单项选择题
You have an Exchange Server 2010 organization.
The organization contains a global security group named Group1.
You plan to deploy a monitoring solution for the Exchange servers in your organization.
You need to recommend a solution that allows members of Group1 to monitor the performance of Exchange Server 2010 servers.
Your solution must prevent members of Group1 from modifying the configurations of the ExchangesServer 2010 organization.
What should you include in the solution?()
A.Delegation of Control Wizard
B.Federation Trusts
C.Reliability Monitor
D.Role Based Access Control (RBAC)
相关考题
-
单项选择题
You have an Exchange Server 2010 organization. You need to recommend a solution that prevents the permanent deletion of e-mail messages from the mailboxes of employee who have been dismissed from the company. What should you recommend?()
A.Implement managed folders.
B.Implement a legal hold for each mailbox.
C.Implement a Retention Policy for each mailbox.
D.Implement an Outlook Protection Rule for each mailbox. -
单项选择题
You have an Exchange Server 2010 organization. You have a global security group named Legal that contains all the members of your companys legaldepartment. The companys security policy states that the Legal group must be able to search all mailboxes for e-mailmessages that contain specific keywords. You need to recommend a solution for the organization that complies with the security policy. What should you include in the solution?()
A.a Discovery Management role group
B.a legal hold
C.administrator audit logging
D.Mailbox journaling -
单项选择题
You have an Exchange Server 2010 organization that contains Windows Mobile 5.0 devices. Your company plans to replace all mobile devices with Windows Mobile 6.5 devices. You need to identify which users accessed their mailboxes by using Windows Mobile 5.0 devices in thepast month. What should you do?()
A.Create a Data Collector Set.
B.Install and run the Exchange Server User Monitor (ExMon).
C.Export and review the Internet Information Services (IIS) logs.
D.Enable User Agent logging, and then review the agent logs.
