单项选择题
Your network contains two Exchange Server 2010 Edge Transport servers and five Exchange Server2010 Hub Transport servers.
All e-mail sent from your organization to the Internet is transferred by the Edge Transport servers. You need to recommend a security solution for the organization to meet the following requirements:
.Ensure that users can send encrypted messages to any other organization on the Internet
.Ensure that all Exchange-related communication between Hub Transport servers and Edge Transport servers is encrypted
What should you recommend?()
A.Deploy IPsec.
B.Deploy SMTP over SSL.
C.Implement Domain Security.
D.Implement Secure/Multipurpose Internet Mail Extensions (S/MIME).
相关考题
-
单项选择题
You have an Exchange Server 2010 organization. You plan to delegate administration of the organization. You have a group named Technicians that contains all the level-two technicians in the organization. You need to ensure that the Technicians group can manage the properties of all the mailbox databases. The solution must minimize the number of permissions assigned to the Technicians group. Which management role should you assign to the Technicians group?()
A.Help Desk
B.Organization Management
C.Recipient Management
D.Server Management -
单项选择题
You have an Exchange Server 2010 organization. You plan to provide users with the ability to schedule meetings. You need to recommend a scheduling solution that meets the following requirements: .Ensures that users can schedule conference rooms for meetings .Ensures that conference room owners can change the settings of meetings scheduled by users What should you include in the solution?()
A.Managed Folder Assistant
B.public folders
C.resource mailboxes
D.room list distribution groups -
单项选择题
You have an Exchange Server 2010 organization that contains multiple Hub Transport servers. You need to recommend a message hygiene solution to meet the following requirements:.Block servers that are known to send spam.Minimize administrative effort What should you recommend?()
A.an IP Block list
B.IP Block list providers
C.recipient filtering
D.sender filtering
