Which of the following can Mark use to minimize the spam amount that is hitting the Microsoft Exchange server of the company?

Mark works as a Network Administrator fot Blue Well Inc. The company has a Windows-based
network. Mark is facing a series of problems with email spam and identifying theft via phishing
scams. He wants to implement the various security measures and to provide some education
because it is related to the best practices while using email. Which of the following can Mark use to
minimize the spam amount that is hitting the Microsoft Exchange server of the company?

Mark works as a Network Administrator fot Blue Well Inc. The company has a Windows-based
network. Mark is facing a series of problems with email spam and identifying theft via phishing
scams. He wants to implement the various security measures and to provide some education
because it is related to the best practices while using email. Which of the following can Mark use to
minimize the spam amount that is hitting the Microsoft Exchange server of the company?

A.
Enable reverse DNS lookup

B.
Use Read-only Domain Controller

C.
Add Sender Policy Framework

D.
Permit User Account Control

Explanation:
To minimize the amount of spam that is hitting the Microsoft Exchange server, it is required to
enable reverse DNS lookup on the SMTP virtual server. It forces a system to crosscheck the domain
name with a PTR record (IP address associated with the domain name) and if the IP address is not
matched the record associated with that domain name, it will not delivered.
who is acceptable to send email from their domain.
introduced with Microsoft’s Windows Vista and Windows Server 2008 operating systems, with a
more relaxed version also present in Windows 7 and Windows Server 2008 R2. It aims to improve
the security of Microsoft Windows by limiting application software to standard user privileges until
an administrator authorizes an increase or elevation.
read-only partition of the Active Directory database. RODC was developed by Microsoft typically to
be deployed in a branch office environment. RODC is a good option to enhance security by placing it
in a location where physical security is poor. RODC can also be placed at locations having relatively
few users and a poor network bandwidth to the main site. As only the read-only partition of the
Active Directory database is hosted by RODC, a little local IT knowledge is required to maintain it.



Leave a Reply 1

Your email address will not be published. Required fields are marked *


sully

sully

a
need to break the answer into paragraphs spaced out so easier to read