PrepAway - Latest Free Exam Questions & Answers

What should you include in the solution?

You have an Exchange Server 2010 organization. The organization contains a global security group
named Group1. You plan to deploy a monitoring solution for the Exchange servers in your
organization. You need to recommend a solution that allows members of Group1 to monitor the
performance of Exchange Server 2010 servers. Your solution must prevent members of Group1 from
modifying the configurations of the Exchanges Server 2010 organization. What should you include in
the solution?

PrepAway - Latest Free Exam Questions & Answers

A.
Delegation of Control Wizard

B.
Federation Trusts

C.
Reliability Monitor

D.
Role Based Access Control (RBAC)

Explanation:
Role Based Access Control (RBAC) is the new permissions model in Microsoft Exchange Server 2010.
With RBAC, you don’t need to modify and manage access control lists (ACLs), which was done in
Exchange Server 2007. ACLs created several challenges in Exchange 2007, such as modifying ACLs
without causing unintended consequences, maintaining ACL modifications through upgrades, and
troubleshooting problems that occurred due to using ACLs in a nonstandard way. RBAC enables you
to control, at both broad and granular levels, what administrators and end-users can do. RBAC also
enables you to more closely align the roles you assign users and administrators to the actual roles
they hold within your organization. In Exchange 2007, the server permissions model applied only to
the administrators who managed the Exchange 2007 infrastructure. In Exchange 2010, RBAC now
controls both the administrative tasks that can be performed and the extent to which users can now
administer their own mailbox and distribution groups.
RBAC has two primary ways of assigning permissions to users in your organization, depending on
whether the user is an administrator or specialist user, or an end-user: management role groups and
management role assignment policies. Each method associates users with the permissions they need
to perform their jobs. A third, more advanced method, direct user role assignment, can also be used
For further reading see:
http://technet.microsoft.com/en-us/library/dd298183.aspx


Leave a Reply