70-342 180(Questions) Advanced Solutions of Microsoft Exchange Server 2013

What should you do first?

You plan to deploy 20 Client Access servers that will have Exchange Server 2013 installed.
You need to prepare the certificate required for the planned deployment. The solution must ensure that the same certificate can be used on all of the Client Access servers.
What should you do first?
A. On one of the Client Access servers, run the New-ExchangeCertificate cmdlet and specify the PrivateKeyExportable parameter.
B. On all of the Client Access servers, run the Get-ExchangeServer cmdlet.
C. On one of the Client Access servers, run the New-ExchangeServer cmdlet and specify the BinaryEncoding parameter.
D. On one of the Client Access servers, start the Certificates console and run the certificate import wizard.


Answer Clike
What should you include in the plan?

You are planning an Exchange Server 2013 Deployment. You plan to install exchange servers in two sites, SiteA and SiteB. You plan to add all exchange servers to a single database availability group (DAG) and have all of the databases replicated to all servers.
You implement the load balancers as configured in the following table:


You need to plan a solution that automatically allows all users to connect to their mailbox if all of the exchange servers in one site fail.
What should you include in the plan?
A. Create two host (A) records named mail.fabrikham.com that each point to one of the VIP’s.
B. Change the DAG settings of AllowCrossSiteRPCAccess to $True.
C. Create one host (A) record named site1.fabrikham.com that points to 192.168.1.10 and create one host (A) record named site2.fabrikham.com that points to 192.168.2.10.
D. Change the DAG setting of DatabaseAvailabilityGroupConfiguration to $Null.


Answer Clike
Which command should you run?

You have an Exchange Server 2013 organization that contains one office in Los Angeles and one office in New York.
All servers have the Mailbox server role and the Client Access server role installed and are members of a data availability group (DAG) named DAG1. The servers and databases are shown in the exhibit. (Click the Exhibit button.)


You need to ensure that if the active copy of NYDB01 fails, a server in the same site will attempt to activate a copy of the database before a server in another site does. The solution must not influence the activation of other database copies.
Which command should you run?
A. suspend-mailboxdatabasecopy -identity nydb01ex3 -activationonly
B. set-mailboxserver -identity ex3 -autodatabasemountdial bestavailability
C. suspend-mailboxdatabasecopy -identity nydb01ex4 -activationonly
D. set-mailboxserver -identity ex4 -autodatabasemountdial bestavailability.


Answer Clike
What should you modify?

You have an Exchange Server organization that contains Exchange Server 2010 servers and Exchange Server 2013 servers. You have a Microsoft Lync Server 2010 environment that is integrated with Unified Messaging (UM) services.
You have an Exchange Server 2010 server named EX1 that has the Unified Messaging server role installed.
You are migrating the UM services to Exchange Server 2013.
You need to prevent EX1 from providing call answering services during the migration.
What should you modify?
A. the UM mailbox policies
B. the UM auto attendants
C. the UM dial plans
D. the UM hunt groups


Answer Clike
HOTSPOT

HOTSPOT
You manage an Exchange Server 2013 organization that has an organization relationship with a partner company named Contoso, LTD.
Contoso has an Exchange Server 2013 organization and has Microsoft Outlook 2013 deployed to all users.
You run the Get-OrganizationRelationship | fl and you receive the following output.


Use the drop-down menus to select the answer choice that completes each statement.
Hot Area:




Answer Clike
HOTSPOT

HOTSPOT
You run the Get-ExchangeCertificate Server Ex2 | fl and you receive the following output.


Use the drop-down area to select the appropriate answers.
Hot Area:




Answer Clike
HOTSPOT

HOTSPOT
You company has two offices. The offices are located in Los Angeles and New York.
You manage an Exchange Server 2013 organization.
A database availability group (DAG) named DAG1 contains servers from the Los Angeles office and servers from the New York office. There are copies of all the databases on all of the servers. The New York office is the primary data center and hosts all of the active database copies. As well as the witness server.
You run the Get-DatabaseAvailabilityGroup command and you receive the following output.


Select the correct option of below answer area now.
Hot Area:




Answer Clike
What command should you use?

HOTSPOT
You manage an Exchange Server 2013 organization for an investment company at which brokers are restricted from communicating with market researchers. You need to prevent members of a group named AllBrokers from using email to share confidential information with members of a group named AllResearchers. The solution must ensure that when an email message is rejected, the sender receives a custom notification of "Communication Not Permitted of Compliance Reasons".
What command should you use? To answer, select the appropriate options in the answer area.
Hot Area:




Answer Clike
Which two of the following should you create next?

You have an Exchange Server 2013 organization.
The human resources (HR) department has a custom form used to enter the personal information of employees. The form uses the Microsoft Word format.
You need to encrypt the contents of the form automatically when users in the HR department send the form to users outside the organization.
You deploy an Active Directory Rights Management Services (AD RMS) template. Which two of the following should you create next? Each correct answer presents a complete solution.
A. an Outlook protection rule.
B. a Mail Tip
C. a DLP policy template.
D. a Policy Tip.


Answer Clike
What are two possible recommendations to achieve this goal?

You have an Exchange Server 2013 organization that has two sites. The sites use a single namespace.
Each site contains two Exchange servers and a hardware load balancer. Mailboxes are distributed evenly between the sites.
Your company’s IT policy states that all users must be able to access their mailbox if one site fails.
You implement a DNS round robin solution for the Client Access server infrastructure.
When a site outage occurs, some users report experiencing intermittent slowness when they connect to their mailbox.
You need to recommend a solution to resolve the issue.
What are two possible recommendations to achieve this goal? Each correct answer presents a complete solution.
A. Remove the Virtual IP (VIP) of the failed data center.
B. Implement geo-dns
C. Add one additional Client Access server to each site.
D. Deploy a Windows Failover Cluster in each site.
E. Lower the TTL of the DNS records.


Answer Clike
What should you identify?

You have an Exchange Server 2013 organization that is integrated with Information Rights Management (IRM).
A user is unable to create and read IRM-protected messages from a mobile device. The user can open IRM- protected messages *missing text*.
You need to identify the most likely cause of the issue.
What should you identify?
A. the value of DevicePasswordEnabled of a mobile device policy
B. the value of AllowNonProvisionableDevices of a mobile device policy
C. the Exchange ActiveSync protocol version
D. the value of RequireDeviceEncryption of a mobile device policy


Answer Clike
What is the best recommendation to achieve the goal?

Your company has two offices. The offices are located in Seattle and Paris.
You have a hybrid deployment of Exchange Server 2013.
All of the users in the Seattle office have mailboxes that are hosted on-premises. All of the users in the Paris office have mailboxes that are hosted in Microsoft Office 365. Azure Rights Management (Azure RMS) is implemented for the Paris office users.
Five of the Seattle office users occasionally receive protected messages from the Paris user. The Seattle office users report that they cannot view the protected content.
You need to recommend a solution to provide the five Seattle office users with the ability to read the protected messages. The solution must minimize costs.
What is the best recommendation to achieve the goal? More than one answer choice may achieve the goal. Select the BEST answer.
A. RMS for Individuals
B. Active Directory Rights Management Services (AD RMS)
C. Information Rights Management (IRM)
D. Azure RMS


Answer Clike
HOTSPOT

HOTSPOT
You have an Exchange Server 2013 organization.
You run Get-OutlookAnywhere -Server EX1 | fl and you receive the following output.


Use the drop-down menus to select the answer choice that completes each statement.
Hot Area:




Answer Clike
How many servers should you identify?

You have an Exchange Server 2013 organization that contains the servers configured as shown in the following table.


All of the Exchange servers run Windows Server 2012 R2 and are members of a database availability group (DAG) named DAG1. Each server has a copy of all the mailbox databases. DAG1 is configured to have a cluster administrative access point. The file share witness is located in Site A.
EX5 fails and is taken offline permanently.
You need to identify the maximum number of Mailbox servers that can fail simultaneously without affecting the mailbox access of the users.
How many servers should you identify?
A. 2
B. 3
C. 4
D. 5


Answer Clike
Which command should you run first?

You have an Exchange Server 2013 organization that contains the servers configured as shown in the following table.


All mailbox servers are members of a database availability group (DAG) named DAG1. DAG1 has Datacenter Activation Coordination (DAC) mode enabled. The data center in Dallas experiences a power failure, causing quorum to be lost.
You need to mount the databases in the data center in Houston.
Which command should you run first?
A. Stop-DatabaseAvailabilityGroup -Identity DAG1 -MailboxServer EX1 -ConfigurationOnly.
B. Restore-DatabaseAvailabilityGroup -Identity DAG1 -ActiveDirectorySite Exchange-Site AlternateWitnessServer -AlternateWitnessDirectory D:DAG1
C. Stop-DatabaseAvailabilityGroup -Identity DAG1 -ActiveDirectorySite Exchange-Site
D. Stop-Service -DisplayName ClusSvc -Force.


Answer Clike
Which four commands should you run in sequence?

DRAG DROP
Your company has two offices. Each office is configured as an Active Directory site. The sites are named Site1 and Site2.
You have an Exchange Server 2013 organization that is configured as shown in the following exhibit. (Click the Exhibit button.)


Datacenter Activation Coordination (DAC) mode is enabled on the database availability group (DAG) named DAG1.
You are testing a site failover by shutting down all of the servers in Site1.
You need to mount the databases in Site2.
Which four commands should you run in sequence? (To answer, move the appropriate four commands from the list of commands to the answer area and arrange them in the correct order. More than one order of answer choices is correct. You will receive credit for any of the correct orders you select.)
Select and Place:




Answer Clike
What command should you run?

HOTSPOT
You have an Exchange Server 2013 organization that contains the servers configured as shown in the following table.


All of the Exchange servers run Windows Server 2012 R2 and are members of a database availability group (DAG) named DAG1.
A mailbox database named DB1 replicates between EX1, EX2, EX3, and EX7. The mailbox database copy of DB1 on EX7 is a lagged database.
You need to ensure that if the number of healthy database copies of DB1 is less than three during a 24-hour period, the logs in the lagged database replay automatically.
What command should you run? To answer, select the appropriate options in the answer area.
Hot Area:




Answer Clike
What command should you run?

HOTSPOT
You have an Exchange Server 2013 organization that contains three servers named EX1, EX2, and EX3 in a single Active Directory site. All of the servers are members of a database availability group (DAG) named DAG1. Each server has a copy of all the mailbox databases.
You discover that the copies of a database named DB1 are in a FailedAndSuspended state due to disk failures on EX2 and EX3.
You replace the disks.
You need to start seeding DB1 on EX2 from EX1. The solution must ensure that DB1 can be seeded on EX3 simultaneously.
What command should you run? To answer, select the appropriate options in the answer area.
Hot Area:




Answer Clike
HOTSPOT

HOTSPOT
You have an Exchange Server 2013 organization that contains two servers named EX1 and EX2.
Both servers are in the same Active Directory site.
You run Get-TransportConfig | fi "shadow" and you receive the following output.


Use the drop-down menus to select the answer choice that completes each statement.
Hot Area:




Answer Clike
What should you do?

You have an Exchange Server 2013 organization named contoso.com. A partner company has an Exchange Server 2010 Service Pack 2 (SP2) organization named fabrikam.com. Both organizations have a federated trust.
In contoso.com, you run Get-FederationInformation -DomainName contoso.com and you discover that the TokenIssueURIs property has a value of <uri:federation:MicrosoftOnline>.
In fabrikam.com, you run Get-FederationInformation -DomainName fabrikam.com and you discover that the TokenIssueURIs property has a value of <uri:WindowsLiveID>.
You need to ensure that the federated sharing can be implemented between the organizations.
What should you do?
A. In contoso.com, install the Exchange Web Service (EWS) Managed API.
B. In the contoso.com, run the Set-OrganizationConfig cmdlet.
C. In fabrikam.com, run the New-FedereationTrust cmdlet.
D. In contoso.com, run the New-FederationTrust cmdlet.


Answer Clike
Which three cmdlets should you run in sequence?

DRAG DROP
You have an Exchange server organization that contains Exchange Server 2010 servers and Exchange Server 2013 servers.
You have a Microsoft Lync Server 2010 environment that is integrated with Exchange Server 2010 to provide Unified Messaging (UM) services. All UM dial plans are SIP secured.
You plan to move the UM services to Exchange Server 2013.
You need to ensure that the Exchange Server 2013 UM services can be integrated with Lync Server 2010.
Which three cmdlets should you run in sequence? To answer, move the appropriate cmdlets from the list of cmdlets to the answer area and arrange them in the correct order.
Select and Place:




Answer Clike
What should you recommend?

HOTSPOT
You have an Exchange Server 2013 organization and a Microsoft SharePoint Server 2013 server farm.
You plan to use a SharePoint eDiscovery Center.
You need to recommend which component must be deployed before you can use the SharePoint eDiscovery Center for In-Place eDiscovery.
What should you recommend? To answer, select the appropriate options in the answer area.
Hot Area:




Answer Clike
Which two options should you use?

HOTSPOT
You have an Exchange Server 2013 organization.
You need to create a single transport rule that applies to messages sent from users in the organization to users that are outside of the organization.
Which two options should you use? To answer, select the two appropriate options in the answer area.
Hot Area:




Answer Clike
Which document type should you identify?

You have an Exchange Server 2013 organization.
You plan to use document fingerprinting.
You need to identify which file type cannot be used as a template for document fingerprinting.
Which document type should you identify?
A. .pptx
B. .doc
C. .txt
D. .dotx


Answer Clike
What should you do first?

You plan to deploy 20 Client Access servers that will have Exchange Server 2013 installed.
You need to prepare the certificate required for the planned deployment. The solution must ensure that the same certificate can be used on all of the Client Access servers.
What should you do first?
A. On each Client Access server, start the Certificates console and run the Certificate Import Wizard.
B. From the Exchange Admin Center, create a new certificate request.
C. On all of the Client Access servers, run the Get-ExchangeCertificate cmdlet.
D. On one of the Client Access servers, run the New-ExchangeCertificate cmdlet and specify the BinaryEncoding parameter.


Answer Clike
Which two actions should you perform?

You have a server named Server1 that has Exchange Server 2013 installed.
Users access their mailbox by using Microsoft Outlook 2010 and Outlook Web App.
You need to identify when a mailbox is accessed by someone other than the owner of the mailbox.
Which two actions should you perform? Each correct answer presents part of the solution.
A. Review the security event log.
B. Enable audit logging for all mailboxes.
C. Export the administrator audit log.
D. Run an administrator role group report.
E. Run a non-owner mailbox access report.


Answer Clike
What command should you run?

HOTSPOT
You have an Exchange Server 2013 organization named contoso.com.
Contoso.com has a federated trust to another Exchange Server 2013 organization named fabrikam.com.
You need to ensure that users from fabrikam.com can view the availability of users in contoso.com.
What command should you run? To answer, select the appropriate options in the answer area.
Hot Area:




Answer Clike
When accessing his mailbox from various client types.

HOTSPOT
You have an Exchange Server 2013 organization.
You plan to implement a hybrid deployment with Microsoft Office 365. Active Directory Federation services (AD FS) will be used to provide Single Sign-On (SSO). Users will access the hybrid deployment by using Microsoft Outlook 2013 and mobile devices.
A user named User1 changes the password for his on-promises Active Directory user account.
You need to identify whether User1 will be prompted for a password when accessing his mailbox from various client types.
In the table below identify whether User1 will be prompted for a password when accessing his mailbox from various clients.
NOTE: Make only one selection in each row.
Hot Area:




Answer Clike
What should you run?

You have an Exchange Server 2013 organization.
You successfully migrate the public folders from a previous version of Exchange Server.
You discover that one of the public folder mailboxes almost reached its quota size.
You need to move some of the public folders in the public folder mailbox to another public folder mailbox.
What should you run?
A. Merge-PublicFolderMailbox.ps1
B. Split-PublicFolderMailbox.ps1
C. Set-MailPublicFolder
D. Set-PublicFolder


Answer Clike
Which cmdlet should you run?

Your company has two offices. The offices are located in New York and Tokyo.
You have an Exchange Server 2013 organization.
You have the following Unified Messaging (UM) dial plans:
. Tokyo Dial Plan
. New York Dial Plan
A user named User 1 has a mailbox that is associated with the New York Dial Plan. User 1 frequently works from both the New York and the Tokyo offices.
You need to add an extension from the Tokyo office to the account of User1.
Which cmdlet should you run?
A. Set-Mailbox
B. Set-UMMailbox
C. Set-UMMailboxPolicy
D. Set-UMDialPlan


Answer Clike
Which cmdlet should you use?

You have an Exchange Server 2013 organization that is integrated with Microsoft Lync Server 2013.
You need to generate a report that shows the statistics of all the calls received or placed by the Mailbox servers during the last 12 month.
Which cmdlet should you use?
A. Get-UMPhone Session
B. Get-UMService
C. Get-UMCallDataRecord
D. Get-UMCallSummaryReport


Answer Clike
Which three Exchange servers should you associate to the UM dial plans?

You have an Exchange Server organization that contains five servers. The servers are configured as shown in the following table.


You deploy Microsoft Lync Server 2010. You need to create a Lync Server SIP Unified Messaging (UM) dial plan to enable voice integration between Lync Server and Exchange Server.
Which three Exchange servers should you associate to the UM dial plans? (Each correct answer presents part of the solution. Choose three.)
A. EX1
B. EX2
C. EX3
D. EX4
E. EX5


Answer Clike
What command should you run?

HOTSPOT
You have an Exchange Server 2013 organization.
You are deploying Unified Messaging (UM) services on an Exchange server named EX1.
You need to ensure that EX1 accepts encrypted and unencrypted VoIP traffic.
What command should you run? To answer, select the appropriate options in the answer area.
Hot Area:




Answer Clike
Which two actions should you perform?

You have an Exchange Server 2013 organization that has a hybrid deployment with Microsoft Office 365. The hybrid deployment use Active Directory Federation Services (AD FS) 3.0.
You need to ensure that only Exchange ActiveSync devices are allowed to access Office 365 services from outside of the organization.
Which two actions should you perform? Each correct answer presents part of the solution.
A. Create a Mobile Device Mailbox Policy.
B. Update the Office 365 Identify Platform relying party trust.
C. Add claims rules to the Active Directory claims provider trust.
D. Update the Office mobile device policy.
E. Add an Active Directory Identify Platform relying party trust.


Answer Clike
Which three actions should you identify?

You have an Exchange Server 2013 organization and a Microsoft Lync Server 2013 environment.
You plan to integrate Lync Server 2013 and Exchange Server 2013 Unified Messaging (UM) services.
You need to identify which actions will complete when you run the exchucutil.psl Windows PowerShell script.
Which three actions should you identify? Each correct answer presents part of the solution.
A. A UM hunt group will be created for each UM IP gateway
B. Permission to read Active Directory UM container objects will be assigned to the Lync server
C. The TLS listening port will be changed on the Client Access servers
D. The Lync server will be added to the SIP dial plan
E. A UM IP gateway will be created for each Lync Server pool
F. A UM auto attendant will be created for each UM IP gateway


Answer Clike
Which cmdlet should you use?

You have an Exchange Server 2013 organization that is integrated with Microsoft Lync Server 2013.
You need to get a list of all the calls received and placed by a user named User1 during the last 90 days.
Which cmdlet should you use?
A. Get-UMMailbox
B. Get-UMCallSummaryReport
C. Get-UMCallDataRecord
D. Get-UMPhoneSession


Answer Clike
Which cmdlet should you use?

You have an Exchange Server 2013 organization that is integrated with Microsoft Lync Server 2013. Users report that they fail to make Unified Messaging (UM) calls.
You download the Unified Message Troubleshooting tool.
You need to perform an end-to-end test of the UM components.
Which cmdlet should you use?
A. Test-ExchangeUMCallFlow
B. Test-CsPhoneBootstrap
C. Start-UMPhoneSession
D. Test-UMConnectivity


Answer Clike
What should you recommend?

HOTSPOT
You have an Exchange Server 2013 organization and a Microsoft SharePoint Server 2013 server farm.
The SharePoint server farm contains the servers shown in the following table:


You plan to use a SharePoint eDiscovery Center.
You need to recommend which component must be deployed before you can use the SharePoint eDiscovery Center for In-Place eDiscovery.
What should you recommend? To answer, select the appropriate options in the answer area.
Hot Area:




Answer Clike
Which two of the following should you create?

You have an Exchange Server 2013 organization.
The human resources (HR) department has a custom form used to enter the personal information of employees. The form uses the Microsoft Word format.
You need to prevent users in the HR department from sending any completed forms to users outside of the organization.
Which two of the following should you create? Each correct answer presents part of the solution.
A. A transport rule
B. A DLP policy template
C. A Send connector of the Partner type
D. A document fingerprint
E. A Policy Tip


Answer Clike
Which cmdlet should you use?

You have an Exchange Server 2013 organization.
A user is involved in a possible litigation matter.
You need to protect all of the messages in a mailbox from permanent deletion.
Which cmdlet should you use?
A. Enable-InboxRule
B. Add-MailboxPermisssion
C. Set-Mailbox
D. Set-Retention Policy


Answer Clike
Which solution should you include for each requirement?

DRAG DROP
You have an Exchange Server 2013 organization that has a hybrid deployment with Microsoft Office 365.
You use Microsoft Azure Active Directory Sync (Azure AD Sync) for password synchronization.
You need to configure Azure AD Sync to meet the following requirements:
. Azure AD Sync must be forced to replicate every hour.
. Only objects in an organizational unit (OU) named Sales must be synced with Office 365.
. The Office 365 user account in Azure AD Sync must be updated to [email protected]
Which solution should you include for each requirement? To answer, drag the appropriate solution to the correct requirement. Each solution may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.
Select and Place:




Answer Clike
Which five actions should you perform in sequence before decommissioning EX1 and EX2 from the network?

DRAG DROP
You have an Exchange Server 2010 organization that contains two servers named EX1 and EX2. EX1 and EX2 are members of a database availability group (DAG) named DAG1.
You plan to migrate the organization to Exchange Server 2013.
You install Exchange Server 2013 on two new servers named EX3 and EX4 and you import the required certificates.
You need to recommend which migration tasks must be performed to migrate the mailboxes and the public folders. The solution must meet the following requirements:
. Prevent any interruption to mailbox and public folder access during the migration.
. Ensure that all mailbox and public folder data remains highly available during the migration.
Which five actions should you perform in sequence before decommissioning EX1 and EX2 from the network? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.
Select and Place:




Answer Clike
Which Service Principal Names (SPNs) to associate with each version of Exchange Server.

HOTSPOT
You have an organization that has Exchange Server 2010 and Exchange Server 2013 deployed. Half of the mailboxes are on Exchange Server 2010 servers and the other half are on Exchange Server 2013 servers.
You plan to implement Kerberos authentication for all mailbox access.
You need to identify which Service Principal Names (SPNs) to associate with each version of Exchange Server.
In the table below identify which SPNs to associate with each Exchange Server version.
NOTE: Make only one selection in each row.
Hot Area:




Answer Clike
Which two actions should you perform?

You have an Exchange Server 2010 organization.
All public folders are stored on a server named Server1.
You deploy a new server named Server2. Server2 has Exchange Server 2013 installed.
You move all mailboxes to Server2.
You need to move the public folders to Server2. The solution must ensure that users can access the public folders after Server1 is decommissioned.
Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)
A. On Server2, assign the FolderOwner permission to the Public Folder Management role group for all of the public folders.
B. On Server1, modify the replication partners for all of the public folders.
C. On Server2, run the New-SiteMailboxProvisioningPolicy cmdlet.
D. On Server2, create a public folder mailbox.
E. On Server2, run the New-PublicFolderMigrationRequest cmdlet.


Answer Clike
HOTSPOT

HOTSPOT
You have an Exchange Server 2013 organization that contains four servers named EX1, EX2, EX3, and EX4. All of the servers run Windows Server 2012 R2 and are members of a database availability group (DAG) named DAG1. All of the mailbox databases replicate to all of the Mailbox servers.
From EX1, you run the Get-ClusterNode | fl cluster, state,*name*,*weight* command and you receive the following output.


Use the drop-down menus to select the answer choice that completes each statement.
Hot Area:




Answer Clike
How many servers should you identify?

You have an Exchange Server 2013 organization that contains the servers configured as shown in the following table.


All of the Exchange servers run Windows Server 2012 R2 and are members of a database availability group (DAG) named DAG1. Each server has a copy of all the mailbox databases.
DAG1 is configured to have a cluster administrative access point. The file share witness is located in Site A.
You need to identify the maximum number of Mailbox servers that can fail simultaneously without affecting the mailbox access of the users.
How many servers should you identify?
A. 2
B. 3
C. 4
D. 5


Answer Clike
What command should you run on EX1 and EX2?

HOTSPOT
You have an Exchange Server organization that contains the servers configured as shown in the following table.


You need to configure the namespace to ensure that users can connect to Outlook Web Access from the Internet if a single site is unavailable.
What command should you run on EX1 and EX2? To answer, select the appropriate options in the answer area.
Hot Area:




Answer Clike
What should you identify?

HOTSPOT
You have an Exchange Server 2013 organization that contains the servers configured as shown in the following table.


All of the Exchange servers run Windows Server 2012 R2 and are members of a database availability group (DAG) named DAG1. Each server has a copy of all the mailbox databases. DAG1 is configured to have a cluster administrative access point.
You plan to take the servers offline to perform routine maintenance.
You need to identify the maximum number of servers that can fail simultaneously during the maintenance period without affecting mailbox access of the users.
What should you identify? To answer, select the appropriate options in the answer area.
Hot Area:




Answer Clike
What is the best recommendation to achieve the goal?

You have a hybrid deployment of Exchange Server 2013.
All of the users in the Seattle office have mailboxes that are hosted on-premises. All of the users in the Paris office have mailboxes that are hosted in Microsoft Office 365. Azure Rights Management (Azure RMS) is implemented for the Paris office users.
Five of the Seattle office users occasionally receive protected messages from the Paris user. The Seattle office users report that they cannot view the protected content.
You need to recommend a solution to provide the five Seattle office users with the ability to read the protected messages. The solution must minimize costs.
What is the best recommendation to achieve the goal? More than one answer choice may achieve the goal. Select the BEST answer.
A. RMS for Individuals
B. Azure RMS
C. Active Directory Rights Management Services (AD RMS)
D. Information Rights Management (IRM)


Answer Clike
Which cmdlet should you use?

HOTSPOT
You have an Exchange Server 2013 organization.
All users access their mailbox by using Outlook Web Access. Users can view .xml files from Outlook Web Access.
You need to meet the following compliance requirements:
Audit the mailbox for a specific user.
Email the mailbox audit log to a compliance officer.
Which cmdlet should you use? To answer, select the appropriate options in the answer area.
Hot Area:




Answer Clike
HOTSPOT

HOTSPOT
You have an Exchange Server 2013 organization.
You run Get-OutlookAnywhere -Server EX1 | fl and you receive the following output.


Use the drop-down menus to select the answer choice that completes each statement.
Hot Area:




Answer Clike
What should you do?

You have an Exchange Server 2013 organization.
A member of the legal department reports that Information Rights Management (IRM)-protected messages are included in the results when performing an In-Place eDiscovery search.
You need to ensure that the IRM-protected messages are excluded from the results.
What should you do?
A. From the Exchange Admin Center, modify the permissions of the discovery mailbox.
B. From Windows PowerShell, run the Set-MailboxSearch cmdlet.
C. From the Exchange Admin Center, run the In-Place eDiscovery & Hold wizard.
D. From Windows PowerShell, run the Set-IRMConfiguration cmdlet.


Answer Clike
Which cmdlet should you run?

You need to ensure that users in the organization are notified before they send email messages to external recipients.
Which cmdlet should you run?
A. Set-Mailbox.
B. Set-OrganizationConfig.
C. Set-TransportAgent.
D. Set-TransportConfig.


Answer Clike
Which two actions should you perform?

Your company acquires a new internet domain name.
You need to ensure that all users can receive email messages sent to the new domain name.
Which two actions should you perform? (Each correct answer presents part of the solution. Choose two).
A. Modify the email address policy.
B. Create an Authoritative accepted domain.
C. Create an External Relay accepted domain.
D. Modify the properties of the default Receive connector.
E. Generate a new Exchange certificate that contains the new domain name.


Answer Clike
What should you run?

Your company is investigating a user named User1.
You need to prevent User1 from permanently deleting items from his mailbox.
What should you run?
A. Set-Mailbox User1 LitigationHoldEnabled $true.
B. Set-Mailbox User1 ModerationEnabled $true.
C. Set-Mailbox User1 RetainDeletedltemsUntilBackup $true.
D. Set-Mailbox User1 RetentionHoldEnabled $true.


Answer Clike
Which two technologies should you include in the recommendation?

You have an Exchange Server 2013 organization.
A distribution group named Sales_Reports is used to distribute confidential information to all of the senior managers in your company.
You need to recommend a solution to ensure that all unencrypted messages sent to the Sales_Reports group are encrypted on the server automatically before they are stored in the mailboxes of the managers.
Which two technologies should you include in the recommendation? Each correct answer presents part of the solution.
A. A transport rule
B. S/MIME
C. Active Directory Certificate Services (AD CS)
D. Active Directory Rights Management Services (AD RMS)
E. TLS


Answer Clike
What should you create?

You are an administrator for an international finance company.
You plan to deploy an Exchange Server 2013 organization.
The company’s compliance policy requires that all users be prevented from sending email messages that contain more than one bank account number to external recipients.
You need to meet the compliance policy requirement.
What should you create?
A. A data loss prevention (DLP) policy and a DLP policy rule
B. A retention policy, a retention tag, and a Policy Tip
C. A throttling policy and a throttling policy association
D. A transport rule and a moderated mailbox


Answer Clike
Which security settings should you recommend configuring for each dial plan?

DRAG DROP
You have a server that has Exchange Server 2013 installed.
You plan to deploy Unified Messaging (UM) to all users.
You have two UM IP gateways named GW1 and GW2.
You create, and then associate a new UM dial plan for each IP gateway. The IP gateways are configured as shown in the following table.


You need to recommend a solution that meets the following security requirements:
. All voice traffic received by GW1 must be encrypted.
. All voice traffic received by GW2 must be unencrypted.
. All signaling traffic to GW1 and GW2 must be encrypted.
Which security settings should you recommend configuring for each dial plan?
To answer, drag the appropriate security setting to the correct UM dial plan in the answer area. Each security setting may be used once, more than once, or not at all. Additionally, you may need to drag the split bar between panes or scroll to view content.
Select and Place:




Answer Clike
What should you recommend?

You have an Exchange Server 2013 organization that contains multiple Hub Transport servers. You need to recommend a message hygiene solution to meet the following requirements:
- Block servers that are known to send spam
- Minimize administrative effort
What should you recommend?
A. an IP Block list
B. IP Block list providers
C. recipient filtering
D. sender filtering


Answer Clike
How many servers should you deploy in each site?

Your company has a main office and a branch office. An Active Directory site exits for each office.
The offices are connected by a WAN link.
You plan to deploy Exchange Server 2013 in each site. You need to identify the number of Exchange servers required to meet the following requirements:
- Maintain user access to mailboxes if a single server fails.
- Use the minimize account of Exchange servers in each site.
How many servers should you deploy in each site?
A. 1
B. 2
C. 3
D. 4


Answer Clike
What should you do first?

You have an Exchange Server 2010 organization. A user named User1 connects to his mailbox using Microsoft Office Outlook. User1 reports that he is unable to send encrypted email messages to an external recipient named User2.
You verify that User1 and User2 have email encryption certificates.
You need to ensure that User1 can send encrypted email messages to User2.
What should you do first?
A. Instruct User2 to add a delegate.
B. Instruct User2 to send a signed email message to User1.
C. Instruct User1 to send a signed email message to User2.
D. Instruct User1 to modify the sensitivity settings of the email message.


Answer Clike
What should you do?

Your company has an Exchange Server 2010 organization.
The network contains an internal root certification authority (CA).
You plan to add a disclaimer to all email messages sent by users in the company.
You need to ensure that the disclaimer can be added to encrypted email messages.
What should you do?
A. Instruct users to encrypt email messages by using IRM only.
B. Instruct users to encrypt email messages by using S/’MIME only.
C. Enable the Content Filter agent on all of the Hub Transport servers.
D. Modify the priority of the Transport Rule agent on all of the Hub Transport servers.


Answer Clike
What should you do?

You have a database availability group (DAG). The DAG is configured as shown in the following table.


You need to prevent a split-brain condition if a restore operation of the DAG occurs.
What should you do?
A. Deploy an alternate witness server to each site.
B. Modify the Datacenter Activation Coordination (DAC) mode.
C. Set the quorum model of the cluster to Node and Disk Majority.
D. Deploy another Mailbox server to Site2.


Answer Clike
Which two actions should you perform?

You have a hybrid deployment of Exchange Server 2013 and Microsoft Office 365. The Exchange Server organization has a mailbox size limit of 2 GB.
You need to provide engineers with the ability to retain certain email messages indefinitely. The solution must meet the following requirements:
. Ensure that the engineers can access the retained email messages by using Outlook Web App.
. Ensure that the retained email messages do not apply to the mailbox size limit of the engineers.
. Minimize the storage requirements of the on-premises servers.
Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)
A. From Office 365, create Archive mailboxes.
B. Instruct the engineers to create a personal folder.
C. Create a retention policy.
D. From the on-premises Exchange Server 2013 organization, create Archive mailboxes.
E. Create a data loss prevention (DLP) policy.


Answer Clike
Which two actions should you recommend?

You are an administrator for a company named Contoso, Ltd.
Contoso has an Exchange Server 2013 organization.
Contoso has a partnership agreement with a company named A. Datum Corporation. A. Datum has an Exchange server 2013 organization.
Both organizations have a federation trust to the Microsoft Federation Gateway. Users at Contoso plan to share their free/busy information with users at A. Datum.
You need to recommend which tasks must be performed to ensure that the A. Datum users can see the free/busy information of the Contoso users.
Which two actions should you recommend? (Each correct answer presents part of the solution. Choose two.)
A. In the Exchange Server organization of Contoso, configure directory synchronization.
B. In the Exchange Server organization of A. Datum, create a sharing policy.
C. In the Exchange Server organization of A. Datum, configure directory synchronization.
D. In the Exchange Server organization of Contoso, create an organization relationship.
E. In the Exchange Server organization of Contoso, create a sharing policy.
F. In the Exchange Server organization of A. Datum, create an organization relationship.


Answer Clike
How should you configure the database availability groups (DAGs)?

Your network contains two Active Directory sites named Site1 and Site2. Both sites contain an equal number of users. Each site contains two Exchange Server 2013 Mailbox servers.
You need to recommend a high-availability solution that meets the following requirements:
. If a single Mailbox server fails, the active mailbox database copies on that server must fail over to a Mailbox server in the same site.
. If both Mailbox servers in the same site fail, the active mailbox databases copies must be switched over to the other site manually.
. If a WAN link fails, multiple copies of the same mailbox database must not be activated in both sites simultaneously.
How should you configure the database availability groups (DAGs)? (To answer, configure the appropriate options in the answer area.)
Hot Area:




Answer Clike
Which tasks should you identify?

DRAG DROP
You work for a financial services company that has an Exchange Server 2013 organization.
Mailbox audit logging is enabled for all mailboxes.
The company identifies the following requirements for the sales department:
. The manager of the sales department must be able to search for email messages that contain specific key words in the mailboxes of the users in the sales department.
. The manager of the human resources department must receive a report that contains a list of all the sales users’ mailboxes that were searched by the sales manager.
You need to identify which tasks must be performed to meet the requirements.
Which tasks should you identify?
To answer, drag the appropriate task to the correct requirement in the answer area. Each task may be used once, more than once, or not at all. Additionally, you may need to drag the split bar between panes or scroll to view content.
Select and Place:




Answer Clike
Which command should you run?

You have an Exchange Server 2013 organization that contains one office in Los Angeles and one office in New York.
All servers have the Mailbox server role and the Client Access server role installed and are members of a data availability group (DAG) named DAG1.
The servers and databases are shown in the exhibit. (Click the Exhibit button.)


You need to ensure that if the active copy of LADB01 fails, a server in the same site will attempt to activate a copy of the database before a server in another site does. The solution must not influence the activation of other database copies.
Which command should you run?
A. Set-databaseavailabilitygroupserver -identity dagl-alternatewitnessserverfs2
B. Set-mailboxserver-identity ex6 autodatabasemountdial bestavailability
C. Suspend-mailboxdatabasecopy-identity ladb01ex6 -activationonly
D. Set-mailboxdatabasecopy -identity ladb01ex2-activationpreference l


Answer Clike
Which two actions should you perform?

Your company has offices in Montreal, New York, and Toronto.
Each office is configured as an Active Directory site. The Montreal office has a site link to the New York office. The New York office has a site link to the Toronto office.
You have an Exchange Server 2013 organization that contains five Mailbox servers. The organization is configured as shown in the exhibit. (Click the Exhibit button.)


The servers in the Montreal and Toronto offices are members of a database availability group (DAG) named DAG01. DAG01 contains two databases name TOMBX and MTLMBX.
MTLMBX is active on EX1 and contains all of the mailboxes of the users in the Montreal office.
TOMBX is active on EX3 and contains all of the mailboxes of the users in the Toronto office.
You need to ensure that all email messages transmitted between the Montreal users and the Toronto users are routed through EX5.
Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)
A. Run the Set-MailboxTransportService cmdlet on EX5.
B. Make EX5 the source server for all of the Send connectors.
C. Create a separate DAG for each of the Montreal and Toronto offices.
D. Add EX5 to DAG01.
E. Configure the New York office as a hub site.


Answer Clike
Which two components should you identify?

You are a network administrator for a company named Contoso, Ltd.
You install the Active Directory Rights Management Services server role on a server. The Active Directory Rights Management Services (AD RMS) server uses an internal certification authority (CA) for all certificates.
You plan to provide users with the ability to use AD RMS to protect all of the email messages sent to a partner company named A. Datum Corporation.
ADatum does not have AD RMS deployed.
You need to identify which components from the Contoso network must be accessible to A. Datum to ensure that the users at A. Datum can open protected messages.
Which two components should you identify? (Each correct answer presents part of the solution. Choose two.)
A. The Active Directory domain controllers
B. The Client Access servers
C. The certificate revocation list (CRL)
D. The Mailbox servers
E. The AD RMS cluster


Answer Clike
Which cmdlets should you run?

You have an Exchange Server organization. The organization contains servers that have either Exchange Server 2010 or Exchange Server 2013 installed.
You hire a junior administrator named Admin5. Admin5 is a member of the Recipient Management management role group.
You discover that Admin5 created two new mailbox-enabled users by using the New-Mailbox command.
You need to identify which management role provides Admin5 with the permissions to create new mailbox-enabled users.
Which cmdlets should you run?
A. Get-ManagementRoleEntry and Get-RoleAssignmentPolicy
B. Get-Rolegroup and Get-ManagementRoleAssignment
C. Get-ManagementRoleEntry and Get-ManagementRoleAssignment
D. Get-RolegroupMember and Get-ManagementRoleAssignment


Answer Clike
Which three actions should you perform?

You have an Exchange Server 2013 organization that contains one Client Access server named EX1 and one Mailbox server named EX2.
You have a perimeter network and an internal network. The perimeter network contains an Edge Transport server named EX3 that has Exchange Server 2010 installed.
You need to ensure that all of the email messages sent to and received from the Internet are routed through the EX3. Which three actions should you perform? (Each correct answer presents part of the solution. Choose three.)
A. Allow SMTP traffic between EX3 and EX2.
B. Create an Edge Subscription.
C. Allow traffic over TCP 50636 from EX1 to EX3.
D. Allow SMTP traffic between EX3 and EX1.
E. Allow traffic over TCP 50636 from EX2 to EX3.
F. Modify the default Receive connector on EX2.


Answer Clike
What should you do in contoso.com?

A company named Contoso, Ltd., has an Exchange Server 2013 organization. The primary SMTP suffix for all users is contoso.com.
A company named Fabrikam, Inc., has an Exchange Server 2010 organization. The primary SMTP suffix for all users is fabrikam.com.
The users in both organizations access their email by using Microsoft Outlook 2010 and Outlook Anywhere. All of the users work from domain-joined client computers that connect to the internal network.
Contoso acquires Fabrikam.
You establish a cross-forest trust between the Contoso forest and the Fabrikam forest.
In fabrikam.com, you create a user named User1. In contoso.com, you create a linked mailbox for User1 and you set the primary SMTP address to [email protected]
User1 reports that Outlook 2010 fails to configure his mail profile automatically. User1 can manually configure his profile and connect to his mailbox.
You need to ensure that users in fabrikam.com can find their mailboxes automatically.
What should you do in contoso.com?
A. Create a DNS record named autodiscover.fabrikam.com. Point the record to the virtual IP address of the Client Access servers.
B. Modify the ExternalURL of the Autodiscover virtual directory on the Exchange Servers 2013 servers.
C. Modify the Autodiscover Service Connection Point (SCP).
D. Run the Export-AutoDiscoverConfig cmdlet on an Exchange Server 2013 server.


Answer Clike
What should you do next?

You have an Exchange Server 2013 organization that contains 10 servers.
You have a federation trust to the Microsoft Federation Gateway. The certificate in the trust relationship expires soon.
You need to replace the certificate. The solution must minimize downtime.
You purchase a new certificate.
What should you do next?
A. On all of the Exchange servers, import the certificate, and then run the New-FederationTrust cmdlet.
B. On all of the Exchange servers, import the certificate, and then run the Set- OrganizationRelationship cmdlet.
C. On one of the Exchange servers, import the certificate, and then run the Set-FederationTrust cmdlet.
D. On one of the Exchange servers, import the certificate, and then run the Set- FederatedOrganizationldentifier cmdlet.


Answer Clike
What should you do?

Your company has a hybrid deployment of Exchange Server 2013 and Microsoft Office 365.
All recipients have an SMTP suffix of contoso.com.
You discover that all of the email messages sent to the Internet from users who have Office 365 mailboxes are routed through the on-premises Exchange servers.
You need to ensure that all of the email messages are sent directly to the Internet.
What should you do?
A. Modify an organization relationship.
B. Create a new routing group connector.
C. Create a new transport rule.
D. Run the Hybrid Configuration wizard.


Answer Clike
Which three actions should you perform?

DRAG DROP
You have an Exchange Server organization. The organization contains servers that have Exchange Server 2010 and Exchange Server 2013 installed.
A new compliance policy requires that all email messages remain stored for two years.
You create two retention tags named Tag1 and Tag2. Tag1 moves the email messages to an Archive mailbox after one year. Tag2 permanently deletes the email messages after two years.
You need to meet the compliance policy requirements. The solution must ensure that all email messages that are older than two years are removed as quickly as possible.
Which three actions should you perform?
To answer, move the three appropriate actions from the list of actions to the answer area and arrange them in the correct order.
Select and Place:




Answer Clike
What should you do?

You have an Exchange Server 2013 organization.
You need to ensure that a user named User1 can prevent the deletion of every email message that contains a specific word from all of the mailboxes. The solution must minimize the number of permissions assigned to User1.
What should you do?
A. Add User1 to the Records Management management role group. Instruct User1 to run the New-ManagedContentSettings cmdlet.
B. Add User1 to the Records Management management role group. Instruct User1 to run the New-MailboxSearch cmdlet.
C. Add User1 to the Discovery Management management role group. Instruct User1 to run the New-ManagedContentSettings cmdlet.
D. Add User1 to the Discovery Management management role group. Instruct User1 to run the New-MailboxSearch cmdlet.


Answer Clike
What should you do on the mailbox of User1?

You have an Exchange Server 2013 organization.
You need to prevent a user named User1 from permanently deleting an email message in his mailbox.
What should you do on the mailbox of User1?
A. Implement a retention policy.
B. Configure a retention hold.
C. Implement a data loss prevention (DLP) policy.
D. Configure an in-place hold.


Answer Clike
Which two cmdlets should you run?

Your company has an Exchange Server 2013 organization named Contoso.
A partner company has an Exchange Server 2013 organization named Fabrikam. Neither company has any trusts between their forests.
Users from both organizations access their mailbox from the Internet by using Outlook Anywhere.
You need to ensure that the users from both organizations can share free/busy information.
Which two cmdlets should you run? (Each correct answer presents part of the solution. Choose two.)
A. New-AcceptedDomain
B. Add-AvailabilityAddressSpace
C. Set-AvailabilityConfig
D. New-SharingPolicy
E. Add-ADPermission


Answer Clike
What should you identify?

You have an Exchange Server 2013 organization.
A user named User1 has a mailbox that is enabled for Unified Messaging (UM). User1 has nine call answering rules.
When User1 attempts to create a new call answering rule, the user receives an error message.
You need to identify what prevents User1 from creating a call answering rule.
What should you identify?
A. The mailbox of User1 has the CallAnsweringRulesEnabled parameter set to $false
B. The UM mailbox policy of User1 has the AllowCallAnsweringRules parameter set to $false.
C. User1 exceeds the Inbox rules storage quota.
D. User1 has the maximum number of call answering rules allowed.


Answer Clike
What should you recommend doing before moving the mailboxes?

You have an Exchange Server 2007 organization.
You deploy a new Exchange Server 2013 organization.
You plan to move all of the mailboxes to the new organization by performing a cross-forest mailbox move.
You need to recommend a solution to meet the following requirements:
. Users must be able to reply successfully to email messages they received before their mailbox moved.
. Users must be able to send email messages to internal mailboxes by using the entries in the nickname cache that existed in Microsoft Outlook before their mailbox moved.
What should you recommend doing before moving the mailboxes?
A. Create a sharing policy and a remote domain.
B. Create an organization relationship and a remote domain.
C. For all of the users in the new organization, add their LegacyExchangeDN value as an x500 proxy address.
D. For all of the users in the new organization, add their LegacyExchangeDN value as an SMTP proxy address.


Answer Clike
Which four actions should you perform in sequence?

DRAG DROP
Your company has two offices. The offices are located in New York and San Francisco.
You have an Exchange Server 2013 organization that contains two servers. The servers are configured as shown in the following table.


The organization contains four mailbox databases. The mailbox databases are configured as shown in the following table.


Recently, DB1 went offline because of a disk failure. The disk is restored and DB1 is mounted.
You discover that there are more than 10,000 email messages queued for delivery to DB1.
You need to preserve the messages and perform the following actions:
. Export the messages queued for delivery to a different drive.
. Clear the messages queued for delivery.
. Ensure that the messages queued for delivery to DB1 are delivered while preserving the original message header information.
. Prevent duplicate messages.
Which four actions should you perform in sequence? (To answer, move the appropriate four actions from the list of actions to the answer area and arrange them in the correct order.)
Select and Place:




Answer Clike
What should you run?

You have an Exchange Server 2013 organization.
You successfully migrate the public folders from a previous version of Exchange Server.
You discover that one of the public folder mailboxes almost reached its quota size.
You need to move some of the public folders in the public folder mailbox to another public folder mailbox.
What should you run?
A. Merge PublicFolderMailbox.ps1
B. Set-MailPublicFolder
C. New-PublicFolderMigrationRequest
D. New-PublicFolderMoveRequest


Answer Clike
Which three Exchange servers should you associate to the UM dial plans?

You have an Exchange Server organization that contains five servers. The servers are configured as shown in the following table.


You deploy Microsoft Lync Server 2010. You need to create a Lync Server SIP Unified Messaging (UM) dial plan to enable voice integration between Lync Server and Exchange Server.
Which three Exchange servers should you associate to the UM dial plans? (Each correct answer presents part of the solution. Choose three.)
A. Server1
B. Server2
C. Server3
D. Server4
E. Server5


Answer Clike
Which two options should you use?

You have an Exchange Server 2013 organization.
You need to create a single transport rule that prevents users in a group named Group1 from exchanging messages with users in a group named Group2.
Which two options should you use?
To answer, select the two appropriate options in the answer area.
Hot Area:




Answer Clike
Which technology should you recommend for each requirement?

DRAG DROP
Contoso, Ltd., is a bank that has offices in North America and Europe.
The company must comply with different regulations for North America and Europe.
The company uses Information Right Management (IRM) to protect sensitive documents, such as internal financial reports.
You need to recommend a compliance solution to meet the following requirements:
. Prevent users from disclosing customers’ personal information in email messages.
. Prevent users from disclosing internal financial data to people outside of the company.
. Prevent the permanent deletion of email messages of users who are under investigation.
. Allow compliance officers to search the mailbox of users who are under investigation without being able to alter the data in the mailbox.
Which technology should you recommend for each requirement?
To answer, drag the appropriate technology to the correct requirement in the answer area. Each technology may be used once, more than once, or not at all. Additionally, you may need to drag the split bar between panes or scroll to view content.
Select and Place:




Answer Clike
Which sequence should you perform the actions?

DRAG DROP
You company has offices in the United States and Germany.
Each office contains several servers that have Exchange Server 2013 installed. The Exchange Server organization is configured for Unified Messaging (UM). Each office contains an IP-PBX device.
You need to ensure that callers to the German office can navigate the voice mail system menu in German.
In which sequence should you perform the actions? (To answer, move all of the actions from the list of actions to the answer area and arrange them in the correct order.)
Select and Place:




Answer Clike
Which command should you run?

HOTSPOT
You have an Exchange Server 2013 organization named contoso.com.
Your company, which is named Contoso, Ltd., has a partnership with another company named Fabrikam, Inc. Fabrikam has an Exchange Server 2013 organization.
Both organizations have a federation trust to the Microsoft Federation Gateway.
You need to ensure that the users at Fabrikam can see the free/busy information of the users at Contoso, including the time, the location, and the subject of appointments.
Which command should you run? (To answer, select the appropriate options in the answer area.)
Hot Area:




Answer Clike
Which message type or types should you identify?

You have an Exchange Server 2013 organization.
All user mailboxes have an In-Place Archive enabled.
You need to identify which email message types can be archived by using a retention policy.
Which message type or types should you identify? (Each correct answer presents part of the solution. Choose all that apply.)
A. calendar items
B. mail items
C. note items
D. task items
E. contact items


Answer Clike
What should you do first?

You plan to deploy 20 Client Access servers that will have Exchange Server 2013 installed.
You need to prepare the certificate required for the planned deployment. The solution must ensure that the same certificate can be used on all of the Client Access servers.
What should you do first?
A. From the Exchange Admin Center, create a new certificate request.
B. On each Client Access server, start the Certificates console and run the Certificate Import Wizard.
C. On all of the Client Access servers, delete the default self-signed certificates.
D. On one of the Client Access servers, run the Remove-ExchangeCertificate cmdlet.


Answer Clike
What should you do?

Your company has an Exchange Server 2013 organization named adatum.com.
You purchase an Office 365 subscription and configure a hybrid deployment.
All recipients have an email address that contains a SMTP suffix of adatum.com.
You discover that all of the email messages sent to the Internet from users who have Office 365 mailboxes are routed through the on-premises Exchange servers.
You need to ensure that all of the email messages are sent directly to the Internet.
What should you do?
A. Modify the Send connector.
B. Run the Hybrid Configuration wizard.
C. Create a new Sharing policy.
D. Modify an organization relationship.


Answer Clike
Which tool should you run in each environment?

DRAG DROP
You have an Exchange Server 2013 organization and a Microsoft Lync Server 2013 infrastructure.
You plan to implement voice mail for all users.
You need to prepare the environment for the planned implementation.
Which tool should you run in each environment? (To answer, drag the appropriate tool to the correct environment or environments. Each tool may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.)
Select and Place:




Answer Clike
Which command should you run?

HOTSPOT
You have an Exchange Server 2013 organization that has mailbox audit logging enabled for all users.
You deploy two third-party applications named App1 and App2. Both applications access a mailbox named Mailbox1.
App1 uses a mail-enabled user account named App1_user. App2 uses a mailbox-enabled user account named App2_user.
You need to prevent the audit logs from containing entries that relate to App2.
Which command should you run? (To answer, select the appropriate options in the answer area.)
Hot Area:




Answer Clike
Which cmdlet should you run?

You have an Exchange Server 2013 organization that has Unified Messaging (UM) enabled for all mailboxes.
The organization is configured to use an IP gateway to connect to a legacy PBX.
An administrator recently performed some configuration changes.
After the changes, users report that their voice mail is no longer being delivered to their Exchange Server mailbox. The users do not report any other problem.
You need to identify which configuration change causes the issue.
Which cmdlet should you run?
A. Test-UMConnectivity
B. Test-CsExUMConnectivity
C. Test-ExchangeUMCallFlow
D. Test-CsExUMVoiceMail


Answer Clike
Which cmdlets should you run?

You have an Exchange Server organization. The organization contains servers that have either Exchange Server 2010 or Exchange Server 2013 installed.
You hire a new helpdesk technician named helpdesk1. Helpdesk1 is a member of the Recipient Management management role group.
You discover that helpdesk1 created nine new mailbox-enabled users by using the New-Mailbox command.
You need to identify which management role provides helpdesk1 with the permissions to create new mailbox-enabled users.
Which cmdlets should you run?
A. Get-ManagementRoleEntry and Get-ManagementRoleAssignment
B. Get-RolegroupMember and Get-ManagementRoleAssignment
C. Get-ManagementRoleEntry and Get-RoleGroup
D. Get-Rolegroup and Get-RoleGroupMember


Answer Clike
What should you run?

You have an Exchange Server 2013 organization.
You successfully migrate the public folders from a previous version of Exchange Server.
You discover that one of the public folder mailboxes almost reached its quota size.
You need to move some of the public folders in the public folder mailbox to another public folder mailbox.
What should you run?
A. Set-PublicFolderMailbox
B. Merge PublicFolderMailbox.ps1
C. Split-PublicFolderMailbox.ps1
D. New-PublicFolderMigrationRequest


Answer Clike
Which DNS modification should you identify?

HOTSPOT
Your network contains two Active Directory sites named Site1 and Site2.
You have an Exchange Server 2013 organization that contains six servers. The servers are configured as shown in the following table.


All of the mailbox databases replicate to all of the servers.
Users in Site1 connect to sitel-mail.contoso.com to access their mailbox. Users in Site2 connect to site2-mail.contoso.com to access their mailbox. All of the users use Microsoft Outlook 2013.
You need to identify which DNS modification must be made to fail over the email services from Site1 to Site2.
Which DNS modification should you identify? (To answer, select the appropriate record to modify and the new data for the record in the answer area.)
Hot Area:




Answer Clike
What should you modify?

You have an Exchange Server 2013 organization that contains a database available group (DAG) named DAG1. DAG1 contains three Mailbox servers named Server1, Server2, and Server3.
DAG1 contains a mailbox database copy named DB1.
You implement a lagged copy of DB1 on Server3. The copy lag time is seven days.
You need to ensure that copies of successfully processed email messages are stored on Server1 and Server2 for seven days.
What should you modify?
A. The Shadow Redundancy settings
B. The Safety Net settings
C. The settings of DAG1
D. The settings of DB1


Answer Clike
What should you do?

You have an Exchange Server 2013 organization.
All users are issued certificates from an internal certification authority (CA).
Users who have a laptop can access their mailbox from the Internet by using Outlook Anywhere.
When the users attempt to view or to create digitally signed email messages while they are connected to the Internet, the users receive a warning message.
When the users use their laptop on the internal network, the users do not receive a warning message.
You need to ensure that the users can send and receive digitally signed email messages without receiving a warning message.
What should you do?
A. Publish the root certificate of the CA to a server that is accessible from the Internet.
B. Publish the certificate revocation list (CRL) to a server that is accessible from the Internet.
C. Install a trusted root CA certificate on all Client Access servers.
D. Install a trusted root CA certificate on all of the laptops.


Answer Clike
Which two actions should you perform?

You have an Exchange Server 2010 organization named adatum.com.
All public folders are stored on a server named EX5.
You deploy a new server named EX6. EX6 has Exchange Server 2013 installed.
You move all mailboxes to EX6.
You need to move the public folders to EX6. The solution must ensure that users can access the public folders after EX5 is decommissioned.
Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)
A. On EX6, create a public folder mailbox.
B. On EX6, run the New-PublicFolderMigrationRequest cmdlet.
C. On EX5, modify the replication partners for all of the public folders.
D. On EX6, run the New-SiteMailboxProvisioningPolicy cmdlet.
E. On EX5, assign the FolderOwner permission to the Public Folder Management management role group for all of the public folders.
F. On EX6, run the MoveAllReplicas.ps1 script.


Answer Clike
What should you include in the recommendation?

Your company has three offices. Each office has 1,000 users and is configured as an Active Directory site. Each site connects directly to the Internet.
The network contains six servers that have Exchange Server 2013 installed. The servers are configured as shown in the following table.


An administrator performs a datacenter switchover by changing the DNS record for webl.adatum.com to point to the IP address of web2.adatum.com.
Users from Main1 report that when they connect to Outlook Web App, they receive a certificate warning message.
You need to recommend a solution to ensure that the users do not receive a certificate warning message when a datacenter switchover is performed.
What should you include in the recommendation?
A. Three host headers for the Default Web Site on each Client Access server
B. One certificate that contains all of the external names as subject alternative names
C. Three certificates that each contains one of the external names
D. An external URL for each Client Access server set to $null


Answer Clike
Which tasks should you identify?

HOTSPOT
You have an Exchange Server organization that contains four servers. The servers are configured as shown in the following table.


SiteA contains an IP gateway that uses a dial plan named Dialplan1. SiteB contains a Lync Server 2013 server that uses a dial plan named Dialplan2.
You plan to migrate all Unified Messaging (UM) functionalities to Exchange Server 2013.
You need to identify which tasks must be performed to complete the migration.
Which tasks should you identify? (To answer, select the tasks that are required and not required in the answer area.)
Hot Area:




Answer Clike
What should you modify?

HOTSPOT
You have an Exchange Server 2013 organization.
All users are enabled for Unified Messaging (UM) and access their voice mail by using Microsoft Lync 2010.
Callers report that when they press a key to dial an external telephone number, they hear a message indicating that the intended destination cannot be reached.
You need to ensure that the callers can reach the external number successfully.
What should you modify?
To answer, select the appropriate object in the answer area.
Hot Area:




Answer Clike
What should you run?

You have an Exchange Server 2013 organization.
You successfully migrate the public folders from a previous version of Exchange Server.
You discover that one of the public folder mailboxes almost reached its quota size.
You need to move some of the public folders in the public folder mailbox to another public folder mailbox.
What should you run?
A. Update-PublicFolderMailbox
B. New-PublicFolderMoveRequest
C. New-PublicFolderMigrationRequest
D. Set-PublicFolderMailbox


Answer Clike
Which two actions should you perform?

You have an Exchange Server 2013 organization.
You purchase a Microsoft Office 365 subscription and configure a hybrid deployment.
The network contains an SMTP relay server named smarthost.contoso.com. The server is configured to use a certificate that has a subject name of smarthost.contoso.com.
All users have Microsoft Outlook 2013 installed on their client computer. Outlook 2013 is configured to connect to mail.contoso.com.
All Exchange servers have a certificate that has a subject name of mail.contoso.com.
You discover that email messages sent from on-premises users are not delivered to Office 365 recipients. You discover that the Send connector for Office 365 uses a smart host of smarthost.contoso.com.
You need to ensure that the on-premises users can send email messages to the Office 365 recipients.
Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)
A. Run the Hybrid Configuration Wizard again.
B. Configure the Microsoft Exchange Online Protection (EOP) Send connector to use smarthost.contoso.com
C. Configure the centralized mail transport option.
D. Remove the smart host from the Send connector.
E. Assign a certificate that has a subject name of smarthost.contoso.com to the Send connector.


Answer Clike
What are two possible ways to achieve this goal?

You have a server named Server1 that has Exchange Server 2013 installed.
Users access their mailbox by using Microsoft Outlook 2010 and Outlook Web App.
You enable auditing for all of the mailboxes.
You need to identify when a mailbox is accessed by someone other than the owner of the mailbox.
What are two possible ways to achieve this goal? (Each correct answer presents a complete solution. Choose two.)
A. Export the administrator audit log.
B. Run an administrator role group report.
C. Export the mailbox audit log.
D. Run a non-owner mailbox access report.
E. Review the security event log.


Answer Clike
Which option should you configure from the UM Auto Attendant window?

HOTSPOT
Your company implements Exchange Server 2013 Unified Messaging (UM).
The company uses an auto attendant.
You need to ensure that when calls are routed to the auto attendant, callers can press 0 to reach a receptionist.
Which option should you configure from the UM Auto Attendant window? To answer, select the appropriate option in the answer area.
Hot Area:




Answer Clike
Which two tasks should you recommend performing?

Your company has three data centers. The data centers are located in Montreal, New York, and Seattle.
You have an Exchange Server 2013 organization that contains six servers. The servers are configured as shown in the following table.


The organization is configured as shown in the following exhibit. (Click the Exhibit button.)


The file share witness for DAG1 is located on EX3.
You plan to implement site resiliency and use a single name space named mail.contoso.com.
You need to recommend a solution to minimize the amount of time that the Exchange Server services are unavailable if either the data center in Montreal or the data center in Seattle fails.
Which two tasks should you recommend performing? (Each correct answer presents part of solution. Choose two.)
A. Deploy a hardware load balancer to EX3 and EX6.
B. Create two DNS host (A) records for mail.contoso.com.
C. Configure EX6 as an alternate file share witness.
D. Move the file share witness to Server1.


Answer Clike
Which two possible rules achieve this goal?

You have an Exchange Server 2013 organization.
You create a data loss prevention (DLP) policy. The mode of the DLP policy is set to Enforce.
You need to ensure that email messages containing social security numbers from the United States are blocked.
Which two possible rules achieve this goal? (Each correct answer presents a complete solution. Choose two.)
A. U.S. State Breach: Allow Override
B. U.S. State Breach: Scan email sent outside - low count
C. U.S. State Breach: Scan email sent outside - high count
D. U.S. State Breach: Scan text limit exceeded
E. U.S. State Breach: Attachment not supported


Answer Clike
What should you do?

You have an Exchange Server 2010 organization that contains three servers. The servers are configured as shown in the following table.


Microsoft Outlook is configured to connect to an FQDN of mail.adatum.com. Mail.adatum.com resolves to the IP address of a Layer 7 hardware load balancer. The hardware load balancer is configured to send traffic to EX2 and EX3.
You deploy an Exchange Server 2013 Mailbox server named EX4 and an Exchange Server 2013 Client Access server named EX5.
You plan to migrate all mailboxes to Exchange Server 2013.
You need to recommend a solution to ensure that users can access their mailbox on EX1 or EX4 during the migration.
What should you do?
A. Create a Client Access server array that contains EX1 and EX5.
B. Modify the autodiscover.contoso.com resource record to point to EX5.
C. Modify the properties of the hardware load balancer to point to EX5.
D. Create a DNS record named legacy.contoso.com in the internal DNS zone.


Answer Clike
Which three actions should you perform?

You have an Exchange Server organization that contains four servers. The servers are configured as shown in the following table.


You are deploying Unified Messaging (UM).
You create a dial plan named UMPlan1 and a UM mailbox policy named UMPlan Mailbox Policy.
You need to ensure that all voice mail sent to the existing extension of a user is delivered to the user’s mailbox.
Which three actions should you perform? (Each correct answer presents part of the solution. Choose three.)
A. Create a UM hunt group
B. Create a UM IP gateway.
C. Configure the IP-PBX to route calls to EX3 and EX4
D. Configure the IP-PBX to route calls to EX I and EX2.
E. Assign EX I and EX2 to UMPlan1.
F. Assign EX3 and EX4 to UMPlan1.


Answer Clike
Which task should you perform in each environment?

DRAG DROP
You have an Exchange Server 2013 organization that contains two Mailbox servers and two Client Access servers.
You have an Active Directory Rights Management Services (AD RMS) cluster. Information Rights Management (IRM) is enabled for the Exchange Server organization.
All company executives are in a security group named Execs. All of the executives use smartphones that are managed by using a mobile device mailbox policy. The executives frequently read IRM-protected email messages by using Microsoft Outlook.
You need to ensure that the executives can read the IRM-protected messages on their smartphone.
Which task should you perform in each environment? (To answer, drag the appropriate tasks to the correct environments. Each task may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.)
Select and Place:




Answer Clike
Which three commands should you run in sequence?

DRAG DROP
Your company has two offices. Each office is configured as an Active Directory site. The sites are named Site1 and Site2.
You have an Exchange Server 2013 organization that is configured as shown in the following exhibit. (Click the Exhibit button.)


Datacenter Activation Coordination (DAC) mode is enabled on the database availability group (DAG) named DAG1.
You are testing a site failover by shutting down all of the servers in Site1.
You need to mount the databases in Site2.
Which three commands should you run in sequence? (To answer, move the appropriate three commands from the list of commands to the answer area and arrange them in the correct order.)
Select and Place:




Answer Clike
Which technologies should you recommend?

DRAG DROP
You have an Exchange Server 2013 organization.
Your company identifies the following security requirements:
. Users must be able to send encrypted email messages that can only be decrypted by the intended recipient.
. All email messages sent by a user named User1 to an external recipient must be protected by using TLS.
. All SMTP sessions to a remote SMTP host named SMTP1 must be encrypted.
You need to recommend which technology must be used to meet each requirement.
Which technologies should you recommend? (To answer, drag the appropriate technologies to the requirements in the answer area. Each technology may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.)
Select and Place:




Answer Clike
What should you do?

HOTSPOT
Your company has a main office and a disaster recovery site. An Active Directory site named MainSite exists for the main office. An Active Directory site named DRSite exists for the disaster recovery site. The two sites connect to each other by using a WAN link. All users work in the main office.
You have an Exchange Server 2013 organization. The organization contains six servers. The servers are configured as shown in the following table.


All of the Mailbox servers are members of a database availability group (DAG) named DAG1.
After a WAN link failure, you discover that all of the active mailbox database copies are located on MBX3, even though MBX1 and MBX2 are still running.
You need to prevent an automatic failover of DAG1 if the WAN link between the two sites fails but the servers in both sites are still running.
The solution must prevent two active copies of the same database.
What should you do? (To answer, select the appropriate options in the answer area.)
Hot Area:




Answer Clike
What should you do on the mailbox of User8?

You have an Exchange Server 2013 organization named adatum.com. The organization contains five Mailbox servers.
You need to prevent a user named User8 from permanently deleting an email message in his mailbox.
What should you do on the mailbox of User8?
A. Configure an in-place hold.
B. Create an Archive mailbox.
C. Configure a retention hold.
D. Create a Retention tag.


Answer Clike
What should you do?

You have an Exchange Server 2013 organization named adatum.com.
You have a database availability group (DAG) that contains four Exchange servers named Server1, Server2, Server3, and Server4. The file share witness is on a server named Share1.
The organization has two Send connectors. The Send connectors are configured as shown in the following table.


Users report that email sent to external recipients is not being received.
You discover that outbound email messages are queued on Server3 and Server4.
You need to ensure that all of the email messages queued on Server3 and Server4 are delivered to the Internet as quickly as possible.
What should you do?
A. Modify the cost of External2.
B. Disable External1.
C. Modify the list of source bridgehead servers of External2.
D. Modify the cost of External1.


Answer Clike
Which two components should you identify?

You are a network administrator for a company named Humongous Insurance. Humongous Insurance has an Active Directory forest that contains two domains.
You install the Active Directory Rights Management Services server role on a server named ADRMS1. The Active Directory Rights Management Services (AD RMS) server uses an internal certification authority (CA) for all certificates.
You plan to provide users with the ability to use AD RMS to protect all of the email messages sent to a partner company named Contoso, Ltd.
Contoso does not have AD RMS deployed.
You need to identify which components from the Humongous Insurance network must be accessible to Contoso to ensure that the users at Contoso can open protected messages.
Which two components should you identify? (Each correct answer presents part of the solution. Choose two.)
A. the AD RMS cluster
B. the certificate revocation list (CRL)
C. the Active Directory domain controllers
D. the Client Access servers
E. the Mailbox servers
F. the Global Catalog servers


Answer Clike
Which three Exchange servers should you associate to the UM dial plans?

You have an Exchange Server organization that contains five servers. The servers are configured as shown in the following table.


You need to create a Lync Server SIP Unified Messaging (UM) dial plan to enable voice integration between Lync Server and Exchange Server.
Which three Exchange servers should you associate to the UM dial plans? (Each correct answer presents part of the solution. Choose three.)
A. EX1
B. EX2
C. EX3
D. EX4
E. EX5


Answer Clike
Which numbers should you use for the UM configurations?

DRAG DROP
You have a server that has Exchange Server 2013 installed.
You plan to configure Unified Messaging (UM) to connect to an IP-PBX.
A telecommunications administrator configures the following numbers on the IP-PBX:
. First extension number: 12100
. Last extension number: 12499
. Help extension number: 12500
. Incoming pilot number: 12000
You need to configure UM to support the following requirements:
. Users must be able to use Outlook Voice Access.
. Users must be able to receive voice mail when callers connect to the users’ extension.
. Callers must be able to dial into an automated help system hosted by your company, which uses standard menus and speech-enabled menus.
Which numbers should you use for the UM configurations?
To answer, drag the appropriate number to the correct UM object in the answer area. Each number may be used once, more than once, or not at all. Additionally, you may need to drag the split bar between panes or scroll to view content.
Select and Place:




Answer Clike
Which order should you perform the actions?

DRAG DROP
You are an administrator for a company named Contoso, Ltd. The company is an international reseller that has offices worldwide. One of the offices is located in France.
Each office contains several servers that have Exchange Server 2013 installed. The Exchange Server organization is configured for Unified Messaging (UM). Each office contains an IP-PBX device.
You need to ensure that callers to the France office can navigate the voice mail system menu in French.
In which order should you perform the actions?
To answer, move all actions from the list of actions to the answer area and arrange them in the correct order.
Select and Place:




Answer Clike
What should you run?

You have an Exchange Server 2013 organization.
You successfully migrate the public folders from a previous version of Exchange Server.
You discover that one of the public folder mailboxes almost reached its quota size.
You need to move some of the public folders in the public folder mailbox to another public folder mailbox.
What should you run?
A. Split-PublicFolderMailbox.ps1
B. Set-MailPublicFolder
C. Update-PublicFolderMailbox
D. Set-PublicFolderMailbox


Answer Clike
Which cmdlet should you run?

You have a hybrid deployment of Exchange Server 2013 and Microsoft Office 365.
The network does not have Active Directory Federation Services (AD FS) 2.0 installed.
A user named User1 reports that he cannot access his mailbox because his account is locked out.
You verify that the mailbox of User1 is hosted on Office 365.
You need to unlock the account of User1.
Which cmdlet should you run?
A. Set-MailUser
B. Set-MSolUser
C. Set-Mailbox
D. Set-ADUser


Answer Clike
Which tool should you use?

You have a hybrid deployment of Exchange Server 2013 and Office 365.
The mail flow between Office 365 and the on-premises Exchange Server environment is routed through an Exchange Server 2010 Edge Transport server.
Your company is assigned a new set of public IP addresses.
A network administrator updates the external firewall address and all of the associated DNS records.
Office 365 users report that they cannot receive email messages from on-premises users.
You discover that outgoing email messages to Office 365 are in the Office 365 SMTP queue on an Edge server.
You need to ensure that the on-premises users can send email messages successfully to the Office 365 users.
Which tool should you use?
A. The Exchange Management Console
B. The Exchange Control Panel in Office 365
C. The Exchange Admin Center
D. The Exchange Remote Connectivity Analyzer


Answer Clike
Which three actions should you perform in sequence?

DRAG DROP
You have an Exchange Server organization named adatum.com. The organization contains servers that have Exchange Server 2010 and Exchange Server 2013 installed.
The company executives require that all email messages remain stored for three years.
You create two retention tags named Ret1 and Ret2. Ret1 moves the email messages to an Archive mailbox after one year. Ret2 permanently deletes the email messages after three years.
You need to meet the company executives’ requirements. The solution must ensure that all email messages that are older than two years are removed as quickly as possible.
Which three actions should you perform in sequence? (To answer, move the appropriate three actions from the list of actions to the answer area and arrange them in the correct order.)
Select and Place:




Answer Clike
Which command should you recommend?

HOTSPOT
You need to recommend a solution to audit the issue of User1.
Which command should you recommend? (To answer, select the appropriate options in the answer area.)
Hot Area:




Answer Clike
Which four actions should you recommend?

DRAG DROP
You have an Exchange Server 2013 organization that has Information Rights Management (IRM) configured.
Users report that they cannot apply IRM protection to email messages from Outlook Web App.
You verify that the users can protect the messages by using IRM from Microsoft Outlook.
You need to recommend a solution to ensure that the users can protect email messages by using IRM from Outlook Web App.
Which four actions should you recommend?
To answer, move the four appropriate actions from the list of actions to the answer area and arrange them in the correct order.
Select and Place:




Answer Clike
What should you do first?

You plan to deploy 20 Client Access servers that will have Exchange Server 2013 installed.
You need to prepare the certificate required for the planned deployment. The solution must ensure that the same certificate can be used on all of the Client Access servers.
What should you do first?
A. On one of the Client Access servers, run the New-ExchangeCertificate cmdlet and specify the PrivateKeyExportable parameter.
B. On all of the Client Access servers, run the Get-ExchangeCertificate cmdlet.
C. On one of the Client Access servers, run the New-ExchangeCertificate cmdlet and specify the BinaryEncoding parameter.
D. On one of the Client Access servers, start the Certificates console and run the Certificate Import Wizard.


Answer Clike
Which two actions should you recommend?

Contoso, Ltd., and Fabrikam, Inc., are partner companies.
Each company has an Exchange Server 2013 organization in a data center that is connected to the Internet. All of the Exchange servers in both of the organizations have the Client Access server role and the Mailbox role installed.
The data centers connect to each other by using a redundant high-speed WAN link.
The following mail exchanger (MX) records are configured:
* Contoso.com MX 10 mail.contoso.com
* Fabrikam.com MX 10 mail.fabrikam.com
You need to recommend a solution for inbound mail flow.
The solution must meet the following requirements:
* Users in both companies must receive email from the Internet if either of the Internet links fails.
* Mail from the Internet to contoso.com must be received by mail.contoso.com if the Internet link at the Contoso data center is available.
* Mail from the Internet to fabrikam.com must be received by mail.fabrikam.com if the Internet link at the Fabrikam data center is available.
Which two actions should you recommend? (Each correct answer presents part of the solution. Choose two.)
A. Create the following DNS records:
* Contoso.com MX 20 mail.fabrikam.com
* Fabrikam.com MX 20 mail.contoso.com
B. Create the following DNS records:
* Contoso.com MX 10 mail.fabrikam.com
* Fabrikam.com MX 10 mail.contoso.com
C. For each organization, configure an internal relay domain and a Send connector.
D. For each organization, configure an external relay domain and a Receive connector.
E. Create the following DNS records:
* Contoso.com MX 5 mail.fabrikam.com
* Fabrikam.com MX 5 mail.contoso.com


Answer Clike
Which three actions should you perform?

DRAG DROP
You have an Exchange Server 2013 database availability group (DAG). Each member of the DAG has two network interfaces named Network1 and Network2. Network1 is used for client connections. Network2 is used for database replication.
Network2 fails.
You discover that replication traffic is sent over Network1.
You need to ensure that all of the database replication traffic is sent over Network2. The solution must minimize database replication downtime.
Which three actions should you perform?
To answer, move the three appropriate actions from the list of actions to the answer area and arrange them in the correct order.
Select and Place:




Answer Clike
What should you change?

You have an Exchange Server 2013 organization that contains two servers. The servers are configured as shown in the following table.


EX1 and EX2 are members of a database availability group (DAG) named DAG1. You have a database named DB1 that replicates to EX1 and EX2.
EX1 fails.
You discover that DB1 does not mount on EX2.
You view the status of the mailbox databases as shown in the following table.


You need to ensure that the database attempts to mount on EX2 if EX1 fails.
What should you change?
A. The AutoDatabaseMountDial setting to Lossless
B. The AutoDatabaseMountDial setting to BestAvailabilty
C. The activation preference of DB1EX2
D. The activation preference of DB1EX1


Answer Clike
What should you recommend?

Your company has a data center in New York and a data center in Miami.
The company has an Exchange Server 2013 organization that contains a database availability group (DAG). The DAG contains servers in both data centers.
The company plans to deploy Outlook Anywhere to all users.
You configure the following:
. All of the Exchange Server 2013 virtual directories in the New York data center use a host name of mail.contoso.com.
. All of the Exchange Server 2013 virtual directories in the Miami data center use a host name of miami.mail.contoso.com.
. In each data center, a certificate from an enterprise certification authority (CA) is configured to contain the following:
- A certificate principal name of mail.contoso.com
- Subject alternate names of mail.contoso.com and miami.mail.contoso.com
You need to recommend which task must be performed to meet the following requirements:
. Users always must attempt to connect first to a server in the data center where their mailbox is located.
. Users must be able to access their mailbox if a single data center fails.
What should you recommend?
A. Change the external host name of the Miami data center to mail.contoso.com.
B. Modify the ExternalUrl of the Autodiscover virtual directory of the Client Access servers.
C. Run the Set-OutlookProvider cmdlet.
D. Run the Add-AvailabilityAddressSpace cmdlet.


Answer Clike
Which three actions should you include in the recommendation?

Your company has offices in Tokyo, Bangkok, and Shanghai.
All connections to the Internet are routed through an Internet connection in the Tokyo office. All of the offices connect to each other by using a WAN link.
The network contains 10 servers that have Exchange Server 2010 installed. The servers are configured as shown in the following table.


You plan to deploy 10 servers that will have Exchange Server 2013 installed.
The servers will be configured as shown in the following table.


Each site has an IP-PBX that provides telephony services for the mailboxes in that site by using unsecured SIP over TCP 5070. The IP-PBX uses the same port to connect to multiple SIP peers.
You need to recommend which tasks must be performed to ensure that the Unified Messaging (UM) features are available to the mailboxes if a single server fails.
Which three actions should you include in the recommendation? (Each correct answer presents part of the solution. Choose three.)
A. Configure the Exchange Server 2013 Mailbox servers to listen to unsecured SIP on TCP 5070.
B. Configure the Exchange Server 2013 Client Access servers to listen to unsecured SIP on TCP 5070.
C. Install the Client Access server role on the Exchange Server 2013 servers in the Shanghai and Bangkok offices.
D. Configure the Exchange Server 2013 Mailbox servers as additional SIP peers that contain new pilot identifiers.
E. Configure the Exchange Server 2013 Client Access servers as additional SIP peers that contain new pilot identifiers.


Answer Clike
What should you do?

You need to resolve the content filtering issue for the Office 365 pilot users.
What should you do?
A. Run the Set-Mailbox cmdlet and specify the -MaxBlockedSenders and the -MicrosoftOnlineServicesID parameters.
B. Run the Microsoft Online Services Directory Synchronization Configuration Wizard and select Enable Exchange hybrid deployment.
C. Modify the default content filter policy from the Office 365 portal.
D. Run the Set-Mailbox cmdlet and specify the -MaxSafeSenders and the -MicrosoftOnlineServicesID parameters.


Answer Clike
Which command should you recommend?

HOTSPOT
You need to recommend a solution to audit the issue of User1.
Which command should you recommend? (To answer, select the appropriate options in the answer area.)
Hot Area:




Answer Clike
Which cmdlet should you use?

You discover that the Large Audience MailTip is not displayed when users compose an email message to the 20 new distribution groups.
You need to ensure that the Large Audience MailTip is displayed for the new distribution groups immediately.
Which cmdlet should you use?
A. Set-DistributionGroup
B. Set-MailboxServer
C. Set-ClientAccessServer
D. Start-ManagedFolderAssistant


Answer Clike
Which three actions should you perform in sequence?

DRAG DROP
You restore the files of DB3 to EX3.
You need to mount DB3 on EX3. The solution must ensure that email messages sent to the users of DB3 while the database was offline are delivered once DB3 is mounted.
Which three actions should you perform in sequence? (To answer, move the appropriate three actions from the list of actions to the answer area and arrange them in the correct order.)
Select and Place:




Answer Clike
Which two cmdlets should you use?

You need to implement a solution that meets the compliance requirements for the members of the legal department.
Which two cmdlets should you use? (Each correct answer presents part of the solution. Choose two.)
A. New-RoleAssignmentPolicy
B. Add-ManagementRoleEntry
C. New-ManagementRoleAssignment
D. New-ManagementRole
E. New-ManagementScope


Answer Clike
Which three cmdlets should you run next in sequence?

DRAG DROP
You need to resolve the network traffic issue for MapiNet.
You suspend database replication.
Which three cmdlets should you run next in sequence? (To answer, move the appropriate three cmdlets from the list of actions to the answer area and arrange them in the correct order.)
Select and Place:




Answer Clike
Which policy tag types should you identify?

DRAG DROP
You are preparing the environment for the planned retention solution.
You need to identify which policy tags must be created to meet the retention requirements.
Which policy tag types should you identify? (To answer, drag the appropriate policy tag types to the correct message types. Each policy tag may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.)
Select and Place:




Answer Clike
Which four commands should you run in sequence?

DRAG DROP
You need to implement UM for the sales department users.
Which four commands should you run in sequence? (To answer, move the appropriate four commands from the list of commands to the answer area and arrange them in the correct order.)
Select and Place:




Answer Clike
Which three actions should you recommend?

You are evaluating the deployment of two additional Client Access servers and a hardware load balancer in the London office.
You need to recommend changes to the Client Access namespace design to meet the site resiliency requirements.
Which three actions should you recommend? (Each correct answer presents part of the solution. Choose three.)
A. In the London office, set mail.proseware.com as the external host name for Outlook Anywhere. In the New York office, set mail.proseware.com as the external host name for Outlook Anywhere.
B. In the London office, set lonmail.proseware.com as the internal host name for Outlook Anywhere. In the New York office, set nycmail.proseware.com as the internal host name for Outlook Anywhere.
C. Use DNS round robin for the external host name for Outlook Anywhere.
D. Use DNS round robin for the internal host name for Outlook Anywhere.
E. In the London office, set nycmail.proseware.com as the external host name for Outlook Anywhere. In the New York office, set lonmail.proseware.com as the external host name for Outlook Anywhere.
F. In the London office, set mail.proseware.com as the internal host name for Outlook Anywhere. In the New York office, set mail.proseware.com as the internal host name for Outlook Anywhere.


Answer Clike
Which cmdlet should you include in the recommendation?

You need to recommend a solution to meet the technical requirements for redundancy during email delivery.
Which cmdlet should you include in the recommendation?
A. Set-FrontendTransportService
B. Set-TransportConfig
C. Set-MailboxTransportService
D. Set-TransportService


Answer Clike
What should you recommend?

HOTSPOT
You need to recommend which technology can be used to meet each email security requirement.
What should you recommend? (To answer, select the appropriate technology for each requirement in the answer area.)
Hot Area:




Answer Clike
What should you configure in each organization?

DRAG DROP
You need to recommend a solution to support the planned changes for the integration of the Exchange Server organizations of Contoso and Proseware.
What should you configure in each organization? (To answer, drag the appropriate objects to the correct forests. Each object may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.)
Select and Place:




Answer Clike
Which three actions should you recommend?

You need to recommend a solution that meets the compliance requirements for email messages that contain information about the Fabrikam acquisition.
Which three actions should you recommend? (Each correct answer presents part of the solution. Choose three.)
A. Create an Outlook protection rule.
B. Create a new custom message classification.
C. Modify the registry on all client computers.
D. Modify the Content Filtering settings.
E. Export the Message Classification configuration to an .xml file.


Answer Clike
What should you do?

You need to implement a solution that meets the collaboration requirements.
What should you do?
A. Run the Set-CASMailbox cmdlet.
B. Create an organization relationship.
C. Create a new sharing policy.
D. Modify the organization configuration.


Answer Clike
How should you configure the UM dial plan?

HOTSPOT
You need to configure the Exchange Server UM dial plan for the planned integration of UM and Lync Server.
How should you configure the UM dial plan? (To answer, select the appropriate dial plan type and VoIP security mode in the answer area.)
Hot Area:




Answer Clike
In which directory on EX1 should you review the log files?

HOTSPOT
You are attempting to resolve the email delivery issue for Fabrikam.
You need to identify which certificate is being used by the servers in the Exchange Server organization of Fabrikam.
In which directory on EX1 should you review the log files? (To answer, select the appropriate directory in the answer area.)
Hot Area:




Answer Clike
Which three actions should you perform?

DRAG DROP
The Montreal data center experiences a power failure.
You need to ensure that all the users can access their mailbox.
Which three actions should you perform?
To answer, move the three appropriate actions from the list of actions to the answer area and arrange them in the correct order.
Select and Place:




Answer Clike
Which two tasks should you recommend?

You need to recommend which tasks must be performed to meet the security requirements for Tailspin Toys.
Which two tasks should you recommend? (Each correct answer presents part of the solution. Choose two.)
A. Run the set-transportserver -transportsyncenabled $true command.
B. Run the set-transportconfig -tlsreceivedomainsecurelist tailspintoys.com command.
C. Run the set-transportservice -transportsyncenabled $true command.
D. Create a new Receive connector.
E. Create a new Send connector.


Answer Clike
Which three actions should you perform?

DRAG DROP
You need to implement a solution to meet the security requirement for the temporary employees.
You deploy an Active Directory Rights Management Services (AD RMS) cluster, and then you run the Set-IRMConfiguration cmdlet.
Which three actions should you perform?
To answer, move the three appropriate actions from the list of actions to the answer area and arrange them in the correct order.
Select and Place:




Answer Clike
Which command should you include in the recommendation?

HOTSPOT
You need to recommend a solution that meets the auditing requirements.
Which command should you include in the recommendation? (To answer, select the appropriate options in the answer area.)
Hot Area:




Answer Clike
Which command should you include in the recommendation?

HOTSPOT
You need to recommend a solution that meets the compliance requirements for emailing bank account numbers.
Which command should you include in the recommendation? (To answer, select the appropriate options in the answer area.)
Hot Area:




Answer Clike
Which technologies should you identify?

DRAG DROP
You need to identify which technologies must be used to meet the security requirements.
Which technologies should you identify? (To answer, drag the appropriate technologies to the correct requirements. Each technology may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.)
Select and Place:




Answer Clike
Which four cmdlets should you recommend running in sequence?

DRAG DROP
You need to recommend a solution that supports the planned changes for the public folders.
Which four cmdlets should you recommend running in sequence? (To answer, move the appropriate four cmdlets from the list of cmdlets to the answer area and arrange them in the correct order.)
Select and Place:




Answer Clike
What should you recommend doing before implementing the organization relationship?

You are evaluating the implementation of the organization relationship.
You need to recommend which tasks must be performed to ensure that the Contoso users can view the Out of Office message of the Tailspin Toys users before the Contoso users send a message to the Tailspin Toys users.
What should you recommend doing before implementing the organization relationship?
A. Create a Policy Tip.
B. Upgrade all of the client computers to Outlook 2010.
C. Create a MailTip.
D. Publish the Autodiscover service of Tailspin Toys.
E. Create a remote domain.


Answer Clike
Which three actions should recommend?

DRAG DROP
You need to recommend which tasks must be performed to meet the compliance requirement for the marketing department.
Which three actions should recommend?
To answer, move the three appropriate actions from the list of actions to the answer area and arrange them in the correct order.
Select and Place:




Answer Clike
Which three actions should you perform?

DRAG DROP
You need to create a federation trust for the planned organization relationship.
Which three actions should you perform?
To answer, move the three appropriate actions from the list of actions to the answer area and arrange them in the correct order.
Select and Place:




Answer Clike
Which two technologies should you identify?

You need to identify which technologies must be deployed to meet the Office 365 coexistence requirements.
Which two technologies should you identify? (Each correct answer presents part of the solution. Choose two.)
A. the Microsoft Online Services Directory Synchronization tool
B. Active Directory Federation Services (AD FS) 2.0
C. Active Directory Rights Management Services (AD RMS)
D. an internal root CA
E. Active Directory Lightweight Directory Services (AD LDS)


Answer Clike
What should you do?

You implement the UM pilot.
You capture and analyze a network trace from the IP-PBX.
You discover that SIP/MTLS requests for TCP 5061 to EX1 are dropped.
You need to ensure that the IP-PBX can route calls successfully to the Exchange Server 2013 organization.
What should you do?
A. Modify the IP-PBX to route calls to EX5 and EX6.
B. Modify the port used on the IP-PBX.
C. Modify the SIP listening port on EX1.
D. Deploy a server that has Exchange Server 2010 and the Unified Messaging server role installed.


Answer Clike
Which two stores should you add the root CA certificate?

You deploy a new certificate to a Client Access server.
You test the new certificate by using Outlook Anywhere from the Internet.
The test generates certificate errors.
You need to prevent the errors from reoccurring.
To which two stores should you add the root CA certificate? (Each correct answer presents part of the solution. Choose two.)
A. the personal store on the client computers
B. the personal store on the Client Access server
C. the personal store on the Mailbox servers
D. the Trusted Root Certification Authorities store on the client computers
E. the Trusted Root Certification Authorities store on the Client Access server
F. the Trusted Root Certification Authorities store on the Mailbox servers


Answer Clike
What should you include in the recommendation?

You need to recommend a solution to ensure that the store managers meet the compliance requirements.
What should you include in the recommendation?
A. Retention tags and retention policies
B. Deleted item retention
C. An in-place hold
D. Personal archives


Answer Clike
What should you recommend?

You need to recommend a solution to ensure that during the planned migrations, all Autodiscover requests are processed by the Exchange Server 2013 Client Access servers.
What should you recommend?
A. On the Exchange Server 2007 Client Access servers, modify the AutodiscoverServiceInternalURI.
B. On the Exchange Server 2007 Client Access servers, modify the ExternalURL value of the Autodiscover virtual directory.
C. On the Exchange Server 2013 Client Access servers, modify the ExternalURL value of the Autodiscover virtual directory.
D. On the Exchange Server 2013 Client Access servers, modify the AutodiscoverServiceInternalURI.


Answer Clike
Which two configurations should you include in the recommendation?

You need to recommend a solution for the voice mail traffic. The solution must meet the technical requirements.
Which two configurations should you include in the recommendation? (Each correct answer presents part of the solution. Choose two.)
A. A dial plan.
B. A server certificate
C. A transport rule
D. A data loss prevention (DLP) policy
E. A call answering rule


Answer Clike
What should you recommend configuring?

DRAG DROP
You need to recommend a solution to meet the compliance requirements for the research department and the statutory holidays.
What should you recommend configuring?
To answer, drag the appropriate object to the correct location in the answer area. Each object may be used once, more than once, or not at all. Additionally, you may need to drag the split bar between panes or scroll to view content.
Select and Place:




Answer Clike
Which DAG design should you recommend?

HOTSPOT
You need to recommend a database availability group (DAG) design that meets the technical requirements.
Which DAG design should you recommend?
To answer, select the appropriate design in the answer area.
Hot Area:




Answer Clike
What should you include in the recommendation?

You need to recommend a solution for the memos. The solution must meet the compliance requirements.
What should you include in the recommendation?
A. Secure/Multipurpose Internet Mail Extensions (S/MIME)
B. Information Rights Management (IRM)
C. Domain Security
D. Data loss prevention (DLP) policies


Answer Clike
What should you include in the recommendation?

You need to recommend a solution to meet the compliance requirement for the legal department.
What should you include in the recommendation?
A. A retention hold
B. The Discovery Management management role group
C. A litigation hold
D. The Recipient Management management role group


Answer Clike
Which three actions should you recommend?

You are creating a contingency plan to be implemented if the entire New York site fails after Exchange Server 2013 is deployed.
You need to recommend which tasks must be performed to ensure that all of the users can access Outlook Web App from the Chicago site if the New York fails.
Which three actions should you recommend? (Each correct answer presents part of the solution. Choose three.)
A. On the Client Access server in the Chicago site, set the ExternalURL of Outlook Web App to mail.adatum.com.
B. On the Mailbox server in the Chicago site, set the ExternalURL of Outlook Web App to mail.adatum.com.
C. Modify the host (A) record for mail.adatum.com to point to the Client Access server in the Chicago site.
D. On the Client Access server in the Chicago site, set the internal URL of Outlook Web App to mail.adatum.local.
E. Install the mail.adatum.com certificate and private key on the Client Access server in the Chicago site.


Answer Clike
What should you recommend?

You need to recommend an auditing solution that meets the compliance requirements.
What should you recommend?
A. Export the mailbox audit log.
B. Run an administrator role group report.
C. Run a non-owner mailbox access report.
D. Export the administrator audit log.


Answer Clike
What should you recommend?

You need to recommend a solution for the HR voice mail. The solution must meet the security requirements.
What should you recommend?
A. Create a UM mailbox policy and associate the policy to UM1. Configure the voice mail protection settings of the UM mailbox policy. Create an auto attendant and link the auto attendant to UM1.
B. Create a UM mailbox policy and associate the policy to a new dial plan. Configure the voice mail protection settings of the UM mailbox policy. Create an auto attendant and link the auto attendant to the new dial plan.
C. Create a UM mailbox policy and associate the policy to a new dial plan. Configure the voice mail protection settings of the UM mailbox policy. Assign the UM mailbox policy to the mailbox of the HR department.
D. Create a UM mailbox policy and associate the policy to UM1. Configure the voice mail protection settings of the UM mailbox policy. Assign the UM1 mailbox policy to the mailbox of the HR department.


Answer Clike
What should you recommend?

You need to recommend an Outlook protection rule solution to meet the technical requirements.
What should you recommend?
A. Create an Outlook protection rule and filter the rule based on the FromDepartment property. Apply the Do Not Forward protection template to the rule and enable the UserCanOverride setting.
B. Create an Outlook protection rule and filter the rule based on the FromDepartment property. Apply the Do Not Forward protection template to the rule and disable the UserCanOverride setting.
C. Create an Outlook protection rule and filter the rule based on the SentTo property. Apply the Do Not Forward protection template to the rule and disable the UserCanOverride setting.
D. Create an Outlook protection rule and filter the rule based on the SentTo property. Apply the Do Not Forward protection template to the rule and enable the UserCanOverride setting.


Answer Clike
How should you configure each retention tag?

HOTSPOT
You plan to create two retention tags named Tag1 and Tag2. Tag1 will be used to move email messages to the Archive mailbox. Tag2 will be used to delete the email messages.
You need to identify which settings must be configured in the retention tags to meet the technical requirements.
How should you configure each retention tag?
To answer, configure the appropriate options for each retention tag setting in the answer area.
Hot Area:




Answer Clike
Which group should you add HR1?

HOTSPOT
You need to ensure that the HR1 group can perform the tasks required to meet the technical requirements.
To which group should you add HR1?
To answer, select the appropriate group in the answer area.
Hot Area:




Answer Clike
Which two IP addresses should you identify?

You are evaluating the implementation of the planned static IP addresses for DAG1.
You need to identify the appropriate IP addresses for DAG1.
Which two IP addresses should you identify? (Each correct answer presents part of the solution. Choose two.)
A. 169.254.0.10
B. 192.168.1.10
C. 192.168.2.10
D. 192.168.10.10
E. 192.168.20.10
F. 224.0.0.10


Answer Clike
Which ports should you identify?

DRAG DROP
The security department implements a new firewall between the IP-PBX system and the servers in the Tampa office.
You discover that SIP sessions cannot be established between the IP-PBX and EX1.
You need to identify which ports must be opened between the IP-PBX and the Exchange Server 2013 servers.
Which ports should you identify?
To answer, drag the appropriate port or ports to the correct group of servers in the answer area. Each port or ports may be used once, more than once, or not at all. Additionally, you may need to drag the split bar between panes or scroll to view content.
Select and Place:




Answer Clike
What should you do?

The Internet link in the Tampa office will be unavailable during the weekend.
You need to ensure that all outbound email messages are sent from the Charlotte office during the planned outage.
What should you do?
A. Modify the cost of the Tampa SMTP Send connector.
B. Create a new mail exchanger (MX) record named SMTP2.fabrikam.com in the internal DNS zone.
C. Modify the smart host of the Tampa SMTP Send connector.
D. Modify the preference value of the fabrikam.com mail exchanger (MX) records.


Answer Clike
Which user right should you modify?

HOTSPOT
You need to resolve the IRM template issue.
Which user right should you modify?
To answer, select the appropriate user right in the answer area.
Hot Area:




Answer Clike
How should you configure the rules?

HOTSPOT
You need to configure transport rules to meet the technical requirements for the PII data and the financial data.
How should you configure the rules?
To answer, disable the appropriate rule or rules in the answer area.
Hot Area:




Answer Clike