单选题Some users report they cannot receive messages from some external senders.You suspect that there is some anti-spam activity blocking those messages.You need to identify what is blocking the messages.You will activate and review the logs of one of the f

题目
单选题
Some users report they cannot receive messages from some external senders.You suspect that there is some anti-spam activity blocking those messages.You need to identify what is blocking the messages.You will activate and review the logs of one of the following:()
A

Protocol logging

B

Connectivity logs

C

Message tracking

D

Pipeline tracing


相似考题
参考答案和解析
正确答案: C
解析: 暂无解析
更多“Some users report they cannot receive messages from some ext”相关问题
  • 第1题:

    You have an Exchange Server 2010 organization named contoso.com that contains a mail-enabled group named Group1. Users from outside the organization report that e-mail messages sent to group1@contoso.com generate a non-delivery report (NDR).You need to ensure that users outside the organization can successfully send e-mail to group1 @ contoso.com. What should you modify?()

    • A、the authentication settings for the Client Receive connector
    • B、the message delivery restrictions for Group1
    • C、the moderation settings for Group1
    • D、the remote IP address range for the Client Receive connector

    正确答案:B

  • 第2题:

    You have an Exchange Server 2010 server that contains a single mailbox database.All users run Microsoft Office Outlook and Outlook Web App.You discover that users cannot restore e-mail messages from the Recover Deleted Items folder.You need to ensure that users can restore e-mail messages from the Recover Deleted Items folder.What should you do?()

    • A、From the Exchange Management Console (EMC), modify the properties of the mailbox database
    • B、From the Exchange Management Console (EMC), modify the properties of the Mailbox server object
    • C、From the Exchange Management Shell, create a management role and then assign the role to all users
    • D、From the Exchange Management Shell, create a retention policy and then assign the policy to all users

    正确答案:A

  • 第3题:

    TestKing.com uses SQL Server 2005. Users report that report execution is slow. You investigate and discover that some queries do not use optimal execution plans. You also notice that some optimizer statistics are missing and others are out of date.  You need to correct the problem so that reports execute more quickly. Which two Transact-SQL statements should you use?()

    • A、DBCC CHECKTABLE
    • B、ALTER INDEX REORGANIZE
    • C、UPDATE STATISTICS
    • D、CREATE STATISTICS
    • E、DBCC SHOW STATISTICS
    • F、DBCC UPDATEUSAGE

    正确答案:C,D

  • 第4题:

    Your network contains an Active Directory Rights Management Services (AD RMS) cluster.   You have several custom policy templates. The custom policy templates are updated frequently.   Some users report that it takes as many as 30 days to receive the updated policy templates.   You need to ensure that users receive the updated custom policy templates within seven days.   What should you do()

    • A、Modify the registry on the AD RMS servers.
    • B、Modify the registry on the users   computers.
    • C、Change the schedule of the AD RMS Rights Policy Template Management (Manual) scheduled task.
    • D、Change the schedule of the AD RMS Rights Policy Template Management (Automated) scheduled  task.

    正确答案:B

  • 第5题:

    You have an Exchange Server 2010 organization named Contoso.com that contains a mail-enabled Domain Local group named Group1.Users from outside the organization report that all e-mail messages sent to group1@contoso.com generate a non-delivery-report (NDR).You need to ensure that users from outside the organization send e-mail to group1@contoso.com. What should you modify for group1?()

    • A、Advanced settings
    • B、Group scope
    • C、Group type
    • D、The mail flow settings

    正确答案:D

  • 第6题:

    You have an Exchange Server 2010 organization named Contoso, Ltd.The organization contains an Edge Transport server.Users from a company named Fabrikam, Inc.send messages over the Internet by using the @fabrikam.com e-mail address suffix.You need to ensure that messages sent from Fabrikam users to Contoso users have the @contoso.com e-mail address suffix in the source address. What should you create?()

    • A、a Receive connector
    • B、an accepted domain
    • C、an address rewrite entry
    • D、an e-mail address policy

    正确答案:C

  • 第7题:

    Your company uses SQL Server 2005. Users report that report execution is slow. You investigate and discover that some queries do not use optimal execution plans. You also notice that some optimizer statistics are missing and others are out of date. You need to correct the problem so that reports execute more quickly. Which two Transact-SQL statements should you use?()

    • A、 DBCC CHECKTABLE 
    • B、 ALTER INDEX REORGANIZE 
    • C、 UPDATE STATISTICS 
    • D、 CREATE STATISTICS 
    • E、 DBCC SHOW_STATISTICS 
    • F、 DBCC UPDATEUSAGE

    正确答案:C,D

  • 第8题:

    单选题
    You have an Exchange Server 2010 organization named Contoso, Ltd.The organization contains an Edge Transport server.Users from a company named Fabrikam, Inc.send messages over the Internet by using the @fabrikam.com e-mail address suffix.You need to ensure that messages sent from Fabrikam users to Contoso users have the @contoso.com e-mail address suffix in the source address. What should you create?()
    A

    a Receive connector

    B

    an accepted domain

    C

    an address rewrite entry

    D

    an e-mail address policy


    正确答案: C
    解析: 暂无解析

  • 第9题:

    多选题
    TestKing.com uses SQL Server 2005. Users report that report execution is slow. You investigate and discover that some queries do not use optimal execution plans. You also notice that some optimizer statistics are missing and others are out of date.  You need to correct the problem so that reports execute more quickly. Which two Transact-SQL statements should you use?()
    A

    DBCC CHECKTABLE

    B

    ALTER INDEX REORGANIZE

    C

    UPDATE STATISTICS

    D

    CREATE STATISTICS

    E

    DBCC SHOW STATISTICS

    F

    DBCC UPDATEUSAGE


    正确答案: B,A
    解析: 暂无解析

  • 第10题:

    单选题
    Some users report they cannot receive messages from some external senders.You suspect that there is some anti-spam activity blocking those messages.You need to identify what is blocking the messages.You will activate and review the logs of one of the following:()
    A

    Protocol logging

    B

    Connectivity logs

    C

    Message tracking

    D

    Pipeline tracing


    正确答案: D
    解析: 暂无解析

  • 第11题:

    单选题
    You are using Windows 2000 Professional on your desktop computer. You are working on the company’s financial report and you want other users on the network to able to modify your documents for the report. You want users to share the financial report folder on the network. Because the network contains confidential information you want to prevent users from the enabling off line access for the network share that contains the financial report. What should you do?()
    A

    Use Windows Explorer to receive the offline files

    B

    Using the Windows Explorer, disable the cache for the reports on the network share

    C

    Use the Windows NT explorer to grant the special access for the reports on the network  share

    D

    Use the synchronization manager to configure synchronization not to occur when users are  connected to the LAN connection. 


    正确答案: A
    解析: 暂无解析

  • 第12题:

    单选题
    You have an Exchange Server 2010 organization named contoso.com that contains a mail-enabled group named Group1. Users from outside the organization report that e-mail messages sent to group1@contoso.com generate a non-delivery report (NDR).You need to ensure that users outside the organization can successfully send e-mail to group1 @ contoso.com. What should you modify?()
    A

    the authentication settings for the Client Receive connector

    B

    the message delivery restrictions for Group1

    C

    the moderation settings for Group1

    D

    the remote IP address range for the Client Receive connector


    正确答案: C
    解析: 暂无解析

  • 第13题:

    You have an Exchange Server 2010 organization.You acquire a new Internet domain name.Users report that they cannot receive e-mail sent to the new domain name.You verify that all users have the new domain name configured as an e-mail address suffix.You need to ensure that users can receive e-mail sent from the Internet to the new domain name. What should you create?()

    • A、an Authoritative Accepted Domain
    • B、an External Relay Accepted Domain
    • C、a new Receive connector
    • D、a remote domain

    正确答案:A

  • 第14题:

    You have an Exchange Server 2010 organization named contoso.com.All users configure internal and external Out Of Office messages.You need to ensure that internal Out Of Office messages are sent to senders from the fabrikam.com domain. What should you create and configure?()

    • A、a new accepted domain
    • B、a new Receive connector
    • C、a new remote domain
    • D、a new Send connector

    正确答案:C

  • 第15题:

    You have a print server that runs Windows Server 2003 Service Pack 2 (SP2). Users report that print jobs are not printing. Users also report that they do not receive any error messages. Younotice a large number of jobs in the print queue. You attempt to delete some jobs from the queue and notice that the jobs remain in the queue. You need to ensure that users can print successfully. What should you do? ()

    • A、Restart the Print Spooler service.
    • B、Pause the printer, and then restart the printer.
    • C、Take ownership of the printer, and then delete the print jobs.
    • D、Assign the Manage Documents permission to the users connected to the printer.

    正确答案:A

  • 第16题:

    Your network contains a public computer that runs Windows 7. Multiple users log on to the computer byusing a local user account named User1. Users report that they can log on to some secure Web sites byusing credentials that were saved by other users. You need to prevent forms-based credentials from beingsaved on the computer.  What should you do?()

    • A、Remove all generic credentials from Windows Vault.
    • B、Remove all Windows credentials from Windows Vault.
    • C、Modify the Windows Internet Explorer certificates settings.
    • D、Modify the Windows Internet Explorer AutoComplete settings.

    正确答案:D

  • 第17题:

    You install a new Exchange Server 2010 organization that contains a single server named erver1.Users report that they receive a large number of unsolicited commercial email (UCE) messages.You need to reduce the amount of UCE messages that users in the organization receive.What should you do?()

    • A、Create a journal rule and then create an Outlook Protection Rule
    • B、Create a Transport Protection Rule and then create a journal rule
    • C、Run the AntispamCommon.ps1 script and then create a Transport Protection Rule
    • D、Run the Install-AntispamAgents.ps1 script and then configure all transport agents

    正确答案:D

  • 第18题:

    You install an Exchange Server 2010 Hub Transport server named Hub1.You need to ensure that Hub1 can receive e-mail messages sent from Internet hosts.What should you do?()

    • A、Enable the Anonymous users permission group for the Client Hub1 Receive connector.
    • B、Enable the Anonymous users permission group for the Default Hub1 Receive connector.
    • C、Create a Receive connector and set the intended use to Client.Modify the port for the connector.
    • D、Create a Receive connector and set the intended use to Custom.Modify the remote IP addresses range for the connector.

    正确答案:B

  • 第19题:

    You have an Exchange organization named Contoso, Ltd.All servers in the organization have Exchange Server 2010 Service Pack 1 (SP1) installed.The organization contains an Edge Transport server.  Users from a company named Fabrikam, Inc.send e-mail messages over the Internet by using the fabnkam.come-mail address suffix. Contoso acquires Fabrikam. You need to ensure that messages sent from Fabrikam users to Contoso users have the contoso.com e-mail address suffix in their source address.  What should you create?()

    • A、an accepted domain
    • B、an address rewrite entry
    • C、an e-mail address policy
    • D、a Receive connector

    正确答案:B

  • 第20题:

    单选题
    You have an Exchange Server 2010 organization named Contoso.com that contains a mail-enabled Domain Local group named Group1.Users from outside the organization report that all e-mail messages sent to group1@contoso.com generate a non-delivery-report (NDR).You need to ensure that users from outside the organization send e-mail to group1@contoso.com. What should you modify for group1?()
    A

    Advanced settings

    B

    Group scope

    C

    Group type

    D

    The mail flow settings


    正确答案: A
    解析: 暂无解析

  • 第21题:

    单选题
    You need to include a disclaimer to all sent messages in your organization. Some of the users require message encryption.How do you make sure that disclaimer can be included in encrypted messages?()
    A

    Instruct the users to use IRM encryption method only

    B

    Instruct the users to use S/MIME encryption method only

    C

    Using command New-ExchangeCertificate cmdlet

    D

    Using the Set-ExchangeServer cmdlet


    正确答案: C
    解析: 暂无解析

  • 第22题:

    单选题
    Ten users at your office run an accounting application on their Windows NT Workstation 4.0 computers. The application stores its data in a shared network folder named Accdata on a Windows 2000 Server computer named Server1. You upgrade all 10 computers to Windows 2000 Professional and verify that all applications are compatible with Windows 2000. After the upgrade, some users report that they are receiving intermittent data-corruption error messages. They are also receiving data file-version mismatch error messages. When these errors occur, your only method of recovery is to restore the entire contents of the Accdata folder from a known good backup copy.  You need to prevent these errors from occurring in the future. What should you do? ()
    A

    Configure Accdata folder to allow a maximum of one user.

    B

    Configure the Accdata folder to disable client caching.

    C

    Create a group policy that removes the Bypass Traverse Checking user right on server1.

    D

    Create a group policy that increases the amount of idle time required before a session   disconnects on server1.


    正确答案: B
    解析: 暂无解析

  • 第23题:

    单选题
    You have an Exchange Server 2010 organization.You acquire a new Internet domain name.Users report that they cannot receive e-mail sent to the new domain name.You verify that all users have the new domain name configured as an e-mail address suffix.You need to ensure that users can receive e-mail sent from the Internet to the new domain name. What should you create?()
    A

    an Authoritative Accepted Domain

    B

    an External Relay Accepted Domain

    C

    a new Receive connector

    D

    a remote domain


    正确答案: B
    解析: 暂无解析

  • 第24题:

    单选题
    Why do some frogs change the pitch of its calls?
    A

    To be different from others.

    B

    To attract a female frog.

    C

    To tend out messages.

    D

    To go against traffic noises.


    正确答案: C
    解析:
    由第三段“…further away from the traffic noise and this increases the distance over which it can be for heard,”得知青蛙改变音高是为了避免噪音干扰。