单项选择题
A.administrator audit logging
B.circular logging
C.diagnostic logging
D.Windows Security Auditing
单项选择题 You have an Exchange Server 2010 organization that contains five Hub Transport servers, five Mailboxservers and one Edge Transport server. You need to provide a solution to ensure that users can prevent legitimate inbound e-mail messages frombeing classified as spam. What should you do?()
单项选择题 You have an Exchange Server 2010 organization. Your companys security policy states that users must not be able to encrypt e-mail messages by usingOutlook Web App (OWA). You need to recommend a client access solution that meets the requirements of the security policy. What should you include in the solution?()
多项选择题 You have an Exchange 2010 organization. Your companys security policy states that all connections to Outlook Web App (OWA) must use smartcard authentication. You need to recommend a solution to meet the security policy requirements. Which two possible ways to achieve this goal should you recommend?()