Advanced Solutions of Microsoft Exchange Server 2013 v22.0 (70-342)

Page:    1 / 13   
Total 183 questions

You have an Exchange Server 2013 organization.
You need to ensure that a user named User1 can prevent the deletion of every email message that contains a specific word from all of the mailboxes. The solution must minimize the number of permissions assigned to User1.
What should you do?

  • A. Add User1 to the Records Management management role group. Instruct User1 to run the New-ManagedContentSettings cmdlet.
  • B. Add User1 to the Records Management management role group. Instruct User1 to run the New-MailboxSearch cmdlet.
  • C. Add User1 to the Discovery Management management role group. Instruct User1 to run the New-ManagedContentSettings cmdlet.
  • D. Add User1 to the Discovery Management management role group. Instruct User1 to run the New-MailboxSearch cmdlet.


Answer : D

Explanation:
* If you want users to be able to use Microsoft Exchange Server 2013 In-Place eDiscovery, you must first authorize them by adding them to the Discovery Management role group.
Members of the Discovery Management role group have Full Access mailbox permissions for the Discovery mailbox that's created by Exchange Setup.
* The New-MailboxSearch cmdlet creates an In-Place eDiscovery search or an In-Place
Hold. Unless specified, mailboxes on all Exchange 2013 servers in an organization are searched. You can stop, start, modify, or remove the search.

You have an Exchange Server 2013 organization that has mailbox audit logging enabled for all users.
You deploy two third-party applications named App1 and App2. Both applications access a mailbox named Mailbox1.
App1 uses a mail-enabled user account named App1_user. App2 uses a mailbox-enabled user account named App2_user.
You need to prevent the audit logs from containing entries that relate to App2.
Which command should you run? (To answer, select the appropriate options in the answer area.)





Answer :

Explanation:


Note:
* Set-MailboxAuditBypassAssociation
Use the Set-MailboxAuditBypassAssociation cmdlet to configure mailbox audit logging bypass for user or computer accounts such as service accounts for applications that access mailboxes frequently.
When you configure a user or computer account to bypass mailbox audit logging, access or actions taken by the user or computer account to any mailbox isn't logged. By bypassing trusted user or computer accounts that need to access mailboxes frequently, you can reduce the noise in mailbox audit logs.
/ AuditBypassEnabled
The AuditBypassEnabled parameter specifies whether audit bypass is enabled for the user or computer. Valid values include the following:
$true. Enables mailbox audit logging bypass
$false. Disables mailbox audit logging bypass

You have an Exchange Server 2013 organization that contains four servers named EX1,
EX2, EX3, and EX4. All of the servers run Windows Server 2012 R2 and are members of a database availability group (DAG) named DAG1. All of the mailbox databases replicate to all of the Mailbox servers.
From EX1, you run the Get-ClusterNode | fl cluster, state,*name*,*weight* command and you receive the following output.


Use the drop-down menus to select the answer choice that completes each statement.



Answer :

Explanation:
* up to one more node
Ex4 is already down. If Ex3 fails as well, then there would still be Ex1 and Ex2. The Dag1 would still be operational if either of these nodes fail.
Important:
The advantage of Dynamic Quorum, is that it is now possible for a cluster to run even if the number of nodes remaining in the cluster is less than 50%! By dynamically adjusting the quorum majority requirement, the cluster can sustain sequential node shutdowns down to a single node and still keep running.
* A DynamicWeight value of 1 indicates the node has a vote, and a value of 0 indicates the node does not have a vote.
Note: Windows Server 2012 introduced a new model called Failover Clustering Dynamic
Quorum, which we can use with Exchange. When using Dynamic Quorum, the cluster dynamically manages the vote assignment to nodes based on the state of each node.
When a node shuts down or crashes, it loses its quorum vote. When a node successfully re-joins the cluster, it regains its quorum vote. By dynamically adjusting the assignment of quorum votes, the cluster can increase or decrease the number of quorum votes that are required to keep it running. This enables the cluster to maintain availability during sequential node failures or shutdowns.
* Both Ex1 and Ex2 go offline
The idea behind DQ (Dynamic Quorum) is that, by adjusting the assignment of quorum votes and dynamically increasing or decreasing the number of quorum votes required to keep running, the cluster can sustain sequential node shutdowns (or failures) all the way down to a single node (referred to as a last man standing).

You have an Exchange Server 2013 organization.
You successfully migrate the public folders from a previous version of Exchange Server.
You discover that one of the public folder mailboxes almost reached its quota size.
You need to move some of the public folders in the public folder mailbox to another public folder mailbox.
What should you run?

  • A. Merge-PublicFolderMailbox.ps1
  • B. Split-PublicFolderMailbox.ps1
  • C. Set-MailPublicFolder
  • D. Set-PublicFolder


Answer : B

Explanation:

Split-PublicFolderMailbox.ps1 -
Splits the given public folder mailbox based on the size of the folder
Note: If the content of a public folder mailbox begins to exceed your mailbox quotas, you may need to move public folders to a different public folder mailbox. There are a couple ways to do this. To move one or more public folders that dont contain subfolders, you can use the PublicFolderMoveRequest cmdlets.

Move a single public folder -
This example starts the move request for the public folder \CustomerEnagagements from the public folder mailbox DeveloperReports to DeveloperReports01
New-PublicFolderMoveRequest -Folders \DeveloperReports\CustomerEngagements -
TargetMailbox DeveloperReports01
Incorrect:
Not A: Merge-PublicFolderMailbox.ps1
Merges the contents of the given public folder mailbox with the targetpublic folder mailbox.
Not C: Use the Set-MailPublicFolder cmdlet to configure the mail-related settings of mail- enabled public folders.
Not D: Use the Set-PublicFolder cmdlet to set the attributes of public folders.
Reference: https://justaucguy.wordpress.com/2012/10/18/exchange-server-2013-preview- scripts/
Reference: Move a public folder to a different public folder mailbox https://technet.microsoft.com/en-us/library/jj906435(v=exchg.150).aspx

You have an Exchange Server 2013 organization.
A user named User1 has a mailbox that is enabled for Unified Messaging (UM). User1 has nine call answering rules.
When User1 attempts to create a new call answering rule, the user receives an error message.
You need to identify what prevents User1 from creating a call answering rule.
What should you identify?

  • A. The mailbox of User1 has the CallAnsweringRulesEnabled parameter set to $false
  • B. The UM mailbox policy of User1 has the AllowCallAnsweringRules parameter set to $false.
  • C. User1 exceeds the Inbox rules storage quota.
  • D. User1 has the maximum number of call answering rules allowed.


Answer : D

Explanation:
A total of nine call answering rules can be set up for each UM-enabled mailbox.

Your company has an Exchange Server 2013 organization named Contoso.
A partner company has an Exchange Server 2013 organization named Fabrikam. Neither company has any trusts between their forests.
Users from both organizations access their mailbox from the Internet by using Outlook
Anywhere.
You need to ensure that the users from both organizations can share free/busy information.
Which two cmdlets should you run? (Each correct answer presents part of the solution.
Choose two.)

  • A. New-AcceptedDomain
  • B. Add-AvailabilityAddressSpace
  • C. Set-AvailabilityConfig
  • D. New-SharingPolicy
  • E. Add-ADPermission


Answer : B,D

Explanation:
B: Use the Add-AvailabilityAddressSpace cmdlet to define the access method and associated credentials used to exchange free/busy data across forests.
D: Use the New-SharingPolicy cmdlet to create a sharing policy to regulate how users inside your organization can share calendar and contact information with users outside the organization. Users can only share this information after federation has been configured in
Exchange.

Your network contains two Active Directory sites named Site1 and Site2.
You have an Exchange Server 2013 organization that contains six servers. The servers are configured as shown in the following table.


All of the mailbox databases replicate to all of the servers.
Users in Site1 connect to sitel-mail.contoso.com to access their mailbox. Users in Site2 connect to site2-mail.contoso.com to access their mailbox. All of the users use Microsoft
Outlook 2013.
You need to identify which DNS modification must be made to fail over the email services from Site1 to Site2.
Which DNS modification should you identify? (To answer, select the appropriate record to modify and the new data for the record in the answer area.)




Answer :

Your company has three offices. Each office has 1,000 users and is configured as an
Active Directory site. Each site connects directly to the Internet.
The network contains six servers that have Exchange Server 2013 installed. The servers are configured as shown in the following table.


An administrator performs a datacenter switchover by changing the DNS record for webl.adatum.com to point to the IP address of web2.adatum.com.
Users from Main1 report that when they connect to Outlook Web App, they receive a certificate warning message.
You need to recommend a solution to ensure that the users do not receive a certificate warning message when a datacenter switchover is performed.
What should you include in the recommendation?

  • A. Three host headers for the Default Web Site on each Client Access server
  • B. One certificate that contains all of the external names as subject alternative names
  • C. Three certificates that each contains one of the external names
  • D. An external URL for each Client Access server set to $null


Answer : B

Explanation:
SAN Certificates (Subject Alternative Names)
This type of certificate allows more than a single name in a single SSL certificate which makes total sense for the new Microsoft products (Lync and Exchange) because several services are using names and all of them are underneath the same IIS Web Site. In some
Public CA these certificates are also known as UC Certificates.
Reference: Managing Certificates in Exchange Server 2013

Your company has two offices. Each office is configured as an Active Directory site. The sites are named Site1 and Site2.
You have an Exchange Server 2013 organization that is configured as shown in the following exhibit. (Click the Exhibit button.)


Datacenter Activation Coordination (DAC) mode is enabled on the database availability group (DAG) named DAG1.
You are testing a site failover by shutting down all of the servers in Site1.
You need to mount the databases in Site2.
Which four commands should you run in sequence? (To answer, move the appropriate four commands from the list of commands to the answer area and arrange them in the correct order. More than one order of answer choices is correct. You will receive credit for any of the correct orders you select.)



Answer :

Explanation:
Target 1:


Target 2:

Target 3:

Target 4:

Step 1: Terminating a Partially Failed Datacenter
When the DAG is in DAC mode, the specific actions to terminate any surviving DAG members in the primary datacenter are as follows:
The DAG members in the primary datacenter must be marked as stopped in the primary datacenter. Stopped is a state of Active Manager that prevents databases from mounting, and Active Manager on each server in the failed datacenter is put into this state by using the Stop-DatabaseAvailabilityGroup cmdlet.
Step 2-4: Activating Mailbox Servers
The steps needed to activate Mailbox servers during a datacenter switchover also depend on whether the DAG is in DAC mode. Before activating the DAG members in the second datacenter, we recommend that you validate that the infrastructure services in the second datacenter are ready for messaging service activation.
When the DAG is in DAC mode, the steps to complete activation of the mailbox servers in the second datacenter are as follows:
1. (step 2, step 3) The Cluster service must be stopped on each DAG member in the second datacenter. You can use the Stop-Service cmdlet to stop the service (for example,
Stop-Service ClusSvc), or use net stop clussvc from an elevated command prompt.
2. (step 4) The Mailbox servers in the standby datacenter are then activated by using the
Restore-DatabaseAvailabilityGroup cmdlet. The Active Directory site of the standby datacenter is passed to the Restore-DatabaseAvailabilityGroup cmdlet to identify which servers to use to restore service and to configure the DAG to use an alternate witness server.

You have an Exchange Server 2013 organization.
You run Get-OutlookAnywhere -Server EX1 | fl and you receive the following output.


Use the drop-down menus to select the answer choice that completes each statement.



Answer :

Explanation:


*Basic Authentication without SSL
From the exhibit we see:

ExternalClientRequireSsl: False -
ExternalClientAuthenticationMethod: Basic
IISAuthenticationMethods: {Basic, Ntlm, Negotiate}
* NTLM Authentication over SSL
From the exhibit we see:

InternalClientRequireSsl: True -
InternalClientAuthenticationMethod: Ntlm
IISAuthenticationMethods: {Basic, Ntlm, Negotiate}

You have an Exchange Server 2013 organization.
You create a data loss prevention (DLP) policy. The mode of the DLP policy is set to
Enforce.
You need to ensure that email messages containing social security numbers from the
United States are blocked.
Which two possible rules achieve this goal? (Each correct answer presents a complete solution. Choose two.)

  • A. U.S. State Breach: Allow Override
  • B. U.S. State Breach: Scan email sent outside - low count
  • C. U.S. State Breach: Scan email sent outside - high count
  • D. U.S. State Breach: Scan text limit exceeded
  • E. U.S. State Breach: Attachment not supported


Answer : B,C

Explanation:
Note:
* In Microsoft Exchange Server 2013, you can use data loss prevention (DLP) policy templates to help meet the messaging policy and compliance needs of your organization.
These templates contain pre-built sets of rules that can help you manage message data that is associated with several common legal and regulatory requirements.
* DLP policy templates in Exchange include:
U.S. State Breach Notification Laws
Helps detect the presence of information subject to U.S. State Breach Notification Laws, including data like social security and credit card numbers.

You have an Exchange Server 2013 organization.
You run Get-OutlookAnywhere -Server EX1 | fl and you receive the following output.


Use the drop-down menus to select the answer choice that completes each statement.



Answer :

Explanation:


Box 1:
ExternalClientAuthenticationMethod: Basic

ExternalClientRequiresSsl: True -
Box 2:
InternalClientAuthenticationMethod: Ntlm
InternalClientRequiresSsl: False

You have an Exchange Server 2013 organization that contains one Client Access server named EX1 and one Mailbox server named EX2.
You have a perimeter network and an internal network. The perimeter network contains an
Edge Transport server named EX3 that has Exchange Server 2010 installed.
You need to ensure that all of the email messages sent to and received from the Internet are routed through the EX3. Which three actions should you perform? (Each correct answer presents part of the solution. Choose three.)

  • A. Allow SMTP traffic between EX3 and EX2.
  • B. Create an Edge Subscription.
  • C. Allow traffic over TCP 50636 from EX1 to EX3.
  • D. Allow SMTP traffic between EX3 and EX1.
  • E. Allow traffic over TCP 50636 from EX2 to EX3.
  • F. Modify the default Receive connector on EX2.


Answer : A,B,E

Explanation:
To establish Internet mail through an Edge Transport server, subscribe the Edge Transport server to an Active Directory site. This automatically creates the two Send connectors required for Internet mail flow:
-> A Send connector configured to send outbound email to all Internet domains.
-> A Send connector configured to send inbound email from the Edge Transport server to an Exchange 2013 Mailbox server.
SMTP traffic and ports TCP 50636 must be allowed between the mailbox server (routing service) and the Edge server.

You run the Get-ExchangeCertificate Server Ex2 | fl and you receive the following output.


Use the drop-down area to select the appropriate answers.



Answer :

You have an Exchange Server organization that contains the servers configured as shown in the following table.


You need to configure the namespace to ensure that users can connect to Outlook Web
Access from the Internet if a single site is unavailable.
What command should you run on EX1 and EX2? To answer, select the appropriate options in the answer area.



Answer :

Explanation:


Set-OWAVirtualDirectory -FailbackURL

Page:    1 / 13   
Total 183 questions