Which of the following solutions is the best recommendation?

You are designing an Exchange organization for a company named Contoso, Ltd. All servers in the
organization will have Exchange Server 2010 Service Pack 1 (SP1) installed. Users connect to their
mailboxes by using either Microsoft Office Outlook 2003, Microsoft Office Outlook 2007, or
Microsoft Outlook 2010. You need to recommend a solution that protects confidential e-mail
messages against eavesdropping and tampering. The e-mail messages must be protected while they
are in transit and once they are stored. Which of the following solutions is the best
recommendation? (More than one answer choice may achieve the goal. Select the BEST answer.)

You are designing an Exchange organization for a company named Contoso, Ltd. All servers in the
organization will have Exchange Server 2010 Service Pack 1 (SP1) installed. Users connect to their
mailboxes by using either Microsoft Office Outlook 2003, Microsoft Office Outlook 2007, or
Microsoft Outlook 2010. You need to recommend a solution that protects confidential e-mail
messages against eavesdropping and tampering. The e-mail messages must be protected while they
are in transit and once they are stored. Which of the following solutions is the best
recommendation? (More than one answer choice may achieve the goal. Select the BEST answer.)

A.
Deploy Active Directory Rights Management Services (AD RMS), and then create transport rules
based on message classifications.

B.
Deploy certificates from a trusted root certification authority (CA) on all transport servers, and
then configure Domain Security.
C Issue X.509 digital certificates to all users, and then instruct the users to protect their confidential
e-mail messages by using S/MIME.

D.
Require RPC encryption for all mailbox databases, and then instruct all Outlook 2003 users to
connect by using Outlook Web App (OWA) only.

E.
Deploy Active Directory Rights Management Services (AD RMS), and then instruct users to protect
their confidential e-mail messages by using Outlook Protection Rules.



Leave a Reply 0

Your email address will not be published. Required fields are marked *