|
Can you please send the latest 642-511 dump to me.. thanks dogar
|
Question 1. You work as a network administrator for ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com. There are currently 120 Web servers running Windows 2000 Server and are contained in an Organizational Unit (OU) named ABC_WebServers ABC.com management took a decision to uABCrade all Web servers to Windows Server 2003. You disable all services on the Web servers that are not required. After running the IIS Lockdown Wizard on a recently deployed web server, you discover that services such as NNTP that are not required are still enabled on the Web server. How can you ensure that the services that are not required are forever disabled on the Web servers without affecting the other servers on the network? Choose two. A. Set up a GPO that will change the startup type for the services to Automatic. B. By linking the GPO to the ABC_WebServers OU. C. Set up a GPO with the Hisecws.inf security template imported into the GPO. D. By linking the GPO to the domain. E. Set up a GPO in order to set the startup type of the redundant services to Disabled. F. By linking the GPO to the Domain Controllers OU. G. Set up a GPO in order to apply a startup script to stop the redundant services. Answer: B, E Explanation: Windows Server 2003 installs a great many services with the operating system, and configures a number of with the Automatic startup type, so that these services load automatically when the system starts. Many of these services are not needed in a typical member server configuration, and it is a good idea to disable the ones that the computer does not need. Services are programs that run continuously in the background, waiting for another application to call on them. Instead of controlling the services manually, using the Services console, you can configure service parameters as part of a GPO. Applying the GPO to a container object causes the services on all the computers in that container to be reconfigured. To configure service parameters in the Group Policy Object Editor console, you browse to the Computer Configuration\Windows Settings\Security Settings\System Services container and select the policies corresponding to the services you want to control. Reference: Jill Spealman, Kurt Hudson & Melissa Craft, MCSE Self-Paced Training Kit (Exam 70-294); Planning, Implementing, and Maintaining a Microsoft Windows Server 2003 Active Directory Infrastructure, Microsoft Press, Redmond, Washington, 2004, p. 13:1-6 Question 2. You are working as the administrator at ABC.com. ABC.com has headquarters in London and branch offices in Berlin, Minsk, and Athens. The Berlin, Minsk and Athens branch offices each have a Windows Server 2003 domain controller named ABC-DC01, ABC-DC02 and ABC-DC03 respectively. All client computers on the ABC.com network run Windows XP Professional. One morning users at the Minsk branch office complain that they are experiencing intermittent problems authenticating to the domain. You believe that a specific client computer is the cause of this issue and so need to discover the IP address client computer. How would you capture authentication event details on ABC-DC02 in the Minsk branch office? A. By monitoring the logon events using the SysMon utility. B. By recording the connections to the NETLOGON share using the SysMon utility. C. By recording the authentication events with the NetMon utility. D. By monitoring the authentication events using the Performance and Reliability Monitor. Answer: C Explanation: The question states that you need to find out the IP address of the client computer that is the source of the problem. Using Network Monitor to capture traffic is the only way to do this. Reference: http://support.microsoft.com/default.aspx?scid=kb;en-us;175062 Martin Grasdal, Laura E. Hunter, Michael Cross, Laura Hunter, Debra Littlejohn Shinder, and Dr. Thomas W. Shinder, Planning and Maintaining a Windows Server 2003 Network Infrastructure: Exam 70-293 Study Guide & DVD Training System, Syngress Publishing, Inc., Rockland, MA, Chapter 11, p. 826 Question 3. You are working as the administrator at ABC.com. Part of you job description includes the deployment of applications on the ABC.com network. To this end you operate by testing new application deployment in a test environment prior to deployment on the production network. The new application that should be tested requires 2 processors and 3 GB of RAM to run successfully. Further requirements of this application also include shared folders and installation of software on client computers. You install the application on a Windows Server 2003 Web Edition computer and install the application on 30 test client computers. During routine monitoring you discover that only a small amount of client computers are able to connect and run the application. You decide to turn off the computers that are able to make a connection and discover that the computers that failed to open the application can now run the application. How would you ensure that all client computers can connect to the server and run the application? A. By running a second instance of the application on the server. B. By increasing the Request Queue Limit on the Default Application Pool. C. By modifying the test server operating system to Window Server 2003 Standard Edition. D. By increasing the amount of RAM in the server to 4GB. Answer: C Explanation: Although Windows Server 2003 Web Edition supports up to 2GB of RAM, it reserves 1GB of it for the operating system; only 1GB of RAM is available for the application. Therefore, we need to install Window Server 2003 Standard Edition or Enterprise Edition to support enough RAM. Question 4. You are an Enterprise administrator for ABC.com. All servers on the corporate network run Windows Server 2003 and all client computers run Windows XP. The network contains a server named ABC-SR01 that has Routing and Remote Access service and a modem installed which connects to an external phone line. A partner company uses a dial-up connection to connect to ABC-SR01 to upload product and inventory information. This connection happens between the hours of 1:00am and 2:00am every morning and uses a domain user account to log on to ABC-SR01. You have been asked by the security officer to secure the connection. How can you ensure that the dial-up connection is initiated only from the partner company and that access is restricted to just ABC-SR01? Choose three. A. Set up the log on hours restriction for the domain user account to restrict the log on to between the hours of 1:00am and 2:00am. B. Set up a local user account on ABC-SR01. Have the dial-up connection configured to log on with this account. C. Set up the remote access policy on ABC-SR01 to allow the connection for the specified user account between the hours of 1:00am and 2:00am. D. Set up the remote access policy with the Verify Caller ID option to only allow calling from the phone number of the partner company modem. E. Set up the remote access policy to allow access to the domain user account only. Answer: B, C, D Explanation: To allow only the minimum amount of access to the network, ensure that only the partner's application can connect to your network over the dial-up connection, you need to first create a local account named on ABC-SR01. You need to then add this account to the local Users group and direct the partner company to use this account for remote access. You can use a local account to provide remote access to users. The user account for a standalone server or server running Active Directory contains a set of dial-in properties that are used when allowing or denying a connection attempt made by a user. You can use the Remote Access Permission (Dial-in or VPN) property to set remote access permission to be explicitly allowed, denied, or determined through remote access policies. Next, you need to configure a remote access policy on ABC-SR01 to allow the connection for only the specified user account between 1 AM and 2 AM. In all cases, remote access policies are used to authorize the connection attempt. If access is explicitly allowed, remote access policy conditions, user account properties, or profile properties can still deny the connection attempt. You need to then configure the policy to allow only the specific calling station identifier of the partner company's computer. When the Verify Caller ID property is enabled, the server verifies the caller's phone number. If the caller's phone number does not match the configured phone number, the connection attempt is denied. Reference: Dial-in properties of a user account http://technet.microsoft.com/en-us/library/cc738142.aspx Question 5. You are an Enterprise administrator for ABC.com. The company consists of an Active Directory domain called ad.ABC.com. All servers on the corporate network run Windows Server 2003. At present there is no provision was made for Internet connectivity. A server named ABC2 has the DNS server service role installed. The DNS zones on ABC2 are shown below: The corporate network also contains a UNIX-based DNS A server named ABC-SR25 hosts a separate DNS zone on a separate network called ABC.com. ABC-SR25 provides DNS services to the UNIX-based computers and is configured to run the latest version of BIND and the ABC.com contains publicly accessible Web and mail servers. The company has a security policy set, according to which, the resources located on the internal network and the internal network's DNS namespace should never be exposed to the Internet. Besides this, according to the current network design, ABC-SR25 must attempt to resolve any name resolution requests before sending them to name servers on the Internet. The company plans to allow users of the internal network to access Internet-based resources. To implement the security policy of the company, you decided to send all name resolution requests for Internet-based resources from internal network computers through ABC2. You thus need to devise a name resolution strategy for Internet access as well as configuring ABC2 so that it will comply with the set criteria and restrictions. Which two of the following options should you perform? A. Have the Cache.dns file copied from ABC2 to ABC-SR25. B. Have the root zone removed from ABC2. C. ABC2 should be set up to forward requests to ABC-SR25. D. Install Services for Unix on ABC2. E. The root zone should be configured on ABC-SR25. F. Disable recursion on ABC-SR25. Answer: B, C Explanation: To plan a name resolution strategy for Internet access and configure ABC2 so that it sends all name resolution requests for Internet-based resources from internal network computers through ABC2, you need to delete the root zone from ABC2. Configure ABC2 to forward requests to ABC-SR25 A DNS server running Windows Server 2003 follows specific steps in its name-resolution process. A DNS server first queries its cache, it checks its zone records, it sends requests to forwarders, and then it tries resolution by using root servers. The root zone indicates to your DNS server that it is a root Internet server. Therefore, your DNS server does not use forwarders or root hints in the name-resolution process. Deleting the root zone from ABC2 will allow you to first send requests to ABC2 and then forward requests to ABCSR25 by configuring forward lookup zone. If the root zone is configured, you will not be able to use the DNS server to resolve queries for hosts in zones for which the server is not authoritative and will not be able to use this DNS Server to resolve queries on the Internet. Reference: How to configure DNS for Internet access in Windows Server 2003 http://support.microsoft.com/kb/323380 Reference: DNS Root Hints in Windows 2003 http://www.computerperformance.co.uk/w2k3/services/DNS_root_hints.htm Question 6. You are working as the administrator at ABC.com. The network consists of a single Active Directory domain named ABC.com with the domain functional level set at Windows Server 2003. All network servers run Windows Server 2003 and all client computers run Windows XP Professional. The ABC.com domain is divided into organizational units (OU). All the resource servers are contained in an OU named ABC_SERVERS and the workstations are contained in an OU named ABC_CLIENTS. All resource servers operate at near capacity during business hours. All workstations have low resource usage during business hours. You received instructions to configure baseline security templates for the resource servers and the workstations. To this end you configured two baseline security templates named ABC_SERVERS.inf and ABC_CLIENTS.inf respectively. The ABC_SERVERS.inf template contains many configuration settings. Applying the ABC_SERVERS.inf template would have a performance impact on the servers. The ABC_CLIENTS.inf contains just a few settings so applying this template would not adversely affect the performance of the workstations. How would you apply the security templates so that the settings will be periodically enforced whilst ensuring that the solution reduces the impact on the resource servers? Choose three. A. By setting up a GPO named SERVER-GPO and link it to the ABC_SERVERS OU. B. By having the ABC_SERVERS.inf template imported into SERVER-GPO. C. By having the ABC_SERVERS.inf and the ABC_CLIENTS.inf templates imported into the Default Domain Policy GPO. D. By scheduling SECEDIT on each resource server to regularly apply the ABC_SERVERS.inf settings during off-peak hours. E. By having a GPO named CLIENT-GPO created and linked to the ABC_CLIENTS OU. F. By having the ABC_CLIENTS.inf template imported into CLIENT-GPO. G. By having SERVER-GPO and CLIENT-GPO linked to the domain. Answer: D, E, F Explanation: The question states that you need to apply the baseline security templates so that the settings will be periodically enforced. To accomplish this you must create a scheduled task so that the performance impact on resource servers is minimized. Furthermore, the question also states that ABC_CLIENTS.inf is a baseline security template for client computers. Therefore, the GPO has to be linked to the OU that contains the client computers, and the ABC_CLIENTS.inf template must be imported to the said GPO so that it can be applied. Secedit.exe is a command line tool that performs the same functions as the Security Configuration And Analysis snap-in, and can also apply specific parts of templates to the computer. You can use Secedit.exe in scripts and batch files to automate security template deployments. You can create a baseline security configuration in a GPO directly, or import a security template into a GPO. Link the baseline security GPO to OUs in which member servers’ computer objects exist. Reference: Craig Zacker, MCSE Self-Paced Training Kit (Exam 70-293): Planning and Maintaining a Microsoft Windows Server 2003 Network Infrastructure, Microsoft Press, Redmond, Washington, Chapter 10 Dan Holme, and Orin Thomas, MCSA/MCSE Self-Paced Training Kit: UABCrading Your Certification to Microsoft Windows Server 2003: Managing, Maintaining, Planning, and Implementing a Microsoft Windows Server 2003 environment: Exams 70-292 and 70-296, Microsoft Press, Redmond, Washington, Chapter 9 Question 7. You are working as the administrator at ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com. The ABC.com network contains a DMZ that contains a two-node Network Load Balancing cluster, which is located in a data centre that is physically impenetrable to unauthorized persons. The cluster servers run Windows Server 2003 Web Edition and host an e-commerce website. The NLB cluster uses a virtual IP address that can be accessed from the Internet. What can you do to mitigate the cluster’s most obvious security vulnerability? A. Configure the cluster to require IPSec. B. Configure the network cards to use packet filtering on all inbound traffic to the cluster. C. Use EFS on the server hard disks. D. Configure intrusion detection the servers on the DMZ. E. Configure Mac addressing on the servers in the DMZ. Answer: B Explanation: The most sensitive element in this case is the network card that uses an Internetaddressable virtual IP address. The question doesn’t mention a firewall implementation or an intrusion detection system (Usually Hardware). Therefore, we should set up packet filtering. You can configure packet filtering to accept or deny specific types of packets. Packet headers are examined for source and destination addresses, TCP and UDP port numbers, and other information. Reference: Craig Zacker, MCSE Self-Paced Training Kit (Exam 70-293): Planning and Maintaining a Microsoft Windows Server 2003 Network Infrastructure, Microsoft Press, Redmond, Washington, 2004, p. 7: Question 8. You are working for a administrator for ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com. All the servers on the network run Windows Server 2003 servers. You have configured four servers in a network load balancing cluster. You need to enable the cluster in unicast mode although each server only has one network card. After your configuration, the NLB cluster has successfully converged. You discover that you can optimize the use of the cluster by moving a specific application to each node of the cluster. However for this application to execute, all the nodes of the cluster must be configured by a Network Load Balancing Port Rule. When you open Network Load Balancing Manager on one of the NLB nodes, you receive a message saying that Network Load Balancing Manager is unable to see the other nodes in the cluster. How can you add a port rule to the cluster nodes? A. By opening Network Load Balancing Manager on a different host. B. By creating an additional virtual IP address on the cluster. C. By modifying the Network Connection Properties on every host. D. By removing each host from the cluster before creating the port rule. Answer: C Explanation: You can configure many Network Load Balancing options through either Network Load Balancing Manager or the Network Load Balancing Properties dialog box accessed through Network Connections. However, Network Load Balancing Manager is the preferred method. Using both Network Load Balancing Manager and Network Connections together to change Network Load Balancing properties can lead to unpredictable results. Reference: Network Load Balancing Best practices / Use Network Load Balancing Manager. http://technet.microsoft.com/en-us/library/cc740265.aspx Question 9. You are working as an administrator for ABC.com. The network consists of a single Active Directory domain named ABC.com. All server run Windows Server 2003 and all client computer run Windows XP Professional. The ABC.com departments are organized into organizational units (OUs). The Administration OU is named ABC_ADMIN, and the Sales OU is named ABC_SALES. All file servers for all departments are located in their respective OUs. The ABC_SALES OU is a child OU of the ABC_ADMIN OU. A new ABC.com written security policy states that servers in the ABC_ADMIN OU should be highly secure. All communications with ABC-ADMIN servers should be encrypted. The security policy also states that auditing should be enabled for file and folder deletion on Sales servers. Communications with the Sales servers should not be encrypted. How should you configure Group Policy for the ABC_Admin and ABC_Sales OU? Choose three. A. Configure a GPO to apply the Hisecws.inf security template. Link this GPO to the ABC_ADMIN OU. B. Configure a GPO to enable the Audit object access audit policy on computer objects. Link this GPO to the ABC_SALES OU. C. Configure a GPO to apply the Hisecws.inf security template. Link this GPO to the ABC_Sales OU. D. Configure a GPO to enable the Audit object access audit policy on computer objects. Link this GPO to the ABC_ADMIN OU. E. Block group policy inheritance on the ABC_ADMIN OU. F. Block group policy inheritance on the ABC_SALES OU. Answer: A, B, F Explanation: The Hisecws.inf security template increases security on a server. One of the security settings is to require secure encrypted communications. A GPO with this template needs to be applied to the ABC_ADMIN OU. We don’t want those settings applying to the ABC_SALES OU though so we need to block inheritance on the ABC_SALES OU. We need to apply a GPO to the ABC_SALES OU to apply the auditing settings. Audit Object Access A user accesses an operating system element such as a file, folder, or registry key. To audit elements like these, you must enable this policy and you must enable auditing on the resource that you want to monitor. For example, to audit user accesses of a particular file or folder, you display its Properties dialog box with the Security tab active, navigate to the Auditing tab in the Advanced Security Settings dialog box for that file or folder, and then add the users or groups whose access to that file or folder you want to audit. Reference: Craig Zacker, MCSE Self-Paced Training Kit (Exam 70-293): Planning and Maintaining a Microsoft Windows Server 2003 Network Infrastructure, Microsoft Press, Redmond, Washington, Chapters 9 and 10 Question 10. You are working as an administrator at ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com which contains Windows Server 2003 servers Windows XP Professional client computers. You want to improve network security and need to pinpoint all computers that have the known vulnerabilities. What should you do to automate the process of collecting information on existing vulnerabilities for each computer, on a nightly basis? A. By scheduling secedit to compare the security settings with a baseline and run on a nightly basis. B. By installing Anti-Virus software on the computers and configuring the software to update on a nightly basis. C. By configuring a scheduled task to run the mbsacli utility on a nightly basis. D. By having Microsoft Baseline Security Analyzer (MBSA) installed on a server on the network. E. By configuring Automatic Updates to use a local SUS server and run on a nightly basis. F. You configuring Automatic Updates to run on a nightly basis and use the Microsoft Updates servers. Answer: C Explanation: We can schedule the mbsacli.exe command to periodically scan for security vulnerabilities. Reference: Martin Grasdal, Laura E. Hunter, Michael Cross, Laura Hunter, Debra Littlejohn Shinder, and Dr. Thomas W. Shinder, Planning and Maintaining a Windows Server 2003 Network Infrastructure: Exam 70-293 Study Guide & DVD Training System, Syngress Publishing, Inc., Rockland, MA, Chapter 11, p. 830
|
Question 1. The customer's Centera is using CentraStar 3.0. A third-party vendor implemented an application and requested that a virtual pool and profile be created on the Centera. The application fails in its attempt to write to the Centera. What is a possible problem? A. CE + is enabled so no data can be written to the Centera B. PEA tile was never provided to the application C. Replication wasn't turned on D. Storage pool creation not completed Answer: B Question 2. What is the maximum number of nodes in a Gen 4 Centera Cube? A. 4 B. 8 C. 16 D. 32 Answer: C Question 3. Clips need to be migrated from the default pool to a virtual pool. An access profile has already been created. Sequence the following steps to migrate clips: 1) Grant the profile access to the pool 2) Create application virtual pool 3) Start migrating pool mappings 4) Set the home pool for the access profile 5) Create pool mapping A. 2, 4, 1, 5, 3 B. 2, 5, 4, 1, 3 C. 2, 1, 4, 5, 3 D. 2, 1, 5, 4, 3 Answer: A Question 4. What is an "unbundled" cluster? A. Flexible solution where the customer chooses any configuration of hardware or software to deploy B. Hardware only solution where the software is provided by the customer C. Software only solution where the hardware is provided by the customer D. Solution where the customer provides the rack in which the cluster is installed Answer: D Question 5. What does SDK Failover enable with the default setting? A. If a C-Clip cannot be found on the primary cluster, then the request goes to the secondary cluster B. If the communication is interrupted to the primary Centera, all data is rewritten to the secondary Centera C. If the pool has reached its defined quota then data is written automatically to the default pool D. In case of a disk failure, data is written automatically to a node connected to the other power rail Answer: A Question 6. How do you launch the CUA Monitor? A. Connect Monitor and keyboard directly to the CUA node and launch web services B. Start a http session to the IP-address of the CUA using port 16000 C. Start a https session to the IP-address of the CUA using port 7227 D. Starting a SSH session to the IP address of the CUA and use the function "M" in the menu Answer: C Question 7. Click the exhibit button. Which button, in the diagram, is used to start the CLI from within Centera viewer? A. 1 B. 2 C. 3 D. 4 Answer: A Question 8. What are the available Centera replication topologies in addition to Uni-Directional and Bi- Directional? A. Chain and Inward Star B. Multipoint to Point and Chain C. Point to Multipoint and Link D. Ring and Star Answer: A Question 9. A new customer has been testing their Centera in Governance mode. They have specified retention periods ranging from 0 days to 7 years. They would now like to erase the cluster and put it into production. How can the customer remove the test data from the cluster? A. Customer can issue a reset cluster command from the CLI B. Customer can switch the cluster off for 24 hours to delete all data C. Customer can use the privileged delete command to remove the data D. Can not be done. data remains on the cluster Answer: C Question 10. With which enterprise backup solutions does CASbar work? A. NDMP compatible systems B. NDMP systems with DMA capabilities C. Systems capable of mounting a UNIX file system D. Systems capable of mounting a windows file system Answer: D
|
Question 1. Exhibit: According to the exhibit, R1/BCV on Symm321 and R2 on Symm654 is pair 1, and R1/BCV on Sym654 and R2 on Symm987 is pair 2. Which of the following commands is utilized for the control SRDF device operations on these two pairs? A. Symrdf -bcv symrdf brbcv B. syumrdf symrdf -rbcv C. Symrdf Jcv symrdf -rdf -bcv D. Symmir -rdf Jcv symrdf -rbcv Answer: A Question 2. To simultaneously provide Read-Write acc4ess to both the R1 and R2 Volumes of the mydg device group, which SRDF symcli command would be used? A. symrdf mydg spilt B. symrdf mydg failover C. symrdf mydg suspend D. symrdf mydg spilt -concurrent E. symrdf mydg suspend - concurrent Answer: A Question 3. You Use Timefinder Snap to issue the following command: Symnsnap list havedevs Which two of the following statements best describes the output? (Choose two) A. Percent full of the active Snap Session is shown. B. The Symmetrix volumes associated with the Snap Save Devices are listed. C. Percent full of the Save Devices is shown. D. Lists the virtual devices associated with the Snap savedev device group. E. Lists the active Snap Sessions. Answer: B, C Question 4. TimeFinder consistent splits are created by using which two items? (Choose two) A. Resource Pak B. Symmetrix integration Utilities (SIU) C. PowerPath D. Enginuity Consistency Assist (ECA) E. Persistent Storage Manager Answer: C, D Question 5. A device group with SRDF source devices would be created by using which of the following SYMCLI commands? A. symcreate namedg type RDF1 B. symdg create namedg -type RDF1 C. symdg create namedg type REGULAR D. symdg create namedg type RDF1 Answer: D Question 6. DRAG DROP As an instructor at ITCertKeys.com, you are required to match the correct ECC agents with the tasks on the left, by placing them in the space provided on the right. (NOTE: agents may be used more than once.) Answer: Question 7. DRAG DROP For the following, you need to match the Symmetrix device type with the replication technology that it employs. Options may be used more than once. Answer: Question 8. What are the three features of SRDF/A, if cache and bandwidth are suitably configured? (Choose three) A. Seconds of data exposure. B. Unlimited distance. C. No performance impact. D. Some performance impact. E. Hours of data exposure. F. Limited distance. G. No data exposure. Answer: B, C, G Question 9. How can the Fibre Channel Buffer Credits, needed for a given distance, be calculated quickly? A. By multiplying the circuit distance in kilometers by 1.6. B. By dividing the circuit distance in kilometers by 2. C. By dividing the circuit distance in miles by 2. D. By multiplying the circuit distance in kilometers by 2. Answer: B Question 10. Exhibit: In the exhibit above, the SRDF primary mode of operation is Synchronous, there is no secondary mode selected and the SRDF link is ready. While Production work on Host A is in progress, both local mirrors of the R1 Volume fail. What will happen in this situation? A. The Symmetrix will automatically change the status of the R2 Volume to write-enabled and Production work an continue form Host B. B. Production work can continue from Host A but new write operation cannot be perform. C. Production work can continue from Host A without interruption. All new writes will accumulate as invalid tracks from the R1 Volume. D. Product ion work form Host A will fail. The application should be restarted form the Disaster Recovery Host B. Answer: C
|
Question 1. Select the two Connectrix MDS Models that are Multiprotocol (iSCSI / FCIP Storage Services Module) Ready? (Choose two) A. MDS 9140 B. MDS 9120 C. MDS 9509 D. MDS 1032 E. MDS 9216 Answer: C, E Question 2. For what reason is having BCVs attached to the R2 devices at the remote site in a SRDF/A configuration recommended? A. To preserve a consistent copy of data at the remote site before a split operation. B. To mirror R2 devices for backup purpose in a disaster recovery scenario. C. To preserve extra tracks that would not fit into the cache of R2's COVD devices. D. To preserve a consistent copy of data at the remote site before a resynchronization operation. Answer: D Question 3. EMC Replication Manager supports which three of the following features? (Choose three) A. Provides incremental establish and restore functionality on CLARiiON storage arrays. B. Exploits the incremental establish and restore capabilities of TimeFinder on Symmetrix storage systems. C. Automates tape backup based user specified schedule. D. Restore automatically take advantage of the CLARiiON array's Protected Restore feature. E. Performs TimeFinder Snap on Symmetrix Storage Systems. Answer: A, B, D Question 4. DRAG DROP You are an instructor at ITCertKeys.com and they enquire as to how you created a recoverable copy of data, using TimeFinder. By way of explanation, arrange the tasks in the order you carried it out. Answer: Question 5. ITCertKeys.com's storage administrator wants to synchronize one device pair within a TimeFinder device group. Which of the following command will achieve this objective? A. symrdf namedf incremental BCV dev 0b3 B. symdev namedg full establish BCV dev 0b3 C. symmir namedg incremental BCV dev 0b3 D. symmir namedg full establish DEV003 BCV dev 0b3 Answer: D Question 6. The ControlCenter's interaction with its components can be described by what three statements?(Choose three) A. The ECC Store retrieves real-time data requested by the Console. B. The repository maintains current and historical data relating to EMC ControlCenter. C. ControlCenter commands are passed over a TCP/IP network from the Console periodically directly to the Agents. D. The EMC ControlCenter Server provides most of the common services, which tie the infrastructure together. E. The Console relies on the EMC ControlCenter Server for information. Answer: B, D, E Question 7. DRAG DROP As an instructor at ITCertKeys.com, you are required to match the correct ECC agents with the tasks on the right, by placing them in the space provided on the left. (NOTE: agents may be used more than once.) Answer: Question 8. Which two are Symmetrix Host Adapters that is supported by Powerpath4.2? (Choose two) A. iSCSI B. Fibre C. Ficon D. ESCON E. SCSI Answer: B, E Question 9. Which of the following are three Operating systems that support PowerPath pseudo devices? (Choose three) A. SUN Solaris B. HP-UX C. Linux D. AIX E. Windows 200/2003 Answer: A, C, D Question 10. DRAG DROP You are an instructor at ITCertKeys.com and they ask you to match the control center component pairs with the given maximum recommended network latency times, bearing in mind that these latency times may be used more than once. Answer:
|
Question 1. You work as a Security Administrator at ABC.com. The network consists of a single Active Directory Domain Services (AD DS) domain with servers running Windows Server 2008 and client computers running Windows 7 Professional. A pool of Windows 2008 Servers hosts the Microsoft Exchange Server 2007 environment. You have recently implemented Forefront Protection for Exchange Server (FPE) 2010 to improve the security of the Microsoft Exchange Server 2007 environment. You discover that some mailboxes have been infected by malware. However there are no malware infection notifications in the Forefront Protection for Exchange Server Console. You need to immediately check specific mailboxes to see if they are infected by the malware. What should you do? A. You should run a Forefront Client Security scan on the client computers. B. You should use Forefront Protection for Exchange to perform a real-time scan of the mailboxes. C. You should use Forefront Protection for Exchange to perform an on-demand scan of the mailboxes. D. You should install Microsoft Security Essentials on client computers. Answer: C Explanation: Question 2. You work as a Network Administrator at ABC.com. Your responsibilities include the security of the computers in the network. The network consists of a single Active Directory Domain Services (AD DS) domain with servers running Windows Server 2008 and client computers running Windows 7 Professional. A pool of Windows 2008 Servers hosts the Microsoft Exchange Server 2007 environment. You have recently implemented Forefront Protection for Exchange Server (FPE) 2010 to improve the security of the Microsoft Exchange Server 2007 environment. How would you configure FPE to enable spam filtering? A. By using the Forefront Management Shell to run the Set-FSEScheduledScan cmdlet. B. By using the Forefront Management Shell to run Set-FseSpamFiltering the cmdlet. C. By using the Forefront Management Shell to run the Set-FseSpamContentCheck cmdlet. D. By using the Forefront Management Shell to run the Set-FSERealtimeScan cmdlet. Answer: B Explanation: Question 3. You are responsible for the security of the ABC.com network. The network consists of a single Active Directory Domain Services (AD DS) domain with servers running Windows Server 2008 and client computers running Windows 7 Professional. The company uses Forefront Protection for Exchange Server (FPE) 2010 to protect the Microsoft Exchange Server 2007 environment. While monitoring the logs in the FPE console, you discover that users in the company have received spam emails. The subject line in each of the emails is: “Free access to our new online tournament!” You note that the sender email address is spoofed to appear to be from a different domain for each email. How can you block this spam attack in future? A. You should configure an allowed sender custom filter in FPE. B. You should configure a file filtering custom filter in FPE. C. You should configure a keyword filtering custom filter in FPE. D. You should configure a sender-domain custom filter in FPE. E. You should configure a subject line filtering custom filter in FPE. Answer: E Explanation: Question 4. You work as a Network Administrator at ABC.com. Your responsibilities include the security of the computers in the network. The network consists of a single Active Directory Domain Services (AD DS) domain named ABC.com and includes servers running Windows Server 2008 and client computers running Windows 7 Professional. Four servers running Windows 2008 Server host the Microsoft Exchange Server 2007 environment. Two servers named ABC-Edge1 and ABC-Edge2 are configured as Microsoft Exchange Edge Transport servers. Two servers named ABC-Mbox1 and ABC-Mbox2 are configured as Microsoft Exchange Mailbox Servers and also run the Microsoft Exchange Hub Transport server roles. You have recently implemented Forefront Protection for Exchange Server (FPE) 2010 to improve the security of the Microsoft Exchange Server 2007 environment. You need to configure email scanning in Forefront Protection for Exchange Server (FPE) 2010. How should you configure FPE to scan all emails sent from within the ABC.com domain to email recipients in the ABC.com domain? A. You should configure FPE to perform Internal scanning on ABC-Mbox1 and ABC-Mbox2. B. You should configure FPE to perform Internal scanning on ABC-Edge1 and ABC-Edge2. C. You should configure FPE to perform Inbound scanning on ABC-Mbox1 and ABC-Mbox2. D. You should configure FPE to perform Inbound scanning on ABC-Edge1 and ABC-Edge2. E. You should configure FPE to perform Outbound scanning on ABC-Edge1 and ABC-Edge2. Answer: A Explanation: Question 5. You are responsible for the security of the ABC.com network. The network consists of a single Active Directory Domain Services (AD DS) domain named ABC.com and includes servers running Windows Server 2008 and client computers running Windows 7 Professional. The network environment is secured using Microsoft Forefront. A server named ABC-ShPoint1 runs Microsoft Office SharePoint Server 2010. The SharePoint system is protected by Forefront Protection 2010 for SharePoint (FPSP). How can you configure the environment to ensure that scanning is performed on all documents that pass through the SharePoint Portal? A. By logging into the SharePoint portal and configuring the scanning for uploaded and downloaded documents. B. By logging into the SharePoint Central Administration website and configuring the scanning for uploaded and downloaded documents. C. By logging into the Forefront Protection for SharePoint console and configuring the scanning for uploaded and downloaded documents. D. By logging into IIS Manager on the SharePoint Web Server and configuring the scanning for uploaded and downloaded documents. E. By logging into the Security Centre on the SharePoint Database Server and configuring the scanning for uploaded and downloaded documents. Answer: B Explanation: Question 6. You work as a Security Administrator at ABC.com. The network consists of a single Active Directory Domain Services (AD DS) domain with servers running Windows Server 2008 and client computers running Windows 7 Professional. The company uses Forefront Protection for Exchange Server (FPE) 2010 to protect the Microsoft Exchange Server 2007 environment. While monitoring the logs in the FPE console, you discover that users in the company have received spam emails. How can you block a future spam attack based on repeated words in the body of the email? A. by configuring an allowed sender custom filter in FPE. B. by configuring a file filtering custom filter in FPE. C. by configuring a sender-domain filtering custom filter in FPE. D. by configuring a keyword custom filter in FPE. E. by configuring a subject line filtering custom filter in FPE. Answer: D Explanation: Question 7. You work as a Network Administrator at ABC.com. Your responsibilities include the security of the computers in the network. The network consists of a single Active Directory Domain Services (AD DS) domain with servers running Windows Server 2008 and client computers running Windows 7 Professional. The company uses Forefront Protection for Exchange Server (FPE) 2010 to protect the Microsoft Exchange Server 2007 environment. While monitoring the logs in the FPE console, you discover that users in the company have received spam emails. You examine the email headers and discover a common source IP address. How can you block a future spam attack based on the IP address? A. by configuring an allowed sender custom filter in FPE. B. by configuring a file filtering custom filter in FPE. C. by configuring a sender-domain filtering custom filter in FPE. D. by configuring a keyword custom filter in FPE. E. by configuring a connection filter in FPE. Answer: E Explanation: Question 8. You are responsible for the security of the ABC.com network. The network consists of a single Active Directory Domain Services (AD DS) domain with servers running Windows Server 2008 and client computers running Windows 7 Professional. A pool of Windows 2008 Servers hosts the Microsoft Exchange Server 2010 environment. You have recently implemented Forefront Protection for Exchange Server (FPE) 2010 to secure the Microsoft Exchange Server 2010 environment. You need to ensure the maximum security when users access their emails on the Exchange servers. You want to ensure that emails are scanned for as much malware as possible. Which two of the following actions should you perform? (Choose two). A. You should enable on-demand scanning. B. You should enable real-time scanning. C. You should select the option to scan message body. D. You should select the option to scan after engine update. E. You should increase the scanning timeout value. Answer: B, D Explanation: Question 9. You work as a Security Administrator at ABC.com. The network consists of a single Active Directory Domain Services (AD DS) domain with servers running Windows Server 2008 and client computers running Windows 7 Professional. A pool of Windows 2008 Servers hosts the Microsoft Exchange Server 2010 environment. You have recently implemented Forefront Protection for Exchange Server (FPE) 2010 to secure the Microsoft Exchange Server 2010 environment. A new scan engine definition is released for Exchange Server 2010. How can you immediately apply new definitions in Forefront Protection for Exchange Server? A. by running the Set-FseSignatureUpdate PowerShell cmdlet. B. by running the Start-FseSignatureUpdate PowerShell cmdlet. C. by running the Get-FseSignatureOptions PowerShell cmdlet. D. by running the Set-FseEngineManagement PowerShell cmdlet. Answer: B Explanation: Question 10. You work as a Network Administrator at ABC.com. Your responsibilities include the security of the computers in the network. The network consists of a single Active Directory Domain Services (AD DS) domain named ABC.com and includes servers running Windows Server 2008 and client computers running Windows 7 Professional. A pool of servers running Windows 2008 Server hosts the Microsoft Exchange Server 2010 environment. Two servers named ABC-Edge1 and ABC-Edge2 are configured as Microsoft Exchange Edge Transport servers. Two servers named ABC-Mbox1 and ABC-Mbox2 are configured as Microsoft Exchange Mailbox Servers and also run the Microsoft Exchange Hub Transport server roles. You have recently implemented Forefront Protection for Exchange Server (FPE) 2010 to secure the Microsoft Exchange Server 2010 environment. You receive reports from users saying that they receive undeliverable mail bounce messages for emails that they did not send. You suspect that the sender field has been forged in the failed messages. How can you ensure that users do not receive undeliverable mail messages for emails that they did not send? A. You should configure a sender filter on ABC-Mbox1 and ABC-Mbox2. B. You should configure a backscatter filter on ABC-Edge1 and ABC-Edge2. C. You should disable Delivery Status Notifications (DSN) messages on ABC-Edge1 and ABCEdge2. D. You should configure a separate Exchange mailbox to receive all Delivery Status Notifications (DSN) messages. Answer: B Explanation:
|
Question 1. You work as the network administrator at ABC.com. You are in the process of configuring a Project Server 2010 environment. You have configured two servers. A Windows Server 2008 R2 server named ABC-SQL1 runs SQL Server 2008 R2. A Windows Server 2008 R2 server named ABC-SPS1 runs SharePoint Server 2010 and Project Server 2010. How can you configure the Project Server 2010 environment to allow Project Web App (PWA) to build OLAP cubes? A. You need to install the SQL Server 2008 Native Client and Analysis Management Objects on ABC- SPS1. B. You need to install the SQL Server 2008 Native Client and Analysis Management Objects on ABC-SQL1. C. You need to install SQL Server Analysis Services on ABC- SPS1. D. You need to configure a trusted data connection library in the Excel Services settings on ABCSPS1. Answer: A Explanation: Question 2. You work as the network administrator at ABC.com. Your responsibilities include maintaining the Project Server 2010 environment. The SQL Server 2008 R2 installation on a server named ABC-SQL1 includes the Analysis and Reporting Services. SharePoint Server 2010 and Project Server 2010 are installed on a server named ABC-SPS1. You have been asked by the project manager to enable Project Server reporting. Which services should you initialize to enable Project Server reporting? A. You should start the Excel Services Web Service then the Security Token Service. B. You should start the SQL Server Browser Service the Security Token Service. C. You should start the Excel Services Web Service then the Secure Store Service. D. You should start the Security Token Service then the Secure Store Service. Answer: C Explanation: Question 3. You work as the network administrator at ABC.com. You are in the process of configuring a Project Server 2010 environment. A Windows Server 2008 R2 server named ABC-SQL1 runs SQL Server 2008 R2. You have installed a Windows Server 2008 R2 server named ABC-SPS1. The next step is to install Project Server 2010 on ABC-SPS1. You run the Project Server 2010 installer on ABC-SPS1 but the installation does not complete. You receive an error message on ABC-SPS1 informing you that the server does not meet the minimum software prerequisites. What is the easiest way to ensure that all the missing software prerequisites are installed? A. You should install the latest Windows service pack on ABC-SPS1. B. You should run Windows Update on ABC-SPS1. C. You should run the SharePoint 2010 Products Preparation Tool on ABC-SPS1. D. You should select the Complete Installation option in the Project Server 2010 setup. Answer: C Explanation: Question 4. You work as the network administrator at ABC.com. You are in the process of configuring a Project Server 2010 environment. You have configured two servers. A Windows Server 2008 R2 server named ABC-SQL1 runs SQL Server 2008 and a Windows Server 2008 R2 server named ABC-SPS1 runs SharePoint Server 2010 and Project Server 2010. You need to configure Microsoft SQL Server 2008 Analysis Services to build Project Server 2010 cubes. You log in using the Farm Administrator account and verify that the account has administrative permissions for the Analysis Services on ABC-SQL1. What should you do next? A. You should uABCrade Microsoft SQL Server 2008 on ABC-SQL1 to Microsoft SQL Server 2008 R2. B. You should assign the Farm Administrator account the Sysadmin role on ABC-SQL1. C. You should add the Farm Administrator account to the local Administrators group on ABCSPS1. D. You should delete the Farm Administrator account from OLAP group on ABC-SQL1. Answer: C Explanation: Question 5. You work as the network administrator at ABC.com. You have been asked to configure a new Project Server 2010 environment. The Project Server 2010 environment will run on multiple virtual servers on the company’s Microsoft HyperV platform. Which server should you configure first? A. You should install and configure SQL Server first. B. You should install and configure Windows SharePoint Services 3.0 first. C. You should uninstall SharePoint Server 2008 first. D. You should install and configure Project Server 2007 first. E. You should install and configure a WINS Server first. Answer: A Explanation: Question 6. You work as the network administrator at ABC.com. You are in the process of configuring a Project Server 2010 environment. A Windows Server 2008 R2 server named ABC-SPS1 runs SharePoint Server 2010 and Project Server 2010. The database will run on a separate server named ABC-SQL1 running SQL Server 2008. How should you configure the database to support remote users? A. You should the SQL Server 2008 Native Client on ABC-SQL1. B. You should configure ABC-SQL1 to accept desktop remote connections. C. You should create an exception in Windows Firewall on ABC-SQL1. D. You should install SQL Server Management Studio (SMSS) on ABC-SPS1. E. You should configure ABC-SQL1 to accept remote connections using TCP/IP. Answer: E Explanation: Question 7. You work as the network administrator at ABC.com. Your responsibilities include maintaining the Project Server 2010 environment. You have recently installed the Project Server 2010 environment with the default settings. The Project Server 2010 environment consists of the following two servers. A Windows Server 2008 R2 server named ABC-SQL1 runs SQL Server 2008 R2. A Windows Server 2008 R2 server named ABC-SPS1 runs SharePoint Server 2010 and Project Server 2010. You have been asked to configure a copy of the current environment in a new Project Web App (PWA) instance to be used for testing and training. What is the easiest way to achieve this goal? A. You should install a second instance of SQL Server on the ABC-SQL1. B. You should run SharePoint Central Administration on ABC-SPS1 and configure the names of the databases to be used using the Project Server service application. C. You should run SharePoint Central Administration on ABC-SPS1 to configure a new ABC collection then install the Project Server service application and run the default database names. D. You should start the SharePoint 2010 Management Shell on ABC-SPS1 and run the Get- SPSite -ContentDatabase command. Answer: B Explanation: Question 8. You work as the network administrator at ABC.com. Your responsibilities include maintaining the Project Server 2010 environment. The Project Server 2010 environment consists of the following two servers. A Windows Server 2008 R2 server named ABC-SQL1 runs SQL Server 2008 R2. A Windows Server 2008 R2 server named ABC-SPS1 runs SharePoint Server 2010 and Project Server 2010. You want to install some Windows Updates on ABC-SPS1. You want to ensure that no data is lost during the update. You also want to disable users’ ability to modify data during the uABCrade to ensure data integrity is maintained. What should you do before installing the updates? A. You should use the SQL Server Management Studio to detach the database on ABC-SQL1. B. You should run the Net Stop W3SVC command on ABC-SPS1. C. You should run SharePoint Central Administration on ABC-SPS1 and select the Quiesce Farm option. D. You should stop the Project Server Queue Service on ABC-SPS1. Answer: C Explanation: Question 9. You work as the network administrator at ABC.com. Your responsibilities include maintaining the Project Server 2010 environment. The Project Server 2010 environment consists of the following two servers. A Windows Server 2008 R2 server named ABC-SQL1 runs SQL Server 2008 R2. A Windows Server 2008 R2 server named ABC-SPS1 runs SharePoint Server 2010 and Project Server 2010. You are configuring a new laptop for a user named Mia Hamm. Mia will be working on an existing project. You install Project Professional 2010 and configure Mia’s user permissions on ABC-SPS1 to allow her to edit projects using Project Professional. What should you do to enable Mia to open the project? A. You should run Project Professional on Mia’s laptop, select the Open Project option and enter the URL for ABC-SPS1. B. You should run Project Professional on Mia’s laptop and configure the account settings for ABC-SPS1. C. You should run Project Server on ABC-SPS1 and open the project. D. You should create an account for Mia using SharePoint Central Administration. Answer: B Explanation: Question 10. You work as the network administrator at ABC.com. You are in the process of configuring a Project Server 2010 environment. The network includes the following two Exchange servers: ABC-Exch1 runs Exchange Server 2007 R2 and is configured to run the Client Access Server role. ABC-Exch2 runs Exchange Server 2007 R2 and is configured to run the Mailbox Server role. You need to configure Project Server 2010 to integrate with the ABC.com Exchange environment. You have configured the following two servers: ABC-SQL1 runs SQL Server 2008 R2. ABC-SPS1 runs SharePoint Server 2010 and Project Server 2010. You plan to enable task synchronization in Project Web App (PWA). What should you do first? A. You should create a user account for ABC-Exch1 in Project Web App (PWA). B. You should create a user account for ABC-Exch2 in Project Web App (PWA). C. You should add the computer account for ABC-SPS1 to the Exchange Domain Servers group in Active Directory. D. You should add the Farm Administrator’s user account to the local Administrators group on ABC-Exch1. E. You should add the Farm Administrator’s user account to the local Administrators group on ABC-Exch2. Answer: A Explanation:
|
Question 1. You work as a Project Manager at ABC.com. You are using Microsoft Project Professional 2010 to manage a project. You notice that a section of the project is located in the wrong phase. The section includes a summary task that contains eight subtasks and two milestones. You need to move the section complete with the summary tasks and milestones to a different project phase. You want the Work Breakdown Structure (WBS) numbering to be updated to match the destination phase. Which of the following actions should you take? A. You should select the summary task and select Change Working Time on the Project ribbon. B. You should select the summary task and modify the start and finish dates. C. You should open the properties of the summary task, select the Advanced tab and configure the WBS code. D. You should select the section including the summary task and milestones and click the Move task option. E. You should select the summary task and drag it to the correct phase. Answer: B Explanation: Question 2. Your work at ABC.com includes management of projects using Microsoft Project Professional 2010. You have several tasks in your project schedule. The tasks are a mix of active and inactive tasks that are automatically or manually scheduled. Some tasks are summary tasks that include subtasks. The tasks are listed using different text colors and fonts including bold, underline and strikethrough fonts. A new member of the project team uses Microsoft Office Project Professional 2007. He asks you to save the project as a Project 2007 project until his version of Project is upgraded to 2010. As a result of some features of the task list not being compatible with Project 2007, you would like to complete the task without creating any new milestones. Which of the following actions should you take? A. You should alter all the tasks to be Manually Scheduled tasks. B. You should alter all the tasks to be Auto Scheduled tasks. C. You should alter the font of all tasks listed with a strikethrough font. D. You should alter the font of all tasks listed with a bold font. Answer: C Explanation: Question 3. You work as a Project Manager at ABC.com. You are using Microsoft Project Professional 2010 to manage multiple projects. Some resources are shared and work is distributed between the projects. You have received instructions to modify the workload for some of the shared resources. Which two of the following actions should you take? (Choose two.) A. You should consider inserting the existing project schedules into a blank project as subprojects. B. You should consider select the Links Between Projects option. C. You should consider opening each existing project schedule and select the shared resource pool. D. You should consider enabling the Load Summary Resource Assignments option. E. You should consider selecting the Level Resource function and select the required resources. F. You should consider selecting the Level All function. Answer: A, E Explanation: Question 4. Your work at ABC.com includes management of projects using Microsoft Project Professional 2010. You are working on a Software System Development project. You have a task named Business Requirements Definition that is scheduled to be completed by 20th July. The constraint type for all tasks listed in the project schedule is configured as “As Soon As Possible”. The project team members inform you that the Business Requirements Definition task will be completed by 15th July. You want the default Gantt chart to show 20th July as the completion date instead of 15th July. Which of the following actions should you take? A. Open the task information window and enter 20th July in the Constraint date field. B. Open the task information window and enter 20th July in the Deadline date field. C. Open the task information window and select the Fixed Units option in the Task Type field. D. Open the task information window and enter 20th July in the Finish date field. Answer: B Explanation: Question 5. You work as a Project Manager at ABC.com. You are using Microsoft Project Professional 2010 to manage a new project. The project will be divided into five major phases. The time that each phase will take is still being calculated but the entire project needs to be completed within 6 months. How should you configure the project to indicate that the entire duration will be 180 days? A. You should configure five summary tasks each with a duration of 36 days. B. You should set the Status Date to 180 days into the future. C. You should enter the project timescale in the project calendar. D. You should create a single summary task with the manually scheduled option. Answer: C Explanation: Question 6. You work as a Project Manager at ABC.com. You are using Microsoft Project Professional 2010 to manage a new project. The resources in the project work from 6pm to 10pm four days a week from Monday through Thursday. You have been instructed to create a new default calendar for the project so that the working hours of the part-time resources are reflected. Which of the following actions should you take? A. You should modify the Standard calendar then select the Update Project option. B. You should navigate to the Change Working Time window and click Create New Calendar. Then change the calendar type in the Project Options dialog box. C. You should change the calendar type to part-time in the Project Options dialog box. D. You should navigate to the Change Working Time window and change the calendar type to part-time. Answer: B Explanation: Question 7. Your work at ABC.com includes management of projects using Microsoft Project Professional 2010. You are configuring the tasks for a new project. You notice that the default constraint type for tasks that you create is set to As Soon As Possible. You are required to make sure that the default constraint type for new tasks is changed to As Late As Possible Which of the following actions should you take? A. You should configure the Schedule From option in the Project Information window to Project Finish Date. B. You should configure the Schedule From option in the Project Information window to Project Start Date. C. You should check the New Tasks are effort driven check box in the Project Options. D. You should select all tasks then click the Update Project option. Answer: A Explanation: Question 8. You work as a Project Manager at ABC.com. You are using Microsoft Office Project Professional 2010 to manage a project. Task1 is represented by the following icon in the default Gantt Chart view: Task2 is represented by the following icon in the default Gantt Chart view: What would you need to change to configure Task2 to be the same type as Task1? A. You would need to configure Task2 to be automatically scheduled. B. You would need to configure Task2 to be manually scheduled. C. You would need to configure Task2 as critical. D. You would need to configure Task2 as a milestone. Answer: B Explanation: Question 9. Your work at ABC.com includes management of projects using Microsoft Project Professional 2010. You are calculating the timescales for a new project using the bottom-up scheduling method. You have created three tasks named Drawings, Prototype and Review. You want to group the Drawings, Prototype and Review tasks into a project phase named Design. How would you group the three tasks? A. By selecting the three tasks and clicking the Outdent Task option. B. By selecting the row above the three tasks and entering a new Summary Task. C. By selecting the three tasks and clicking the Indent Task option. D. By selecting the three tasks and selecting the Insert Summary Task option. Answer: D Explanation: Question 10. Your work at ABC.com includes management of projects using Microsoft Project Professional 2010. How can you display a task that lists the project name, total project duration and start and finish dates by default in the project schedule? A. By navigating to the Format tab and selecting the Critical Tasks checkbox. B. By navigating to the Format tab and selecting the Summary Tasks checkbox. C. By navigating to the Format tab and selecting the Project Summary Task checkbox. D. By navigating to the Format tab and selecting the Outline Number checkbox. Answer: C Explanation:
|
Question 1. You work as the Exchange Administrator at ABC.com. The ABC.com network has an Exchange Server 2007 infrastructure. The network contains a mailbox named TestResources. At present all users are able to diarize appointments for TestResources. A new company policy states that only Kara Lang and Mia Hamm are permitted to diarize appointments for TestResources. What actions must you take to comply with the ABC.com policy? A. You should run the following cmdlet: Set- MailboxCalendarSettings - Identity"TestResources" - MonthCalendar calendar = new MonthCalendar(); KaraLang , MiaHamm. B. You should run the following cmdlet: Set-MailboxCalendarSettings - Identity " TestResources" - BookInPolicy KaraLang , MiaHamm -AllBookInPolicy $false cmdlet. C. You should run the following cmdlet: Set - MonthCalendar calendar = new MonthCalendar(); “host.KaraLang , MiaHamm = calendar " this.Content = host;. D. You should run the following cmdlet: Set - MonthCalendar calendar = new MonthCalendar(); HwndSource source = HwndSource.FromHwnd(calendar.Handle); this.Content = calendar;Delegates KaraLang , MiaHamm. Answer: B Explanation: Question 2. You work as the Exchange Administrator at ABC.com. The ABC.com network has an Exchange Server 2007 environment. ABC.com has headquarters in London and branch offices in Paris and Berlin. The marketing department is located at the Paris office. The personnel in Paris connect to the network through the Internet and use Outlook Anywhere on their laptops. To ensure productivity management wants you to make sure that the marketing personnel have access to the companies' mailboxes. What actions must you take? A. You should utilize the Test- MAPIConnectivity and the Test- WebServicesConnectivity cmdlet. B. You should utilize Get- Recipient – Filter cmdlet. C. You should utilize Show-MailboxStatistics cmdlet. D. You should utilize List-Mailbox cmdlet. Answer: A Explanation: Question 3. You work as the Exchange administrator at ABC.com. The ABC.com network has an Exchange Server 2007 environment. The ABC.com network has an Exchange Server 2007 environment. The Edge Transport Server role is installed on a server named ABC-EX01. Due to this server failure, you have decided to install a new Microsoft Windows Server 2003 server named ABCEX03 on the network with the reinstallation of the Edge Transport Server role. However, the address rewrites that was functional on ABC-EX01 did not in operation on ABC-EX03. This functionality is needed. What actions must you take? A. You should use the ImportEdgeConfig.ps1 on ABC-EX03. B. You should use the iiscnfg/enable: application name check version. C. You should use the Transaction Logs for sp_configure configuration. D. You should use create a new Send connector on ABC-EX03. Answer: A Explanation: Question 4. You work as the Exchange administrator at ABC.com. ABC.com has headquarters in London and a branch office in Paris. The Exchange Server 2007 server in the London office is named ABCEX07 and the Exchange Server 2003 server in the London office is named ABC-EX08. You need to transfer the mailbox from ABC-EX07 to ABC-EX08. What actions must you take? A. You should include the IgnoreRuleLimitErrors parameter when using the Move-Mailbox cmdlet. B. You should use the System configuration data collector. C. You should create a mapping schema definition. D. You should enable the Windows Remote Management (WinRM). Answer: A Explanation: Question 5. You work as the Exchange administrator at ABC.com. ABC.com has its headquarters in Chicago and a branch office in Dallas. You are implementing a new Exchange Server 2007 Organization. The Exchange Server 2007 environment of ABC.com has the following server installed: • An Edge Transport server named ABC-EX01 • A Hub Transport server named ABC-EX02. During the course of the day you have received instruction from the CIO to have e-mail routing configured on ABC-EX01 and ABC-EX02. In your solution you need to ensure that ABC-EX01 is able to transmit e-mail messages to and from the Internet. You should also ensure that Internet email is sent to ABC-EX01 via ABC-EX02. What actions must you take? A. You should use the Microsoft System Center Configuration Manager (SCCM). B. You should export a new Edge Subscription file to ABC-EX01 and Import the Edge Subscription file to ABC-EX02. C. You should use the Microsoft System Center Operations Manager (SCOM). D. You should use the Microsoft Exchange Internet Message Access Protocol, Version 4 (IMAP4). Answer: B Explanation: Question 6. You work as the Exchange administrator at ABC.com. The ABC.com network has an Exchange Server 2007 environment. You were compelled to restore the directory objects and settings from a backup. However, after the restoration a number of employees reported that they are unable to access their mailboxes that were assigned to them before the backup was made. The employees need to access their mailboxes. What actions must you take? A. You should use the Get-Mailbox cmdlet. B. You should use the Get-MailboxInformation cmdlet. C. You should use the Connect-Mailbox cmdlet. D. You should use the Show-Information cmdlet. Answer: C Explanation: Question 7. You work as the Exchange administrator at ABC.com. The ABC.com network has an Exchange Server 2007 environment. During routine maintenance of the Exchange server you discover that the storage limits are all different in the mailboxes. What actions must you take to ensure that the storage limits to be the same? A. You should use the Get-MailboxStatistics cmdlet and forward it to the Get-Mailbox cmdlet. B. You should use the Show-MailboxStatistics cmdlet and forward it to the Select-Object cmdlet. C. You should use the Get-MailboxInformation cmdlet and forward it to the Select-Object cmdlet. D. You should create an Exchange Management Shell script and forward the Get-Mailbox Database cmdlet output to the Set-Mailbox Database cmdlet. Answer: D Explanation: Question 8. You work as the Exchange administrator at ABC.com. The ABC.com network has an Exchange Server 2007 environment. The ABC.com network contains a stand-alone server named ABCSR09. Your boss, Tess King, wants to know which Exchange Server 2007 server role can ABC-SR09 support. What would you reply? A. It can support the Terminal Service Session Broker (TS Session Broker) role. B. It can support the Edge Transport server role. C. It can support the PDC emulator role. D. It can support the Exchange Recipient Administrators role. Answer: B Explanation: Question 9. You work as the Exchange Administrator at ABC.com. The ABC.com network has an Exchange Server 2007 infrastructure that has two Client Access Servers with load balancing. The employees on the intranet has 24/7 access to data when utilizing Outlook Anywhere. During the course of the day you have received instruction from the CIO to ensure that the employees who connect to the Exchange infrastructure via the IUnernet also have access to data 24/7. What actions must you take? A. You should enable the Microsoft Exchange Information Store. B. You should enable the Microsoft Exchange Search Service. C. You should set the external URL on every Client Access Server. D. You should enable the Microsoft Exchange File Distribution service. Answer: C Explanation: Question 10. You work as the Exchange administrator at ABC.com. The ABC.com network has an Exchange Server 2007 environment. You have received several complaints from employees in various departments stating that e-mail messages are ending up in their Junk E-mail folder even though the sender’s e-mail address is on their Safe Senders List. You need to ensure that the employees' Safe Senders Lists are used. What actions must you take? A. You should modify the SMTP Send connectors. B. You should utilize the Get-Mailbox cmdlet. C. You should utilize the Show-Information cmdlet. D. You should utilize the Update-SafeList cmdlet on each mailbox. Answer: D Explanation:
|
Question 1. You work as the Exchange administrator at ABC.com. The ABC.com network has an Active Directory domain named ABC.com. The ABC.com Exchange organization contains two Exchange Server 2003 computers named ABC-SR11 and ABC-SR12 respectively. ABC-SR11 is configured as the mailbox server and ABCSR12 is configured as the front-end server. ABC-SR12 has Microsoft Outlook Web Access over SSL installed to allow ABC.com employees to access their e-mail. The ABC.com intranet is connected to the Internet via a firewall. When several employees complain that they are unable to access ABC-SR12, you investigate the issue and find that employees are able to access Outlook Web Access using HTTP or HTTPS. You have been instructed to make sure that the ABC.com employees are only able to use HTTPS to access Outlook Web Access. Which of the following actions should you take? A. You should reconfigure the firewall to allow ABC.com employees to access port 443 on ABCSR12, and then configure the default Web site on ABC-SR12 to require SSL connections. B. You should reconfigure the firewall to allow ABC.com employees to access port 80 on ABCSR12, and then configure the default Web site on ABC-SR12 to use port 443 for SSL connections. C. You should reconfigure the firewall to allow ABC.com employees to access port 993 on ABCSR12, and then configure the default Web site on ABC-SR12 to require SSL connections and 128- bit encryption. D. You should reconfigure the firewall to allow ABC.com employees to access port 143 on ABCSR12, and then configure the Exchange HTTP virtual server on ABC-SR12 to enable forms-based authentication for Outlook Web Access. Answer: A Explanation: SSL utilizes port 443. The external firewall does not currently allow traffic on port 443 to pass. Opening up this port will take care of that issue. The default OWA site is currently not correctly setup to use HTTPS. This is why internal clients can connect to OWA using HTTP. Modifying the security on the OWA web site will solve this problem. Reference: MS white paper Exchange Server 2003 RPC over HTTP Deployment Scenarios MS white paper Exchange Server 2003 Client Access Guide MS white paper Exchange 2003 Front-End Back-End Topology Question 2. You work as the network Exchange administrator at ABC.com, who has their headquarters located in Miami. The ABC.com network has an Active Directory domain named ABC.com. All servers on the ABC.com network run Windows Server 2003 and all client computers run Windows XP Professional. The ABC.com network includes a server named ABC-EX01, which runs Microsoft Exchange Server 2003. ABC.com recently entered into partnership with Weyland Industries, who has their office located in Toronto. Part of the network in the Toronto office is configured as an Active Directory site within the ABC.com domain. A server named ABC-EX02 is configured to run Microsoft Exchange Server 2003 and located in the Toronto office. The two Exchange servers are configured in separate routing groups connected via a routing group connector. The Toronto and Miami offices are connected to each other via a leased line connection. You receive instruction from ABC.com to configure an ISDN-dialup connection as a backup connection in the event that the leased line connection becomes unavailable. During the course of your maintenance you discover that the ISDN dial-up connection is not used as a backup connection, but is used exclusively by the routing group connector. ABC.com wants you to make sure that the leased line connection is used as the primary connection, and that the ISDN connection is used only if the leased line connection fails. Which of the following actions should you take? A. You should configure ABC-EX01 and ABC-EX02 to be in the same Active Directory site. B. You should configure ABC-EX01 and ABC-EX02 to be in the same routing group. C. You should have a lower IP route cost assigned to the ISDN link and a higher link cost to the leased line link. D. You should configure ABC-EX02 to use ABC-EX01 as a smart host. E. You should have a lower IP route cost assigned to the leased line link and a higher link cost to the ISDN link. Answer: E Explanation: It is possible that the administrator reversed the values of the cost on the connections because IP route costs are used to set the preference levels between two routes to the same destination. Question 3. You work as the Exchange administrator at ABC.com. The ABC.com network has an Active Directory domain named ABC.com. ABC.com employs Exchange Server 2003 as its messaging system. All servers on the ABC.com network run Windows Sever 2003 and all Exchange servers run Exchange Server 2003. The Exchange organization contains an Exchange server named ABC-SR31, which is used to pass SMTP e-mail messages between ABC.com and the Internet and also stores the mailboxes of all ABC.com’s employees. The intranet is connected to the Internet via a firewall. When several employees complain that they continuously receive numerous unwanted e-mail messages, you investigate the issue and find that the unwanted e-mail messages received by ABC.com’s employees are the same. You also notice that the messages are being sent to a universal distribution group in the ABC.com domain. You must configure the network so that distribution groups are prevented from sending e-mail messages from the Internet to the ABC.com users. Your solution must enable the ABC.com users to continue to send and receive legitimate e-mail messages. Which of the following is the best solution? A. You should consider having the universal distribution groups converted to Domain Local Distribution groups. B. You should consider having the Exchange Attributes removed from the universal distribution groups. C. You should consider having the distribution groups configured to only permit e-mail messages from authenticated users. D. You should consider having the membership of the universal distribution groups hidden. Answer: C Explanation: Your best option in this scenario would be to select Option C. The universal group is used for mail distribution in your organization. You can configure the distribution group to accept mail from authenticate users only to stop receiving spam. Incorrect answers A: Converting the universal groups to domain local security groups on its own will not protect you against unsolicited mail. The security groups will still receive email B: Removing the Exchange Attributes will remove the email address which would prevent ABC.com users from sending email to the groups. D: Hiding the group membership will not protect you against unsolicited mail. The groups will still receive email. Reference: MS white paper Exchange Server 2003 RPC over HTTP Deployment Scenarios MS white paper Exchange Server 2003 Client Access Guide MS white paper Exchange 2003 Front-End Back-End Topology MS white paper Exchange Server 2003 Message Security Guide MS white paper Microsoft Exchange Intelligent Message Filter Deployment Guide Question 4. You work as the network Exchange administrator at ABC.com. The ABC.com network has an Active Directory domain named ABC.com. All servers on the ABC.com network have Windows Server 2003 installed and all workstations have Windows XP Professional installed. The ABC.com network contains an Exchange 2003 server named ABC-EX01, which hosts thousands of mailboxes in a single storage group. ABC-EX01 is equipped with a single RAID-5 device, which is configured as a single logical drive. ABC-EX01 is additionally equipped with a high-end CPU and has a 2GB of RAM. During the course of the day the ABC.com network users with mailboxes hosted on ABC-EX01 complain that at times of peak usage their email-services become considerably slower and it takes longer for messages to be sent and opened using Microsoft Outlook. You have recently received instruction from the ABC.com network CIO to monitor the performance and you receive the values shown in the following exhibit: You are required to improve the performance of e-mail for the network Exchange users on ABCEX01. What should you do? A. You should consider having a full-text index created on the mailbox store B. You should consider having a new volume created on the existing RAID-5 device and move The Exchange transaction logs to the new volume C. You should consider having a new RAID device added and the Exchange transaction logs moved to the new device D. You should consider installing additional RAM E. You should consider installing an additional processor Answer: C Explanation: The performance results indicate that the hard disk usage is very high and the other counter values are within acceptable limits. All changes to the Exchange databases are recorded first in the transaction logs. Question 5. You work as the Exchange administrator at ABC.com. The ABC.com Exchange organization has includes a solitary server named ABC-EX01 that has Exchange Server 2003 installed. All ABC.com users make use of Microsoft Outlook to send and receive e-mail messages. ABC-EX01 is equipped with dual CPUs and 2 GB Random Access Memory (RAM). ABC-EX01 is configured to host a storage group that contains one mailbox store. You receive reports that opening Outlook takes too long, and that every e-mail message being sent or opened takes too long. You monitor the ABC-EX01 and find that the inadequate RAM results in the primary bottleneck, which then results in sluggish performance. You, therefore, increase ABC-EX01’s RAM to 4 GB RAM. However, the ABC.com users continue to report sluggish Outlook performance. Which of the following actions should you take to improve ABC-EX01’s performance? A. You should increase the size of the virtual memory to 6GB. B. You should place an additional switch that increases user mode memory usage to the Boot.ini file in the mailbox servers. C. You should increase the priority of the store.exe process in Task Manager. D. You should set up an additional mailbox store on the server. Then divide the existing Mailboxes between the old and the new mailbox store. Answer: B Explanation: If you have more than 1 GB of physical memory installed on a server that is running Exchange Server 2003, you must make sure that Exchange Server 2003 can make efficient use of that memory. If you are running Exchange Server 2003 on a Windows Server 2003-based computer, and if the /3GB switch is set, Microsoft recommends that you set the /USERVA=3030 parameter in the Boot.ini file. This configuration option increases the virtual address space. Question 6. You work as the network Exchange administrator at ABC.com. The ABC.com network has an Active Directory domain named ABC.com. All servers on the ABC.com network have Windows Server 2003 installed and all workstations have Windows XP Professional installed. The ABC.com DNS servers are configured with Active Directory Integrated zones. ABC.com has introduced a written security policy stating that these Active Directory zones should allow only secure dynamic updates. All computers are configured with static IP addresses. During the course of the business day you decided to configure a new Exchange server to supplement your current server. To this end, you first install the operating system and accept the typical network settings. After the installation of the operating system, you decided to install Exchange Server 2003. When you start it for the first time, you encounter an error message that states that the server is unable to locate the global catalog server. Which of the following actions should you take to rectify this problem? A. You should consider assigning a static TCP/IP configuration that includes the address of the DNS server and register it manually in DNS. B. You should consider configuring with a Hosts file containing the global catalog server address. C. You should executing the ipconfig /registerdns command on the server D. You should consider assigned a static TCP/IP configuration that includes the address of the DNS server. Then join it to the domain and register it manually. E. You should consider executing the ipconfig /renew command on the server. F. You should configure the DNS zone to allow all dynamic updates. Answer: D Explanation: In the event of an operating system being installed with typical settings, it will result in configuring the server as a DHCP client. However in this scenario there is no DHCP server. This results in the new Exchange server being unable to get an address and no DNS server address and without this information it will be unable to locate the DNS server. And even if it did, it would not be able to register because only secure dynamic updates are allowed for security reasons. Thus you need to assign the server a static TCP/IP configuration including the address of the DNS server. Join the new Exchange server to the domain and register it manually in DNS. Question 7. You work as the Exchange administrator at ABC.com. The ABC.com network has an Active Directory domain named ABC.com. ABC.com has its headquarters in Chicago and branch offices in Dallas and Miami. Each of these offices contains a domain controller that runs Microsoft Windows Server 2003. You are planning to deploy one Exchange Server 2003 computer, which must be placed in a separate administrative group, in each ABC.com office. You have already prepared the forest and the domain to support Exchange Server 2003. You attempt to install the first Exchange server, and find that you are unable to select an administrative group in which to place the server so you decide to cancel the installation. You have to make sure that you are able to select an administrative group during installation. Which of the following actions should you take? A. You should consider Install Exchange Server 2003 by executing the setup /choosedc Command and specifying the local domain controller. B. You should consider installing Exchange System Manager and create the administrative groups. C. You should consider installing Exchange System Manager and assign the Exchange Full Administrator permissions to the account used to installing Exchange Server 2003 at the Exchange organization level. D. You should consider installing Exchange by executing setup /choosedc and specifying the local global catalog server on the new server in each branch office. E. You should consider configuring the new server to point to the local global catalog server as its primary DNS server. Then install Exchange Server 2003 on the new server. Answer: B Explanation: If the administrative group or routing group already exists, a server only can be assigned to a routing group or to an administrative group during the installation phase. By default, if one Exchange server has been installed only one administrative group, the First Administrative Group exists. To be able to install the FIRST Exchange server in a different administrative Group than the default, the required administrative group must be created prior to the installation. The forest and the domain are already prepared to support Exchange Server 2003. You must install the Exchange System Manager tool choosing a custom action during the setup. Incorrect Answers A: Exchange Setup includes the new /ChooseDC switch. You can now enter the fully qualified domain name (FQDN) of a Windows domain controller to force Setup to read and write all data from the specified domain controller (the specified domain controller must reside in the domain where you install your Exchange 2003 server). When installing multiple Exchange 2003 servers simultaneously, forcing each server to communicate with the same Active Directory directory service domain controller ensures that replication latencies do not interfere with Setup and cause installation failures. "setup.exe" /ChooseDC “Your FQDN Server name here” The principal reason to use this switch is to avoid errors during multiple Exchange setup running to same time C: Exchange System Manager by default is installed when you install the first Exchange server. Also is required to permit administrators who are assigned the Exchange Full Administrator administrative role at the administrative group level to install and to remove Exchange Server 2003, to uABCrade servers, and to perform disaster recovery on servers that are in that administrative group. They already have and account that is able to perform this task, same account that they have used to run ForestPrep and DomainPrep switch’s D: This is similar to answer A and is thus not required for this scenario. E: This is not a DNS issue. The problem is that the administrative groups haven’t yet been created. Reference Exchange Server 2003 Deployment Guide Question 8. You work as the Exchange administrator at ABC.com. The ABC.com network has an Active Directory domain named ABC.com. All servers on the ABC.com network have Windows Server 2003 installed and all workstations have Windows XP Professional installed. The ABC.com network has a server named ABC-EX01 that runs Exchange Server 2003. You have been instructed to configure sender filtering to minimize the amount of junk e-mail being received by ABC.com users. After specifying a list of known junk e-mail senders in the blockedsender list, you find that users still report that they receive e-mail from these senders. Which of the following would allow you to complete this task? A. You should enable the filter on the IP address of the SMTP virtual server on the Exchange server. B. You should enable the Windows Firewall on the Exchange server. C. You should configure the authentication settings of the SMTP virtual server on the Exchange server to allow Integrated Windows Authentication. D. You should configure the of the SMTP virtual server on the Exchange server to enable logging. Answer: A Explanation: The filter is created, but has not been applied. Hence, the junk mail still arrives. Question 9. You work as the Exchange administrator at ABC.com. The ABC.com network has an Active Directory domain named ABC.com. All servers on the ABC.com network run Windows Server 2003 and all client computers run Windows XP Professional. The ABC.com network also has a firewall that connects the intranet to the internet. The ABC.com Exchange organization contains two servers running Exchange Server 2003. In addition, you have configured another server as an email gateway server, which is configured for queuing and delivery of outbound SMTP mail ABC.com then releases a new security policy that prohibits SMTP mail from being sent directly to the Internet by the Exchange servers. The new security policy stipulates that only the gateway server should send SMTP mail to the Internet. The new security policy does, however, state that the Exchange servers should be capable of sending mail directly to one another. You have been tasked with making sure that the new security policy is adhered to. Which of the following actions should you take? A. You should configure the MX records for ABC.com to point to the internal IP address of the gateway server. B. You should configure the Default Gateway of both Exchange servers to point to the gateway server. C. You should configure the firewall to block outbound SMTP traffic from the Exchange servers. D. You should delete the SMTP virtual servers on the Exchange servers. E. You should configure each SMTP virtual server to make use of the gateway server as a smart host. Answer: E Explanation: The company policy states that Exchange servers must not send SMTP mail directly to the Internet. Therefore, we will need to configure on each an SMTP virtual server that will send all the traffic to a smart host, in this case the gateway server. The gateway server will then forward the email to the internet. References MS article 821911, How to Configure Exchange Server 2003 to Use a Smart Host IP Address Using ISA Server 2000 with Exchange Server 2003 MS White paper Question 10. You work as the Exchange administrator at ABC.com. The ABC.com network has an Active Directory domain named ABC.com. All servers on the network run Windows Server 2003. The ABC.com network contains two servers, named ABC-SR01 and ABC-SR02, running Exchange Server 2003. ABC-SR01 is configured as the mailbox server for ABC.com’s employees, and cannot be accessed from the Internet. ABC-SR02 serves as a front-end server that is only utilized when employees make use of HTTP or IMAP4 to access their mailboxes. You have been tasked with making sure that ABC-SR02 only has the services required to perform its appointed role enabled. Which of the following actions should you take? A. You should consider having the IIS Admin Service, World Wide Web Publishing Service, and Microsoft Exchange Information Store disabled. B. You should consider having the IIS Admin Service, Microsoft Exchange Information Store, and Microsoft Exchange Post Office Protocol version 3 (POP3) disabled. C. You should consider having the Microsoft Exchange Information Store, Microsoft Exchange Post Office Protocol version 3 (POP3), and Microsoft Exchange Message Transfer Agent (MTA) Stacks disabled. D. You should consider having Microsoft Exchange Message Transfer Agent (MTA) Stacks, the Microsoft Exchange Internet Message Access Protocol, Version 4 (IMAP4), and the Microsoft Exchange Information Store disabled. Answer: C Explanation: You do not need Microsoft POP3 Service, which provides e-mail transfer and retrieval services. The Microsoft POP3 Service system service is combined with the SMTP Service, which allows users to send outgoing e-mail, for full e-mail services. The Exchange Information Store service supports data storage (mailboxes and public folders data) on the server. Since a front end OWA server queries backend server for data, this service can be disabled during regular operations. Microsoft Exchange MTA Stacks service supports message routing to foreign messaging system using X.400 and gateway connectors. It is not a required service on a front end OWA server. Reference: SECURING AN EXCHANGE 2000 OWA FRONTEND SERVER WITH SECURITY TEMPLATES
Copyright © 2004 CertsBraindumps.com Inc. All rights reserved.