单项选择题

You work as the enterprise exchange administrator at TestKing.com. TestKing.com makes use of
Microsoft Exchange Server messaging solution. The TestKing.com network consists of a single ActiveDirectory domain named testking.com.
TestKing.com is configured to run in an Exchange Server 2010 environment. TestKing.com contains 30 offices that consist of 1,500 users. AT present TestKing.com users make use of Microsoft Exchange
Server to access their e-mail messages. During the course of day you receive an instruction from the CIO to ensure that users in their offices is only able download the list of recipients for their offiche as well asensuring that they are able to communicate to any other user in the orgranization via e-mail.
What should you do?()

A.The best option is to set up 30 new managed folder mailbox policies and 20 e-mail address policies.
B.The best option is to set up 30 new mailbox database and then move the mailboxes from each officheto a separate mailbox database.
C.The best option is to set up 30 new address lists and 30 offline address books (OABs)
D.The best option is to set up 30 new dynamicdistribuition groups and then create 20 new global address lists (GALs).

相关考题

You work as the enterprise exchange administrator at Te...


单项选择题

You work as the enterprise exchange administrator at TestKing.com. TestKing.com makes use of
Microsoft Exchange Server messaging solution. The TestKing.com network consists of a single ActiveDirectory domain named testking.com.
A firewall at Testking.com separates the internal network and a perimeter network. The perimeter networkcontains an Exchange Server 2010 Edge Transport server.
You have received instructions from the CIO to install an internal Exchange Server 2010 with the followingcriteria:
1. The support of EdgeSync synchronizaiton and encrypted delivery of outbound e-mail messages to theEdge Transport server.
2. The minimization of the attack surface of the internal network.
What should you do?()

A.The best option is to use port 3309 and 25 from the internal network to the perimeter network.
B.The best option is to use port 3309 and 636 from the internal network to the perimeter network.
C.The best option is to use port 50636 and 25 from the internal network to the perimeter network.
D.The best option is to use port 50636 and 135 from the internal network to the perimeter network.