PrepAway - Latest Free Exam Questions & Answers

Author: admin

What should you do to enable the Client Access server to retrieve the updated OAB from the Mailbox server?

Your Exchange Server 2007 organization contains a Mailbox server and a Client Access server. You are using Web-based distribution for the default offline address book (OAB). The OAB is no longer being updated on the Client Access server. You need to enable the Client Access server to retrieve the updated OAB from the Mailbox server.What should you do?

What should you do to perform an unattended installation of Exchange Server 2007?

Your existing Exchange Server 2003 environment contains the servers shown in the following table.
You are preparing to install Exchange Server 2007. You install the Exchange 2007 Edge Transport server role on a server named Server3. You want to install Exchange 2007 Mailbox, Client Access, and Hub Transport server roles on a server named Server4.contoso.com. You need to perform an unattended installation of Exchange Server 2007.
What should you do?

What should you do to allow e-mail from internal and Internet users to be sent to the SMTP address…

All users can receive e-mail that is sent directly to them from the Internet. A distribution group named WebResponse is configured to accept e-mail from all users. All corporate users can send messages to the WebResponse distribution group by using Microsoft Office Outlook. All messages that are sent to the distribution group from the Internet are rejected. You need to allow e-mail from internal and Internet users to be sent to the SMTP address of the WebResponse distribution group.
What should you do?

What should you do?

You are the security administrator for your company. The network consists of two segments named Segment A and Segment B. The client computers on the network run Windows XP Professional. The servers run Windows Server 2003.
Segment A contains a single server named Server1. Segment B contains all other computers, including a server named Server2. The company’s written security policy states that Segment B must not be connected to the lnternet. Segment A is allowed to connect to the lnternet. There is no network connection between Segment A and Segment B. You can copy files from Segment A to Segment B only by using a CD-ROM to transport the files between the two segments. The network topology is displayed in the exhibit. (Click the Exhibit button.)
You are planning a patch management infrastructure. On Segment B, you install Software Update Services (SUS) on Server2. You configure Automatic Updates on all computers in Segment B to use http://Server2 and to install security patches.
You need to ensure that all computers in Segment B automatically install security patches. What should you do?

What should you do?

You are a security administrator for your company. The network consists of a single Active Directory domain. Four Windows Server 2003 computers run IIS and serve as Web servers on the lnternet.
The company’s written security policy states that computers that are accessible from the lnternet must be hardened against attacks. The procedure for hardening computers includes disabling unnecessary services. You evaluate which services are necessary by using the following information about the Web servers: Customers and business partners access Web content on the Web servers after they authenticate by using a user name and password. To access certain parts of the site, some of these connections use the SSL protocol. All software is installed locally on the Web servers by using removable media, except for service packs and security patches. The Web servers automatically download service packs and security patches from an internal computer that runs Software Update Services (SUS). The Web servers are not functioning as any other roles.
You need to create a security template for the Web servers that disables unnecessary services and allows necessary services to operate.exhibit What should you do? To answer, drag the appropriate service startup types to the correct locations in the work area.
Drag and drop question. Drag the items to the proper locations.

What should you do?

You are a security administrator for your company. The network consists of a single Active Directory domain. All servers run Windows Server 2003.
You plan to deploy remote access to the network for users that work from home. The company’s written security policy states the following remote access requirements:
Users are allowed to use remote access during the day only.
Enterprise Admins are never allowed to use remote access.
Domain Admins are always allowed to use remote access.
A user who is a member of both the Enterprise Admins group and the Domain Admins group is not allowed to use remote access.
You configure and enable Routing and Remote Access on a member server named Server1. You delete the predefined remote access policies. The remote access permission for all user accounts in the domain is set to use remote access policies. You need to ensure that the remote access policies on Server1 comply with the written security policy. exhibit What should you do?
To answer, drag the remote access policy that should appear first in the remote access policy list to the First Policy box. Continue dragging the appropriate remote access policies to the corresponding numbered boxes until you list all required policies in the correct order. You might not need to use all numbered boxes.
Drag and drop question. Drag the items to the proper locations.