单项选择题
Your network contains one Exchange Server 2010 Service Pack 1 (SP1) Client Access server named Server1. You have a user named User1. You need to limit the size of the attachments that User1 can download by using Windows Mobile 6.5 devices. What should you do first?()
A.Create a new Exchange ActiveSync device access rule.
B.Create new managed content settings.
C.Modify the message size restrictions for User1.
D.Create a new Exchange ActiveSync mailbox policy.
相关考题
-
单项选择题
YouhaveahostedExchangeorganization.AllserversintheorganizationhaveExchangeServer2010ServicePack1(SP1)installed.YouneedtopreventausernamedUser1fromusingOutlookWebApp(OWA)toaccesshismailbox.Whatshouldyoudo?()
A.From the properties of User1’s mailbox, modify the mailbox settings.
B.From the properties of User1’s mailbox, modify the mailbox features.
C.Create a new OWA mailbox policy.
D.Modify the default OWA mailbox policy. -
单项选择题
YouhaveanExchangeorganization.AllserversintheorganizationhaveExchangeServer2010ServicePack1(SP1)installed.AllusershaveWindowsMobile6.5devicesthatconnecttotheorganizationbyusingExchangeActiveSync.AusernamedUser1reportsthatshelostherdeviceandsuccessfullyperformedaremotewipeofthedevice.User1laterreportsthatshelocatedherdevice.User1configuresthedevicetoconnecttoExchangeActiveSyncanddiscoversthattheconnectionfails.YouneedtoensurethatUser1canconnectherdevicebyusingExchangeActiveSync.Whatshouldyoudo?()
A.Instruct User1 to perform a hardware reset on the device.
B.Instruct User1 to use the Exchange Control Panel (ECP) to modify the device list.
C.Run the Set-ActiveSyncDeviceAccessRule cmdlet from the Exchange Management Shell.
D.Instruct User1 to change her user account password. -
单项选择题
YouhaveanExchangeorganization.AllserversintheorganizationhaveExchangeServer2010ServicePackl(SP1)installed.Anexternaluserreportsthatwhenhesendse-mailmessagestotheorganization,theyarenotreceived.Yoususpectthatthee-mailmessageshesendsareincorrectlyidentifiedasspam.Youneedtoidentifywhichanti-spamfilterisblockingthee-mailmessages.Whatshouldyoudo?()
A.Modify the protocol logging level, and then review the protocol logs.
B.Modify the connectivity log settings, and then review the connectivity logs.
C.Modify the message tracking settings, and then review the message tracking logs.
D.Enable pipeline tracing, and then review the trace.
