay Accepted Domain

    C

    a new Receive connector

    D

    a remote domain


    正确答案: A
    解析: 暂无解析

  • 第8题:

    单选题
    You have an Exchange Server 2010 organization named contoso.com.All users configure internal and external Out Of Office messages.You need to ensure that internal Out Of Office messages are sent to senders from the fabrikam.com domain. What should you create and configure?()
    A

    a new accepted domain

    B

    a new Receive connector

    C

    a new remote domain

    D

    a new Send connector


    正确答案: A
    解析: 暂无解析

  • 第9题:

    单选题
    You have an Exchange Server 2010 organization.  An Edge Transport server sends and receives all e- mail messages from the Internet.  You notice that some servers on the Internet identify e-mail messages from your organization as spam. You need to minimize the possibility that e-mail messages sent from your organization are identified asspam.  What should you do?()
    A

    Implement Microsoft Forefront Security for Exchange Server.

    B

    Create SenderID TXT records for the Edge Transport servers.

    C

    Configure the Edge Transport servers to use a real-time block list (RBL).

    D

    Install a server certificate from a trusted third-party certification authority (CA).


    正确答案: B
    解析: 暂无解析

  • 第10题:

    单选题
    You need to include a disclaimer to all sent messages in your organization. Some of the users require message encryption.How do you make sure that disclaimer can be included in encrypted messages?()
    A

    Instruct the users to use IRM encryption method only

    B

    Instruct the users to use S/MIME encryption method only

    C

    Using command New-ExchangeCertificate cmdlet

    D

    Using the Set-ExchangeServer cmdlet


    正确答案: B
    解析: 暂无解析

  • 第11题:

    单选题
    Your network contains an Active Directory Rights Management Services (AD RMS) cluster.   You have several custom policy templates. The custom policy templates are updated frequently.   Some users report that it takes as many as 30 days to receive the updated policy templates.   You need to ensure that users receive the updated custom policy templates within seven days.   What should you do()
    A

    Modify the registry on the AD RMS servers.

    B

    Modify the registry on the users   computers.

    C

    Change the schedule of the AD RMS Rights Policy Template Management (Manual) scheduled task.

    D

    Change the schedule of the AD RMS Rights Policy Template Management (Automated) scheduled  task.


    正确答案: A
    解析: 暂无解析

  • 第12题:

    单选题
    You install a new Exchange Server 2010 organization that contains a single server named erver1.Users report that they receive a large number of unsolicited commercial email (UCE) messages.You need to reduce the amount of UCE messages that users in the organization receive.What should you do?()
    A

    Create a journal rule and then create an Outlook Protection Rule

    B

    Create a Transport Protection Rule and then create a journal rule

    C

    Run the AntispamCommon.ps1 script and then create a Transport Protection Rule

    D

    Run the Install-AntispamAgents.ps1 script and then configure all transport agents


    正确答案: C
    解析: 暂无解析

  • 第13题:

    One of the users in the PROD database, Adams, complains that his update on the table, TRANS, is taking an unusually long time to complete. You find that the table gets locked by another database user before Adams starts his transactions, and you are unable to contact the user holding the table lock. As Adams is updating some crucial rows in the table, he should get the highest priority. Which method would you use to overcome this problem?()

    • A、execute the command, ALTER SESSION KILL .., to kill the blocking session
    • B、execute the DBMS_SESSION.KILL_SESSION procedure to kill the blocking session
    • C、execute the command, ALTER SYSTEM KILL SESSION .., to kill the blocking session
    • D、execute the command, ALTER SESSION UNLOCK .., to release the lock for the blocking session
    • E、execute the command, ALTER SYSTEM UNLOCK SESSION .., to release the lock for the blocking session

    正确答案:C

  • 第14题:

    You have a print server that runs Windows Server 2003 Service Pack 2 (SP2). Users report that print jobs are not printing. Users also report that they do not receive any error messages. Younotice a large number of jobs in the print queue. You attempt to delete some jobs from the queue and notice that the jobs remain in the queue. You need to ensure that users can print successfully. What should you do? ()

    • A、Restart the Print Spooler service.
    • B、Pause the printer, and then restart the printer.
    • C、Take ownership of the printer, and then delete the print jobs.
    • D、Assign the Manage Documents permission to the users connected to the printer.

    正确答案:A

  • 第15题:

    You install a new Exchange Server 2010 organization that contains a single server named erver1.Users report that they receive a large number of unsolicited commercial email (UCE) messages.You need to reduce the amount of UCE messages that users in the organization receive.What should you do?()

    • A、Create a journal rule and then create an Outlook Protection Rule
    • B、Create a Transport Protection Rule and then create a journal rule
    • C、Run the AntispamCommon.ps1 script and then create a Transport Protection Rule
    • D、Run the Install-AntispamAgents.ps1 script and then configure all transport agents

    正确答案:D

  • 第16题:

    Some users report they cannot receive messages from some external senders.You suspect that there is some anti-spam activity blocking those messages.You need to identify what is blocking the messages.You will activate and review the logs of one of the following:()

    • A、Protocol logging
    • B、Connectivity logs
    • C、Message tracking
    • D、Pipeline tracing

    正确答案:C

  • 第17题:

    单选题
    A customer has a WebTrade application that initially uses the embedded LDAP to authenticate users. To enhance security, the customer decides to use OAM to authenticate some of the users against an external LDAP store. For this to work, a customer configured an OAMAuthenticator, but was not sure what to select for the Control Flag. What Control Flag should the customer choose?()
    A

    OPTIONAL

    B

    REQUISITE

    C

    REQUIRED

    D

    SUFFICIENT

    E

    MANDATORY


    正确答案: D
    解析: 暂无解析

  • 第18题:

    单选题
    Some users report they cannot receive messages from some external senders.You suspect that there is some anti-spam activity blocking those messages.You need to identify what is blocking the messages.You will activate and review the logs of one of the following:()
    A

    Protocol logging

    B

    Connectivity logs

    C

    Message tracking

    D

    Pipeline tracing


    正确答案: D
    解析: 暂无解析

  • 第19题:

    单选题
    You are debugging a Windows Communication Foundation (WCF) service. The service uses signed and encrypted messages.You need to configure logging so that you can read the contents of the messages. What should you do?()
    A

    Set maxSizeMessagesToLog to 10

    B

    Set logMessageAtServiceLevel to true.

    C

    Set maxMessagesToLog to 10.

    D

    Set logMessageAtTransportLevel to true.


    正确答案: D
    解析: 暂无解析

  • 第20题:

    单选题
    One of the users in the PROD database, Adams, complains that his update on the table, TRANS, is taking an unusually long time to complete. You find that the table gets locked by another database user before Adams starts his transactions, and you are unable to contact the user holding the table lock. As Adams is updating some crucial rows in the table, he should get the highest priority. Which method would you use to overcome this problem?()
    A

    execute the command, ALTER SESSION KILL .., to kill the blocking session

    B

    execute the DBMS_SESSION.KILL_SESSION procedure to kill the blocking session

    C

    execute the command, ALTER SYSTEM KILL SESSION .., to kill the blocking session

    D

    execute the command, ALTER SESSION UNLOCK .., to release the lock for the blocking session

    E

    execute the command, ALTER SYSTEM UNLOCK SESSION .., to release the lock for the blocking session


    正确答案: B
    解析: 暂无解析

  • 第21题:

    单选题
    You have a print server that runs Windows Server 2003 Service Pack 2 (SP2). Users report that print jobs are not printing. Users also report that they do not receive any error messages. Younotice a large number of jobs in the print queue. You attempt to delete some jobs from the queue and notice that the jobs remain in the queue. You need to ensure that users can print successfully. What should you do? ()
    A

    Restart the Print Spooler service.

    B

    Pause the printer, and then restart the printer.

    C

    Take ownership of the printer, and then delete the print jobs.

    D

    Assign the Manage Documents permission to the users connected to the printer.


    正确答案: C
    解析: 暂无解析

  • 第22题:

    单选题
    You have an Exchange organization.All servers in the organization have Exchange Server 2010 Service Pack l (SP1) installed.An external user reports that when he sends e-mail messages to the organization, they are not received.You suspect that the e-mail messages he sends are incorrectly identified as spam.You need to identify which anti-spam filter is blocking the e-mail messages. What should you do?()
    A

    Modify the protocol logging level, and then review the protocol logs.

    B

    Modify the connectivity log settings, and then review the connectivity logs.

    C

    Modify the message tracking settings, and then review the message tracking logs.

    D

    Enable pipeline tracing, and then review the trace.


    正确答案: D
    解析: 暂无解析

  • 第23题:

    单选题
    Your network contains a public computer that runs Windows 7. Multiple users log on to the computer byusing a local user account named User1. Users report that they can log on to some secure Web sites byusing credentials that were saved by other users. You need to prevent forms-based credentials from beingsaved on the computer.  What should you do?()
    A

    Remove all generic credentials from Windows Vault.

    B

    Remove all Windows credentials from Windows Vault.

    C

    Modify the Windows Internet Explorer certificates settings.

    D

    Modify the Windows Internet Explorer AutoComplete settings.


    正确答案: A
    解析: 暂无解析

  • 第24题:

    单选题
    You have a print server that runs Windows Server 2003 Service Pack 2 (SP2). Users report that print jobs are not printing. Users also report that they do not receive any error messages. You notice a large number of jobs in the print queue. You attempt to delete some jobs from the queue and notice that the jobs remain in the queue. You need to ensure that users can print successfully. What should you do? ()
    A

    Restart the Print Spooler service.

    B

    Pause the printer, and then restart the printer.

    C

    Take ownership of the printer, and then delete the print jobs.

    D

    Assign the Manage Documents permission to the users connected to the printer.


    正确答案: C
    解析: 暂无解析