Vous êtes sur la page 1sur 2

IT260 Exam II Review Sheet 

Donald Riley
NAME: ____________________________ 

1. E-mail is typically created and sent using an e-mail client program, such as Microsoft
Outlook or Eudora, called a __________.
MDA

2. Domain names that contain the name of the host computer are called ________________.
FQDN

3. ________________
ESMTP is an improved version of the standard e-mail protocol that provides
greater support for embedded graphics and attachments in e-mail.

4. Which Exchange Server role allows users to access e-mail, voice mail, and fax messages
from a MAPI client, OWA, smart phone, or telephone? 60%

5. The two forest-wide FSMO roles that must be present on a single DC in the forest are the
Domain Naming Master and the ____BB______.
Schema Master
 

6. GPOs are applied to user and computer objects based on the link in the following order:
________>
Site Domain> Parent OUs> Child OUs.

7. Installing the Exchange role on multifunction servers is a ________


Poor practice.

8. An Exchange server that hosts the Edge, Hub, CAS, and Mailbox server roles should have at
least ___GB
4 of RAM.

9. To install Exchange Server 2007 from the installation media, you can run the setup.exe for
graphical mode or the setup.com for _________
unattended mode.

10. Which administrative role grants full permission to all components of Exchange as well as
Exchange-related objects and information in AD?

11. Unlike other Exchange servers within your Exchange Organization, servers that host the
______ role cannot communicate directly with Active Directory.

12. To relay e-mail within your organization and across the Internet, your Hub and Edge role
servers must have __________ that specify how to send and receive e-mail.

13. Which user group represents users within an organization that have both a user account in
AD and a mailbox on an Exchange server?

14. If you create __________ groups within your organization to represent even the smallest
groups of users who share the same function, location, or job role, you will have great
flexibility when sending e-mail.
15. Instead of using public folders, Outlook 2007 and Entourage 2008 MAPI clients use the
__________________ within Exchange 2007 to obtain offline address books, schedule
calendar appointments, and obtain configuration information.

16. Although mailbox users connect to a single public folder database by default, they will be
able to see and access all of the public folders within the Exchange organization using
___________.

17. Which protocol is designed to download e-mail from an e-mail server to a client for viewing?

18. POP3 uses TCP port 110 while IMAP uses TCP port ____ by default.

19. Some viruses spread via e-mail. When the file or file attachment that contains this type of
virus is opened, the virus obtains a list of any e-mail addresses it can find within your e-mail
client program and sends e-mail to those recipients on your behalf along with a copy of the
virus. What is this type of virus called? BBBBBBBBBBBBBBBBBBBBBBB

20. Network-based firewalls can restrict traffic based on source and destination IP address,
network, and _________ address.

21. _____________ can


Volume Shadow Copy be used to make Point-In-Time backups from files that are open, locked,
Service
or in use.

22. A ____BBB_______________
Recovery Storage Group can be used for mailbox restore operations and cannot be accessed
by e-mail clients nor can it participate in policies, replication, or clustering.

23. The ___________________,


Protocol log found on the Hub role servers, contains all of the SMTP
communications that occurred on the send and receive connectors of those servers.

24. Which parameter should be used to perform an offline defrag with eseutil.exe?

25. Mailbox databases use the ________


EDB file name extension.
 

Vous aimerez peut-être aussi