Which two actions should you perform? (Each correct answer presents part of the solution

You are a messaging professional. Your company uses a Microsoft Exchange
Server 2007 messaging system. The company has eight Microsoft Active Directory sites in two regions,
East and West.

You plan to implement a new e-mail application on your Exchange Server 2007 Hub Transport servers in
each site. The new application queries a database on a remote Microsoft Windows Server 2003 server by
using Lightweight Directory Access Protocol (LDAP).

The company security policy has the following requirements on the usage of Public Key Infrastructure
(PKI):

PKI-based encryption must be used for all application data transmissions in the West region.
PKI-based encryption must not be used in the East region due to conflicts with mission critical
applications.

You need to ensure that maximum confidentiality is provided to all data that is transmitted by the
application.

Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)

You are a messaging professional. Your company uses a Microsoft Exchange
Server 2007 messaging system. The company has eight Microsoft Active Directory sites in two regions,
East and West.

You plan to implement a new e-mail application on your Exchange Server 2007 Hub Transport servers in
each site. The new application queries a database on a remote Microsoft Windows Server 2003 server by
using Lightweight Directory Access Protocol (LDAP).

The company security policy has the following requirements on the usage of Public Key Infrastructure
(PKI):

PKI-based encryption must be used for all application data transmissions in the West region.
PKI-based encryption must not be used in the East region due to conflicts with mission critical
applications.

You need to ensure that maximum confidentiality is provided to all data that is transmitted by the
application.

Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)

A.
Configure Identity Based Encryption (IBE) as a hosted service in the West region.

B.
Allow TCP and UDP ports 3389 through the firewalls in the West region.

C.
Allow TCP port 1701 through the firewalls in the West region.

D.
Configure Identity Based Encryption (IBE) as a hosted service in the East region.

E.
Allow TCP and UDP ports 443 through the firewalls in the East region.

F.
Allow TCP port 1701 through the firewalls in the East region.



Leave a Reply 0

Your email address will not be published. Required fields are marked *