You have an Exchange that contains the exchange servers shown in the following table: You plan to move all mailboxes from server2 and server3 to server4. You need to ensure that all users can send and receive e-mail messages after their mailboxes are moved to server4.What should you do?()
A. Create an SMTP Site Link.
B. Create a Routing Group and a Routing Group Connector.
C. Install the Exchange Server 2010 Hub Transport Server Role on Server4.
D. Install the Exchange Server 2010 Edge Transport server role on a new server.
查看答案
Certkiller.com has employed you as a system administrator. You are in the process of creating anASP.NET application using Microsoft.NET Framework v3.5. This application will be hosted on aserver named CERTKILLER-SR01. CERTKILLER-SR01 is configured to run Microsoft IIS 5.0. You are assigned a computer named CERTKILLER-WS02. You make use of CERTKILLER-WS02to log on to the companies domain with an account named CKUser. CERTKILLER-SR01 andCERTKILLER-WS02 are both members of the Certkiller.com domain. To ensure productivity youneed to establish the necessary permissions to allow remote debugging. What should you do?()
A. Your best option would be to ensure that the Remote Debugging Monitor is set to make use ofWindows Authentication.
B. Your best option would be to ensure that the CKUser account is added to the domainAdministrators group.
C. Your best option would be to ensure that the AS
D. NET worker process is changed onCERTKILLER-SR01 to run as the local Administrator account.
E. Your best option would be to ensure that the CKUser account is added to the localAdministrators group on CERTKILLER-SR01.
Certkiller.com has employed you as a system administrator. You are in the process of creating anASP.NET AJAX application using .NET Framework v3.5. You receive an instruction from management to debug the JavaScript code in the application. Youthen attach Microsoft Visual Studio 2008 debugger to the Microsoft Internet Explorer instance. Youneed to make sure that the details of the client side object on the debugger console is displayedon the application. What should you do?()
A. This can be achieved using the Sys.Debug.fail method.
B. This can be achieved using the Sys.Debug.traceDump method.
C. This can be achieved using the Sys.Debug.trace method.
D. This can be achieved using the Sys.Debug.assert method.
You network contains a Web site named www.contoso.com. The Web site is configured as shown in the exhibit. Your user account has write permissions to the c:\inetpub\wwwroot folder on the Web server. You need to copy files to www.contoso.com. What should you do first?()
A. From the command prompt, run ftp www.contoso.com.
B. From the command prompt, run http \\www.contoso.com\web$.
C. In the Address bar in Internet Explorer, type https://www.contoso.com/webdav.
D. From the File menu in Internet Explorer, click Open. Type http://www.contoso.com and select the Open as Web Folder option.
You have an Active Directory forest that contains a single site.Your organization contains the Exchange Server 2010 servers shown in the following table: All clients connect from the Internet by using IMAP4.You need to prevent some users from using IMAP4 to connect to the mailboxes Server5. What should you do?()
A. Modify the IMAP4 retrieval settings on Server5.
B. Disable the IMAP4 mailbox feature for the mailboxes on Server5.
C. On Server5, configure Windows Firewall to block TCP port 25 and TCP port 110.
D. On Server5, configure Windows Firewall to block TCP port 110 and TCP port 995.