单项选择题X 纠错
A.Configure deleted item retention for all users.
B.Configure Personal Archives for the legal department users.
C.Create two Managed Folder mailbox policies. Use one policy for the legal department users. Use the other policy for all other users.
D.Create two new message classifications. Use one message classification for the e-mails sent to legal department users. Use the other message classification for the e-mails sent to all other users.
你可能喜欢
单项选择题
A.custom MailTips
B.dynamic distribution groups
C.Outlook Protection Rules
D.sharing policies
单项选择题
A.Microsoft System Center Service Manager
B.Microsoft System Center Operations Manager
C.Microsoft System Center Configuration Manager
D.Microsoft System Center Virtual Machine Manager
单项选择题
A.Delegation of Control Wizard
B.Federation Trusts
C.Reliability Monitor
D.Role Based Access Control (RBAC)
单项选择题
A.Implement managed folders.
B.Implement a legal hold for each mailbox.
C.Implement a Retention Policy for each mailbox.
D.Implement an Outlook Protection Rule for each mailbox.
单项选择题
A.a Discovery Management role group
B.a legal hold
C.administrator audit logging
D.Mailbox journaling
单项选择题
A.Create a Data Collector Set.
B.Install and run the Exchange Server User Monitor (ExMon).
C.Export and review the Internet Information Services (IIS) logs.
D.Enable User Agent logging, and then review the agent logs.
单项选择题
A.administrator audit logging
B.circular logging
C.diagnostic logging
D.Windows Security Auditing
单项选择题
A.Enable sender filtering.
B.Enable Sender ID filtering.
C.Configure a custom MailTip.
D.Configure safelist aggregation.
单项选择题
A.managed folder mailbox policies
B.multiple OWA virtual directories
C.OWA segmentation
D.WebReady Document Viewing
多项选择题
A.Require certificate-based authentication for all Internet-facing Client Access servers.
B.Require Windows Integrated Authentication for all Internet-facing Client Access servers.
C.Deploy an Edge Transport server, and then disable Windows Integrated Authentication.
D.Deploy a server that runs Microsoft Internet Security and Acceleration (ISA) Server, and then enableKerberos constrained delegation.