当前位置:MCITP(70-663)题库

问题:

[单选]

You work as the enterprise exchange administrator at TestKing.com. TestKing.com makes use of
Microsoft Exchange Server messaging solution. The TestKing.com network consists of a single ActiveDirectory domain named testking.com.
A firewall at Testking.com separates the internal network and a perimeter network. The perimeter networkcontains an Exchange Server 2010 Edge Transport server.
You have received instructions from the CIO to install an internal Exchange Server 2010 with the followingcriteria:
1. The support of EdgeSync synchronizaiton and encrypted delivery of outbound e-mail messages to theEdge Transport server.
2. The minimization of the attack surface of the internal network.
What should you do?()

A . The best option is to use port 3309 and 25 from the internal network to the perimeter network.
B . The best option is to use port 3309 and 636 from the internal network to the perimeter network.
C . The best option is to use port 50636 and 25 from the internal network to the perimeter network.
D . The best option is to use port 50636 and 135 from the internal network to the perimeter network.

You are designing a strategy to enable the ATC application to successfully resolve computer names.  Which name resolution method should you use?()  DNS。  WINS。  Hosts file。  Lmhosts file。 WMF格式的文件属于()。 位图。 矢量图形。 声音文件。 视频文件。 You have a computer that runs Windows XP Professional. You run a background application named app1. exe. The application becomes unresponsive. You need to forcibly shut down the application. You must achieve this goal without restarting the computer.Which tool should you use?()  System Configuration Utility。 System Information。 Task Manager。 tasklist.exe。 近因效应。 You have a Windows Server 2008 R2 Hyper-V server. Virtual machines (VMs) store data on pass- through disks. You need to design a backup solution that allows you to restore VMs. What should you do?() Back up the VMs by using Windows Server Backup within the VMs。 Create checkpoints of the VMs by using Microsoft System Center Virtual Machine Manager (VMM) 2008 R2。 Back up the system state on the VMs by using Windows Server Backup within the VMs。 Back up the Hyper-V server by using Microsoft System Center Data Protection Manager (DPM) 2007 with SP1。

You work as the enterprise exchange administrator at TestKing.com. TestKing.com makes use of
Microsoft Exchange Server messaging solution. The TestKing.com network consists of a single ActiveDirectory domain named testking.com.
A firewall at Testking.com separates the internal network and a perimeter network. The perimeter networkcontains an Exchange Server 2010 Edge Transport server.
You have received instructions from the CIO to install an internal Exchange Server 2010 with the followingcriteria:
1. The support of EdgeSync synchronizaiton and encrypted delivery of outbound e-mail messages to theEdge Transport server.
2. The minimization of the attack surface of the internal network.
What should you do?()

参考答案:

  参考解析

本题暂无解析

在线 客服