70-341 195(Questions) Core Solutions of Microsoft Exchange Server 2013

Which two actions should you perform?

A company named Contoso, Ltd. has an Exchange Server 2013 organization that contains two servers.
Contoso has a subsidiary named Fabrikam, Inc. All users have mailboxes in the Contoso organization.
You implement an address book policy (ABP) for the users from Fabrikam.
A company policy states that the users from Contoso must not be able to view the contact cards of the Fabrikam users.
You need to implement a solution to meet the requirement of the company policy.
Which two actions should you perform? Each correct answer presents part of the solution.
A. Run the New-TransportRule cmdlet
B. Modify the properties of the ABP.
C. Run the Set-TransportConfig cmdlet.
D. Run the Set-Mailbox cmdlet.
E. Install and Enable the Address Book Policy Routing agent.
F. Modify the properties of the global address list (GAL).


Answer Clike
What are two possible recommendations?

Your company has a main office and three branch offices.
You have an Exchange Server 2013 organization. The main office contains five Exchange servers. Each branch office contains two Exchange servers. All of the servers have all of the Exchange server roles installed. Each branch office contains one database availability group (DAG).
You need to recommend a load balancing solution for the branch offices. The solution must ensure that both servers in each office are the targets of all client connections.
What are two possible recommendations? Each correct answer presents a complete solution.
A. DNS round robin
B. Layer 4 hardware load balancers
C. CAS arrays
D. Network Load Balancing (NLB) clusters


Answer Clike
Which cmdlet should you use?

You have an Exchange Server 2013 organization.
Users connect to their mailbox by using Microsoft Outlook 2013 and mobile devices.
A user named User1 loses a mobile device.
You need to wipe the mobile device remotely.
Which cmdlet should you use?
A. Remove-MobileDevice
B. Clear-MobileDevice
C. Set-Mailbox
D. Remove-ActiveSyncDevice


Answer Clike
What command should you run?

HOTSPOT
You have an Exchange Server 2013 organization that contains a server named EX1.
The network contains two domain controllers named DC1 and DC2.
You plan to make changes to the Active Directory infrastructure and to remove DC2 from the network.
You need to verify whether EX1 writes Active Directory changes to DC2.
What command should you run? To answer, select the appropriate options in the answer area.
Hot Area:




Answer Clike
Your network contains an Active Directory forest named contoso.com.

Your network contains an Active Directory forest named contoso.com.
The forest contains the domain controllers configured as shown in the following table.


You plan to deploy an Exchange Server 2013 organization to the forest
A company policy prevents administrators from logging on to DC2 to perform installations.
You need to prepare the Active Directory schema for the planned Exchange Server deployment.
You verify that your user account has all the required permissions to achieve the task. The solution must minimize changes to the Active Directory infrastructure.
A. Move the schema master role to DC1, and then run Exchange setup.
B. Deploy a member server to contoso.com, and then move the server to the West site. Run adprep.exe from the member server.
C. Log on to DC3 and then run Exchange setup.
D. Log on to any server in the West site, and then run Exchange setup.


Answer Clike
Which five actions should you perform in sequence before you can add EX2 to DAG2?

DRAG DROP
You have an Exchange Server 2013 organization that contains the servers configured as shown in the following table.


You need to add EX2 to DAG2. The solution must maintain redundancy for all mailbox databases.
Which five actions should you perform in sequence before you can add EX2 to DAG2? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.
Select and Place:




Answer Clike
Which three actions should you perform?

You have an Exchange Server 2013 organization.
A new policy requires that all iPhone users access their on-premises mailbox by using the OWA for iPhone app.
You need to ensure that push notifications for the OWA for iPhone app are configured before the users install the app.
Which three actions should you perform? Each correct answer presents part of the solution.
A. Configure Microsoft Azure Active Directory Sync (Azure AD Sync).
B. Modify the EWS virtual directory.
C. Enable push notifications proxy.
D. Enroll in Microsoft Office 365 for business.
E. Modify the OWA virtual directory.
F. Set up on premises Exchange 2013 to Office 365 Authentication.


Answer Clike
What should you recommend?

DRAG DROP
You have an Exchange Server 2013 organization.
You need to recommend a solution to ensure that users can access their mailbox by using IMAP4.
The solution must meet the following requirements:
. The users must be able to download their email messages from multiple devices.
. The users must be able to look up their SMTP server from Outlook Web App.
. All IMAP4 connections must be audited.
What should you recommend? To answer drag the appropriate recommendation to the correct requirement. Each recommendation may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.
Select and Place:




Answer Clike
What should you do?

You have an Exchange Server 2010 organization.
You deploy several Exchange Server 2013 servers to the organization and you deploy the required certificates.
You attempt to connect to an Exchange Server 2013 server by using Outlook Web App and you discover the error message shown in the exhibit (Click the Exhibit button.)
Exhibit: * Missing*
You need to prevent the error message from appearing when users access Outlook Web App on the new servers.
What should you do?
A. Remove the Exchange Server 2010 servers from the organization.
B. Run the Remove-ExchangeCertificate cmdlet.
C. From the Exchange Management Console, remove the certificates from the Exchange Server 2010 servers.
D. From the Exchange Admin Center, modify the properties of the OWA virtual directory.


Answer Clike
Which URL should you use?

You have an Exchange Server organization. The organization contains a server named EX01 that has Exchange Server 2010 installed and a server named EX02 that has Exchange Server 2013 installed.
Your mailbox is hosted on EX01.
You need to access the Exchange Admin Center (EAC).
Which URL should you use?
A. https://EX01/ecp?ExchClientVer= 14
B. https://EX02/ecp?ExchClientVer= 15
C. https://EX02/eac?ExchClientVer=15
D. https://EX01/ecp?ExchCfientVer=15


Answer Clike
What should you recommend?

You have an Exchange Server 2013 organization. The organization contains four servers in the same Active Directory site. The servers are configured as shown in the following table.


EXB and EX4 are members of a database availability group (DAG) named DAG1. All users use Microsoft Outlook 2013 to connect to their mailbox.
You need to recommend a client access solution to ensure that all of the users can connect to their mailbox if EX1 or EX2 fails.
What should you recommend?
A. Add a layer 4 hardware load balancer that balances RPC traffic
B. Add a layer 7 hardware load balancer that balances the traffic on port 443.
C. Add a layer 7 hardware load balancer that balances RPC traffic.
D. Replicate all of the databases in DAG1 to both DAG1 members.


Answer Clike
What should you recommend?

Your company has a main office and three branch offices. The main office is located in Austin. The branch offices are located in Denver, San Diego, and Chicago.
The network contains an Active Directory forest. The forest contains a single domain. Each office is configured as an Active Directory site.
The site in Austin contains four domain controllers that run Windows Server 2008 R2 and are configured as global catalog servers. The sites in Denver, San Diego, and Chicago each contain a read-only domain controller (RODC) that runs Windows Server 2008 R2. No other domain controllers exist on the network.
You plan to deploy an Exchange Server 2013 organization. Exchange Server 2013 servers will be deployed in the Austin, Denver, and San Diego sites. Users from the Chicago site will access their mailbox remotely.
You need to recommend changes to the Active Directory infrastructure to support the planned deployment of Exchange Server 2013.
What should you recommend?
A. Replace the RODCs in the Denver and San Diego sites with domain controllers that are configured as global catalog servers.
B. Configure the RODCs in the Denver and San Diego sites as read-only global catalog servers.
C. Configure Active Directory automatic site coverage for the Chicago site.
D. Upgrade all of the RODCs to Windows Server 2012.


Answer Clike
Which groups should you add ExchangeAdmin?

You have an Exchange Server 2013 organization that contains 20 servers.
You plan to deploy Exchange Server 2013 RTM Cumulative Update 1 (CU1) to the first Exchange server in the organization.
You need to ensure that a user named ExchangeAdmin can deploy CU1 to the first server, The solution must minimize the number of permissions assigned to ExchangeAdmin.
To which groups should you add ExchangeAdmin?
A. Schema Admins, Domain Admins, and Enterprise Admins
B. Schema Admins, Domain Admins, and Delegated Setup
C. Domain Admins and Organization Management
D. Enterprise Admins and Organization Management


Answer Clike
What should you use?

You have an Exchange Server 2013 organization.
An Active Directory administrator is concerned about the permissions assigned to a group named Exchange Trusted Subsystem. Exchange Trusted Subsystem has a member named Exchange Windows Permissions.
You need to show the Active Directory administrator all of the permissions assigned to Exchange Trusted Subsystem.
What should you use?
A. ADSI Edit
B. Active Directory Sites and Services
C. Dsget
D. Active Directory Users and Computers


Answer Clike
Which role groups should you identify?

DRAG DROP
You have an Exchange Server 2013 organization.
You plan to delegate the following administrative tasks:
• View the status of the message queue.
• Create, mount, and dismount databases.
• Restore mailboxes from a recovery database,
• Modify the settings of Exchange ActiveSync devices.
You need to identify which role group must be used to delegate each administrative task. The solution must ensure that the role group that has the fewest administrative privileges is used.
Which role groups should you identify? {To answer, drag the appropriate role groups to the correct tasks. Each role group may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.)
Select and Place:




Answer Clike
HOTSPOT

HOTSPOT
Your network contains three Exchange Server 2013 servers that have the Client Access server role installed. Each server is configured as a POP3 server and an IMAP4 server.
You deploy the Network Load Balancing (NLB) feature on the servers and configure NLB as shown in the exhibit (Click the Exhibit button.)


Use the drop-down menus to select the answer choice that completes each statement.
Hot Area:




Answer Clike
What command should you run?

HOTSPOT
You have an Exchange Server 2013 organization that contains three moderated distribution groups named DG1, DG2, and DG3. DG3 is a member of DG2.
You need to exclude from moderation the email messages sent from the members of DG3 to the members of DG1. The solution must maintain moderation for the email messages sent from all other users.
What command should you run? (To answer, select the appropriate options in the answer area.)
Hot Area:




Answer Clike
Which cmdlet should you run?

You have an Exchange Server 2013 organization.
You deploy the anti-spam features of Exchange Server 2013.
You need to specify the spam quarantine mailbox.
Which cmdlet should you run?
A. Set-Mai IboxJunkEmailConfiguration
B. Set-ContentFilterConfig
C. Set-MalwareFilterPolicy
D. Set-SenderFilterConfig


Answer Clike
What should you do next?

Your network contain an Active Directory forest. The forest contains a single domain named contoso.com. The network contains a legacy mail system that uses a SMTP namespace of contoso.com.
You plan to deploy Exchange Server 2013.
There will be a period of interoperability while the email is migrated from the legacy system to Exchange Server 2013.
During the period of interoperability, you need to ensure that all incoming email is received by an Exchange Server 2013 server, and then routed to the legacy mail system if an Exchange Server email recipient cannot be found.
You configure the firewall in the perimeter network to route SMTP traffic to the Exchange Server 2013 organization.
What should you do next?
A. Modify the existing accepted domain for contoso.com and create a new Send connector.
B. Add a new external relay accepted domain for contoso.com and create a new Send connector.
C. Add a new authoritative domain for contoso.com and create a new email address policy.
D. Add a new internal relay accepted domain for contoso.com and create a new email address policy.


Answer Clike
Which functionality should you transfer to each server?

HOTSPOT
You have an Exchange Server 2013 organization that contains three servers. The servers are configured as shown in the following table.


All inbound email messages from the Internet are routed through EX01.
You plan to remove EX01 from the organization.
You need to ensure that all of the functionalities of EX01 are transferred to EX02 and EX03. The solution must minimize administrative effort.
Which functionality should you transfer to each server? (To answer, select the appropriate server for each functionality in the answer area.)
Hot Area:




Answer Clike
What should you identify?

You deploy an Exchange Server 2013 organization to a test network for evaluation.
You install the Mailbox server role and the Client Access server role on a server named ex01.contoso.com. You do not perform any other configurations.
All of the ports from the Internet to ex01.contoso.com are open. You successfully connect to ex01.contoso.com from the Internet and from the internal network.
You need to identify which types of Exchange Server clients will connect successfully to the organization without any further configurations.
What should you identify?
A. Internal Outlook Web App connections
B. Android Phones using Activesync
C. Windows RT devices running the Mail app
D. Windows Phones that use Exchange ActiveSync


Answer Clike
Which cmdlet should you run?

You have an Exchange Server 2013 organization.
You create a public folder.
You assign an email address to the public folder.
You need to ensure that only a user named User1 can add content to the public folder by using email.
Which cmdlet should you run?
A. Set-MailPublicFolder
B. Set-PublicFolder
C. Set-Mailbox
D. Add-PublicFolderCMentPermission


Answer Clike
What command should you run before you deploy the first Exchange Server 2013 server?

HOTSPOT
Your network contains an Active Directory forest named contoso.com. The forest contains two domains named contoso.com and nwtraders.com.
You plan to deploy a new Exchange Server 2013 organization named Contoso.
You need to ensure that you can deploy the first Exchange Server 2013 server to the forest root domain.
What command should you run before you deploy the first Exchange Server 2013 server? (To answer, select the appropriate options in the answer area.)
Hot Area:




Answer Clike
Which two tasks should you perform?

You have an Exchange Server 2010 organization.
You deploy a server that has Exchange Server 2013 installed.
You plan to install five additional servers that have Exchange Server 2013 installed.
You are a member of the Organization Management management role group.
Your company hires an external IT consultant named Admin1.
The company’s security policy states that all external consultants must have the minimum number of required permissions on the network.
You need to ensure that Admin1 can install a server named EX2. The solution must meet the requirements of the security policy.
Which two tasks should you perform? (Each correct answer presents part of the solution. Choose two.)
A. Add Admin1 to the Exchange Server role group.
B. Create a new management role and a new role assignment policy.
C. Run setup and specify the/newprovisionectservenex2 parameter.
D. Add Admin1 to the Delegated Setup management role group.


Answer Clike
What command should you run?

HOTSPOT
Your company has an Exchange Server 2013 organization named contoso.com.
All users run Microsoft Outlook 2010 or Outlook 2013.
The company recently acquired another company named A. Datum Corporation. All of the users at A. Datum run Linux-based computers and use a third-party IMAP client to access their email messages.
You configure IMAP over SSL to use the external URL of mail.contoso.com.
You need to publish the IMAP settings to Outlook Web App.
What command should you run? (To answer, select the appropriate options in the answer area.)
Hot Area:




Answer Clike
What should you configure on a Client Access server?

You have an Exchange Server 2013 organization.
The help desk reports that users fail to access their mailbox by using the URL http://mail.contoso.com. All of the users successfully connect to their mailbox by using Exchange ActiveSync.
You need to ensure that all of the users can access their mailbox by using the URL http://maif.contoso.com.
What should you configure on a Client Access server?
A. From Internet Information Services (IIS) Manager, configure HTTP Response Headers on the OWA virtual directory.
B. From Exchange Admin Center, create a new Outlook Web App mailbox policy.
C. From File Explorer, modify the permissions of the Web.config file in the Default Web Site folder.
D. From Internet Information Services (IIS) Manager, configure HTTP Redirect on the default web site.


Answer Clike
HOTSPOT

HOTSPOT
You have an Exchange Server 2013 organization that contains four servers. The servers are configured as shown in the following table.


You run Get-TransportConfig and receive the output shown in the exhibit. (Click the Exhibit button.)


Use the drop-down menus to select the answer choice that completes each statement.
Hot Area:




Answer Clike
What should you run?

Your company has four offices. Each office connects to two of the other offices by using a direct WAN link. Each office is configured as an Active Directory site. The office connections and the Active Directory site links are configured as shown in the exhibit (Click the Exhibit button.)


You have Exchange Server 2013 organization that contains four servers. The servers are configured as shown in the following table.


You discover that email messages sent from the site in Montreal to the site in Miami are routed through the site in New York.
You need to ensure that all of the email messages sent from the Montreal site to the Miami site are routed through the Washington site.
What should you run?
A. Set-AdSite1ink Site1inkl -ExchangeCost 25
B. Set-AdSite Washington’ -HubSiteEnabled $false
C. Set-AdSite1ink SiteUnkl -ExchangeCost 15
D. Set-AdSite New York’ -Hubsiteenabled Sfalse


Answer Clike
Which three actions should you perform in sequence?

DRAG DROP
You have an Exchange Server 2013 organization that contains two servers named EX1 and EX2.
EX1 and EX2 are the members of a database availability group (DAG) named DAG1. DAG1 contains a database named DB1. DB1 is active on EX1.
You deploy a new Exchange Server 2013 server named Ex3.
You add EX3 as a member of DAG1.
You need to add a copy of DB1 to EX3 by using an offline copy of the database.
Which three actions should you perform in sequence? (To answer, move the appropriate three actions from the list of actions to the answer area and arrange them in the correct order.)
Select and Place:




Answer Clike
What command should you run?

HOTSPOT
You have an Exchange Server 2013 organization.
You have a user named User1 and a user named User2. Both users access their email by using Microsoft Outlook 2013.
You need to ensure that User2 can access all of the email messages in the mailbox of User1 the next time User2 opens Outlook.
What command should you run? (To answer, select the appropriate options in the answer area.)
Hot Area:




Answer Clike
Which cmdlets should you use?

DRAG DROP
You have an Exchange Server 2013 organization that contains five servers.
Several employees plan to use Microsoft Outlook to collaborate on some projects.
You need to configure access to Outlook to meet the following requirements:
. Several employees must be able to send email messages as a user named User1.
. Several employees must be able to send email messages on behalf of a user named User2.
Which cmdlets should you use?
To answer, drag the appropriate crndlet to the correct requirement in the answer area. Each crndlet may be used once, more than once, or not at all. Additionally, you may need to drag the split bar between panes or scroll to view content.
Select and Place:




Answer Clike
Which cmdlet should you use?

You have an Exchange Server 2013 organization.
You need to ensure that users receive a notification if the delivery of a message is delayed for more than one hour.
Which cmdlet should you use?
A. Set-FrontEndTransportService
B. Set-MailboxTransportService
C. Set-Tra nsportConf ig
D. Set-TransportService


Answer Clike
Which cmdlet should you use in a scheduled task?

You have an Exchange Server 2013 organization.
You need to ensure that an administrator named Adminl receives a daily email message that contains a log of all the Exchange Server administrative actions.
Which cmdlet should you use in a scheduled task?
A. Search-AdminAuditLog
B. Set-AdminAuditLogConfig
C. New-AdminAuditLogSearch
D. Write-AdminAuditLog


Answer Clike
Which cmdlet should you run?

You have an Exchange Server 2013 organization.
You plan to assign the default workload management policy to all of the servers in the organization.
You need to remove the Calendar Synchronization Assistant workload from the workload management policy before you assign the policy to the servers.
Which cmdlet should you run?
A. Remove-ResourcePolicy
B. Set-ResourcePolicy
C. Set-WorkloadPolicy
D. Remove-WorkloadPolicy


Answer Clike
What are two possible ways to achieve this goal?

You have an Exchange Server 2013 organization named fabrikam.com.
You have a distribution group named DL1 and a user named User1. The managedBy attribute of DL1 is fabrikam.comusersUser1.
User1 attempts to add a user named User2 to DL1 and receives the following error message: “Changes to the public group membership cannot be saved. You do not have sufficient permissions to perform this operation on this object.”
You need to ensure that User1 can add User2 to DLL
What are two possible ways to achieve this goal? (Each correct answer presents a complete solution. Choose two.)
A. From Exchange Management Shell, run New-ManagementRoleAssignment -Name “Default Role Assignment Policy-MyDistributionGroupMembership” -Policy “Default Role Assignment Policy” -Role “MyDistributionGroupMembership
B. From Exchange Admin Center, edit the Default Role Assignment Policy and select MyDistributionGroups
C. From Exchange Management Shell, run New-ManagementRoleAssignment -Name “Default Role Assignment Policy-MyDistributionGroups” -Policy “Default Role Assignment Policy” -Role “MyDistributionGroups”.
D. From Exchange Admin Center, edit the Default Role Assignment Policy and select MyDistributionGroupMembership.


Answer Clike
What should you do?

A company named Fabrikam, Ltd. has an Exchange Server 2013 organization that contains two servers.
The servers are configured as shown in the following table.


You configure the internal and external namespaces named mail.fabrikam.com and autodiscover.fabrikam.com to point to EX2.
You configure Outlook Anywhere on EX1 as shown in the following table.


You configure Outlook Anywhere on EX2 as shown in the following table.


You need to ensure that all of the users on EX1 can connect to their mailbox by using Microsoft Outlook from the Internet.
What should you do?
A. Change the authentication settings of EX1.
B. Disable IPv6 on EX1.
C. Change the authentication settings of EX2.
D. Disable Outlook Anywhere on EX1.


Answer Clike
What should you recommend?

You have an Exchange Server 2013 organization that contains two Client Access servers and two Mailbox servers.
You configure DNS round robin on the Client Access servers. All of the host (A) and alias (CNAME) records in the DNS zone are configured to have a TTL value of 10 minutes.
You need to recommend a solution to fail over client connections to a Client Access server automatically if Internet Information Services (US) fails. The solution must minimize costs.
What should you recommend?
A. Deploy a Client Access server array.
B. Reduce the TTL values on all of the A and CNAME records to one minute.
C. Deploy a hardware load balancing solution.
D. Deploy Network Load Balancing (NLB) on each Client Access server.


Answer Clike
What should you do?

HOTSPOT
Your network contains an Active Directory forest named contoso.com. The forest contains one domain and two sites named Site1 and Site2. Site1 connects directly to the Internet.
You have an Exchange Server 2010 organization.
Users access their email remotely by using Outlook Web App and Outlook Anywhere by connecting to the name mail.contoso.com.
You plan to migrate to Exchange Server 2013.
Exchange Server 2010 and Exchange Server 2013 will co-exist for several months during the migration. During the co-existence phase, the organization will contain seven servers. The servers will be configured as shown in the following table.


You need to identify which host names must be associated to which servers. The solution must ensure that the users can access mailboxes on EX2, EX4, EX6, and EX7.
What should you do? (To answer, select the appropriate target for each host name in the dialog box in the answer area.)
Hot Area:




Answer Clike
What should you run?

Your company has a main office and four branch offices.
You have an Exchange Server 2013 organization that contains 2,500 mailboxes.
An administrator plans to deploy Microsoft Lync Server 2013.
You need to enable the unified contact store in the Exchange Server 2013 organization.
What should you run?
A. The New-CsPartnerApplication cmdlet
B. The Set-ClientAccessServer cmdlet
C. The Configure-EnterprisePartnerApplication.ps1 script
D. The Set-AuthConfig cmdlet


Answer Clike
What command should you run?

HOTSPOT
Your network contains an Active Directory forest. The forest contains a single domain.
You have an Exchange Server 2013 organization named Contoso that contains a server named EX01. Split permissions are configured for the organization.
You need to change the permission model to shared permissions.
What command should you run? (To answer, select the appropriate options in the answer area.)
Hot Area:




Answer Clike
What should you recommend?

You have an Exchange Server 2013 organization that contains a database availability group (DAG) named DAG1. DAG1 has two members.
You create a mailbox database copy for each database on each DAG member.
You plan to implement a service level agreement (SLA) that meets the following requirements:
All deleted mailboxes must be recoverable for up to six months after they are deleted.
When a mailbox is recovered, the entire contents of the mailbox must be recovered.
You need to recommend a solution that meets the requirements.
What should you recommend?
A. Get-Mailbox | Set-Mailbox -RetainDeletedItemsFor 180.00:00:00
B. Get-MailboxDatabase | Set-MailboxDatabase -MailboxRetention 180.00:00:00
C. Get-MailboxDatabase | Set-MailboxDatabase -DeletedItemRetention 180.00:00:00
D. Get-Mailbox | Set-Mailbox -Audit Log Age Limit 180.00:00:00


Answer Clike
Which two cmdlets should you run?

You have an Exchange Server 2013 organization that contains four servers.
All users access their email by using Microsoft Outlook 2010.
An administrator deploys a shared mailbox named Project.
You assign all of the users in the marketing department Full Access permissions to Project.
You discover that Project automatically appears in Outlook to all of the marketing department users.
You need to ensure that Project only appears in Outlook to the marketing department users who add the mailbox manually to their Outlook profile.
Which two cmdlets should you run? (Each correct answer presents part of the solution. Choose two.)
A. Remove-MailboxPermission
B. Set-Mailbox
C. Remove-Mailbox
D. Add-MailboxPermission
E. New-Mailbox


Answer Clike
What should you do first?

You have an Exchange Server 2013 organization. The organization contains a Mailbox server that hosts several databases, including a database named ExecsDB. ExecsDB contains the mailboxes of the company executives.
The hard disk that contains ExecsDB fails.
You replace the hard disk with a new disk, and then you mount the database.
You create a recovery database in an alternate location, and then you restore the database files for ExecsDB to the alternate location.
You need to ensure that all data is consistent before merging the mailbox data into the dial-tone database.
What should you do first?
A. Run the isinteg.exe command and specify the -fix parameter.
B. Run the Move-ActiveMailboxDatabase cmdlet.
C. Run the Update-MailboxDatabaseCopy cmdlet.
D. Run the eseutil.exe command and specify the/R parameter.


Answer Clike
What command should you run?

HOTSPOT
You have an Exchange Server 2013 organization.
You enable single item recovery for all users.
A user named User1 accidentally deletes important email messages sent from a user named User2. User1 reports that he cannot locate the email messages in his Deleted Items folder.
You need to recover the items.
What command should you run? (To answer, select the appropriate options in the answer area.)
Hot Area:




Answer Clike
What should you do on EX1?

Fabrikam, Ltd. has an Exchange Server organization that contains two servers. The servers are configured as shown in the following table.


Recently, the internal and external namespaces named mail.fabrikam.com and autodiscover.fabrikam.com were changed to point to EX2.
You configure all of the users on EX2 to access their mailbox by using Microsoft Outlook from the Internet.
You enable Outlook Anywhere on EX1.
You need to ensure that users who have mailboxes on EX1 can connect to their mailbox from the Internet.
What should you do on EX1?
A. Set the ExternalHostName value to NULL.
B. Set the ExternalClientAuthenticationMethod value to Basic and NTLM.
C. Set the IISAuthenticationMethods value to Basic and NTLM.
D. Set the InternalHostName value to NULL


Answer Clike
What command should you run?

HOTSPOT
Your company has two main offices. One office is located in Atlanta and the other office is located in Washington.
The offices connect to each other by using a dedicated WAN link.
You have an Exchange Server 2013 organization that contains four servers.
The servers are configured as shown in the following table.


The company opens a new office in New York. The New York office connects directly to the Washington office via a dedicated WAN link. You configure a separate Active Directory site for each office.
You discover poor response times when scheduling meetings and configuring Microsoft Outlook profiles from the client computers in the New York office.
You need to reduce the amount of time required to schedule meetings and to configure Outlook profiles from the computers in the New York office.
What command should you run? (To answer, select the appropriate options in the answer area.)
Hot Area:




Answer Clike
What should you do?

Your company has four offices. Each office is configured as an Active Directory site.
You have an Exchange Server 2013 organization that contains nine servers. The servers are configured as shown in the following table.


A user named User1 is in a distribution group named D_Sales. The mailbox of User1 is in a database that is active on MBX4 and is configured to use MBX5 as an expansion server.
You need to ensure that email sent to D_Sales from the Internet is received by CAS1, and then routed from MBX1 to MBX4.
What should you do?
A. Configure Site1 as a hub site.
B. Modify the expansion server setting of D_Sales.
C. Modify the SubmissionServerOverrideList list on MBX1.
D. Configure Site3 as a hub site.


Answer Clike
What should you identify?

Your company has two offices. Each office is configured as an Active Directory site.
You have an Exchange Server 2013 organization that contains four servers. The servers are configured as shown in the following table.


MBX1 and MBX2 are members of a database availability group (DAG) named DAG1. A mailbox database named DB1 has a copy on each Mailbox server. DB1 is active on MBX2.
You are creating a disaster recovery plan for the organization.
You need to identify how email messages will be received for the mailboxes on DB1 if the Exchange Server transport services fail on MBX2 because of messages in the poison message queue.
What should you identify?
A. Email messages will be queued on MBX1, and then delivered directly to the mailboxes on MBX2.
B. The Exchange Server transport services will restart automatically, and then put all delivery queues in a Retry state.
C. The Exchange Server transport services will restart automatically, and then purge the poison messages.
D. Email messages will be queued on CAS1 or CAS2, and then delivered directly to the mailboxes on MBX2.


Answer Clike
What should you run?

You have an Exchange Server 2013 organization.
You are troubleshooting an email delivery problem.
You need to disable temporarily the antimalware scanning on a server that has Exchange Server 2013 installed. The solution must ensure that the antimalware engine continues to download updates.
What should you run?
A. The Set-TransportConfig cmdlet
B. The New-MalwareFilterPolicy cmdlet
C. The Disable-Antimalwarescanning.psl script
D. The Set-MalwarServer cmdlet


Answer Clike
What should you do?

You have an Exchange Server 2013 organization that contains two servers named EX1 and EX2.
EX1 and EX2 are the members of a database availability group (DAG) named DAG1. DAG1 contains two mailbox databases named DB1 and DB2. DB1 is active on EX1. DB2 is active on EX2.
A disk on EX2 fails. DB2 fails over to EX1.
Users who have mailboxes in DB2 report that Microsoft Outlook can no longer connect to the Exchange Server organization.
You discover that DB2 is dismounted on EX1.
When you attempt to mount DB2 on EX1, the operation fails.
You need to identify what prevents DB2 from mounting on EX1.
What should you do?
A. Run the Resume-MailboxdatabaseCopy cmdlet.
B. Run the Update-MailboxdatabaseCopy cmdlet.
C. Run the eseutil.exe command and specify the A parameter.
D. Run the eseutil.exe command and specify the/mft parameter.


Answer Clike
Which servers should you identify for each name?

DRAG DROP
You are migrating an existing Exchange Server 2007 organization to Exchange Server 2013. You expect the migration to last several weeks.
The servers in the organization are configured as shown in the following table.


Users who have mailboxes on all of the servers will access Outlook Anywhere by using the mail.contoso.com name.
You need to recommend which servers must be associated to the autodiscover.contoso.com and mail.contoso.com names.
Which servers should you identify for each name?
To answer, drag the appropriate servers to the correct name in the answer area. Each server may be used once, more than once, or not at all. Additionally, you may need to drag the split bar between panes or scroll to view content.
Select and Place:




Answer Clike
Which tool should you use?

You have an Exchange Server 2013 organization.
Each user has an In-Place Archive.
You discover that several items in a user’s In-Place Archive are corrupt.
You need to ensure that the user can access the corrupt items.
Which tool should you use?
A. The Repair-FileIntegrity cmdlet
B. The Isinteg command
C. The New-MailboxRepairRequest cmdlet
D. The Eseutil command


Answer Clike
Which three actions should you perform in sequence?

DRAG DROP
You have an Exchange Server 2013 organization that contains a database availability group (DAG) named DAG1. The organization contains three servers. The servers are configured as shown in the following table.


EX1 and EX2 are members of DAG1. EX1 has an active copy of a database named DB1 and a passive copy of a database named DB2. EX2 has a passive copy of DB1 and an active copy of DB2.
You plan to create a public folder named Invoices.
You need to ensure that users can access the Invoices public folder if one of the DAG members fails. The solution must ensure that the users can send email messages to the Invoices public folder.
Which three actions should you perform in sequence? (To answer, move the appropriate three actions from the list of actions to the answer area and arrange them in the correct order.)
Select and Place:




Answer Clike
How many of each should you identify?

HOTSPOT
A school has 200 students and 10 classes. Each class has 20 students. Each class has one teacher. The school has five administrative staff members.
You need to design an Exchange Server 2013 organization for the school. The design must meet the following requirements:
Students must be able to view only the email addresses of the other students in their class, the teacher of their class, and the entire administrative staff.
Teachers must be able to view only the email addresses of the students in their class, all of the other teachers, and the entire administrative staff.
The administrative staff must be able to see the email addresses of everyone.
Everyone will use Microsoft Outlook 2013 to view a list of all the users.
You need to identify the minimum number of address lists, global address lists, Offline Address Books (OABs), and address book policies required for the design.
How many of each should you identify? (To answer, select the appropriate numbers in the answer area.)
Hot Area:




Answer Clike
What should you do?

You create a mailbox named ConfRoom1 as shown in the exhibit. (Click the Exhibit button.)


Users report that when they schedule meetings and attempt to locate ConfRoom1 in the All Rooms address list, they do not see ConfRoom1 on the list.
You need to ensure that the users can locate ConfRoom1 on the All Rooms address list.
What should you do?
A. Modify the Sharing Policy that is associated to ConfRoom1.
B. Run the Update-AddressList command and specify the -Identity parameter.
C. Run the Set-Mailbox command and specify the -IsRootPublicFolderMailbox parameter.
D. Delete the ConfRoom1 mailbox, and create a new resource mailbox.


Answer Clike
Which role group should you add User1?

Your company has an Exchange Server 2013 organization. All Exchange servers have the Client Access server role and the Mailbox server role installed. All of the servers are members of a database availability group (DAG) named DAG1.
You need to ensure that a user named User1 can move mailboxes between the servers. The solution must minimize the number of permission assigned to User1.
To which role group should you add User1?
A. Server Management
B. Organization Management
C. Help Desk
D. Recipient Management


Answer Clike
Which three cmdlets should you run?

You have an Exchange Server 2013 organization that contains a server named Server1. Server1 has the Client Access server role and the Mailbox server role installed.
You monitor the performance of Server1, and you discover that the Exchange Server transport services consume a high amount of processor resources.
You need to limit the amount of processor resources that the Exchange Server transport services consume.
Which three cmdlets should you run?
A. New-WorkloadManagementPolicy. New-ThrottlingPolicy, and Set- ThrottlingPolicyAssociation
B. New-WorkloadPolicy, New-ThrottlingPolicy and Set-ExchangeServer
C. New-WorkloadPolicy, New-ThrottlingPolicy and Set-ThrottlingPolicyAssociation
D. New-WorkloadManagementPolicy. New-WorkloadPolicy, and Set-ExchangeServer


Answer Clike
HOTSPOT

HOTSPOT
Your company has three main offices. Each office is configured as an Active Directory site as shown in the exhibit (Click the Exhibit button.)


You have an Exchange Server 2013 organization. Each office contains Exchange servers.
All users access their mailbox by using Outlook Web App. All of the users have a mailbox on a server in their respective office.
Use the drop-down menus to select the answer choice that completes each statement.
Hot Area:




Answer Clike
Which command should you recommend running?

HOTSPOT
Your network contains two Active Directory sites named MainSite and DRSite.
You have an Exchange Server 2013 organization that contains two servers. The servers are configured as shown in the following table.


The active copy of DB1 is located on EX1. There are typically 100 MB of log files queued on EX1.
You need to recommend a procedure to allow administrators to mount the mailbox database copies on EX2 if EX1 fails. The recovery point objective (RPO) for mailbox data is 200 MB.
Which command should you recommend running? (To answer, select the appropriate options in the answer area.)
Hot Area:




Answer Clike
Which sequence should you run the commands?

DRAG DROP
You have an Exchange Server 2013 organization.
You create a script named New-CustomMailbox.ps1 to create mailboxes based on your company’s requirements.
You create a role group named Mailbox Provisioning.
You need to ensure that the members of Mailbox Provisioning can create new mailboxes only by using New-CustomMailbox.ps1.
In which sequence should you run the commands? (To answer, move all of the commands from the list of commands to the answer area and arrange them in the correct order.)
Select and Place:




Answer Clike
What should you assign to the users of each company?

You have an Exchange Server 2013 organization that contains mailboxes for multiple companies.
You need to segment the address lists in the organization per company.
What should you assign to the users of each company?
A. Address book policies (ABPs)
B. Address lists
C. Global Address Lists (GALs)
D. Email address policies


Answer Clike
Which command should you run?

HOTSPOT
Your network contains an Active Directory forest. The forest contains a single domain named contoso.com.
You have an Exchange Server 2013 organization that contains one Client Access server named CAS1 and one Mailbox server named MBX1.
You plan to enable Outlook Anywhere for remote access from non-domain joined client computers.
You deploy a trusted third-party certificate that has a subject name of mail.contoso.com.
Users report that they fail to access their email by using Microsoft Outlook 2013 when they work remotely from a non-domain joined client computer. From the internal network, the users can access their email by using Outlook 2013.
You verify that Autodiscover is configured remotely.
You need to ensure that the remote users can access their email by using Outlook Anywhere.
Which command should you run? (To answer, select the appropriate options in the dialog box in the answer area.)
Hot Area:




Answer Clike
What should you do?

Your network contains an Active Directory forest named contoso.com. The forest contains one domain.
You have an Exchange Server organization that contains three servers. The servers are configured as shown in the following table.


An administrator implements Outlook Anywhere on Exchange Server 2013.
Remote users who have a mailbox hosted on EX1 report that they receive the following error message when they attempt to configure a Microsoft Outlook profile.


Remote users who have a mailbox hosted on EX3 can configure an Outlook profile successfully.
You need to ensure that the remote users who have a mailbox on EX1 can access their mailbox by using Outlook Anywhere.
What should you do?
A. On EX2, run Set-OutlookAnywhere
B. On EX2, run Set-CasMailbox.
C. On EX1, run Enable-OutlookAnywhere
D. On EX1, run Set-OutlookAnywhere


Answer Clike
Which should you do?

Your company has offices in New York, Paris, and Montreal. An Active Directory site exists for each office.
You have an Exchange Server 2013 organization that contains two servers in each site. One server in each site has the Mailbox server role installed and the other server in each site has the Client Access server role installed.
You need to ensure that all of the outbound email from each site is routed through the Client Access server in that site.
Which should you do?
A. Remove the Mailbox servers from the list of source servers on each Send connector.
B. Disable the Microsoft Exchange Transport service on each Mailbox server.
C. Run the Set-SendConnector cmdlet and specify the -FrontendProxyEnabted.True parameter.
D. Run the Set-TransportConfig cmdlet and specify the -InternatSMTPServers:$nult parameter.


Answer Clike
Which setting should you change?

You have an Exchange Server 2010 organization.
Users access Outlook Web App by using the name mail.contoso.com.
You deploy Exchange Server 2013 to the existing organization.
You change the DNS record of mail.contoso.com to point to an Exchange Server 2013 Client Access server.
The users report that they can no longer access their mailbox from Outlook Web App.
The OWA virtual directory in Exchange Server 2010 is configured as shown in the exhibit. (Click the Exhibit button.)


You need to ensure that the users on Exchange Server 2010 can access Outlook Web App.
Which setting should you change?
A. WindowsAuthentication
B. FormsAuthentication
C. LegacyRedirectType
D. FailbackUri


Answer Clike
What should you do first?

You have an Exchange Server 2013 organization that contains two Mailbox servers and two Client Access servers.
You have a database availability group (DAG) that contains both Mailbox servers.
You need to deploy public folders.
What should you do first?
A. Run the New-PublicFolderDatabase cmdlet and specify the -Server parameter.
B. Run the New-PublicFolder cmdlet and specify the -Path parameter.
C. Run the New-Mailbox cmdlet and specify the -Publicfolder parameter.
D. Run the New-MailboxDatabase cmdlet and specify the -PublicFotderDatabase parameter.


Answer Clike
HOTSPOT

HOTSPOT
Your company has an Exchange Server 2013 organization. All servers have the Client Access server role and the Mailbox server role installed.
The DNS Manager is shown in the exhibit. (Click the Exhibit button.)


Use the drop-down menus to select the answer choice that completes each statement.
Hot Area:




Answer Clike
What should you configure?

DRAG DROP
You have an Exchange Server 2013 organization that contains a server named EX1. EX1 has the Mailbox server role and the Client Access server role installed.
You plan to enable anti-spam protection on EX1.
You need to configure the message hygiene settings for email messages received from the Internet.
The solution must meet the following requirements:
. Place email messages that contain the word Contoso in a quarantine folder.
. Block all email messages sent to former employees who no longer work for the company.
. Reject all email messages sent from a source that has a sender reputation level (SRL) of 7 or greater.
What should you configure? (To answer, drag the appropriate transport objects to the correct requirements. Each object may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.)
Select and Place:




Answer Clike
Which log folder should you review?

HOTSPOT
Your company has an Exchange Server 2013 organization.
You configure domain security with a partner organization.
You configure the required connectors.
You plan to verify whether the partner organization configured the required settings for domain security.
You enable logging for the Send connectors and the Receive connectors.
You need to verify that the STARTTLS command is issued by an Exchange server when an email message is sent to the partner organization.
Which log folder should you review? (To answer, select the appropriate folder in the answer area.)
Hot Area:




Answer Clike
What should you recommend changing?

You are evaluating the implementation of a Database Availability Group (DAG).
You need to recommend changes to the planned implementation to minimize the loss of large email messages if a single DAG member fails.
What should you recommend changing?
A. The preference of the mail exchanger (MX) records
B. The duration of single item recovery
C. The intervals of shadow redundancy
D. The size of the transport dumpster


Answer Clike
Which tool should you use?

A user fails to connect to his mailbox by using Outlook Anywhere. The user successfully connects to the mailbox by using an Exchange ActiveSyncenabled mobile device and Outlook Web App.
You need to identify what prevents the users from connecting to the mailbox by using Outlook Anywhere.
Which tool should you use?
A. Microsoft Outlook Connectivity Test
B. Microsoft Exchange RPC Extractor
C. Microsoft Exchange Server Profile Analyzer
D. Exchange Server MAPI Editor


Answer Clike
You need to create an exclusion for two helpdesk RBAC (Role Based Access Control) groups to not have access to managers.

You need to create an exclusion for two helpdesk RBAC (Role Based Access Control) groups to not have access to managers.
You will need to pick 3 powershell commands from the available choices
A. New-ManagementRole, New-ManagementScope,Set-ManagementScope (Guessed)
B. New-ManagementScope, RecipientRestrictionFilter ,New-ManagementRoleAssignment (Guessed)
C. New-ManagementScope, New-ManagementRoleAssignment, CustomRecipientWriteScope (Guessed)
D. Unsure of commands and correct answer


Answer Clike
Which three actions should you recommend performing in sequence?

DRAG DROP
You need to recommend a solution to deploy the Outlook app
Which three actions should you recommend performing in sequence? (To answer, move the appropriate three actions from the list of actions to the answer area and arrange them in the order)
(Apps for Outlook can help you personalize your messages or speed up the way you access information on the web.
For example, the Bing Maps app that comes with Outlook shows an online map whenever you open a message that contains a street address.
http://office.microsoft.com/en-us/store/apps-for-outlook-FX102804983.aspxOutlook App Office Store)
Select and Place:




Answer Clike
How would you disable the anti malware filtering and ensure that engine updates from microsoft are downloaded and updated.

How would you disable the anti malware filtering and ensure that engine updates from microsoft are downloaded and updated.
A. Disable-Antimalwareagent.ps1
B. Set-malwarefilteringserver
C. Disable-Antimalwarescanning.ps1 (probable option)
D. Update-MalwareFilteringServer.ps1 (guessed option)


Answer Clike
Which servers should you install the anti-spam agents and enable the anti-spam and antimalware filtering?

You need to install and configure anti-spam and antimalware filtering. Which servers should you install the anti-spam agents and enable the anti-spam and antimalware filtering? (Choose two)
A. You should install the anti-spam agents on the Client Access Servers only.
B. You should install the anti-spam agents on the Mailbox servers only.
C. You should install the anti-spam agents on the Client Access Servers and the Mailbox Servers.
D. You should enable antimalware filtering on the Client Access Servers only.
E. You should enable antimalware filtering on the Mailbox servers only.
F. You enable antimalware filtering on the Client Access Servers and the Mailbox Servers.


Answer Clike
What should you do next?

You have network contoso.com. contoso.com consist of AD DS Domain contoso.com.
All Servers running Windows Server 2012 and all Clients running Windows 8 Pro.
Server1 runs Mailbox Server Role and Client Access Server Role.
You are configuring Anti-Spam Filtering on Server1.
You need to ensure that all emails with the words "Free Credit Check" are rejected unless the email is sent to Finance Distribution Group.
You also need to ensure that all emails from partner company
Domain name adatum.com bypass the Anti-Spam Filter.
You run the Add-ContentFilterPhrase and add the words "Free Credit Check"
What should you do next?
A. Run the Set-TransportConfig and Set-ContentFilterConfig
B. Run the Set-SenderReputationConfig and Set-TransportConfig
C. Run the Set-ContentFilterConfig and Set-RecipientFilterConfig
D. Run the Set-SenderFilterConfig and Set-RecipientFilterConfig


Answer Clike
Which WAN link or links should you identify?

Your network contains an internal network and a perimeter network. The internal network contains four offices. The perimeter network is located in a separate office. Each internal office has a direct WAN link to all other internal offices.
Each of the four offices that make up the internal network is configured as an Active Directory site. The Active Directory sites and site links are configured as shown in the exhibit. (Click the Exhibit button.)


Your company has an Exchange Server 2013 organization. Each site contains two servers that have the Mailbox server role and the Client Access server role installed.
To the perimeter network, you deploy two servers that have Exchange Server 2010 Service Pack 2 (SP2) and the Edge Transport server role installed.
You configure an Edge Subscription to Site1.
You deploy a new email notification application to Site4. The application will send 25,000 email messages daily to external recipients.
You need to identify which WAN links will have increased traffic from the new email application.
Which WAN link or links should you identify? (Each answer presents part of the solution. Choose all that apply.)
A. The WAN link between Site4 and the perimeter network
B. The WAN link between Site4 and Site3
C. The WAN link between Site1 and the perimeter network
D. The WAN link between Site4 and Site1
E. The WAN link between Site4 and Site2


Answer Clike
Which three actions should you perform?

You have an Exchange Server 2007 organization.
You recently deployed a server that has Exchange Server 2013 installed.
The Exchange Server organization contains three servers. The servers are configured as shown in the following table.


Server2 contains a mailbox for a user named User1. You move the mailbox of User1 to Server3.
After the move, User1 fails to access his mailbox by using Outlook Web App. Users who have mailboxes on Server1 and Server2 can access their mailboxes by using Outlook Web Access.
You need to ensure that User1 can access his mailbox from the Internet by using Outlook Web App at https://mail.contoso.com.
The solution must ensure that users who have mailboxes on Server1 and Server2 can continue to use Outlook Web Access.
Which three actions should you perform? (Each correct answer presents part of the solution. Choose three.)
A. Export the certificate on Server1 and import the certificate to Server 3.
B. On all of the Exchange servers, install a new certificate that contains the mail.contoso.com and legacy.contoso.com names.
C. Redirect all of the traffic from the Internet for mail.contoso.com to Server3.
D. On all of the Exchange servers, install a new certificate that contains the Server1.contoso.com, server2.contoso.com, server3.contoso.com, and legacy.contoso.com names.
E. Create a host (A) record named legacy.contoso.com that points to Server1.


Answer Clike
Which cmdlet should you run?

You host Exchange Server 2013 organizations for several hundred tenants.
The infrastructure contains several custom transport agents.
You need to prevent the transport agents from overloading the processors on one of the Exchange servers.
Which cmdlet should you run?
A. Set-WorkloadPolicy
B. Set-ResourcePolicy
C. Set-TransportAgent
D. Set-ThrottlingPolicy


Answer Clike
Which three commands should you run?

DRAG DROP
You have an Exchange Server 2013 organization that contains a server named EX1. You have a user named User1 in the marketing department.
You need to prevent User1 from submitting more than 50 email messages per minute to the Exchange Server organization by using Microsoft Outlook.
Which three commands should you run?
To answer, move the three appropriate commands from the list of commands to the answer area and arrange them in the correct order.
Select and Place:




Answer Clike
Which three actions should you perform?

DRAG DROP
You have an Exchange Server 2013 organization that contains four servers named EX1, EX2, EX3, and EX4. All of the servers are members of a database availability group (DAG) named DAG1.
Each server has a copy of a mailbox database named DB1. DB1 has the following characteristics:
. The replay lag time on Ex4 is set to 14 days.
. Single item recovery on all of the servers is set to 14 days.
. None of the servers have Volume Shadow Copy Service (VSS) backups.
Ex4 has a folder named F:RDB that is used to store database files during restore operations.
Twenty days ago, a user named User1 deleted an email message that had a subject of “Sales Report”.
You need to restore the deleted email message to the mailbox of User1.
You copy the lagged database and the log files that are older than 20 days to F:RDB.
Which three actions should you perform?
To answer, move the three appropriate actions from the list of actions to the answer area and arrange them in the correct order.
Select and Place:




Answer Clike
Which cmdlet should you run?

EX1 and EX2 are members of a database availability group (DAG) named DAG1. DAG1 contains four mailbox databases. All databases are active on EX1 and replicate to EX2.
You start an unplanned maintenance on EX1 and shut down EX1.
You discover that the databases do not mount on EX2.
You restart EX1 and the databases mount automatically on EX1.
You need to identify what prevents the databases from switching over successfully to EX2.
Which cmdlet should you run?
You have an Exchange Server 2013 organization that contains two servers named EX1 and EX2.
A. Test-ServiceHealth
B. Test-OutlookConnectivity
C. Get-AvailabilityReportOutage
D. Test-ReplicationHealth


Answer Clike
What should you do first?

Your company has three offices. Each office is configured as an Active Directory site.
You have three servers that have Exchange Server 2013 installed named EX1, EX2 and EX3. All three servers have the Client Access server role and the Mailbox server role installed.
The Active Directory site links and costs are configured as shown in the exhibit. (Click the Exhibit button.)


Site B is designated as a hub site.
EX2 fails.
You discover that all email messages sent from the users in Site A to the users in Site C are queued on a server in Site A.
You need to ensure that the email messages are sent to Site C as quickly as possible.
What should you do first?
A. Modify the Active Directory site link costs.
B. Configure Site A as a hub site.
C. Modify the Exchange-specific site link cost.
D. Remove the hub site.


Answer Clike
Which three actions should you perform?

Your network contains an Active Directory forest named contoso.com. The forest contains an enterprise root certification authority (CA) named CA1. The network contains a server named EX1 that has Exchange Server 2013 installed.
A partner company named A. Datum Corporation has an Active Directory domain named adatum.com. The domain contains a server named EX5 that has Exchange Server 2010 Service Pack 2 (SP2) installed. EX5 has a Receive connector that is configured for mutual TLS.
Users in contoso.com plan to send email messages that contain sensitive data to users in adatum.com.
You need to ensure that all of the email messages sent from contoso.com to adatum.com are encrypted by using TLS. The solution must ensure that EX1 and EX5 validate server certificates.
Which three actions should you perform? (Each correct answer presents part of the solution. Choose three.)
A. Run the set-transportconfig -tlssenddomainsecurelist contoso.com command.
B. Install a certificate, and then assign the certificate to the IIS service. Send the root certificate for contoso.com to the administrators in adatum.com.
C. Run the New-SendConnector cmdlet and specify the domainsecureenabled parameter.
D. Run the New-SendConnector cmdlet and specify the tlsdomainparameter.
E. Run the set-transportconfig -tlssenddomainsecurelist adatum.com command.
F. Install a certificate, and then assign the certificate to the SMTP service. Send the root certificate for contoso.com to the administrators in adatum.com.


Answer Clike
Which cmdlet should you use?

You have an Exchange Server 2013 organization that contains five servers.
Your company has a finance department, a marketing department, and a research department.
Users in the marketing department are prevented from creating more than two Exchange ActiveSync device associations.
You have a user named User5 in the finance department.
You need to prevent User5 from creating more than two Exchange ActiveSync device associations.
Which cmdlet should you use?
A. Set-ThrottlingPolicyAssociation
B. Set-ResourcePolicy
C. Set-ActiveSyncMailboxPolicy
D. Set-CASMailbox


Answer Clike
Which three commands should you run?

You have an Exchange Server organization that contains three servers that have Exchange Server 2013 installed and one server that has Exchange Server 2010 installed.
You create the custom RBAC roles shown in the following table.


The Seattle help desk manages all of the users in an organizational unit (OU) named Seattle. The Miami help desk manages all of the users in an OU named Miami. The IT Administrators manage all of the users in the forest.
You need to recommend which commands must be run to prevent only the members of both help desks from modifying the properties of users who have a department attribute value of Manager.
Which three commands should you run? (Each correct answer presents part of the solution. Choose three.)
A. new-managementscope “executive users exclusive scope” -recipientrestrictionfilter { department -eq “manager” } -exclusive force
B. new-managementroleassignment -name “managers” -securitygroup “managers” -role “mail recipients” -exclusiverecipientwritescope “executive users exclusive scope”
C. new-roleassignmentpolicy -name “limited end user policy” -roles “mypersonalinformation”.
D. new-rolegroup -name “managers” -roles “mail recipients” -members admins
E. new-rolegroup -name “help desk” -roles “mail recipients” -members admins


Answer Clike
Which two actions should you perform?

Your network contains an Active Directory forest. The forest contains a single domain named contoso.com. You have an Exchange Server 2013 organization named Contoso.
You plan to create an additional SMTP domain named sales.contoso.com. You will use sales.contoso.com as the primary SMTP address for the users in the sales department.
You create a new email address policy and apply the policy to the sales users.
New sales users report that when they attempt to access their email from the Internet for the first time by using Microsoft Outlook 2010, they fail to connect. The sales users connect to their mailbox internally successfully by using Outlook 2010. All other users can connect to their mailbox from the Internet and internally.
You need to ensure that the new sales users can connect to the Exchange Server 2013 organization by using Outlook Anywhere from the Internet.
Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)
A. Modify each existing Service Connection Point (5CP) object in Active Directory to point to autodiscover.sales.contoso.com.
B. From DNS Manager, create a host (A) record for autodiscover.sales.contoso.com.
C. On the Client Access servers, deploy a new certificate that includes the autodiscover.sales.contoso.com name.
D. Create a new Autodiscover virtual directory on the Client Access servers and configure ExternalURL to use autodiscover.sales.contoso.com.
E. Create a new Service Connection Point (SCP) object in Active Directory that points to autodiscover.sales.contoso.com.


Answer Clike
What should you do?

You have an Exchange Server 2013 organization named Contoso. The organization contains a server named Server1 that has Exchange Server 2013 installed. Server1 has the Mailbox server role and the Client Access server role installed.
Server1 has a Send connector for a partner company. The Send connector is configured for Domain Security with a domain named adatum.com.
The only certificate installed on Server1 expires.
You discover that all email messages sent to adatum.com remain in the queue on Server1.
On Server1, you install a new certificate from a trusted third-party.
You need to ensure that the email messages are delivered to adatum.com.
What should you do?
A. Assign the new certificate to the IIS service.
B. Send the new certificate to the administrator at adatum.com.
C. Assign the new certificate to the SMTP service.
D. Create a new send connector that contains an address space to adatum.com.


Answer Clike
Which cmdlet should you run?

Your company has a main office and a branch office.
You have an Exchange Server 2013 organization.
The company recently built a new meeting room in the branch office.
You need to ensure that the meeting room is available by using the Room Finder feature in Microsoft Outlook.
Which cmdlet should you run?
A. Set-MailboxCalendarConfiguration
B. New-Mailbox
C. Set-CalendarProcessing
D. New RemoteMailbox


Answer Clike
Which solutions should you recommend?

HOTSPOT
You are planning to implement several servers on virtual machines. The servers have Exchange Server 2013 installed.
The planned implementation must meet the following requirements:
. Minimize the amount of overhead required for the virtualization solution.
. Minimize the risk of data corruption for the Exchange Server databases.
You need to recommend a storage solution for the Exchange databases and a backup and recovery solution for the planned servers.
Which solutions should you recommend?
To answer, select the appropriate solutions in the answer area.
Hot Area:




Answer Clike
Which cmdlets should you use?

DRAG DROP
You have an Exchange Server 2013 organization that contains a server named Server1.
A user named User1 has an administrative assistant named Assistant1. A user named User2 has an administrative assistant named Assistant2.
You need to configure access to Outlook to meet the following requirements:
. Assistant1 must be able to send email messages as a User1.
. Assistant2 must be able to send email messages on behalf of User2.
Which cmdlets should you use? (To answer, drag the appropriate cmdlets to the correct requirements. Each cmdlet may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.)
Select and Place:




Answer Clike
Which command should you run?

HOTSPOT
You have an Exchange Server 2013 organization that contains 10 mailbox servers.
You have a custom workload management policy named App1Policy. App1Policy is applied to three Mailbox servers.
You deploy a new Mailbox server named EX11.
You need to ensure that App1Policy is applied to EX11.
Which command should you run? (To answer, configure the appropriate options in the answer area.)
Hot Area:




Answer Clike
Which command should you run?

HOTSPOT
You have an Exchange Server 2013 organization that contains two distribution groups named Groupl and Group2.
You need to prevent the members of Groupl and Group2 from communicating with each other by using email, unless the email messages contain the string Press Release in the subject.
Users whose email messages are rejected must receive a non-delivery report (NDR) that contains a status code of 5.7.3.
Which command should you run? (To answer, configure the appropriate options in the answer area.)
Hot Area:




Answer Clike
Which cmdlet should you run?

Your company has four regional offices and 20 branch offices. The regional offices connect to each other by using a 30-Mbps WAN link. Each branch office connects to its nearest regional office by using a 1-Mbps WAN link.
The network contains an Active Directory forest. The forest contains a domain controller in each office. Each office maps to an Active Directory site.
Each branch office site connects to the nearest regional office site by using an Active Directory site link.
You have an Exchange Server 2013 organization that contains one server in each office.
You need to implement a messaging solution to meet the following requirements:
. The users in the branch offices must only be able to send email messages that are up to 2 MB to the users in the other offices.
. The users in the regional offices must be prevented from sending email messages that are larger than 5 MB to the users in any of the regional offices.
Which cmdlet should you run?
A. Set-TransportRule
B. Set-ADSite
C. Set-AdSiteLink
D. Set-RoutingGroupConnector


Answer Clike
Which two tasks should you perform?

You have an Exchange Server 2013 organization named for A.Datum Inc. A user named User1 is a member of the Domain Admins group. User1 fails to synchronize a new Windows Phone device by using Exchange ActiveSync and receives an HTTP 500 error message.
User1 successfully logs on to Outlook Web App and Outlook Anywhere. You need to ensure that User1 can synchronize the new Windows Phone device by using Exchange ActiveSync. Which two tasks should you perform? (Each correct answer presents a complete solution. Choose two.)
A. Disable permission inheritance on the User1 user account.
B. Enable permission inheritance on the User1 user account.
C. Install a trusted root certificate on the Windows Phone device.
D. Create a new mobile device mailbox policy.
E. Modify the Exchange ActiveSync policy that applies to User1’s mailbox.


Answer Clike
Which cmdlet should you run?

Your company, Fabrikam Inc., has an Exchange Server 2013 organization. The organization that contains three servers named Server1, Server2, and Server3. Server1 and Server2 are members of a database availability group (DAG) named DAG1.
DAG1 contains two mailbox databases. All databases are active on Server1 and replicate to Server2.
You start an unplanned maintenance on Server1 and shut down Server1. You discover that the databases do not mount on Server2. You restart Server1 and the databases mount automatically on Server1.
You need to identify what prevents the databases from switching over successfully to Server2.
Which cmdlet should you run?
A. Test-ReplicationHealth
B. Test-OutlookConnectivity
C. Test-ServiceHealth
D. Get-AvailabilityReportOutage


Answer Clike
Which two tasks should you perform?

You have an Exchange Server 2010 organization named adatum.com. You deploy a server that has Exchange Server 2013 installed. You plan to install eight additional servers that have exchange Server 2013 installed. You are a member of the Organization Management role group. You hire a temporary Exchange administrator named Temp1.
The company’s security policy states that all external consultants must have the minimum number of required permissions on the network.
You need to ensure that Temp1 can install a server named Server5. The solution must meet the requirements of the security policy.
Which two tasks should you perform? (Each correct answer presents part of the solution. Choose two.)
A. Run setup and specify the /newprovisionedserver:Server5 parameter.
B. Add Temp1 to the Delegated Setup management role group.
C. Add Temp1 to the Exchange Server role group.
D. Create a new management role and a new role assignment policy.
E. Run setup and specify the /roles:temp1 parameter


Answer Clike
Which command should you run in each domain?

DRAG DROP
You deploy an Active Directory forest that contains two domains named contoso.com and child.contoso.com.
You plan to deploy Exchange Server 2013 servers to the child.contoso.com domain.
You need to prepare Active Directory for the installation of the first Exchange Server 2013 servers.
Which command should you run in each domain? (To answer, drag the appropriate commands to the correct domains. Each command may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.)
Select and Place:




Answer Clike
What should you include in the recommendation?

You have an Exchange Server 2013 organization.
Your company has a Service Level Agreement (SLA) stating that you must be able to reconnect disconnected mailboxes to user accounts for up to 365 days. After 365 days, disconnected mailboxes must be deleted permanently.
You need to recommend a solution to meet the SLA.
What should you include in the recommendation?
A. Create a retention policy and apply the policy to all mailboxes.
B. Configure the deleted mailbox retention setting for all databases.
C. Configure the deleted item retention setting for all databases.
D. Implement a database availability group (DAG) that contains a lagged copy.


Answer Clike
Which tool should you use?

A user fails to connect to his mailbox by using Outlook Anywhere. The user successfully connects to the mailbox by using an Exchange ActiveSyncenabled mobile device and Outlook Web App.
You need to identify what prevents the users from connecting to the mailbox by using Outlook Anywhere.
Which tool should you use?
A. Microsoft Outlook
B. Microsoft Exchange Server Deployment Assistant
C. Microsoft Exchange RPC Extractor
D. Microsoft Exchange Server Profile Analyzer
E. Microsoft Exchange Server User Monitor
F. Microsoft Exchange Load Generator
G. Exchange Remote Connectivity Analyzer
H. Exchange Server MAPI Editor


Answer Clike
Which three actions should you perform?

DRAG DROP
You have an Exchange Server 2013 organization that contains a database availability group (DAG). There are four copies of every mailbox database.
One of the copies is a lagged copy configured to have a replay lag time of 14 days.
All mailboxes have single item recovery enabled. All databases are configured to have a deleted item retention period of seven days.
A company executive reports that an email message, which was deleted 10 days ago, must be restored.
You need to ensure that you can recover the email message from the lagged copy of the mailbox database. The solution must preserve the lagged copy of the mailbox database.
Which three actions should you perform?
To answer, move the three appropriate actions from the list of actions to the answer area and arrange them in the correct order.
Select and Place:




Answer Clike
Which command should you run on EX1 and EX3?

DRAG DROP
Your network contains an Active Directory forest. The forest contains a single domain named fabrikam.com.
You have an Exchange Server organization that contains four servers. The servers are configured as shown in the following table.


You plan to enable Outlook Anywhere for all users. You plan to configure the users to connect to the name oa.fabrikam.com. The IP address of oa.fabrikam.com points to EX3.
You need to ensure that users on EX2 and EX4 can access their mailbox by using Outlook Anywhere.
Which command should you run on EX1 and EX3? (To answer, drag the appropriate cmdlets to the correct servers. Each cmdlet may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.)
Select and Place:




Answer Clike
What should you do?

You have an Exchange Server 2013 organization named adatum.com. The organization contains two servers named EX1 and EX2 that are configured as shown in the table.


Both servers are members of a database availability group (DAG). EX1 has the active copy of a database named Database1.
Several users who have mailboxes in Database1 discover that all of their outbound email messages remain in their Drafts folder when they use Outlook Web App.
You need to ensure that the email messages are delivered.
What should you do?
A. On EX2, retry the message queues.
B. On EX1, start the Microsoft Exchange Mailbox Transport Submission service.
C. On EX2, start the Microsoft Exchange Mailbox Transport Submission service.
D. On EX1, retry the message queues.


Answer Clike
Which two commands should you run?

You have an Exchange Server 2013 organization that contains two Mailbox servers named MBX1 and MBX2.
You create a database availability group (DAG) named DAG1. DAG1 is configured as shown in the exhibit. (Click the Exhibit button.)


You need to ensure that replication only occurs over the replication network.
Which two commands should you run? (Each correct answer presents part of the solution. Choose two.)
A. Set-DatabaseAvailabilityGroupNetwork ReplicationDagNetwork01 ReplicationEnabled $true
B. Set-DatabaseAvailabilityGroupNetworkMapiDagNetwork ReplicationEnabled $false
C. Set-DatabaseAvailabilityGroup Dag1 ManualDagNetworkConfiguration $true
D. Set-DatabaseAvailabilityGroup Dag1 ManualDagNetworkConfiguration $false


Answer Clike
What are two possible ways to achieve this goal?

You have an Exchange Server 2013 organization that contains a server named Server1.
Server1 has an IP address of 10.1.100.16 and is configured to use a default gateway of 10.1.100.1.
You deploy a hardware load balancer that is configured to use the IP addresses of 192.168.101.31 and 10.1.100.31.
A user named User1 has a client computer that has an IP address of 102.168.101.201. User1 reports that he cannot view his mailbox by using Outlook Web App.
When you review the IIS logs on Server1, you discover the following information:
#Fields: date time cs-method cs-uri-stem s-port c-ipcs(Referer) sc-status2013-01-09 00:08:55 POST /owa/ev.owa2 443 192.168.101.201 https://owa.fabrikam.com/owa/ 200
You need to ensure that User1 can access his mailbox successfully from Outlook Web App.
What are two possible ways to achieve this goal? (Each correct answer presents a complete solution. Choose two.)
A. Configure the hardware load balancer to use the same certificate as the certificate used on Server1.
B. Configure the hardware load balancer to use source NAT (SNAT).
C. Configure the computer of User1 to ignore response headers.
D. Modify the default gateway of Server1.


Answer Clike
Which command should you run?

You have an Exchange Server 2013 organization that is configured to filter email messages for spam and malware.
You need to modify the schedule for applying updates to the anti-spam and the antimalware definitions.
Which command should you run?
A. Update-MalwareFilteringServer.ps1
B. Set-MalwareFilteringServer
C. Set-SenderFilterConfig
D. Update-SafeList


Answer Clike
Which command should you run?

HOTSPOT
Your network contains an Active Directory forest named contoso.com. The forest contains two sites named Site1 and Site2.
You have an Exchange Server 2013 organization that contains two servers. The servers are configured as shown in the following table.


An administrator creates a new Active Directory site named Site3. The administrator creates mailboxes for the users in Site3. All of the mailboxes of the Site3 users are located on EX1.
Site3 contains a domain controller named dc3.contoso.com. The Site3 users report that sometimes, when they open Microsoft Outlook, it takes a long time to access their mailbox.
You need to reduce the amount of time it takes for the users to access their mailbox.
Which command should you run? (To answer, select the appropriate options in the dialog box in the answer area.)
Hot Area:




Answer Clike
Which two actions should you perform?

You have an Exchange Server 2013 organization that contains one server named exl.contoso.com. The server has the Mailbox server role and the Client Access server role installed.
You plan to configure users to work from home and to access their email by using the Outlook Anywhere feature.
Upon testing the planned configuration, you discover that the users can connect and synchronize email from home, but they cannot execute the following tasks:
. Set automatic replies for Out of Office.
. Download changes to the offline address book.
. View availability data when scheduling meetings with coworkers.
The users can execute these tasks when they work from the office.
You need to ensure that the users can execute the tasks when they work from home.
Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)
A. Install a new certificate on exl.contoso.com
B. Modify the EWS virtual directory.
C. Create a new Autodiscover virtual directory.
D. Renew the certificate on exl.contoso.com.
E. Modify the OAB virtual directory.


Answer Clike
Which three commands should you run in sequence?

DRAG DROP
You have an Exchange Server 2013 organization named adatum.com. The organization contains a server named Server1. Server1 is a member of a Database Availability Group (DAG) named DAG1.
You have a user named Sales1 in the Sales department.
You need to prevent Sales1 from submitting more than 75 email messages per minute to the Exchange Server organization by using Microsoft Outlook.
Which three commands should you run in sequence? (To answer, move the appropriate three commands from the list of commands to the answer area and arrange them in the correct order.)
Select and Place:




Answer Clike
Which three actions should you perform in sequence?

DRAG DROP
You have an Exchange Server organization that contains three servers. The servers are configured as shown in the following table.


You need to create a new database availability group (DAG) that contains EX1 and EX2.
Which three actions should you perform in sequence? (To answer, move the appropriate three actions from the list of actions to the answer area and arrange them in the correct order.)
Select and Place:




Answer Clike
What should you create?

Your company has a main office site and a disaster recovery site. The two sites connect to each other by using redundant WAN links. Each site connects directly to the Internet. Each site contains one Exchange Server 2013 server that is accessible from the Internet.
The company uses the ©contoso.com email address suffix. The DNS records that can be resolved from the Internet are configured as shown in the following table.


When the Internet link at the main office site fails, the company cannot receive incoming email from the Internet.
You need to ensure that incoming email from the Internet is delivered to Server1. Incoming email from the Internet must be delivered to Server2 if Server1 is unavailable.
What should you create?
A. A CNAME record for the name mail.contoso.com that resolves to server2.contoso.com
B. An MX record that has a cost of 20 and resolves to mail.contoso.com
C. An MX record that has a cost of 20 and resolves to server2.contoso.com
D. An A record for the name mail.contoso.com that resolves to 131.107.101.1


Answer Clike
Which two actions should you perform?

You have an Exchange Server 2013 organization.
You create two distribution groups named Group1 and Group2. Group1 and Group2 each contain several hundred users. Group1 contains a user named User1.
You need to configure moderation for Group2. The solution must meet the following requirements:
Email sent from the members of Group1 must NOT be moderated unless the sender is User1.
All other email must be moderated by a user named Admin1.
Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)
A. Create a transport rule that has a condition of The recipient is Group2. Configure the transport rule to have an action of Forward the message for approval to Admin1.
B. Run Set-DistributionGroup Group2 -ModeratedBy Admin1 -BypassModerationFromSendersOrMembers Group1 -ModerationEnabled $true.
C. Create a transport rule that has the conditions of The sender is User1 and The recipient is Group2. Configure the transport rule to have an action of Forward the message for approval to Admin1.
D. Create a transport rule that has the conditions of The sender is User1 and The recipient is Group2. Configure the transport rule to have an action of Forward the message for approval to Admin1.


Answer Clike
Which three actions should you perform?

You have an Exchange Server 2013 organization that contains two servers named EX1 and EX2.
EX1 and EX2 are the members of a database availability group (DAG) named DAG1.
EX1 and EX2 each contain a copy of a mailbox database named DB1. DB1 is configured to retain deleted items for 120 days.
At the end of each month, the mailbox databases on EX1 are backed up to tape. The monthly backups are retained for two years.
A user named User1 has a mailbox in DB1.
User1 discovers that a mailbox folder that contained important email messages was deleted more than six months ago.
You need to recover the deleted mailbox folder without affecting any other users who have mailboxes in DB1.
Which three actions should you perform? (Each correct answer presents part of the solution. Choose three.)
A. Run the New-MaiboxRestoreRequest cmdlet.
B. Run the New-MailboxDatabase cmdlet and specify the Recovery parameter.
C. Restore DB1 from the tape backup to an alternate location.
D. Restore DB1 from the tape backup to the database’s original location.
E. Run the New-Mailbox cmdlet and specify the Recovery parameter.


Answer Clike
Which cmdlet should you run?

You have an Exchange Server 2010 organization.
All users connect to their mailbox by using Microsoft Outlook 2013 and Outlook Web App. All client connections to Exchange Server use the name mail.contoso.com.
You deploy Exchange Server 2013 to the organization, you move all of the users to Exchange Server 2013, and then you decommission all of the Exchange Server 2010 servers.
The users report that when they open Outlook 2013, they receive a certificate warning message.
The users do not receive a certificate error message or a certificate warning message when they open Outlook Web App.
You need to prevent the certificate warning message from occurring when the users open Outlook 2013.
Which cmdlet should you run?
A. Set-ClientAccessServer
B. New-ExchangeCertficiate
C. New-ClientAccessArray
D. Import-ExchangeCertificate


Answer Clike
Which two cmdlets should you run?

Your network contains an Active Directory forest. The forest contains two sites named Montreal and New York.
You have an Exchange Server 2013 organization that contains a Mailbox server and a Client Access server in each site.
The users in the New York site report that the offline address book (OAB) is not updated after an extended WAN outage between the sites.
The Montreal site contains the OAB generation server.
You need to ensure that the New York site users download the OAB from a server in the New York site.
Which two cmdlets should you run? (Each correct answer presents part of the solution. Choose two.)
A. Set-Mailbox
B. New-OfflineAddressBook
C. New-Mailbox
D. New-OabVirtualDirectory
E. Set-OfflineAddressBook


Answer Clike
What should you do?

Your network contains an Active Directory forest. The forest contains one domain. The domain contains two sites and three domain controllers. The sites and domain controllers are configured as shown in the following table.


The sites connect to each other by using a WAN link.
You have an Exchange Server 2013 organization that contains two servers in the Main Office site.
In Branch1, you plan to deploy one server to the Exchange Server 2013 organization.
You need to ensure that all of the Exchange Server services in Branch1 are available if the WAN link fails after the planned deployment.
What should you do?
A. Create a site link bridge, and then configure Branch1 as a hub site.
B. Replace the domain controller in Branch1 with an RODC that runs Windows Server 2012.
C. Replace the domain controller in Branch1 with a writable domain controller that runs a Server Core installation of Windows Server 2008.
D. Create an additional site link, and then configure Branch1 as a hub site.


Answer Clike
Which servers should you identify for each name?

DRAG DROP
You have an Exchange Server 2007 organization.
You are migrating the organization to Exchange Server 2013. The migration will last eight weeks.
All servers are in a site named Site1.
The servers in the organization are configured as shown in the following table.
/* TABLE MISSING */
Users who have mailboxes on all of the servers will access Outlook Anywhere by using the mail.adatum.com name.
You need to recommend which servers must be associated to the autodiscover.adatum.com and mail.adatum.com names.
Which servers should you identify for each name? (To answer, drag the appropriate servers to the correct names. Each server may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.)
Select and Place:




Answer Clike
Which cmdlet should you run?

You have an Exchange Server 2013 organization that contains two Client Access servers named SERVER1 and SERVER2 and two Mailbox servers named 5ERVER3 and SERVER4.
You have a firewall that controls all of the traffic between the internal network and the Internet.
SERVER3 and SERVER4 are prevented from communicating with Internet hosts.
SERVER1 and SERVER3 are in a site named Main. 5ERVER2 and SERVER4 are in a site named Main_2.
All outbound email is sent through SERVER1.
Main fails.
You discover that email messages for the Internet are queued on SERVER4.
You create a new send connector in Main_2.
You discover that all of the outbound email is queued on 5ERVER4 and is not delivered to the Internet.
You verify that the client computers on the network can receive email messages from the Internet successfully.
You need to ensure that the email messages are delivered successfully to the Internet.
Which cmdlet should you run?
A. Set-SendConnector
B. Set-TransportService
C. Set-ExchangeServer
D. Set-ADSite


Answer Clike
Which cmdlet should you use in a scheduled task?

You have an Exchange Server 2013 organization named adatum.com. The organization contains five Mailbox servers and two Client Access servers.
You need to ensure that an administrator named user1 receives a daily email message that contains a log of all the Exchange Server administrative actions.
Which cmdlet should you use in a scheduled task?
A. Search-AdminAuditLog
B. Set-Mailbox
C. New-AdminAuditLogSearch
D. Set-ExchangeServer
E. Set-AdminAuditLogConfig


Answer Clike
Which two actions should you perform?

You have an Exchange Server 2013 organization.
You plan to deploy Exchange ActiveSync for mobile devices. Each mobile device will be authenticated by using certificates issued by an internal certification authority (CA).
You need to configure the organization to authenticate the mobile devices by using the certificates.
Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)
A. From Internet Information Services (IIS) Manager on each Client Access server, configure the Microsoft-Server-ActiveSync virtual directory to require client certificates.
B. From Exchange Admin Center, configure the Microsoft-Server-ActiveSync virtual directory to require client certificates.
C. From Internet Information Services (IIS) Manager on each Client Access server, enable Active Directory Client Certificate Authentication.
D. From Internet Information Services (IIS) Manager on each Mailbox server, enable Active Directory Client Certificate Authentication.


Answer Clike
In which order should you perform the actions?

DRAG DROP
Your network contains four servers. The servers are configured as shown in the following table.


You create a new user account for a temporary user named User1.
You plan to create a new mailbox for User1.
You need to recommend which actions must be performed to ensure that User1 can modify only the values of his home phone number attribute and his office location attribute.
In which order should you perform the actions?
To answer, move all actions from the list of actions to the answer area and arrange them in the correct order.
Select and Place:




Answer Clike
Which three actions should you recommend performing on EX6 in sequence?

DRAG DROP
Your network contains an internal network and a perimeter network.
You have an Exchange Server 2010 organization that contains an Edge Transport server named EX3.
You plan to upgrade the organization to Exchange Server 2013. You plan to replace EX3 and its functionalities with a new server named EX6 that has Exchange Server 2013 installed.
EX6 will be used to send all email messages to and receive all email messages from the Internet and to filter spam.
You need to recommend which steps are required to install EX6. EX6 must have the least number of Exchange Server roles installed.
Which three actions should you recommend performing on EX6 in sequence? (To answer, move the appropriate three actions from the list of actions to the answer area and arrange them in the correct order.)
Select and Place:




Answer Clike
Which command should you run?

HOTSPOT
You have an Exchange Server 2013 organization that contains three servers. The servers are configured as shown in the following table.


All of the servers are part of a database availability group (DAG) named DAG1.
The databases are configured as shown in the following table.


All of the databases replicate between all the members of DAG1.
You plan to move all mailboxes from DB1 to DB2.
You need to ensure that the passive copies of DB1 are in a healthy state before you move the mailboxes.
Which command should you run? (To answer, select the appropriate options in the dialog box in the answer area.)
Hot Area:




Answer Clike
Which RBAC scopes should you identify?

DRAG DROP
You have an Exchange Server 2013 organization that contains several custom RBAC management roles.
You need to identify which RBAC scopes must be used to meet the following requirements:
. Manage only the mailboxes of the users in the sales department.
. Manage the properties of all the mailbox databases.
Which RBAC scopes should you identify? (To answer, drag the appropriate RBAC scopes to the correct requirements. Each RBAC scope may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.)
Select and Place:




Answer Clike
Which two new policies should you create?

You have an Exchange Server 2013 organization that contains a server named EX1.
Your network contains a non-critical internal application that regularly connects to the POP3 Service on EX1.
Users report that Outlook Web App performs more slowly than usual.
You discover that EX1 frequently has a CPU utilization that is greater than 85 percent.
You need to configure EX1 temporarily to allocate more processor resources to Outlook Web App and to allocate less processor resources to POP3.
Which two new policies should you create? (Each correct answer presents part of the solution. Choose two.)
A. a throttling policy that sets OWAMaxConcurrency to 25
B. a workload policy for POP3 that sets the WorkloadClassification to Discretionary
C. a workload policy for Outlook Web App that sets the WorkloadClassification to Discretionary
D. a throttling policy that sets PopMaxConcurrency to 25
E. a workload policy for POP3 that sets the WorkloadClassification to CustomerExpectation
F. a workload policy for Outlook Web App that sets the WorkloadClassification to CustomerExpectation


Answer Clike
Which management roles should you identify?

HOTSPOT
Your company has an Exchange Server 2013 organization.
The company hires 200 temporary employees.
You create a mailbox for each temporary employee.
You create a new management role named CustomBaseOptions that uses MyBaseOptions as a parent. You create a new management role named CustomContactInfo that uses MyContactInfo as a parent.
You plan to apply the new management roles to the temporary employees.
You need to identify which management roles must be modified to prevent the temporary employees from performing the following task:
. Adding a user photo
. Viewing delivery reports
. Viewing the Install Apps feature
. Changing the value of the office location
Which management roles should you identify?
To answer, select the appropriate management role for each task in the answer area.
Hot Area:




Answer Clike
Which design should you identify?

HOTSPOT
Your company has two offices. The offices are configured as shown in the following table.


The offices connect to each other by using a WAN link that has a latency of more than 700 ms.
You plan to deploy an Exchange Server 2013 organization to meet the following requirements:
. Ensure that users can access their mailbox if the WAN link fails.
. Ensure that users can access their mailbox if a single server fails.
. Ensure that users can access their mailbox if a single database fails.
You recommend deploying one or more database availability groups (DAGs) and mailbox database copies.
You need to identify which design meets the requirements for the planned deployment.
Which design should you identify?
To answer, select the appropriate design in the answer area.
Hot Area:




Answer Clike
Which three commands should you run from Server1?

DRAG DROP
Your company plans to deploy an Exchange Server 2013 organization.
The network contains an Active Directory forest. The forest contains two domains named contoso.com and child.contoso.com. The forest contains one Active Directory site.
To contoso.com, you plan to deploy two servers that have Exchange Server 2013 installed. To child.contoso.com, you plan to deploy two servers that have Exchange Server 2013 installed.
To the contoso.com domain, you deploy a new member server named Server1 that runs Windows Server 2012.
You need to prepare the forest for the planned deployment of Exchange Server 2013.
Which three commands should you run from Server1?
To answer, move the three appropriate commands from the list of commands to the answer area and arrange them in the correct order.
Select and Place:




Answer Clike
Which cmdlet should you use in a scheduled task?

You have an Exchange Server 2013 organization.
You need to ensure that an administrator named Admin1 receives a daily email message that contains a log of all the Exchange Server administrative actions.
Which cmdlet should you use in a scheduled task?
A. Set-AdminAuditLogConfig
B. Write-AdminAuditLog
C. New-AdminAuditLogSearch
D. Search-AdminAuditLog


Answer Clike
What should you do?

You have an Exchange Server 2013 organization named for Contoso.
A user named Admin1 is a member of the Domain Admins group.
Admin1 fails to synchronize a new Windows Phone device by using Exchange ActiveSync and receives an HTTP 500 error message. Admin1 successfully logs on to Outlook Web App and Outlook Anywhere.
You need to ensure that Admin1 can synchronize the new Windows Phone device by using Exchange ActiveSync.
What should you do?
A. Install a trusted root certificate on the Windows Phone device.
B. Create a new mobile device mailbox policy.
C. Enable permission inheritance on the Admin1 user account.
D. Disable permission inheritance on the Admin1 user account.


Answer Clike
What should you recommend doing first?

You plan to deploy an Exchange Server 2013 organization.
You need to recommend a solution to ensure that a user named User1 can access email messages by using Exchange ActiveSync on an Android device.
The solution must prevent all other users from using Android devices to access email by using Exchange ActiveSync.
What should you recommend doing first?
A. Run the Set-CasMailbox cmdlet.
B. Create a device access rule.
C. Modify the Quarantine Notification settings.
D. Create a mobile device mailbox policy.


Answer Clike
What should you do?

You have an Exchange Server 2013 organization that contains five servers.
All users connect to their mailbox by using a mobile device.
All of the users in the finance department are in an organizational unit (OU) named OU1.
You need to prevent the finance users from accessing the extended storage on their mobile device.
What should you do?
A. Create a new mobile device mailbox policy, and then run the Set-CasMailboxcmdlet.
B. Create a new device access rule, and then run the Set-Mailbox cmdlet.
C. Create a new mobile device mailbox policy, and then run the Set-Mailboxcmdlet.
D. Create a new device access rule, and then run the Set-CasMailboxcmdlet.


Answer Clike
What should you configure for each requirement?

DRAG DROP
You have an Exchange Server 2013 organization named Contoso. The organization is configured to apply a disclaimer to all email messages sent to external recipients.
Your company works with a partner company named A. Datum Corporation. A. Datum has an SMTP domain named adatum.com.
You need to ensure that email messages sent to adatum.com meet the following compliance requirements:
. Messages sent to adatum.com must NOT include the disclaimer.
. Messages that contain credit card numbers must NOT be sent to adatum.com.
. If a user writes a message that contains a credit card number and the message is addressed to a recipient at adatum.com, the user must receive a notification before the message is sent.
What should you configure for each requirement?
To answer, drag the appropriate configuration to the correct requirement in the answer area. Each configuration may be used once, more than once, or not at all. Additionally, you may need to drag the split bar between panes or scroll to view content.
Select and Place:




Answer Clike
Which three actions should you perform next?

DRAG DROP
You have an Exchange Server 2013 organization that contains three servers named EX1, EX2, and EX3. The servers are members of a database availability group (DAG) named DAG1. A mailbox database named DB1 is replicated to all the members of DAG1.
EX3 experiences a complete hardware failure.
You need to restore EX3 on a new server.
You reset the computer account for EX3.
Which three actions should you perform next?
To answer, move the three appropriate actions from the list of actions to the answer area and arrange them in the correct order.
Select and Place:




Answer Clike
Which cmdlets should you use?

DRAG DROP
You have an Exchange Server 2013 organization that contains five servers.
Several employees plan to use Microsoft Outlook to collaborate on some projects.
You need to configure access to Outlook to meet the following requirements:
. Several employees must be able to open only the Inbox of a user named User1.
. Several employees must be able to create only contacts in the mailbox of a user named User3.
. Several employees must be able to copy email messages from any folder in the mailbox of a user named User2.
Which cmdlets should you use?
To answer, drag the appropriate cmdlet to the correct requirement in the answer area. Each cmdlet may be used once, more than once, or not at all.
Additionally, you may need to drag the split bar between panes or scroll to view content.
Select and Place:




Answer Clike
Which actions should you perform?

Your company has offices in Miami, Singapore and Montreal. An Active Directory site exists for each office.
You have an Exchange Server 2013 organization that contains a server in each site. Each server has the Mailbox server role and the Client Access Server role installed.
All users connect to the Miami servers to retrieve the public folder hierarchy.
You need to create several public folders on the server in the Singapore office to meet the following requirements:
. Ensure that the public folders are available if a single Mailbox server fails.
. Ensure that the users in the Singapore office connect to their local server to retrieve the public folder hierarchy.
Which actions should you perform? (Each correct answer presents part of the solution. Choose all that apply.)
A. Create a new public folder mailbox.
B. Create a new public folder database.
C. Run the Add-MailboxDatabaseCopy cmdlet.
D. For each mailbox in the Singapore office, run the Set-Mailbox cmdlet and specify the defaultpublicfoldermailbox parameter.
E. Run the Set-PublicFolderDatabase cmdlet.
F. For each public folder mailbox, run the Set-Mailbox cmdlet and specify the defaultpublicfoldermailbox parameter.


Answer Clike
Which three actions should you perform?

DRAG DROP
You have an Exchange Server 2013 organization that contains two servers. The servers are configured as shown in the following table.


You need to create a new database availability group (DAG) that contains EX1 and EX2.
Which three actions should you perform?
To answer, move the three appropriate actions from the list of actions to the answer area and arrange them in the correct order.
Select and Place:




Answer Clike
What should you do?

You have an Exchange Server 2013 organization that contains one Client Access server. The Client Access server is accessible from the Internet by using a network address translation (NAT) device.
You deploy an additional Client Access server.
You also deploy an L4 hardware load balancer between the Client Access servers and the NAT device.
After deploying the hardware load balancer, you discover that all of the Exchange Server traffic is directed to a single Client Access server.
You need to ensure that the hardware load balancer distributes traffic evenly across both Client Access servers.
What should you do?
A. Change the default route of the Client Access servers to point to the hardware load balancer.
B. Configure the NAT device to pass the original source IP address of all connections from the Internet.
C. Configure the Client Access servers to have a second IP address and web site. Create the Exchange virtual directories in the new sites.
D. Configure SSL offloading on the hardware load balancer and the Client Access servers.


Answer Clike
Which two actions should you perform?

Your company named Contoso, Ltd., has an Exchange Server 2013 organization named contoso.com.
The network contains an Active Directory domain. The domain contains an organizational unit (OU) named SalesOU. SalesOU contains two users named User1 and User2.
Contoso purchases a domain name adatum.com.
You need to change the primary SMTP address of all the users in SalesOU to use the SMTP suffix of adatum.com. The solution must not remove the contoso.com email address.
Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)
A. Create a new email address policy and apply the policy to the users in SalesOU.
B. Change the default email address policy to include adatum.com.
C. Create a new remote domain for adatum.com.
D. Create a new accepted domain for adatum.com and set the domain type to Authoritative Domain.
E. Create a new accepted domain for adatum.com and set the domain type to External RelayDomain.


Answer Clike
Which three cmdlets should you run?

You deploy a server that has the Exchange Server 2013 Mailbox server role and Client Access server role installed.
You need to configure anti-spam to meet the following requirements:
. Email messages sent from the Internet to a distribution list named Executives must be rejected.
. Email messages that contain the words casino and jackpot must be rejected, unless they were sent to [email protected]
Which three cmdlets should you run? (Each correct answer presents part of the solution. Choose three.)
A. Add ContentFilterPhrase
B. Set-ContentFilterConfig
C. Set-TransportConfig
D. Set-SenderReputationConfig
E. Set-RecipientFilterConfig


Answer Clike
Which action or actions should you recommend performing?

You need to recommend a solution to resolve the load balancing issue.
Which action or actions should you recommend performing? (Each correct answer presents part of the solution. Choose all that apply.)
A. From Exchange Management Shell, import a certificate and assign the certificate to the IIS service.
B. From the settings of the hardware load balancer, enable cookie-based persistence.
C. From Exchange Admin Center, configure the Exchange Server 2013 virtual directories.
D. From DNS Manager, create new DNS records in the public DNS zone.
E. From the settings of the hardware load balancer, disable the source NAT (SNAT).
F. From EX3, generate a new certificate.


Answer Clike
Which commands should you run?

HOTSPOT
You create a workload management policy named EX4.
You need to create a new workload policy to resolve the hardware resources issue on EX4.
Which commands should you run? (To answer, select the appropriate options in the answer area.)
Hot Area:




Answer Clike
What should you do?

You need to ensure that users can create new public folders when EX4 is unavailable.
What should you do?
A. Run the New-PublicFolderMoveRequest cmdlet.
B. Add EX4 to DAG1.
C. Create a new public folder database.
D. Run the New-MoveRequest cmdlet.


Answer Clike
What authentication and permission group should you configure for the Receive Connector?

HOTSPOT
You need to ensure that the help desk application can use EX4 as an SMTP relay to send email messages. The solution must ensure that the sender of the email messages is displayed as Help Desk.
What authentication and permission group should you configure for the Receive Connector? (To answer, configure the appropriate options in the answer area.)
Hot Area:




Answer Clike
Which actions should you recommend performing in each forest?

DRAG DROP
You are evaluating the implementation of the address rewrite feature in the Fabrikam forest.
You need to recommend a solution for the Trey Research forest and the Fabrikam forest to share the SMTP domain name of treyresearch.com.
Which actions should you recommend performing in each forest? (To answer, drag the appropriate actions to the correct forests. Each action may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content)
Select and Place:




Answer Clike
Which cmdlet should you include in the recommendation?

You need to recommend a solution to resolve the issue of domain controller overuse.
Which cmdlet should you include in the recommendation?
A. Set-ExchangeServer
B. Set-OrganizationConfig
C. Set-ADServerSettings
D. Set-AuthConfig


Answer Clike
Which value should you set for each SCL option?

HOTSPOT
You need to implement the SCL configurations to support the planned changes.
Which value should you set for each SCL option? (To answer, configure the appropriate options in the dialog box in the answer area.)
Hot Area:




Answer Clike
Which command should you include in the recommendation?

HOTSPOT
You need to recommend a solution to resolve the issue for the finance department users.
Which command should you include in the recommendation? (To answer, select the appropriate options in the answer area.)
Hot Area:




Answer Clike
Which four cmdlets should you use?

You need to configure the address books to meet the business goal for the finance department.
Which four cmdlets should you use?
A. Set-MailUser, New-OfflineAddressBook, New-AddressBookPolicy, and New- GlobalAddressList
B. Set-MailUser, New-OfflineAddressBook, New-GlobalAddressList, and New-AddressList
C. Set-Mailbox, New-DistributionGroup, New-AddressBookPolicy. and New-AddressList
D. Set-Mailbox, New-AddressBookPolicy, New-GlobalAddressList, and New-AddressList


Answer Clike
Which command should you run?

You need to ensure that if a volume fails on EX2 again, a mailbox database copy is recreated automatically on a different volume.
Which command should you run?
A. Set-MailboxDatabase
B. Set-MailboxDatabaseCopy
C. Set-DatabaseAvailabilityGroup
D. Set-MailboxAutoRcplyConfigu ration


Answer Clike
Which three actions should you recommend performing in sequence?

DRAG DROP
You need to recommend to a solution to deploy the Outlook app.
Which three actions should you recommend performing in sequence? (To answer, move the appropriate three actions from the list of actions to the answer area and arrange them in the correct order.)
Select and Place:




Answer Clike
Which command should you include in the recommendation?

HOTSPOT
You need to recommend a solution to meet the technical requirement for message recovery.
Which command should you include in the recommendation? (To answer, configure the appropriate options in the answer area.)
Hot Area:




Answer Clike
Which cmdlets should you recommend using on EX1 and EX2?

DRAG DROP
You need to recommend a solution to resolve the user access issues that occur during the installation of updates on the Exchange Server 2013 servers.
Which cmdlets should you recommend using on EX1 and EX2? (To answer, drag the appropriate cmdlet to the correct servers. Each cmdlet may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.)
Select and Place:




Answer Clike
What should you include in the recommendation?

You need to recommend a solution to resolve the issue of the human resources department manager.
What should you include in the recommendation?
A. Run Set-ADServerSettings -ConfigurationDomainController dcl.proseware.com on all of the Exchange servers in the London site.
B. Move the PDC emulator to the New York office.
C. Modify the replication interval on the Active Directory site link.
D. Schedule a task that runs the Update-AddressList command to run once per hour.


Answer Clike
What should you do?

You need to recommend a solution to resolve the issue for the London office users.
What should you do?
A. Modify the properties of the OAB virtual directory.
B. Create a new address book policy.
C. Modify the properties of the default offline address book (OAB).
D. Create a new arbitration mailbox.


Answer Clike
Which three actions should you recommend?

Running above command will force Outlook client “Only connect to proxy servers that have this principal name in their certificate” to be enabled and value set to msstd:mail.contoso.com.
If client connects to a proxy server, which does not have mail.contoso.com in subject name field in the certificate, the connection will fail.
You need to recommend which actions must be performed to meet the technical requirements for the new Contoso users.
Which three actions should you recommend? (Each correct answer presents part of the solution. Choose three.)
A. Configure UPN suffix routing.
B. Configure Contoso to trust Proseware.
C. Configure Proseware to trust Contoso.
D. Run the New-Mailbox cmdlet and specify the AccountDisabled parameter.
E. Run the New-Mailbox cmdlet and specify the LinkedMasterAccount parameter.
F. Create a linked role group.


Answer Clike
Which command should you include in the recommendation?

HOTSPOT
You need to recommend a solution to resolve the Autodiscover and the free/busy information issues.
Which command should you include in the recommendation? (To answer, configure the appropriate options in the answer area.)
Hot Area:




Answer Clike
Which two commands should you run?

You are implementing a solution to meet the security requirements for Outlook authentication.
You purchase a new certificate that has a subject name of mail.proseware.com and SANs of autodiscover.proseware.com and oa.proseware.com.
You create a host (A) record for oa.proseware.com in the public DNS zone.
Remote users report that they fail to connect to their mailbox by using Outlook.
You need to ensure that the remote users can connect to their mailbox from Outlook. The solution must meet the security requirements.
Which two commands should you run? (Each correct answer presents part of the solution. Choose two.)
A. Set-OutlookProvider EXPR -CertPrincipalName msstd:mail.proseware.com
B. Set-OutlookAnywhere -ExternalHostName oa.proseware.com -ExternalClientAuthenticationMethod Basic -ExternalClientsRequireSsI $true – InternalHostName mail.proseware.com -InternalClientAuthenticationMethod NTLM -InternalClientsRequireSsI Strue
C. Set-OutlookProvider EXPR -CertPrincipalName msstd:oa.proseware.com
D. Set-OutlookAnywhere -ExternalHostName mail.proseware.com- ExternalClientAuthenticationMethod Basic -ExternalClientsRequireSsI $true – InternalHostName oa.proseware.com -InternalClientAuthenticationMethod NTLM -InternalClientsRequireSsI $true


Answer Clike
Which command should you use?

HOTSPOT
You are attempting to resolve the database activation issue. You need to identify why the database copies are activated on EX3 instead of EX2.
Which command should you use? (To answer, select the appropriate options in the answer area.)
Hot Area:




Answer Clike
Which commands should you run?

DRAG DROP
You need to identify which commands must be run to perform the maintenance window tasks.
Which commands should you run? (To answer, drag the appropriate commands to the correct tasks. Each command may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.)
Select and Place:




Answer Clike
Which command should you recommend?

HOTSPOT
You need to recommend which command must be run to remove the email notifications from all of the servers if App1 malfunctions again.
Which command should you recommend? (To answer, configure the appropriate options in the answer area.)
Hot Area:




Answer Clike
What should you do?

DRAG DROP
You are evaluating the planned deployment of the additional Exchange Server 2013 servers.
You need to meet the technical requirement for installing all of the anti-spam agents and for enabling antimalware filtering.
What should you do? (To answer, drag the appropriate servers to the correct locations. Each server may be used once, more than once, or not at all.
You may need to drag the split bar between panes or scroll to view content.)
Select and Place:




Answer Clike
Which command should you include in the recommendation?

HOTSPOT
You need to recommend a solution to meet the business requirements for users accessing their email messages.
Which command should you include in the recommendation? (To answer, select the appropriate options in the answer area.)
Hot Area:




Answer Clike
What should you include in the recommendation?

You are evaluating the deployment of the additional Exchange Server 2013 servers.
You need to recommend changes to the transport configurations to ensure that all email messages sent from the Detroit office are routed through EX2.
What should you include in the recommendation?
A. Increase the cost of the CHI-NY site link to 15.
B. Specify an Exchange-specific cost of 20 for the CHI-DET site link.
C. Decrease the cost of the CHI-NY and the DET-NY site links to 4.
D. Increase the cost of the DET-NY site link to 15.


Answer Clike
What should you include in the solution?

You need to recommend a solution to resolve the issue of email messages not being received on the Internet.
What should you include in the solution?
A. Modify the CNAME record.
B. Add an MX record.
C. Modify the TXT record.
D. Add a pointer (PTR) record.


Answer Clike
What should you include in the recommendation?

You need to recommend a solution for the New York office that meets the technical requirements for client access.
What should you include in the recommendation? (Each correct answer presents a complete solution. Choose all that apply.)
A. DNS round robin
B. a Layer 4 hardware load balancer
C. a Layer 7 hardware load balancer
D. the Network Load Balancing (NLB) feature
E. a Client Access server array


Answer Clike
Which three actions should you recommend performing in sequence?

DRAG DROP
You need to recommend a solution to meet the mailbox creation requirements.
Which three actions should you recommend performing in sequence? (To answer, move the appropriate three actions from the list of actions to the answer area and arrange them in the correct order.)
Select and Place:




Answer Clike
Which external namespaces should you identify for each office?

DRAG DROP
You need to identify which external namespaces must be used for the Exchange servers in each office.
Which external namespaces should you identify for each office?
To answer, drag the appropriate namespace to the correct office in the answer area. Each namespace may be used once, more than once, or not at all.
Additionally, you may need to drag the split bar between panes or scroll to view content.
Select and Place:




Answer Clike
Which command should you include in the recommendation?

HOTSPOT
You need to recommend a solution to meet the technical requirements for mailbox size restrictions.
Which command should you include in the recommendation? (To answer, select the appropriate options in the answer area.)
Hot Area:




Answer Clike
Which command should you include in the recommendation?

HOTSPOT
You need to recommend a solution to meet the technical requirements for email message recovery.
Which command should you include in the recommendation? (To answer, configure the appropriate options in the answer area.)
Hot Area:




Answer Clike
What should you recommend adding?

You are evaluating the planned deployment of the additional Exchange Server 2013 servers.
You need to recommend changes to the DNS records to ensure that email messages are routed to the Detroit site if the servers in the New York site are unavailable.
What should you recommend adding?
A. An MX record that has a preference value of 10 that points to EX4
B. An MX record that has a preference value of 20 that points to EX4
C. An MX record that has a preference value of 10 that points to EX3
D. An MX record that has a preference value of 20 that points to EX3


Answer Clike
Which property should you modify by using the Set-OutlookAnywhere cmdlet?

You are testing the planned implementation of Exchange Server 2013.
After you begin moving several mailboxes to Exchange Server 2013, you discover that users on the internal network that have been moved are prompted repeatedly for their credentials when they run Microsoft Outlook.
You run the Get-OutlookAnywhere cmdlet on CH-EX4, and receive the following output:


You need to prevent the internal users from being prompted for their credentials when they connect to their mailbox by using Outlook.
Which property should you modify by using the Set-OutlookAnywhere cmdlet?
A. IISAuthenticationMethods
B. InternalHostname
C. ExternalHostname
D. ExternalClientAuthenticationMethod
E. InternalClientAuthenticationMethod


Answer Clike
Which two tasks should you recommend?

You need to recommend which tasks must be performed to deliver email messages to the Internet if CH-EX2 and CH-EX3 fail to connect to the Internet.
The solution must ensure that all queued email is sent.
Which two tasks should you recommend? (Each correct answer presents part of the solution. Choose two.)
A. Run the retry-queue ch-to-internet command.
B. Create a new Send connector on a server in the Baltimore office.
C. Modify the cost of the CH-to-Internet Send connector.
D. Run the set-sendconnector -identity ch-to-internet -frontendproxyenabled Strue command.
E. Disable the CH-to-Internet Send connector.


Answer Clike
Which three actions should you perform?

DRAG DROP
You need to create and configure a hierarchical address book (HAB) named Litware to reflect the company’s organizational chart.
Which three actions should you perform?
To answer, move the three appropriate actions from the list of actions to the answer area and arrange them in the correct order.
Select and Place:




Answer Clike
Which tools should you identify?

DRAG DROP
You are planning the upgrade to Exchange Server 2013.
You plan to perform the following tasks:
Identify the number of email messages sent and received by the users in the current Exchange Server organization.
Identify how many IOPS are required to provide adequate access to mailboxes for all of the users in the planned organization.
Validate that all of the planned servers will meet the IOPS requirements of the planned organization.
You need to identify which tool must be used to achieve each task.
Which tools should you identify?
To answer, drag the appropriate tool to the correct task in the answer area. Each tool may be used once, more than once, or not at all. Additionally, you may need to drag the split bar between panes or scroll to view content.
Select and Place:




Answer Clike
What should you do next?

You need to resolve the search issue reported by the users in the New York office.
You restart the Microsoft Exchange Search service and discover that the active copy of the mailbox database has a content indexing status of Unknown.
What should you do next?
A. Rebuild the content index.
B. Run the Update-MailboxDatabaseCopy cmdlet and specify the -manualresume parameter.
C. Restart the Microsoft Exchange Mailbox Replication service.
D. Run the Update-MailboxDatabaseCopy cmdlet and specify the -catalogonly parameter.


Answer Clike
What should you create in contoso.com?

You need to ensure that all of the email messages sent from the Internet to adatum.com are routed through the contoso.com organization.
What should you create in contoso.com? (Each corrects answer presents part of the solution. Choose all that apply.)
A. A contact object for each adatum.com recipient
B. An internal relay accepted domain for adatum.com
C. A Send connector that is configured to point to the contoso.com transport servers
D. A Send connector that is configured to point to the adatum.com transport servers
E. An authoritative accepted domain for adatum.com


Answer Clike
Which two actions should you perform?

You need to prevent several users in the Miami office from establishing more than two concurrent Exchange ActiveSync connections to the Exchange Server organization. The solution must affect only the users in the Miami office.
Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)
A. Create a new throttling policy that has the Organization scope.
B. Create a new throttling policy that has the Global scope.
C. Create a new throttling policy that has the Regular scope.
D. Run the Set-ThrottlingPolicyAssociation cmdlet.
E. Run the Set-ThrottlingPolicy cmdlet.
F. Remove the default throttling policy.


Answer Clike
What are three possible ways to achieve the goal?

You need to recommend a temporary solution to reroute all of the outbound email messages through the Miami mail appliance during the planned replacement of the New York mail appliance.
What are three possible ways to achieve the goal? (Each correct answer presents a complete solution. Choose three.)
A. Modify the value of the SmartHost of the Send connector in the New York office.
B. Increase the cost of the Send connector in the Miami office.
C. Increase the cost of the Send connector in the New York office.
D. Decrease the cost of the Send connector in the New York office,
E. Modify the value of the SmartHost of the Send connector in the Miami office.
F. Disable the Send connector in the New York office.


Answer Clike
Which DAG design should you deploy?

HOTSPOT
You are evaluating a DAG design for the New York and Atlanta offices.
You need to ensure that all of the users in the New York and Atlanta offices can access their mailbox if the WAN link fails.
Which DAG design should you deploy?
To answer, select the appropriate DAG design in the answer area.
Hot Area:




Answer Clike
Which node should you install the root CA certificate?

HOTSPOT
You discover that one of the Client Access servers in the New York office does not trust the standalone CA.
You need to ensure that all of the users who have Windows Phone devices can connect successfully to their mailbox.
In which node should you install the root CA certificate?
To answer, select the appropriate node in the answer area.
Hot Area:




Answer Clike
What should you recommend?

What should you recommend?
You need to recommend changes to the network to ensure that you can deploy the planned Exchange Server 2013 infrastructure.
A. Transfer of the FSMO roles to a domain controller in the Chicago office.
B. Change the forest functional level.
C. Change the domain functional level.
D. Change the operating system on one of the domain controllers in the Chicago office


Answer Clike
Which names should you identify?

HOTSPOT
You need to identify which names must be used as the URLs of each virtual directory on the planned Exchange Server 2013 servers.
Which names should you identify?
To answer, configure the appropriate name for each server in the answer area.
Hot Area:




Answer Clike
Which two parameters should you modify by using the Set-SendConnector cmdlet?

You are testing the planned implementation of Domain Security. You discover that users fail to exchange domain-secured email messages.
You open the Exchange Management Shell and discover the output shown in the exhibit. (Click the Exhibit button.)


You need to ensure that users can exchange email messages by using Domain Security.
Which two parameters should you modify by using the Set-SendConnector cmdlet? (Each correct answer presents part of the solution. Choose two.)
A. tlsauthlevel
B. requiretls
C. ignorestarttls
D. tlsdomain
E. domainsecureenabled
F. smarthostauthmechanism


Answer Clike
Which script should you recommend?

You need to recommend which script the administrators must run to create the reports required to meet the technical requirements.
Which script should you recommend?
To answer, select the appropriate script in the answer area.
Hot Area:




Answer Clike
Which recovery solution should you recommend?

You need to recommend which recovery solution will restore access to all of the mailboxes in AccountingDB if EX1 fails. The solution must restore access to email messages as quickly as possible.
Which recovery solution should you recommend?
A. On EX2, create a new mailbox database. Restore the database files, and then mount the database. Run the New-MailboxRestoreRequest cmdlet for all of the mailboxes in the database.
B. On EX2, create a new mailbox database. Restore the database files, and then mount the database. Run the Set-Mailbox cmdlet for all of the mailboxes in the database.
C. On replacement hardware, run setup /mode:recoverserver. Restore the database files, and then mount the database. Run the Set-Mailbox cmdlet.
D. On replacement hardware, run setup /mode:recoverserver. Restore the database files, and then mount the database. Run the New-MailboxRestoreRequest cmdlet for all of the mailboxes in the database.


Answer Clike
Which three actions should you recommend performing in sequence?

You need to recommend to a solution to deploy the Outlook app.
Which three actions should you recommend performing in sequence?
Select and Place:




Answer Clike
Which business requirement should you identify?

You need to identify which business requirement will be met by implementing the planned hardware load balancer.
Which business requirement should you identify?
A. Minimize the hardware costs required for a load balancing solution.
B. Minimize the software costs required for a load balancing solution.
C. Minimize user interruptions if a service fails on a Client Access server.
D. Minimize user interruptions if a service fails on a Mailbox server.


Answer Clike
What should you recommend?

You need to recommend which task is required to prepare Active Directory for the planned Exchange Server 2013 implementation.
What should you recommend?
A. On any domain controller in the Paris office, run setup.exe /preparead.
B. On any domain controller in the Amsterdam office, run setup.exe /preparead.
C. On any domain controller in the Paris office, run setup.exe /preparealldomains.
D. On any domain controller in the Amsterdam office, run setup.exe /preparedomain.


Answer Clike
Which three actions should you perform in fabrikam.com?

You need to recommend a design that meets the technical requirements for communication between Fabrikam and A. Datum.
Which three actions should you perform in fabrikam.com? (Each correct answer presents part of the solution. Choose three.)
A. Create a remote domain for adatum.com.
B. Exchange certificates with the administrators of adatum.com.
C. From EDGE1, create a Send connector that has an address space for adatum.com
D. Run the Set-TransportConfigcmdlet.
E. Run the Set-TransportServercmdlet.
F. From a Mailbox server, create a Send connector that has an address space for adatum.com.


Answer Clike
Which three actions should you include in the recommendation?

You are evaluating the implementation of a second Edge Transport server named EDGE2 in the Amsterdam office.
You need to recommend which tasks must be performed to ensure that email messages can be sent by the organization if a single Edge Transport server fails.
Which three actions should you include in the recommendation?
To answer, move the three appropriate actions from the list of actions to the answer area and arrange them in the correct order.
Select and Place:




Answer Clike
Which type of group should you recommend?

You need to recommend which type of group must be used to create the planned department lists.
Which type of group should you recommend?
A. Universal Distribution
B. Dynamic Distribution
C. Global Security
D. Universal Security


Answer Clike
Which two tasks should you recommend?

You need to recommend which tasks must be performed to meet the technical requirements of the research and development (R&D) department.
Which two tasks should you recommend? (Each correct answer presents part of the solution. Choose two.)
A. Create a new global address list (GAL) and a new address book policy.
B. Modify the permissions of the default global address list (GAL), and then create a new GAL.
C. Run the Update AddressList cmdlet.
D. Run the Set-Mailbox cmdlet.
E. Create an OAB virtual directory.


Answer Clike
Which configurations should you recommend?

HOTSPOT
You need to recommend which configurations must be set for each network.
Which configurations should you recommend?
To answer, select the appropriate configurations for each network in the answer area.
Hot Area:




Answer Clike
Which anti-spam feature should you identify?

An administrator recommends removing EDGE1 from the implementation plan and adding a new Client Access server named CAS-8 instead.
You need to identify which anti-spam feature will NOT be available on CAS-8.
Which anti-spam feature should you identify?
A. Connection Filtering
B. Sender Filtering
C. Content Filtering
D. Recipient Filtering


Answer Clike