PrepAway - Latest Free Exam Questions & Answers

Author: liti

You have an Exchange organization named nwtraders.com. All servers in the organization have Exchange Server 20

You have an Exchange organization named nwtraders.com. All servers in the organization have Exchange Server 2010 SP1 installed.

Your company acquires another company named contoso Ltd.

You plan to create new mailboxes for each user from contoso.

You need to ensure that each new mailbox can receive e-mail messages sent to contoso.com.

Which two objects should you create. (Choose two).

What should you modify for Group1?

You have an Exchange organization named contoso.com. All servers in the organisation have Exchange Server 2010 SP1 installed. The organization contains a mail-enabled domain local group name Group1.

Users from outside the organisation report that all e-mail messages sent to group1@contoso.com generate a non-delivery report (NDR).

You need to ensure that users from outside the organization can successfully send e-mail to group1@contoso.com.

What should you modify for Group1?

You need to prevent all users from posting content to folder1 by sending e-mail

You have an Exchange Server 2010 SP1 organization named contoso.com.

All users have the @contoso.com e-mail address suffix.

You discover that both anonymous and authenticated users can post content to a public folder named folder1 by sending e-mail messages to folder1@contoso.com.

You need to prevent all users from posting content to folder1 by sending e-mail.

So what’s your next action?

You work in an international company which is named TXTWIN. And you’re in charge of the company network and use Microsoft BizTalk Server 2006 R2.
You business partner send messages to you and each of them has their own custom message format to use. In order to use a standard message format to process all messages, an XML schema is created for each custom message format. The schema displays the standard message format. So what’s your next action?

What should you do?

You are a network consultant.
You have a network that contains 50 Microsoft Windows XP Professional client computers with similar hardware configuration and software configuration. There is a single Microsoft Windows Small Business Server 2003 computer that hosts e-mail function, file sharing, and a proprietary database for an accounting software package. The accounting group reports poor response of the accounting software, which stores data on the server.

You diagnose that the accounting database is consuming excessive resources from other services on the Microsoft Windows Small Business Server 2003 computer. You purchase a new computer system to offload some of the server load.

You need to add a new member server to accommodate the company’s needs with the least amount of administrative effort.

What should you do?

So what should you do to catch the error when it happens in the pipeline processing?

You work in an international company which is named TXTWIN. And you’re in charge of the company network and use Microsoft BizTalk Server 2006 R2 developer.
You create an orchestration. The orchestration validates documents and aggregates them into a single message by using pipeline processing. The message will be relayed to a Web service. An error occurs when messages enter the pipeline and the orchestration is activated. So what should you do to catch the error when it happens in the pipeline processing?

So what actions should you perform?

You work in an international company which is named TXTWIN. And you’re in charge of the company network and use Microsoft BizTalk Server 2006 R2.
You develop an orchestration. The orchestration use direct binding to drop a message on the MessageBox database. The message is based on a schema named Request.xsd. You have to create a send port and an orchestration. When Request message arrives on the MessageBox database, the send port and an orchestration will subscribe to them. So what actions should you perform?

What should you do?

You are the network administrator for a small office.

The office has a single-server domain that runs Microsoft Windows Small Business Server 2003, Premium Edition with Microsoft Internet Security and Acceleration (ISA) Server 2000 enabled. There are 25 Windows 2000 Professional desktop computers

Twenty of the desktop computers and the server do not have current Windows critical and security updates installed. The other five desktop computers run antivirus programs, all of which have expired definitions. The ISA Firewall Client is not enabled on any of the desktop computers. The latest updates for ISA Server are not installed on the server

You need to implement a solution that eliminates the two biggest security risks to the network

What should you do? (Each correct answer presents part of the solution. Choose two.)


Page 2 of 3912345...102030...Last »