microsoft.practicetest.70-342.v2016-02-21.by.daniel · / there is a um dial plan named um1. * the...

242
http://www.gratisexam.com/ 70-342 microsoft Number : 70-342 Passing Score : 800 Time Limit : 120 min http://www.gratisexam.com/

Upload: others

Post on 20-May-2020

0 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

70-342 microsoft

Number: 70-342Passing Score: 800Time Limit: 120 min

http://www.gratisexam.com/

Page 2: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

Testlet 1

Topic 1, Fabrikam, Inc

Overview

General OverviewFabrikam, Inc., is a plastics manufacturer.Fabrikam has an Exchange Server organization that contains only servers that have Exchange Server 2013 installed

Physical LocationsFabrikam has two main offices. The main offices are located in Tampa and Charlotte. The company has 8, 000 users in each office.

Existing EnvironmentActive Directory EnvironmentFabrikam has an Active Directory forest that contains one domain named fabrikam.com. Each office is configured as an Active Directory site.

The network contains four subnets. The subnets are configured as shown in the following table.

All of the traffic from Subnet1 is routable to Subnet3. All of the traffic from Subnet2 is routable to Subnet4.

All client computers are on Subnet1 and Subnet3 only. Subnet 192.168.1.0/24 and subnet 192.168.10.0/24 are assigned as the MAPI network.

The network contains four domain controllers. The domain controllers are configured as shown in the following table.

Page 3: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

Network InfrastructureThe network contains the following components:Two 10-gigabits per second WAN links that connect the Tampa office and the Charlotte office. The links have a latency of less than 15 ms.One IP-PBX that is located in the Tampa office. The IP-PBX can use only unencrypted communications.An Internet connection in the Tampa office and an Internet connection the Charlotte office.

Exchange EnvironmentThe network contains six servers that have Exchange Server 2013 installed. The servers are configured as shown in the following table.

The Exchange Server environment has the following configurations:Two data loss prevention (DLP) policies named DLP_Finance and DLP_PII. DLP_Finance is based on a template named Financial Data - U.S. DLP_PII is based on

Page 4: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

a template named PII (U.S.).A mailbox database named UM that hosts only Unified Messaging (UM)-enabled mailboxes and is replicated between the Mailbox servers in the Tampa office only.A database availability group (DAG) named DAG1 that contains EX2, EX3, EX5, and EX6. DAG1 is configured to use DHCP to obtain an IP address.A Send connector named Tampa SMTP that uses SMTP1 as a smart host. The cost of the Tampa SMTP connector is 10.Mailbox servers in the Tampa office that provide outbound SMTP services to the Internet.A UM dial plan named UM1.An SMTP relay device named SMTP2 in the Charlotte office.An SMTP relay device named SMTP1 in the Tampa office.No client access services are published to the Internet.

Requirements

Exchange Server IssuesThe current Exchange Server environment has the following issues:Due to power failures, the Exchange servers unexpectedly fail, causing databases to fail over. During the database failovers, the preferred database is notactivated, causing an unexpected distribution of active databases.An IRM template named No Print or Screenshot is deployed, but the template fails to prevent users from taking screenshots of email messages.

Technical RequirementsYou identify the following technical requirements:Assign a static IP address to DAG1.Block all personally identifiable information (PII) data and financial data without exception.Prevent the forwarding of email messages sent by users who have a value of Legal in their Department field.Ensure that the members of a group named HR1 can search all of the mailboxes for sensitive email content.Use Information Rights Management (IRM) to protect all of the voice mails left for the telephone number of the human resource (HR) department.Implement an archiving policy that moves all of the email messages from the mailbox folders to an Archive mailbox after 30 days and permanently deletes all of theemail messages after 365 days.

QUESTION 1You need to recommend a solution for the HR voice mail. The solution must meet the security requirements.

What should you recommend?

A. Create a UM mailbox policy and associate the policy to UM1. Configure the voice mail protection settings of the UM mailbox policy. Create an auto attendantand link the auto attendant to UM1.

B. Create a UM mailbox policy and associate the policy to a new dial plan. Configure the voice mail protection settings of the UM mailbox policy. Create an autoattendant and link the auto attendant to the new dial plan.

C. Create a UM mailbox policy and associate the policy to a new dial plan. Configure the voice mail protection settings of the UM mailbox policy. Assign the UMmailbox policy to the mailbox of the HR department.

D. Create a UM mailbox policy and associate the policy to UM1. Configure the voice mail protection settings of the UM mailbox policy. Assign the UM1 mailbox

Page 5: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

policy to the mailbox of the HR department.

Correct Answer: DSection: [none]Explanation

Explanation/Reference:* Scenario:/ Use Information Rights Management (IRM) to protect all of the voice mails left for the telephone number of the human resource (HR) department./ There is a UM dial plan named UM1.

* The Protected Voice Mail feature is available with Exchange 2010 and later versions of Unified Messaging (UM). It can be configured on a UM mailbox policy.* By default, a single UM mailbox policy is created every time you create a UM dial plan. The new UM mailbox policy is automatically associated with the UM dialplan, and part of the dial plan name is included in the display name of the UM mailbox policy. You can edit this default UM mailbox policy. You can create additionalUM mailbox policies to apply a common set of settings for groups of users.

QUESTION 2You need to recommend an Outlook protection rule solution to meet the technical requirements.

What should you recommend?

A. Create an Outlook protection rule and filter the rule based on the FromDepartment property.Apply the Do Not Forward protection template to the rule and enable the UserCanOverride setting.

B. Create an Outlook protection rule and filter the rule based on the FromDepartment property.Apply the Do Not Forward protection template to the rule and disable the UserCanOverride setting.

C. Create an Outlook protection rule and filter the rule based on the SentTo property. Apply the Do Not Forward protection template to the rule and disable theUserCanOverride setting.

D. Create an Outlook protection rule and filter the rule based on the SentTo property. Apply the Do Not Forward protection template to the rule and enable theUserCanOverride setting.

Correct Answer: BSection: [none]Explanation

Explanation/Reference:* Scenario:Prevent the forwarding of email messages sent by users who have a value of Legal in their Department field.* Use FromDepartment property and do not allow the user to override.

QUESTION 3You are evaluating the implementation of the planned static IP addresses for DAG1.

Page 6: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

You need to identify the appropriate IP addresses for DAG1.

Which two IP addresses should you identify? (Each correct answer presents part of the solution.Choose two.)

A. 169.254.0.10B. 192.168.1.10C. 192.168.2.10D. 192.168.10.10E. 192.168.20.10F. 224.0.0.10

Correct Answer: BDSection: [none]Explanation

Explanation/Reference:* Scenario:/ Assign a static IP address to DAG1./ A database availability group (DAG) named DAG1 that contains EX2, EX3, EX5, and EX6. DAG1 is configured to use DHCP to obtain an IP address. / Subnet192.168.1.0/24 and subnet 192.168.10.0/24 are assigned as the MAPI network.

* A DAG network is a collection of one or more subnets used for either replication traffic or MAPI traffic. Each DAG contains a maximum of one MAPI network andzero or more replication networks.

QUESTION 4You need to configure transport rules to meet the technical requirements for the PII data and the financial data.

How should you configure the rules?

To answer, disable the appropriate rule or rules in the answer area.

Hot Area:

Page 7: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

Page 8: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

Correct Answer:

Page 9: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

Page 10: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

Section: [none]Explanation

Explanation/Reference:Explanation:The question asks which rules should be DISABLED. We need to disable the two Allow Override rules and leave the rest in place.

QUESTION 5You need to resolve the IRM template issue.

http://www.gratisexam.com/

Which user right should you modify?

To answer, select the appropriate user right in the answer area.

Hot Area:

Page 11: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

Correct Answer:

Page 12: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

Section: [none]Explanation

Explanation/Reference:

QUESTION 6You plan to create two retention tags named Tag1 and Tag2. Tag1 will be used to move email messages to the Archive mailbox. Tag2 will be used to delete theemail messages.

You need to identify which settings must be configured in the retention tags to meet the technical requirements.

How should you configure each retention tag?

To answer, configure the appropriate options for each retention tag setting in the answer area.

Hot Area:

Page 13: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

Correct Answer:

Page 14: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

Section: [none]Explanation

Explanation/Reference:* Scenario: Implement an archiving policy that moves all of the email messages from the mailbox folders to an Archive mailbox after 30 days and permanently deletes all of theemail messages after 365 days.* Both Tag Types should affect all email messages. For the first policy move the archive after 30 days. The second policy should permanently delete the messagesafter 365 days.

QUESTION 7You need to ensure that the HR1 group can perform the tasks required to meet the technical requirements.

Page 15: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

To which group should you add HR1?

To answer, select the appropriate gr oup in the answer area.

Hot Area:

Correct Answer:

Page 16: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

Section: [none]Explanation

Explanation/Reference:* Scenario: Ensure that the members of a group named HR1 can search all of the mailboxes for sensitive email content.

* Discovery managementIf you want users to be able to use Microsoft Exchange Server 2013 In-Place eDiscovery, you must first authorize them by adding them to the Discovery

Page 17: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

Management role group. Members of the Discovery Management role group have Full Access mailbox permissions for the Discovery mailbox that's created byExchange Setup.

Page 18: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

Testlet 1

Topic 2, A.Datum

Overview

Topic 2, A.Datum

General OverviewA. Datum Corporation is a pet supply company that has stores across North America.

A. Datum has an Exchange Server 2007 organization. A. Datum plans to migrate to Exchange Server 2013.

Physical LocationsA. Datum has five locations. The locations are configured as shown in the following table.

Existing EnvironmentNetwork InfrastructureAll of the locations connect to the each other by using a WAN link. The New York, Toronto, and Chicago locations connect directly to the Internet.

All client computers run Windows 7 and Office 2010. All servers run Windows Server 2008.

Active Directory EnvironmentThe network contains an Active Directory domain named adatum.local. Adatum.local is the corporate domain based in the United States. The network contains adomain named Canada.adatum.local. Canada.adatum.local is the domain for the stores in Canada.

Each location is configured as an Active Directory site.The forest functional level is Windows Server 2008.

Page 19: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

The main office and both of the distribution centers each has two domain controllers for their respective domain. All of the other locations have one domaincontroller for their respective domain. All of the domain controllers are global catalog servers.

Exchange InfrastructureThe main office and the distribution centers each have three servers that have Exchange Server 2007 installed.

The servers have the following configurations:Two of the servers have cluster continuous replication (CCR) deployedOne of the servers has the Client Access server role and the Hub Transport server role installed

Each store contains a server that has Exchange Server 2007 installed. Each server has mailboxes for active users and mailboxes for inactive users. Each serverhas approximately 50 mailboxes.

Remote users access Outlook Web Access by using a namespace of mail.adatum.com, which resolves to the Client Access server in the New York office.

Requirements

Planned ChangesThe company plans to implement the following changes:Migrate all of the mailboxes in the main office and the distribution centers to Exchange Server 2013.Integrate a new telephone system to the Exchange Server 2013 organization.Deploy a standalone certification authority (CA) that will be used to issue all of the certificates for the messaging infrastructure.

Technical RequirementsThe company identifies the following technical requirements:Hardware costs must be minimized whenever possible.The impact on end users if a site fails must be minimized.Voice mail traffic between the telephone system and the Exchange Server environment must be encrypted.Each user must be able to access the internal resources and their mailbox by using a single user account.

Compliance RequirementsAfter a security review, the company identifies the following compliance requirements for the new Exchange Server environment:All administrative changes made to the mailboxes must be tracked.The legal department must be able to search for messages in all of the mailboxes.Users must be prevented from sending email during an upcoming statutory holiday.All store managers must be prevented from permanently deleting email messages from their Inbox.All email messages must be archived for a minimum of five years to meet regulatory requirements.Management occasionally sends the staff internal memos that contain confidential information, such as sales figures. The memos must be protected so thatunauthorized users cannot read the memos and internal users cannot forward the memos to external recipients.The users in the research department must be able to send email to anyone in the organization, but only the members of a group named Execs must be able tosend email to the research users. All other users must be notified that email sent to the research users will remain undelivered.

Page 20: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

QUESTION 1You need to recommend a solution to ensure that the store managers meet the compliance requirements.

What should you include in the recommendation?

A. Retention tags and retention policiesB. Deleted item retentionC. An in-place holdD. Personal archives

Correct Answer: CSection: [none]Explanation

Explanation/Reference:* Scenario: All store managers must be prevented from permanently deleting email messages from their Inbox.* In Exchange 2013, you can use In-Place Hold to accomplish the following goals:Place user mailboxes on hold and preserve mailbox items immutably Preserve mailbox items deleted by users or automatic deletion processes such as MRM* Preserve items indefinitely or for a specific duration Etc.Reference: n-Place Hold and Litigation Hold

QUESTION 2You need to recommend a solution for the memos. The solution must meet the compliance requirements.

What should you include in the recommendation?

A. Secure/Multipurpose Internet Mail Extensions (S/MIME)B. Information Rights Management (IRM)C. Domain SecurityD. Data loss prevention (DLP) policies

Correct Answer: BSection: [none]Explanation

Explanation/Reference:* Scenario: Management occasionally sends the staff internal memos that contain confidential information, such as sales figures. The memos must be protected sothat unauthorized users cannot read the memos and internal users cannot forward the memos to external recipients.* With the IRM features in Exchange 2013, your organization and your users can control the rights recipients have for e-mail. IRM also helps allow or restrict

Page 21: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

recipient actions such as forwarding a message to other recipients, printing a message or attachment, or extracting message or attachment content by copying andpasting. IRM protection can be applied by users in Microsoft Outlook or Microsoft Office Outlook Web App, or it can be based on your organization's messagingpolicies and applied using transport protection rules or Outlook protection rules.

Reference: Information Rights Management

QUESTION 3You need to recommend a solution to meet the compliance requirement for the legal department.

What should you include in the recommendation?

A. A retention holdB. The Discovery Management management role groupC. A litigation holdD. The Recipient Management management role group

Correct Answer: BSection: [none]Explanation

Explanation/Reference:* Scenario: The legal department must be able to search for messages in all of the mailboxes.

* Administrators or users who are members of the Discovery Management role group can perform searches of mailboxes in the Exchange organization for data thatmeets specific criteria and can also configure litigation holds on mailboxes.

QUESTION 4You are creating a contingency plan to be implemented if the entire New York site fails after Exchange Server 2013 is deployed.

You need to recommend which tasks must be performed to ensure that all of the users can access Outlook Web App from the Chicago site if the New York fails.

Which three actions should you recommend? (Each correct answer presents part of the solution.Choose three.)

A. On the Client Access server in the Chicago site, set the ExternalURL of Outlook Web App to mail.adatum.com.B. On the Mailbox server in the Chicago site, set the ExternalURL of Outlook Web App to mail.adatum.com.C. Modify the host (A) record for mail.adatum.com to point to the Client Access server in the Chicago site.D. On the Client Access server in the Chicago site, set the internal URL of Outlook Web App to mail.adatum.local.E. Install the mail.adatum.com certificate and private key on the Client Access server in the Chicago site.

Page 22: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

Correct Answer: ACESection: [none]Explanation

Explanation/Reference:A: Example: To configure an external URL for Outlook Web App, run the following command in Exchange Management Shell.Set-OwaVirtualDirectory "<CAS2013>\OWA (Default Web Site)" -ExternalUrl https://mail.contoso.com/OWAC: Need a new record in the DNS.

E: In Exchange 2013, you can use the Certificate Wizard to request a digital certificate from a certification authority. After you've requested a digital certificate, you'llneed to install it on the Client Access server.

Reference: Exchange 2013 Client Access server configuration

QUESTION 5You need to recommend an auditing solution that meets the compliance requirements.

What should you recommend?

A. Export the mailbox audit log.B. Run an administrator role group report.C. Run a non-owner mailbox access report.D. Export the administrator audit log.

Correct Answer: DSection: [none]Explanation

Explanation/Reference:* Scenario: All administrative changes made to the mailboxes must be tracked.* You can use administrator audit logging in Microsoft Exchange Server 2013 to log when a user or administrator makes a change in your organization. By keepinga log of the changes, you can trace changes to the person who made the change, augment your change logs with detailed records of the change as it wasimplemented, comply with regulatory requirements and requests for discovery, and more.

Reference: Administrator audit logging

QUESTION 6You need to recommend a solution to ensure that during the planned migrations, all Autodiscover requests are processed by the Exchange Server 2013 ClientAccess servers.

Page 23: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

http://www.gratisexam.com/

What should you recommend?

A. On the Exchange Server 2007 Client Access servers, modify the AutodiscoverServiceInternalURI.B. On the Exchange Server 2007 Client Access servers, modify the ExternalURL value of the Autodiscover virtual directory.C. On the Exchange Server 2013 Client Access servers, modify the ExternalURL value of the Autodiscover virtual directory.D. On the Exchange Server 2013 Client Access servers, modify the AutodiscoverServiceInternalURI.

Correct Answer: ASection: [none]Explanation

Explanation/Reference:The Exchange Server 2007 Client Access servers must be configured to use the Exchange Server 2013 Client Access server. We do this by setting theAutodiscoverServiceInternalURI property.

QUESTION 7You need to recommend a solution for the voice mail traffic. The solution must meet the technical requirements.

Which two configurations should you include in the recommendation? (Each correct answer presents part of the solution. Choose two.)

A. A dial plan.B. a server certificateC. a transport ruleD. a data loss prevention (DLP) policyE. a call answering rule

Correct Answer: ABSection: [none]Explanation

Explanation/Reference:

Page 24: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

* Scenario: Voice mail traffic between the telephone system and the Exchange Server environment must be encrypted.A: Use the EAC to configure Protected Voice Mail from authenticated callers

1. In the EAC, navigate to Unified Messaging > UM dial plans. In the list view, select the UM dial plan you want to modify, and then click Edit .2. On the UM Dial Plan page, under UM Mailbox Policies, select the UM mailbox policy you want to manage, and then click Edit .3. On the UM Mailbox Policy page > Protected voice mail, under Protect voice message from authenticated callers, select one of the following options:None Use this setting when you don't want protection applied to any voice messages osent to UM-enabled users.Private Use this setting when you want Unified Messaging to apply protection only to ovoice messages that have been marked as private by the caller. All Use this setting when you want Unified Messaging to apply protection to all voice omessages, including those not marked as private.4. Click Save.

B:* In on-premises and hybrid deployments, you can configure a Client Access and Mailbox server to use mutual Transport Layer Security (mutual TLS) to encrypt theSIP and RTP traffic sent and received from other devices and servers. When you configure the dial plan to use SIP secured mode, only the SIP signaling traffic willbe encrypted, and the RTP media channels will still use TCP, which isn't encrypted. However, when you configure the dial plan to use Secured mode, both the SIPsignaling traffic and the RTP media channels are encrypted. An encrypted signaling media channel that uses Secure Realtime Transport Protocol (SRTP) also usesmutual TLS to encrypt the VoIP data.* When you're deploying Transport Layer Security (TLS) with UM, the certificates that are used on the Client Access server and the Mailbox server both mustcontain the local computer's fully qualified domain name (FQDN) in the certificate's Subject Name. To work around this issue, use a public certificate and import thecertificate on all Client Access and Mailbox servers, any VoIP gateways, IP PBXs, and all the Lync servers.

QUESTION 8You deploy a new certificate to a Client Access server.

You test the new certificate by using Outlook Anywhere from the Internet.

The test generates certificate errors.

You need to prevent the errors from reoccurring.To which two stores should you add the root CA certificate? (Each correct answer presents part of the solution. Choose two.)

A. the personal store on the client computersB. the personal store on the Client Access serverC. the personal store on the Mailbox serversD. the Trusted Root Certification Authorities store on the client computersE. the Trusted Root Certification Authorities store on the Client Access serverF. the Trusted Root Certification Authorities store on the Mailbox servers

Correct Answer: DE

Page 25: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

Section: [none]Explanation

Explanation/Reference:D: Outlook Anywhere won't work with a self-signed certificate on the Client Access server. Self-signed certificates must be manually copied to the trusted rootcertificate store on the client computer or mobile device. When a client connects to a server over SSL and the server presents a self-signed certificate, the client willbe prompted to verify that the certificate was issued by a trusted authority. The client must explicitly trust the issuing authority. If the client confirms the trust, thenSSL communications can continue.

E: If you are providing external access to Autodiscover by using Outlook Anywhere you must install a valid SSL certificate on the Client Access server.

Page 26: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

Testlet 1

Topic 3, Contoso Ltd

Overview

General OverviewContoso, Ltd., is an aerospace engineering company that manufactures jet engine parts for various industries and government agencies. Contoso has an ExchangeServer 2013 organization.A partner company named Tailspin Toys has an Exchange Server 2010 organization.

Physical LocationsContoso has two offices. The offices are located in Montreal and Chicago.

Each office contains a data center:The Montreal and Chicago offices connect to each other by using a direct WAN link.All connections to the Internet are routed through the Montreal office.Most of Contoso's employees work from the Montreal office.

Existing EnvironmentThe network of Contoso is configured as shown in the exhibit. (Click the Exhibit button.)

The network of Contoso contains the following components:Client computers that run either Microsoft Outlook 2007 or Outlook 2010.Users who have a primary SMTP address that uses the contoso.com suffix.A retention policy that retains all email messages for 580 days and is associated to all users.Six servers that have Exchange Server installed. The servers are configured as shown in the following table.

Page 27: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

A data availability group (DAG) named DAG1 that contains all of the mailbox servers. EX5 is configured as the witness server for DAG1. A file server in theChicago office is configured as an alternate witness server. DAG1 has Datacenter Activation Coordination (DAC) mode enabled.

Requirements

Planned ChangesContoso plans to implement the following changes:Implement an organization relationship between Contoso and Tailspin Toys.Move the mailboxes of all the members of the sales department to Office 365.Evaluate Unified Messaging (UM) by conducting a small pilot in the Montreal office.

Security RequirementsContoso identifies the following security requirements:Ensure that the data in the Exchange Server databases cannot be read if a hard disk is stolen.Prevent temporary employees from executing a Reply All or a Forward of any email messages they receive.Prevent temporary contractors from changing the configurations of the user accounts for the users in the research and development department.Ensure that all of the connections to Outlook Web App from the Internet use Extensible Authentication Protocol (EAP) protocols and Transport Layer Security (TLS)protocols.Secure all of the email messages from the users at Tailspin Toys to the Contoso users. Ensure that all of the messages can be secured if the certificates at TailspinToys are issued by a trusted third-party certification authority (CA).

Auditing RequirementsContoso identifies the following requirements for auditing mailboxes:The manager of the legal department must receive a daily report by email that contains a record of all the eDiscovery mailbox searches.Any access to a mailbox by a service account must be excluded from the daily report.

Compliance Requirements

Page 28: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

All of the email messages in the Sent Items folder of each user in the marketing department of Contoso must be deleted automatically after 365 days.

Office 365 Coexistence RequirementsContoso identifies the following Office 365 coexistence requirements:Office 365 users must be able to access their mailbox by using their Active Directory user account in Contoso.On-premises users must be able to share free/busy information and calendar information with the Office 365 users.

QUESTION 1You need to create a federation trust for the planned organization relationship.

Which three actions should you perform?

To answer, move the three appropriate actions from the list of actions to the answer area and arrange them in the correct order.

Select and Place:

Page 29: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

Correct Answer:

Section: [none]Explanation

Explanation/Reference:

QUESTION 2You are evaluating the implementation of the organization relationship.

You need to recommend which tasks must be performed to ensure that the Contoso users can view the Out of Office message of the Tailspin Toys users beforethe Contoso users send a message to the Tailspin Toys users.

Page 30: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

What should you recommend doing before implementing the organization relationship?

A. Create a Policy Tip.B. Upgrade all of the client computers to Outlook 2010.C. Create a MailTip.D. Publish the Autodiscover service of Tailspin Toys.E. Create a remote domain.

Correct Answer: BSection: [none]Explanation

Explanation/Reference:* Scenario: Implement an organization relationship between Contoso and Tailspin Toys.

QUESTION 3You need to identify which technologies must be deployed to meet the Office 365 coexistence requirements.

Which two technologies should you identify? (Each correct answer presents part of the solution.Choose two.)

A. the Microsoft Online Services Directory Synchronization toolB. Active Directory Federation Services (AD FS) 2.0C. Active Directory Rights Management Services (AD RMS)D. an internal root CAE. Active Directory Lightweight Directory Services (AD LDS)

Correct Answer: ABSection: [none]Explanation

Explanation/Reference:* Scenario: Contoso identifies the following Office 365 coexistence requirements:/ Office 365 users must be able to access their mailbox by using their Active Directory user account in Contoso./ On-premises users must be able to share free/busy information and calendar information with the Office 365 users.

A: When you create an Office 365 mailbox in Exchange Online in a hybrid deployment, the mail user is created in Active Directory on-premises. Directorysynchronization, if it's configured, automatically synchronizes this new user object to Office 365, where it's converted to a cloud mailbox in Exchange Online. Youcan create Office 365 mailboxes as regular user mailboxes, resource mailboxes for meeting rooms and equipment, and shared mailboxes.

Page 31: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

B: Step-By-Step: Setting up AD FS and Enabling Single Sign-On to Office 365

QUESTION 4You implement the UM pilot.

You capture and analyze a network trace from the IP-PBX.

You discover that SIP/MTLS requests for TCP 5061 to EX1 are dropped.

You need to ensure that the IP-PBX can route calls successfully to the Exchange Server 2013 organization.

What should you do?

A. Modify the IP-PBX to route calls to EX5 and EX6.B. Modify the port used on the IP-PBX.C. Modify the SIP listening port on EX1.D. Deploy a server that has Exchange Server 2010 and the Unified Messaging server role installed.

Correct Answer: ASection: [none]Explanation

Explanation/Reference:

QUESTION 5You need to recommend which tasks must be performed to meet the security requirements for Tailspin Toys.

Which two tasks should you recommend? (Each correct answer presents part of the solution.Choose two.)

A. Run the set-transportserver transportsyncenabled $true command.B. Run the set-transportconfig tlsreceivedomainsecurelist tailspintoys.com command.C. Run the set-transportservice transportsyncenabled $true command.D. Create a new Receive connector.E. Create a new Send connector.

Correct Answer: BDSection: [none]

Page 32: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

Explanation

Explanation/Reference:* Scenario:Secure all of the email messages from the users at Tailspin Toys to the Contoso users. Ensure that all of the messages can be secured if the certificates at TailspinToys are issued by a trusted third-party certification authority (CA).* Configuring Domain Security on Exchange Server 20131. Establish certificate trust between organizations2. Configure Domain SecurityTLSReceiveDomainSecureList specifies the domains from which you want to receive domain secured email by using mutual Transport Layer Security (TLS)authentication3. Configure connectors

Reference: Configuring Domain Security on Exchange Server 2013

QUESTION 6You need to recommend which tasks must be performed to meet the compliance requirement for the marketing department.

Which three actions should recommend?

To answer, move the three appropriate actions from the list of actions to the answer area and arrange them in the correct order.

Select and Place:

Page 33: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

Correct Answer:

Page 34: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

Section: [none]Explanation

Explanation/Reference:

Page 35: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

Testlet 1

Topic 4, Trey Research

Overview

General OverviewTrey Research is a brokerage firm that has 5,000 users. Trey Research has a finance department, a human resources department, an investment department, anda legal department.Trey Research is acquiring a partner company named Fabrikam, Inc.

Physical LocationsTrey Research has four main offices located in Boston, Chicago, New York, and Atlanta. The offices connect to each other by using a WAN link. The Chicago officeconnects directly to the Internet.

Existing EnvironmentNetwork EnvironmentTrey Research has an Active Directory forest named treyresearch.com. The forest contains a single domain. All domain controllers run Windows Server 2012.

Each office is configured as an Active Directory site.

All user accounts are in an organizational unit (OU) based on their department. All users are in a universal security group based on their department.

Trey Research has a Lync Server 2013 infrastructure. The infrastructure is configured to required encryption for voice traffic.

Exchange Server OrganizationTrey Research has an Exchange Server organization that contains five servers. The servers are configured as shown in the following table.

Page 36: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

The mailbox databases are mounted on the Exchange servers shown in the following table.

All of the mailboxes of the users in the executives department are mounted on DB3.

A public folder database named PF1 is mounted on EX5.

The Exchange Server organization has the following configurations:Users in the legal department use a shared mailbox named Legal. Legal is enabled for In-Place Hold. Legal is the only mailbox on DB2.All inbound and outbound email messages to and from the Internet are routed through EX1.

Page 37: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

Email messages sent and received by Fabrikam are secured by using Mutual TLS.All public folders are stored in PF1.

All users connect to their mailbox by using Microsoft Outlook 2013 and Outlook Web App. Fabrikam has an Exchange Server 2013 organization.

Problem StatementsTrey Research identifies the following issues:After a change to a certificate, users report that email messages sent to Fabrikam are not delivered.The storage for DB3 fails. The storage will be offline for the next two days.

Requirements

Planned ChangesTrey Research plans to implement the following changes:Move all public folders to an Exchange Server 2013 server. The solution must ensure that all users cannot modify the public folders stored on EX5 after the plannedmove.Integrate Unified Messaging (UM) services with the Lync Server 2013 infrastructure.

Collaboration RequirementsCustom recipient MailTips created in the Exchange Server organization of Trey Research must be visible to the users at Fabrikam. The solution must ensure thatadministrators can define a subset of users who can share their MailTips.

Auditing RequirementsThe following actions must be audited for actions in the Legal mailbox only:Delegate - Purge mailbox contentDelegate - Transfer file between foldersAdministrator - Messages sent by administratorAdministrator - Open any content within the mailbox

Security RequirementsTrey Research identifies the following security requirements:Ensure that the users in the finance department can protect email messages from being altered in transit, regardless of the recipient.Prevent the email messages sent to the users in the human resources department from being forwarded to external recipients.Prevent the audio files in voice mail message marked as Private from being extracted from email messages.Redirect email messages that contain social security information to the legal department.

Compliance RequirementsTrey Research identifies the following compliance requirements:All users must be notified before they send an email message that contains any five bank account numbers to an external recipient. The users must be able tooverride the requirement if they have a valid business reason to send the email message.

Page 38: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

Users must use a custom message classification when they send email messages that contain information about the planned acquisition of Fabrikam.Only the users in the legal department must be able to use eDiscovery to view the contents of email messages sent by the finance department users.

QUESTION 1You need to implement a solution that meets the compliance requirements for the members of the legal department.

Which two cmdlets should you use? (Each correct answer presents part of the solution. Choose two.)

A. New-RoleAssignmentPolicyB. Add-ManagementRoleEntryC. New-ManagementRoleAssignmentD. New-ManagementRoleE. New-ManagementScope

Correct Answer: CDSection: [none]Explanation

Explanation/Reference:* From scenario:/ Only the users in the legal department must be able to use eDiscovery to view the contents of email messages sent by the finance department users./ Users in the legal department use a shared mailbox named Legal. Legal is enabled for In-Place Hold. Legal is the only mailbox on DB2.

We need to assign the role to the legal department users using the New- ManagementRoleAssignment cmdlet.

To restrict the eDiscovery access to the finance users emails, we need to create a scope using the New-ManagementScope cmdlet.

QUESTION 2You need to recommend a solution that meets the auditing requirements.

Which command should you include in the recommendation? (To answer, select the appropriate options in the answer area.)

Page 39: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

Hot Area:

Correct Answer:

Page 40: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

Section: [none]Explanation

Explanation/Reference:* Scenario:The following actions must be audited for actions in the Legal mailbox only:Delegate - Purge mailbox contentDelegate - Transfer file between foldersAdministrator - Messages sent by administratorAdministrator - Open any content within the mailbox

* Use the Set-Mailbox cmdlet to modify the settings of an existing mailbox.

HardDelete: An e-mail is permanently deletedMove: An e-mail is moved to another folderMessageBind: An e-mail is opened or viewed in the preview paneCreate: An item (excluding folders) is created in the mailbox (a message is sent, for example)

Reference: Auditing Mailbox Access

QUESTION 3You need to recommend a solution that meets the compliance requirements for emailing bank account numbers.

Page 41: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

Which command should you include in the recommendation? (To answer, select the appropriate options in the answer area.)

Hot Area:

Correct Answer:

Page 42: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

Section: [none]Explanation

Explanation/Reference:* Scenario: All users must be notified before they send an email message that contains any five bank account numbers to an external recipient. The users must beable to override the requirement if they have a valid business reason to send the email message.

* Transport rules apply actions to messages, most with corresponding action values.RejectUnlessSilentOverride Message is rejected unless the sender has chosen to override the policy restriction.RejectUnlessExplicitOverride This is the same as RejectUnlessSilentOverride, but the sender can also provide a justification for overriding the policy restriction.

Reference: New-TransportRule

QUESTION 4You need to identify which technologies must be used to meet the security requirements.

Which technologies should you identify? (To answer, drag the appropriate technologies to the correct requirements. Each technology may be used once, more thanonce, or not at all. You may need to drag the split bar between panes or scroll to view content.)

Page 43: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

Select and Place:

Correct Answer:

Page 44: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

Section: [none]Explanation

Explanation/Reference:

QUESTION 5You need to recommend a solution that meets the compliance requirements for email messages that contain information about the Fabrikam acquisition.

Which three actions should you recommend? (Each correct answer presents part of the solution.Choose three.)

Page 45: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

A. Create an Outlook protection rule.B. Create a new custom message classification.C. Modify the registry on all client computers.D. Modify the Content Filtering settings.E. Export the Message Classification configuration to an .xml file.

Correct Answer: BCESection: [none]Explanation

Explanation/Reference:B: Use the New-MessageClassification cmdlet to create a message classification instance in your organization.E: After you create a new message classification, you can specify the message classification as a transport rule predicate. Before Microsoft Outlook and OutlookWeb App users can apply the message classification to messages, you must update the end-user systems with the message classification XML file created by theExport-OutlookClassification.ps1 script file. The Export- OutlookClassification.ps1 script file is located in the %ExchangeInstallPath%Scripts directory.

C: Microsoft Office Outlook requires a local file (Classifications.xml) that contains definitions of the message classifications that Microsoft Exchange Serversupports before Outlook users can apply message classifications to their messages. You must also create a registry key that enables message classification andreferences the Classifications.xml file on the Outlook user's computer.

* From scenario:Compliance Requirements include:Users must use a custom message classification when they send email messages that contain information about the planned acquisition of Fabrikam.

QUESTION 6You need to implement a solution that meets the collaboration requirements.

What should you do?

A. Run the Set-CASMailbox cmdlet.B. Create an organization relationship.C. Create a new sharing policy.D. Modify the organization configuration.

Correct Answer: BSection: [none]Explanation

Explanation/Reference:* Scenario: Custom recipient MailTips created in the Exchange Server organization of Trey Research must be visible to the users at Fabrikam. The solution must

Page 46: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

ensure that administrators can define a subset of users who can share their MailTips.

* MailTips Over Organization RelationshipsYou may want to restrict certain types of MailTips. You can either allow all MailTips to be returned or allow only a limited set that would prevent NDRs. You canconfigure this setting with the MailTipsAccessLevel parameter on the Set-OrganizationRelationship cmdlet.

Reference: MailTips over organization relationships

QUESTION 7You need to recommend a solution that supports the planned changes for the public folders.

Which four cmdlets should you recommend running in sequence? (To answer, move the appropriate four cmdlets from the list of cmdlets to the answer area andarrange them in the correct order.)

Select and Place:

Page 47: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

Correct Answer:

Page 48: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

Section: [none]Explanation

Explanation/Reference:

Page 49: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

http://www.gratisexam.com/

QUESTION 8You need to configure the Exchange Server UM dial plan for the planned integration of UM and Lync Server.How should you configure the UM dial plan? (To answer, select the appropriate dial plan type and VoIP security mode in the answer area.)

Hot Area:

Page 50: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

Correct Answer:

Section: [none]Explanation

Explanation/Reference:* Scenario: Integrate Unified Messaging (UM) services with the Lync Server 2013 infrastructure.

* If you want to integrate Exchange Unified Messaging (UM) with Lync Server 2013, you must perform the following tasks: / On the Exchange UM server, create a SIP dial plan based on your organization’s specific deployment requirements./ To encrypt Enterprise Voice traffic, configure the security settings on the Exchange UM SIP dial plan as SIP Secured or Secured.Etc.

Note: * There are three formats or URI types that can be configured on UM dial plans:/ Telephone Extension (TeleExtn)/ SIP URISession Initiation Protocol (SIP) is a standard protocol for initiating interactive user sessions that involve multimedia elements such as video, voice, chat, andgaming. SIP is a request-to-response based protocol that answers requests from clients and responses from servers./ E.164

* When you configure the dial plan to use SIP secured mode, only the SIP signaling traffic will be encrypted, and the RTP media channels will still use TCP, whichisn’t encrypted. However, when you configure the dial plan to use Secured mode, both the SIP signaling traffic and the RTP media channels are encrypted. Anencrypted signaling media channel that uses Secure Realtime Transport Protocol (SRTP) also uses mutual TLS to encrypt the VoIP data.

Page 51: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

Reference: UM dial plans

QUESTION 9You are attempting to resolve the email delivery issue for Fabrikam.

You need to identify which certificate is being used by the servers in the Exchange Server organization of Fabrikam.

In which directory on EX1 should you review the log files? (To answer, select the appropriate directory in the answer area.)

Hot Area:

Page 52: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

Correct Answer:

Page 53: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

Section: [none]Explanation

Explanation/Reference:

* Scenario: After a change to a certificate, users report that email messages sent to Fabrikam are not delivered.* ProtocolLogProtocol logging records the SMTP conversations that occur between messaging servers as part of message delivery. These SMTP conversations occur on Sendconnectors and Receive connectors that exist in the Front End Transport service on Client Access servers, the Transport service on Mailbox servers, and theMailbox Transport service on Mailbox servers. You can use protocol logging to diagnose mail flow problems.

Page 54: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

Testlet 1

Topic 5, Proseware, Inc

Overview

General OverviewProseware, Inc., is an international manufacturing company that has 1,000 users. Proseware has a sales department, a marketing department, a researchdepartment, and a human resources department.

Proseware purchases another company named Contoso, Ltd. Contoso has 500 users.

Physical LocationsProseware has two main offices located in New York and London.The offices connect to each other by using a WAN link. Each office connects directly to the Internet. Contoso has a single office in Dallas.

Existing EnvironmentActive Directory EnvironmentThe Proseware network contains an Active Directory forest named proseware.com. The forest contains a single domain. All domain controllers run Windows Server2012.

Each office contains three domain controllers. Each office is configured as an Active Directory site.

The Contoso network contains an Active Directory forest named contoso.com. The forest contains a single domain. All domain controllers run Windows Server2012.

Exchange Server OrganizationProseware has an Exchange Server 2013 organization that contains four servers. The servers are configured as shown in the following table.

EX3 and EX4 are the members of a database availability group (DAG) named DAG1. DAG1 has two DAG networks. The networks are configured as shown in thefollowing table.

Page 55: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

Users connect to mail.proseware.com for Microsoft Outlook and Outlook Web App services. Mail.proseware.com resolves to an IP address on a hardware loadbalancer.

All Outlook Anywhere users are enabled for Cached Exchange Mode.

Proseware pilots a hybrid deployment of Exchange Server 2013 and Microsoft Office 365. The mailbox of each pilot user is moved to Office 365. For the pilotmailboxes, all inbound email messages from the Internet are delivered to the Exchange Server organization, and then forwarded to Office 365.

Contoso has an Exchange Server 2010 organization.

Problem StatementsProseware identifies the following issues:MapiNet is saturated with network traffic caused by the database replication between the members of DAG1 over MapiNet.The pilot users report that entries added to their Safe Senders list and their Blocked Senders list fail to work.A recent power outage in the New York office prevents all users from accessing their mailbox.A user named User1 reports that email messages are being sent from her mailbox without her consent.

Requirements

Planned ChangesProseware plans to implement the following changes:Several users at Contoso will use a mailbox at Proseware as their primary mailbox. The Contoso users will use Autodiscover to configure their client settings andwill use single sign-on.For a special project, an IT administrator will create 20 distribution groups that will each contain 200 members.Certain users in both companies will have a contoso.com SMTP suffix as their primary email address.

Technical RequirementsProseware identifies the following technical requirements for the Exchange Server organization:Internal email messages must be rejected if the messages cannot be protected by using Shadow Redundancy.All database replication between DAG1 members must occur over the ReplNet network.

Site Resiliency RequirementsProseware identifies the following site resiliency requirements for the Exchange Server organization:All mailboxes must be available if a single site becomes unavailable. The solution must not require administrator intervention.User traffic on the WAN links must be minimized.

Page 56: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

Email Security RequirementsProseware identifies the following requirements for securing email messages:Email recipients must be able to identify whether an email message was modified during delivery.All email messages stored in the mailbox databases must be protected from theft.Users must be able to encrypt email messages from Outlook Web App.

Retention RequirementsProseware plans to reduce mailbox server storage usage and to limit company liability. Proseware identifies the following requirements:Email messages in the Deleted Items folder must be retained for only 30 days.Email messages in a mailbox folder named Projects must be retained for 540 days, unless the messages contain contractual information.Email messages in the Projects folder that contain contractual information must be retained indefinitely.All other email messages must be removed after one year.

QUESTION 1You are preparing the environment for the planned retention solution.

You need to identify which policy tags must be created to meet the retention requirements.

Which policy tag types should you identify? (To answer, drag the appropriate policy tag types to the correct message types. Each policy tag tag may be used once,more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.)

Select and Place:

Correct Answer:

Page 57: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

Section: [none]Explanation

Explanation/Reference:

QUESTION 2You need to implement UM for the sales department users.

Which four commands should you run in sequence? (To answer, move the appropriate four commands from the list of commands to the answer area and arrangethem in the correct order.)

Select and Place:

Page 58: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

Page 59: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

Correct Answer:

Page 60: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

Page 61: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

Section: [none]Explanation

Explanation/Reference:

QUESTION 3You need to recommend which technology can be used to meet each email security requirement.

What should you recommend? (To answer, select the appropriate technology for each requirement in the answer area.)

Hot Area:

Page 62: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

Correct Answer:

Page 63: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

Section: [none]Explanation

Explanation/Reference:

QUESTION 4You need to recommend a solution to support the planned changes for the integration of the Exchange Server organizations of Contoso and Proseware.

What should you configure in each organization? (To answer, drag the appropriate objects to the correct forests. Each object may be used once, more than once,or not at all. You may need to drag the split bar between panes or scroll to view content.)

Select and Place:

Page 64: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

Correct Answer:

Page 65: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

Section: [none]Explanation

Explanation/Reference:

QUESTION 5You need to recommend a solution to audit the issue of User1.

Which command should you recommend? (To answer, select the appropriate options in the answer area.)

Page 66: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

Hot Area:

Correct Answer:

Section: [none]Explanation

Explanation/Reference:* Scenario: A user named User1 reports that email messages are being sent from her mailbox without her consent.

Page 67: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

* Set-Mailbox –AuditDelegateThe AuditDelegate parameter specifies the operations to log for delegate users.

QUESTION 6You are evaluating the deployment of two additional Client Access servers and a hardware load balancer in the London office.

You need to recommend changes to the Client Access namespace design to meet the site resiliency requirements.

Which three actions should you recommend? (Each correct answer presents part of the solution.Choose three.)

A. In the London office, set mail.proseware.com as the external host name for Outlook Anywhere. In the New York office, set mail.proseware.com as the externalhost name for Outlook Anywhere.

B. In the London office, set lonmail.proseware.com as the internal host name for Outlook Anywhere. In the New York office, set nycmail.proseware.com as theinternal host name for Outlook Anywhere.

C. Use DNS round robin for the external host name for Outlook Anywhere.D. Use DNS round robin for the internal host name for Outlook Anywhere.E. In the London office, set nycmail.proseware.com as the external host name for Outlook Anywhere. In the New York office, set lonmail.proseware.com as the

external host name for Outlook Anywhere.F. In the London office, set mail.proseware.com as the internal host name for Outlook Anywhere. In the New York office, set mail.proseware.com as the internal

host name for Outlook Anywhere.

Correct Answer: ABCSection: [none]Explanation

Explanation/Reference:A: Use mail.proseware.com as the external host name for Outlook Anywhere at both locations.

B: Use internal names (lonmail.proseware.com and nycmail.proseware.com) as the internal host name for Outlook Anywhere in London and New York respectively.

C: To meet the resiliency requirement use the external host name (mail.proseware.com) for DNS round robin for Outlook anywhere.

* From scenario:/ Users connect to mail.proseware.com for Microsoft Outlook and Outlook Web App services. Mail.proseware.com resolves to an IP address on a hardware loadbalancer.

/ All Outlook Anywhere users are enabled for Cached Exchange Mode.

/ Proseware has two main offices located in New York and London.

Page 68: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

/Site Resiliency Requirements- All mailboxes must be available if a single site becomes unavailable. The solution must not require administrator intervention.- User traffic on the WAN links must be minimized.* Split DNS for Exchange Server 2013Split DNS allows your internal clients to receive a different answer to their DNS lookups than an external client would receive. In effect you have your Exchangenamespace hosted on your internal DNS server, with records configured to point to internal IP addresses.

QUESTION 7You need to recommend a solution to meet the technical requirements for redundancy during email delivery.

http://www.gratisexam.com/

Which cmdlet should you include in the recommendation?

A. Set-FrontendTransportServiceB. Set-TransportConfigC. Set-MailboxTransportServiceD. Set-TransportService

Correct Answer: BSection: [none]Explanation

Explanation/Reference:Explanation:/ Internal email messages must be rejected if the messages cannot be protected by using Shadow Redundancy

We need to use the Set-TransportConfig cmdlet with the RejectMessageOnShadowFailure parameter.

QUESTION 8You need to resolve the content filtering issue for the Office 365 pilot users.

What should you do?

Page 69: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

A. Run the Set-Mailbox cmdlet and specify the -MaxBlockedSenders and the - MicrosoftOnlineServicesID parameters.B. Run the Microsoft Online Services Directory Synchronization Configuration Wizard and select Enable Exchange hybrid deployment.C. Modify the default content filter policy from the Office 365 portal.D. Run the Set-Mailbox cmdlet and specify the -MaxSafeSenders and the - MicrosoftOnlineServicesID parameters.

Correct Answer: BSection: [none]Explanation

Explanation/Reference:* Scenario:/ The pilot users report that entries added to their Safe Senders list and their Blocked Senders list fail to work./ For the pilot mailboxes, all inbound email messages from the Internet are delivered to the Exchange Server organization, and then forwarded to Office 365.* Hybrid Configuration wizard Exchange 2013 includes the Hybrid Configuration wizard which provides you with a streamlined process to configure a hybriddeployment between on- premises Exchange and Exchange Online organizations.

Reference: Exchange Server 2013 Hybrid Deployments

QUESTION 9You discover that the Large Audience MailTip is not displayed when users compose an email message to the 20 new distribution groups.

You need to ensure that the Large Audience MailTip is displayed for the new distribution groups immediately.

Which cmdlet should you use?

A. Set-DistributionGroupB. Set-MailboxServerC. Set-ClientAccessServerD. Start-ManagedFolderAssistant

Correct Answer: BSection: [none]Explanation

Explanation/Reference:We need to use the Set-MailboxServer cmdlet with the ForceGroupMetricsGeneration parameter to force a count of the number of members of the distributiongroups.

The ForceGroupMetricsGeneration parameter specifies that group metrics information must be generated on the Mailbox server regardless of whether that servergenerates an offline address book (OAB). By default, group metrics are generated only on servers that generate OABs. Group metrics information is used by

Page 70: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

MailTips to inform senders about how many recipients their messages will be sent to. You need to use this parameter if your organization doesn't generate OABsand you want the group metrics data to be available.

Page 71: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

Testlet 1

Topic 6, Mix Questions

QUESTION 1Your company has offices in Tokyo, Bangkok, and Shanghai.

All connections to the Internet are routed through an Internet connection in the Tokyo office. All of the offices connect to each other by using a WAN link.

The network contains 10 servers that have Exchange Server 2010 installed. The servers are configured as shown in the following table.

You plan to deploy 10 servers that will have Exchange Server 2013 installed.

The servers will be configured as shown in the following table.

Page 72: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

Each site has an IP-PBX that provides telephony services for the mailboxes in that site by using unsecured SIP over TCP 5070. The IP-PBX uses the same port toconnect to multiple SIP peers.

You need to recommend which tasks must be performed to ensure that the Unified Messaging (UM) features are available to the mailboxes if a single server fails.

Which three actions should you include in the recommendation? (Each correct answer presents part of the solution. Choose three.)

A. Configure the Exchange Server 2013 Mailbox servers to listen to unsecured SIP on TCP 5070.B. Configure the Exchange Server 2013 Client Access servers to listen to unsecured SIP on TCP 5070.C. Install the Client Access server role on the Exchange Server 2013 servers in the Shanghai and Bangkok offices.D. Configure the Exchange Server 2013 Mailbox servers as additional SIP peers that contain new pilot identifiers.E. Configure the Exchange Server 2013 Client Access servers as additional SIP peers that contain new pilot identifiers.

Correct Answer: BCESection: [none]Explanation

Explanation/Reference:Note:* Exchange 2013 Unified Messaging offers administrators:/ A complete voice mail systemUnified Messaging offers a complete voice mail solution using a single store, transport, and directory infrastructure. The store is provided by a Mailbox server andforwarding of incoming calls from a VoIP gateway or IP PBX is handled by a Client Access server. All email and voice mail messages can be managed from asingle management point, using a single administration interface and tool set./ An Exchange security modelThe Microsoft Exchange Unified Messaging service on a Mailbox server and the Microsoft Exchange Unified Messaging Call Router service on a Client Accessserver run as a single Exchange server account.Consolidation

* The client access server (CAS) is a server role that handles all client connections to Exchange Server 2010 and Exchange 2013. The CAS supports all clientconnections to Exchange Server from Microsoft Outlook and Outlook Web App, as well as ActiveSync applications. The CAS also provides access to free/busy datain Exchange calendars.

Page 73: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

The CAS is one of five server roles in Exchange Server 2007 and Exchange 2010, and one of two server roles in Exchange Server 2013. It must be installed inevery Exchange Server organization and on every Active Directory (AD) site that has the Exchange mailbox server role installed.

QUESTION 2You have an Exchange Server 2013 organization named adatum.com. The organization contains five Mailbox servers.You need to prevent a user named User8 from permanently deleting an email message in his mailbox.

What should you do on the mailbox of User8?

A. Configure an in-place hold.B. Create an Archive mailbox.C. Configure a retention hold.D. Create a Retention tag.

Correct Answer: ASection: [none]Explanation

Explanation/Reference:In Exchange 2013, you can use In-Place Hold to accomplish the following goals:Place user mailboxes on hold and preserve mailbox items immutably Preserve mailbox items deleted by users or automatic deletion processes such as MRM Usequery-based In-Place Hold to search for and retain items matching specified criteria Preserve items indefinitely or for a specific duration Place a user on multipleholds for different cases or investigations Keep In-Place Hold transparent from the user by not having to suspend MRM Enable In-Place eDiscovery searches ofitems placed on hold

Note:When a reasonable expectation of litigation exists, organizations are required to preserve electronically stored information (ESI), including email that's relevant tothe case. This expectation often exists before the specifics of the case are known, and preservation is often broad. Organizations may need to preserve all emailrelated to a specific topic or all email for certain individuals.

Failure to preserve email can expose an organization to legal and financial risks such as scrutiny of the organization's records retention and discovery processes,adverse legal judgments, sanctions, or fines.

QUESTION 3You have an Exchange Server 2013 organization named adatum.com.

You have a database availability group (DAG) that contains four Exchange servers named Server1, Server2, Server3, and Server4. The file share witness is on aserver named Share1. The organization has two Send connectors. The Send connectors are configured as shown in the following table.

Page 74: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

Users report that email sent to external recipients is not being received.

You discover that outbound email messages are queued on Server3 and Server4.

You need to ensure that all of the email messages queued on Server3 and Server4 are delivered to the Internet as quickly as possible.

What should you do?

A. Modify the cost of External2.B. Disable External1.C. Modify the list of source bridgehead servers of External2.D. Modify the cost of External1.

Correct Answer: BSection: [none]Explanation

Explanation/Reference:Note:* In Microsoft Exchange Server 2013, a Send connector controls the flow of outbound messages to the receiving server.

* When a message is to be delivered to a remote delivery group, a routing path must be determined for the message. Exchange 2013 uses the same logic asExchange 2010 to select the routing path for a message:

Calculate the least-cost routing path by adding the cost of the IP site links that must be traversed to reach the destination. If the destination is a connector, the costassigned to the address space is added to the cost to reach the selected connector. If multiple routing paths are possible, the routing path with the lowest aggregatecost is used;If more than one routing path has the same cost, the routing path with the least number of hops is used;If more than one routing path is still available, the name assigned to the AD sites before the destination is considered. The routing path where the AD site nearestthe destination is lowest in alphanumeric order is used. If the site nearest the destination is the same for all routing paths being evaluated, an earlier site name isconsidered.

Page 75: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

QUESTION 4You are a network administrator for a company named Humongous Insurance. Humongous Insurance has an Active Directory forest that contains two domains.

http://www.gratisexam.com/

You install the Active Directory Rights Management Services server role on a server named ADRMS1. The Active Directory Rights Management Services (ADRMS) server uses an internal certification authority (CA) for all certificates.

You plan to provide users with the ability to use AD RMS to protect all of the email messages sent to a partner company named Contoso, Ltd.

Contoso does not have AD RMS deployed.

You need to identify which components from the Humongous Insurance network must be accessible to Contoso to ensure that the users at Contoso can openprotected messages.

Which two components should you identify? (Each correct answer presents part of the solution.Choose two.)

A. the AD RMS clusterB. the certificate revocation list (CRL)C. the Active Directory domain controllersD. the Client Access serversE. the Mailbox serversF. the Global Catalog servers

Correct Answer: BCSection: [none]Explanation

Explanation/Reference:B: The CRL is exactly what its name implies: a list of subscribers paired with digital certificate status. The list enumerates revoked certificates along with the reason(s) for revocation. The dates of certificate issue, and the entities that issued them, are also included. In addition, each list contains a proposed date for the nextrelease. When a potential user attempts to access a server, the server allows or denies access based on the CRL entry for that particular user.C: If federation cannot be implemented and the external organization cannot implement their own AD RMS infrastructure, hosting the user accounts can be the best

Page 76: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

option. However, the cost of managing such accounts (for both the IT department and each user) must be considered. In this case, the users will need to beauthenticated by a domain controller.

QUESTION 5You have an Exchange Server organization. The organization contains servers that have either Exchange Server 2010 or Exchange Server 2013 installed.

You hire a new helpdesk technician named helpdesk1. Helpdesk1 is a member of the Recipient Management management role group.

You discover that helpdesk1 created nine new mailbox-enabled users by using the New-Mailbox command.

You need to identify which management role provides helpdesk1 with the permissions to create new mailbox-enabled users.

Which cmdlets should you run?

A. Get-ManagementRoleEntry and Get-ManagementRoleAssignmentB. Get-RolegroupMember and Get-ManagementRoleAssignmentC. Get-ManagementRoleEntry and Get-RoleGroupD. Get-Rolegroup and Get-RoleGroupMember

Correct Answer: ASection: [none]Explanation

Explanation/Reference:* Use the Get-ManagementRoleEntry cmdlet to retrieve management role entries that have been configured on management roles.

* Use the Get-ManagementRoleAssignment cmdlet to retrieve management role assignments.

QUESTION 6You have an Exchange Server 2013 organization.

All user mailboxes have an In-Place Archive enabled.

You need to identify which email message types can be archived by using a retention policy.

Which message type or types should you identify? (Each correct answer presents part of the solution. Choose all that apply.)

A. calendar itemsB. mail itemsC. note items

Page 77: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

D. task itemsE. contact items

Correct Answer: ABCDSection: [none]Explanation

Explanation/Reference:Retention policy tags can created for these Folders:* CalendarThis default folder is used to store meetings and appointments.* InboxThis default folder is used to store messages delivered to a mailbox.* NotesThis folder contains notes created by users in Outlook. These notes are also visible in Outlook Web App.* TasksThis default folder is used to store tasks.Etc.

Reference: Retention tags and retention policies

QUESTION 7You plan to deploy 20 Client Access servers that will have Exchange Server 2013 installed.

You need to prepare the certificate required for the planned deployment. The solution must ensure that the same certificate can be used on all of the Client Accessservers.

What should you do first?

A. From the Exchange Admin Center, create a new certificate request.B. On each Client Access server, start the Certificates console and run the Certificate Import Wizard.C. On all of the Client Access servers, delete the default self-signed certificates.D. On one of the Client Access servers, run the Remove-ExchangeCertificate cmdlet.

Correct Answer: ASection: [none]Explanation

Explanation/Reference:You can use the EAC to generate certificate requests that work with most certificate issuers.

Page 78: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

Note:To prevent clients from receiving errors regarding untrusted certificates, the certificate that's used by your Exchange server must be issued by someone that theclient trusts. Although most clients can be configured to trust any certificate or certificate issuer, it's simpler to use a trusted third-party certificate on your Exchangeserver. This is because most clients already trust their root certificates. There are several third-party certificate issuers that offer certificates configured specificallyfor Exchange.

QUESTION 8Your company has an Exchange Server 2013 organization named adatum.com.

You purchase an Office 365 subscription and configure a hybrid deployment.

All recipients have an email address that contains a SMTP suffix of adatum.com.

You discover that all of the email messages sent to the Internet from users who have Office 365 mailboxes are routed through the on-premises Exchange servers.

You need to ensure that all of the email messages are sent directly to the Internet.

What should you do?

A. Modify the Send connector.B. Run the Hybrid Configuration wizard.C. Create a new Sharing policy.D. Modify an organization relationship.

Correct Answer: BSection: [none]Explanation

Explanation/Reference:Creating and configuring a hybrid deployment with the Hybrid Configuration wizard is now a single process in Microsoft Exchange Server 2013.

Note:A hybrid deployment offers organizations the ability to extend the feature-rich experience and administrative control they have with their existing on-premisesMicrosoft Exchange organization to the cloud. A hybrid deployment provides the seamless look and feel of a single Exchange organization between an on-premisesExchange Server 2013 organization and Exchange Online in Microsoft Office 365. In addition, a hybrid deployment can serve as an intermediate step to movingcompletely to an Exchange Online organization.

QUESTION 9You have an Exchange Server 2013 organization.

You successfully migrate the public folders from a previous version of Exchange Server. You discover that one of the public folder mailboxes almost reached its

Page 79: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

quota size.

You need to move some of the public folders in the public folder mailbox to another public folder mailbox.

What should you run?

A. Merge PublicFolderMailbox.ps1B. Set-MailPublicFolderC. New-PublicFolderMigrationRequestD. New-PublicFolderMoveRequest

Correct Answer: DSection: [none]Explanation

Explanation/Reference:* If the content of a public folder mailbox begins to exceed your mailbox quotas, you may need to move public folders to a different public folder mailbox. There area couple ways to do this. To move one or more public folders that don't contain subfolders, you can use the PublicFolderMoveRequest cmdlets.

* Use the New-PublicFolderMoveRequest cmdlet to begin the process of moving public folder contents between public folder mailboxes. Moving public folders onlymoves the physical contents of the public folder; it doesn't change the logical hierarchy. When the move request is completed, you must run the Remove-PublicFolderMoveRequest cmdlet to remove the request or wait until the time specified in the CompletedRequestAgeLimit parameter has passed. The request mustbe removed before you can run another move request.

QUESTION 10You have an Exchange Server organization that contains five servers. The servers are configured as shown in the following table.

You deploy Microsoft Lync Server 2010. You need to create a Lync Server SIP Unified Messaging (UM) dial plan to enable voice integration between Lync Server

Page 80: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

and Exchange Server.

Which three Exchange servers should you associate to the UM dial plans? (Each correct answer presents part of the solution. Choose three.)

A. Server1B. Server2C. Server3D. Server4E. Server5

Correct Answer: ABESection: [none]Explanation

Explanation/Reference:A: You can enable Unified Messaging (UM) in Microsoft Exchange Server 2010. You must enable the Exchange computer running the Unified Messaging serverrole before the Unified Messaging server can process calls for UM-enabled Exchange 2010 recipients in your Exchange organization. However, the UnifiedMessaging server also must be added to a UM dial plan before it can process calls for Unified Messaging.

BE:* Requirements and RecommendationsClient Access and Mailbox. In Microsoft Exchange Server 2013, Exchange UM runs as a service on these servers.

* Deploy the Exchange Mailbox server roles in each Exchange Unified Messaging (UM) forest where you want to enable users for Exchange UM.

Reference: Configuring Unified Messaging on Microsoft Exchange Server to Work with Lync Server 2013

QUESTION 11You have an Exchange Server 2013 organization.

You need to ensure that a user named User1 can prevent the deletion of every email message that contains a specific word from all of the mailboxes. The solutionmust minimize the number of permissions assigned to User1.

What should you do?

A. Add User1 to the Records Management management role group. Instruct User1 to run the New-ManagedContentSettings cmdlet.B. Add User1 to the Records Management management role group. Instruct User1 to run the New-MailboxSearch cmdlet.C. Add User1 to the Discovery Management management role group. Instruct User1 to run the New-ManagedContentSettings cmdlet.D. Add User1 to the Discovery Management management role group. Instruct User1 to run the New-MailboxSearch cmdlet.

Page 81: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

Correct Answer: DSection: [none]Explanation

Explanation/Reference:* If you want users to be able to use Microsoft Exchange Server 2013 In-Place eDiscovery, you must first authorize them by adding them to the DiscoveryManagement role group. Members of the Discovery Management role group have Full Access mailbox permissions for the Discovery mailbox that's created byExchange Setup.

* The New-MailboxSearch cmdlet creates an In-Place eDiscovery search or an In-Place Hold. Unless specified, mailboxes on all Exchange 2013 servers in anorganization are searched. You can stop, start, modify, or remove the search.

QUESTION 12You have an Exchange Server 2013 organization.

You need to prevent a user named User1 from permanently deleting an email message in his mailbox.What should you do on the mailbox of User1?

A. Implement a retention policy.B. Configure a retention hold.C. Implement a data loss prevention (DLP) policy.D. Configure an in-place hold.

Correct Answer: DSection: [none]Explanation

Explanation/Reference:In Exchange 2013, you can use In-Place Hold to accomplish the following goals:Place user mailboxes on hold and preserve mailbox items immutably Preserve mailbox items deleted by users or automatic deletion processes such as MRM Usequery-based In-Place Hold to search for and retain items matching specified criteria Preserve items indefinitely or for a specific duration Place a user on multipleholds for different cases or investigations Keep In-Place Hold transparent from the user by not having to suspend MRM Enable In-Place eDiscovery searches ofitems placed on hold

QUESTION 13Your company has an Exchange Server 2013 organization named Contoso.

A partner company has an Exchange Server 2013 organization named Fabrikam. Neither company has any trusts between their forests.

Users from both organizations access their mailbox from the Internet by using Outlook Anywhere.

Page 82: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

You need to ensure that the users from both organizations can share free/busy information.

Which two cmdlets should you run? (Each correct answer presents part of the solution. Choose two.)

A. New-AcceptedDomainB. Add-AvailabilityAddressSpaceC. Set-AvailabilityConfigD. New-SharingPolicyE. Add-ADPermission

Correct Answer: BDSection: [none]Explanation

Explanation/Reference:B: Use the Add-AvailabilityAddressSpace cmdlet to define the access method and associated credentials used to exchange free/busy data across forests.

D: Use the New-SharingPolicy cmdlet to create a sharing policy to regulate how users inside your organization can share calendar and contact information withusers outside the organization. Users can only share this information after federation has been configured in Exchange.

QUESTION 14A company named Contoso, Ltd., has an Exchange Server 2013 organization. The primary SMTP suffix for all users is contoso.com.

A company named Fabrikam, Inc., has an Exchange Server 2010 organization. The primary SMTP suffix for all users is fabrikam.com.

The users in both organizations access their email by using Microsoft Outlook 2010 and Outlook Anywhere. All of the users work from domain-joined clientcomputers that connect to the internal network.

Contoso acquires Fabrikam.

You establish a cross-forest trust between the Contoso forest and the Fabrikam forest.

In fabrikam.com, you create a user named User1. In contoso.com, you create a linked mailbox for User1 and you set the primary SMTP address [email protected].

User1 reports that Outlook 2010 fails to configure his mail profile automatically. User1 can manually configure his profile and connect to his mailbox.

You need to ensure that users in fabrikam.com can find their mailboxes automatically.

What should you do in contoso.com?

Page 83: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

A. Create a DNS record named autodiscover.fabrikam.com. Point the record to the virtual IP address of the Client Access servers.B. Modify the ExternalURL of the Autodiscover virtual directory on the Exchange Servers 2013 servers.C. Modify the Autodiscover Service Connection Point (SCP).D. Run the Export-AutoDiscoverConfig cmdlet on an Exchange Server 2013 server.

Correct Answer: DSection: [none]Explanation

Explanation/Reference:You can configure Microsoft Exchange services, such as the Availability service, for the Autodiscover service on a Microsoft Exchange Server 2010 Client Accessserver. When you enable Outlook Anywhere, you must also configure external client access to Microsoft Exchange services for the Autodiscover service. Otherexternal URLS you must configure include the URLs for the Availability service, Exchange Web Services, Unified Messaging (UM), and the offline address book.

QUESTION 15You have an Exchange Server 2013 organization that contains 10 servers.

You have a federation trust to the Microsoft Federation Gateway. The certificate in the trust relationship expires soon.

You need to replace the certificate. The solution must minimize downtime.

You purchase a new certificate.

What should you do next?

A. On all of the Exchange servers, import the certificate, and then run the New-FederationTrust cmdlet.B. On all of the Exchange servers, import the certificate, and then run the Set- OrganizationRelationship cmdlet.C. On one of the Exchange servers, import the certificate, and then run the Set-FederationTrust cmdlet.D. On one of the Exchange servers, import the certificate, and then run the Set- FederatedOrganizationldentifier cmdlet.

Correct Answer: CSection: [none]Explanation

Explanation/Reference:You can use the Set-FederationTrust cmdlet to manage the certificates used for the federation trust. You can also use the Set-FederationTrust cmdlet to refresh themetadata document from the Microsoft Federation Gateway and download its certificate.

Example:This example configures the federation trust Microsoft Federation Gateway to use the certificate with the thumbprint

Page 84: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

AC00F35CBA8359953F4126E0984B5CCAFA2F4F17 as the next certificate.Set-FederationTrust -Identity "Microsoft Federation Gateway" -Thumbprint AC00F35CBA8359953F4126E0984B5CCAFA2F4F17

QUESTION 16Your company has a hybrid deployment of Exchange Server 2013 and Microsoft Office 365.All recipients have an SMTP suffix of contoso.com.

You discover that all of the email messages sent to the Internet from users who have Office 365 mailboxes are routed through the on-premises Exchange servers.

You need to ensure that all of the email messages are sent directly to the Internet.

What should you do?

A. Modify an organization relationship.B. Create a new routing group connector.C. Create a new transport rule.D. Run the Hybrid Configuration wizard.

Correct Answer: DSection: [none]Explanation

Explanation/Reference:Creating and configuring a hybrid deployment with the Hybrid Configuration wizard is now a single process in Microsoft Exchange Server 2013.

The wizard allows you to select and configure Client Access or Edge Transport servers to handle secure mail transport between the on-premises and ExchangeOnline organizations. The wizard configures on-premises Client Access servers and Microsoft Exchange Online(EOP) on your Office 365 organization for hybridmail routing. By configuring new and existing Send and Receive connectors in the on-premises organization and Inbound and Outbound connectors in EOP, thewizard allows you to choose whether outbound messages delivered to the Internet from the Exchange Online organization will be sent directly to external mailrecipients or routed through your on-premises Exchange servers included in the hybrid deployment.

Reference: Hybrid Configuration wizard

QUESTION 17You have an Exchange Server 2013 organization that contains one office in Los Angeles and one office in New York.

All servers have the Mailbox server role and the Client Access server role installed and are members of a data availability group (DAG) named DAG1. The serversand databases are shown in the exhibit. (Click the Exhibit button.)

Page 85: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

You need to ensure that if the active copy of LADB01 fails, a server in the same site will attempt to activate a copy of the database before a server in another sitedoes. The solution must not influence the activation of other database copies.

Which command should you run?

A. Set-databaseavailabilitygroupserver -identity dagl-alternatewitnessserverfs2B. Set-mailboxserver-identity ex6 autodatabasemountdial bestavailabilityC. Suspend-mailboxdatabasecopy-identity ladb01\ex6 -activationonlyD. Set-mailboxdatabasecopy -identity ladb01\ex2-activationpreference l

Correct Answer: DSection: [none]Explanation

Explanation/Reference:Use the Set-MailboxDatabaseCopy cmdlet to configure the properties of a database copy. With this cmdlet, you can configure the replay lag time, truncation lagtime, and activation preference value for a mailbox database copy.

/ activationpreferenceThe ActivationPreference parameter value is used as part of Active Manager's best copy selection process and to redistribute active mailbox databases throughout

Page 86: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

the database availability group (DAG) when using the RedistributeActiveDatabases.ps1 script. The value for the ActivationPreference parameter is a number equalto or greater than 1, where 1 is at the top of the preference order. The position number can't be larger than the number of database copies of the mailbox database.

Incorrect:Not C: Use the Suspend-MailboxDatabaseCopy cmdlet to block replication and replay activities (log copying and replay) or activation for a database configured withtwo or more database copies.

/ IdentityThe Identity parameter specifies the name of the database copy being suspended.

/ ActivationOnlyThe ActivationOnly switch specifies whether to suspend only activation for the mailbox database copy.

QUESTION 18Your company has offices in Montreal, New York, and Toronto.

Each office is configured as an Active Directory site. The Montreal office has a site link to the New York office. The New York office has a site link to the Torontooffice.

You have an Exchange Server 2013 organization that contains five Mailbox servers. The organization is configured as shown in the exhibit. (Click the Exhibitbutton.)

The servers in the Montreal and Toronto offices are members of a database availability group (DAG) named DAG01. DAG01 contains two databases nameTOMBX and MTLMBX.

MTLMBX is active on EX1 and contains all of the mailboxes of the users in the Montreal office.

TOMBX is active on EX3 and contains all of the mailboxes of the users in the Toronto office.

Page 87: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

You need to ensure that all email messages transmitted between the Montreal users and the Toronto users are routed through EX5.

Which two actions should you perform? (Each correct answer presents part of the solution.Choose two.)

A. Run the Set-MailboxTransportService cmdlet on EX5.B. Make EX5 the source server for all of the Send connectors.C. Create a separate DAG for each of the Montreal and Toronto offices.D. Add EX5 to DAG01.E. Configure the New York office as a hub site.

Correct Answer: CESection: [none]Explanation

Explanation/Reference:Routing in Exchange 2013 is now fully aware of Database Availability Groups (DAGs), and uses DAG membership as a routing boundary.

You use the Set-AdSite cmdlet to specify an Active Directory site as a hub site. Whenever a hub site exists along the least-cost routing path for message delivery,the messages are queued and are processed by the Transport service on Mailbox servers in the hub site before they're relayed to their ultimate destination.

You can configure any Active Directory site as a hub site. However, for this configuration to work correctly, you must have at least one Mailbox server in the hubsite.

QUESTION 19You are a network administrator for a company named Contoso, Ltd. You install the Active Directory Rights Management Services server role on a server. TheActive Directory Rights Management Services (AD RMS) server uses an internal certification authority (CA) for all certificates.

You plan to provide users with the ability to use AD RMS to protect all of the email messages sent to a partner company named A. Datum Corporation.

ADatum does not have AD RMS deployed.

You need to identify which components from the Contoso network must be accessible to A. Datum to ensure that the users at A. Datum can open protectedmessages.

Which two components should you identify? (Each correct answer presents part of the solution.Choose two.)

A. The Active Directory domain controllers

Page 88: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

B. The Client Access serversC. The certificate revocation list (CRL)D. The Mailbox servers

Correct Answer: ACSection: [none]Explanation

Explanation/Reference:A: The users in Adatum will need an account on a domain controller in Contoso to open a protected message.

C. The certificate used to secure the message will need to be checked against a certificate revocation list (CRL).

QUESTION 20You are an administrator for an international finance company.

You plan to deploy an Exchange Server 2013 organization.

The company's compliance policy requires that all users be prevented from sending email messages that contain more than one bank account number to externalrecipients.

You need to meet the compliance policy requirement.

What should you create?

A. A data loss prevention (DLP) policy and a DLP policy ruleB. A retention policy, a retention tag, and a Policy TipC. A throttling policy and a throttling policy associationD. A transport rule and a moderated mailbox

Correct Answer: ASection: [none]Explanation

Explanation/Reference:Sensitive Information Types in DLP Policies

When you create DLP policies, you can include rules that include checks for sensitive information. The conditions that you establish within a policy, such as howmany times something has to be found before an action is taken or exactly what that action is can be customized within your new custom policies in order to meetyour business requirements. Sensitive information rules are integrated with the transport rules framework by introduction of a condition that you can customize: If

Page 89: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

the message contains...Sensitive Information. This condition can be configured with one or more sensitive information types that are contained within themessages.

QUESTION 21You have an Exchange Server 2013 organization that contains multiple Hub Transport servers. You need to recommend a message hygiene solution to| meet thefollowing requirements:

- Block servers that are known to send spam- Minimize administrative effortWhat should you recommend?

A. an IP Block listB. IP Block list providersC. recipient filteringD. sender filtering

Correct Answer: BSection: [none]Explanation

Explanation/Reference:

QUESTION 22Your company has a main office and a branch office. An Active Directory site exits for each office.The offices are connected by a WAN link.You plan to deploy Exchange Server 2013 in each site. You need to identify the number of Exchange servers required to meet the following requirements:

- Maintain user access to mailboxes if a single server fails- Use the minimize account of Exchange servers in each site

How many servers should you deploy in each site?

A. 1B. 2C. 3D. 4

Correct Answer: BSection: [none]

Page 90: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

Explanation

Explanation/Reference:

QUESTION 23You have an Exchange Server 2010 organization. A user named Userl connects to his mailbox using Microsoft Office Outlook. Userl reports that he is unable tosend encrypted email messages to an external recipient named User2.You verify that Userl and User2 have email encryption certificates. You need to ensure that Userl can send encrypted email messages to User2.

What should you do first?

A. Instruct User2 to add a delegate.B. Instruct User2 to send a signed email message to Userl.C. Instruct Userl to send a signed email message to User2.D. Instruct Userl to modify the sensitivity settings of the email message.

Correct Answer: BSection: [none]Explanation

Explanation/Reference:

QUESTION 24Your company has an Exchange Server 2010 organization. The network contains an internal root certification authority (CA). You plan to add a disclaimer to allemail messages sent by users in the company. You need to ensure that the disclaimer can be added to encrypted email messages.What should you do?

A. Instruct users to encrypt email messages by using IRM only.B. Instruct users to encrypt email messages by using S/'MIME only.C. Enable the Content Filter agent on all of the Hub Transport servers.D. Modify the priority of the Transport Rule agent on all of the Hub Transport servers.

Correct Answer: ASection: [none]Explanation

Explanation/Reference:

Page 91: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

QUESTION 25You need to ensure that users in the organization are notified before they send email messages to external recipients.Which cmdlet should you run?

A. Set-Mailbox.B. Set-OrganizationConfig.C. Set-TransportAgent.D. Set-TransportConfig.

Correct Answer: BSection: [none]Explanation

Explanation/Reference:

QUESTION 26Your company is investigating a user named User1.You need to prevent User1 from permanently deleting items from his mailbox.What should you run?

A. Set-Mailbox User1 LitigationHoldEnabled $true.B. Set-Mailbox User1 ModerationEnabled $true.C. Set-Mailbox User1 RetainDeletedltemsUntilBackup $true.D. Set-Mailbox User1 RetentionHoldEnabled $true.

Correct Answer: ASection: [none]Explanation

Explanation/Reference:

QUESTION 27You have an Exchange Server 2013 organization that has Information Rights Management (IRM) configured.

Users report that they cannot apply IRM protection to email messages from Outlook Web App.

You verify that the users can protect the messages by using IRM from Microsoft Outlook.

Page 92: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

You need to recommend a solution to ensure that the users can protect email messages by using IRM from Outlook Web App.

Which four actions should you recommend?

To answer, move the four appropriate actions from the list of actions to the answer area and arrange them in the correct order.

Select and Place:

Correct Answer:

Page 93: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

Section: [none]Explanation

Explanation/Reference:

QUESTION 28You have an Exchange Server 2013 database availability group (DAG). Each member of the DAG has two network interfaces named Network1 and Network2.Network1 is used for client connections. Network2 is used for database replication.

Network2 fails.

You discover that replication traffic is sent over Network1.

Page 94: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

You need to ensure that all of the database replication traffic is sent over Network2. The solution must minimize database replication downtime.

Which three actions should you perform?

To answer, move the three appropriate actions from the list of actions to the answer area and arrange them in the correct order.

Select and Place:

Correct Answer:

Page 95: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

Section: [none]Explanation

Explanation/Reference:

QUESTION 29You have a server that has Exchange Server 2013 installed.

You plan to configure Unified Messaging (UM) to connect to an IP-PBX.

A telecommunications administrator configures the following numbers on the IP-PBX:First extension number: 12100Last extension number: 12499Help extension number: 12500Incoming pilot number: 12000

You need to configure UM to support the following requirements:Users must be able to use Outlook Voice Access.Users must be able to receive voice mail when callers connect to the users' extension.Callers must be able to dial into an automated help system hosted by your company, which uses standard menus and speech-enabled menus.

Page 96: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

Which numbers should you use for the UM configurations?

To answer, drag the appropriate number to the correct UM object in the answer area. Each number may be used once, more than once, or not at all. Additionally,you may need to drag the split bar between panes or scroll to view content.

Select and Place:

Correct Answer:

Section: [none]Explanation

Explanation/Reference:

Page 97: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

QUESTION 30You are an administrator for a company named Contoso, Ltd. The company is an international reseller that has offices worldwide. One of the offices is located inFrance.

Each office contains several servers that have Exchange Server 2013 installed. The Exchange Server organization is configured for Unified Messaging (UM). Eachoffice contains an IP-PBX device.

You need to ensure that callers to the France office can navigate the voice mail system menu in French.

In which order should you perform the actions?

To answer, move all actions from the list of actions to the answer area and arrange them in the correct order.

Select and Place:

Correct Answer:

Page 98: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

Section: [none]Explanation

Explanation/Reference:

QUESTION 31You have an Exchange Server organization named adatum.com. The organization contains servers that have Exchange Server 2010 and Exchange Server 2013installed.

The company executives require that all email messages remain stored for three years.

You create two retention tags named Ret1 and Ret2. Ret1 moves the email messages to an Archive mailbox after one year. Ret2 permanently deletes the emailmessages after three years.

You need to meet the company executives' requirements. The solution must ensure that all email messages that are older than two years are removed as quicklyas possible.

Page 99: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

Which three actions should you perform in sequence? (To answer, move the appropriate three actions from the list of actions to the answer area and arrange themin the correct order.)

Select and Place:

Correct Answer:

Page 100: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

Section: [none]Explanation

Explanation/Reference:

QUESTION 32You have an Exchange Server 2013 organization that contains two Mailbox servers and two Client Access servers.

You have an Active Directory Rights Management Services (AD RMS) cluster. Information Rights Management (IRM) is enabled for the Exchange Serverorganization.

All company executives are in a security group named Execs. All of the executives use smartphones that are managed by using a mobile device mailbox policy. Theexecutives frequently read IRM-protected email messages by using Microsoft Outlook.

You need to ensure that the executives can read the IRM-protected messages on their smartphone.

Page 101: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

Which task should you perform in each environment? (To answer, drag the appropriate tasks to the correct environments. Each task may be used once, more thanonce, or not at all. You may need to drag the split bar between panes or scroll to view content.)

Select and Place:

Correct Answer:

Page 102: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

Section: [none]Explanation

Explanation/Reference:Note:* Set-ActiveSyncMailboxPolicyUse the Set-ActiveSyncMailboxPolicy cmdlet to apply a variety of Mobile Device mailbox policy settings to a server. You can set any of the parameters by using onecommand.Parameters include:/ IrmEnabledThe IrmEnabled parameter specifies whether Information Rights Management (IRM) is enabled for the mailbox policy.

* AD RMS super users To enable transport decryption, journal report decryption, IRM in Outlook Web App, and IRM for Exchange Search, you must add the Federation mailbox, a systemmailbox created by Exchange 2013 Setup, to the super users group on the AD RMS cluster.

Reference: Information Rights Management

Page 103: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

QUESTION 33Your company has two offices. Each office is configured as an Active Directory site. The sites are named Site1 and Site2.

You have an Exchange Server 2013 organization that is configured as shown in the following exhibit.

Datacenter Activation Coordination (DAC) mode is enabled on the database availability group (DAG) named DAG1.

You are testing a site failover by shutting down all of the servers in Site1.

You need to mount the databases in Site2.

Which three commands should you run in sequence? (To answer, move the appropriate three commands from the list of commands to the answer area andarrange them in the correct order.)

Select and Place:

Page 104: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

Correct Answer:

Page 105: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

Section: [none]Explanation

Explanation/Reference:

QUESTION 34You have an Exchange Server 2013 organization.

Your company identifies the following security requirements:Users must be able to send encrypted email messages that can only be decrypted by the intended recipient.All email messages sent by a user named User1 to an external recipient must be protected by using TLS.

Page 106: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

All SMTP sessions to a remote SMTP host named SMTP1 must be encrypted.

You need to recommend which technology must be used to meet each requirement.

Which technologies should you recommend? (To answer, drag the appropriate technologies to the requirements in the answer area. Each technology may be usedonce, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.)

Select and Place:

Correct Answer:

Section: [none]

Page 107: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

Explanation

Explanation/Reference:

QUESTION 35Your company has a main office and a disaster recovery site. An Active Directory site named MainSite exists for the main office. An Active Directory site namedDRSite exists for the disaster recovery site. The two sites connect to each other by using a WAN link. All users work in the main office.

You have an Exchange Server 2013 organization. The organization contains six servers. The servers are configured as shown in the following table.

All of the Mailbox servers are members of a database availability group (DAG) named DAG1.

After a WAN link failure, you discover that all of the active mailbox database copies are located on MBX3, even though MBX1 and MBX2 are still running.

You need to prevent an automatic failover of DAG1 if the WAN link between the two sites fails but the servers in both sites are still running.

The solution must prevent two active copies of the same database.

What should you do? (To answer, select the appropriate options in the answer area.)

Hot Area:

Page 108: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

Correct Answer:

Page 109: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

Section: [none]Explanation

Explanation/Reference:Note:Set-DatabaseAvailabilityGroupThe Set-DatabaseAvailabilityGroup cmdlet enables you to manage DAG properties that can't be managed from the Exchange Administration Center (EAC), such asconfiguring network discovery, selecting the TCP port used for replication, and enabling datacenter activation coordination (DAC) mode.Parameters include:/ DatacenterActivationModeThe DatacenterActivationMode parameter specifies whether datacenter activation mode is disabled (Off) or enabled for the DAG (DagOnly)./ WitnessServerThe WitnessServer parameter specifies the name of a server that will act as a witness for the DAG. The server specified can't be a member of the DAG./ AlternateWitnessServerThe AlternateWitnessServer parameter specifies the name of an alternate server that's used to store file share witness data. The specified server must not be amember of the DAG that's configured to use it. This parameter is used only as part of a datacenter switchover process. If the DAG is extended across multipledatacenters in a site resilience configuration, we recommend preconfiguring the alternate witness server and directory.

QUESTION 36

Page 110: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

Your company implements Exchange Server 2013 Unified Messaging (UM).

The company uses an auto attendant.

You need to ensure that when calls are routed to the auto attendant, callers can press 0 to reach a receptionist.

Which option should you configure from the UM Auto Attendant window? To answer, select the appropriate option in the answer area.

Hot Area:

Page 111: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

Correct Answer:

Page 112: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

Section: [none]Explanation

Explanation/Reference:

Page 113: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

Note:* Address Book and Operator AccessSpecify how callers to this UM auto attendant can dial and search for users in the shared address book, and if they can transfer to the operator.

QUESTION 37You have an Exchange Server organization that contains four servers. The servers are configured as shown in the following table.

SiteA contains an IP gateway that uses a dial plan named Dialplan1. SiteB contains a Lync Server 2013 server that uses a dial plan named Dialplan2.

You plan to migrate all Unified Messaging (UM) functionalities to Exchange Server 2013.

You need to identify which tasks must be performed to complete the migration.

Which tasks should you identify? (To answer, select the tasks that are required and not required in the answer area.)

Hot Area:

Page 114: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

Correct Answer:

Page 115: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

Section: [none]Explanation

Explanation/Reference:

QUESTION 38You have an Exchange Server 2013 organization.

All users are enabled for Unified Messaging (UM) and access their voice mail by using Microsoft Lync 2010.

Callers report that when they press a key to dial an external telephone number, they hear a message indicating that the intended destination cannot be reached.

You need to ensure that the callers can reach the external number successfully.

What should you modify?

To answer, select the appropriate object in the answer area.

Page 116: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

Hot Area:

Correct Answer:

Page 117: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

Section: [none]Explanation

Page 118: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

Explanation/Reference:Note:After you create a Unified Messaging (UM) dial plan, you can view and configure a variety of settings. For example, you can configure the level of Voice over IP(VoIP) security, the audio codec, and dialing restrictions. The settings that you configure on the UM dial plan affect all users who are linked with the dial planthrough a UM mailbox policy.

QUESTION 39Your network contains two Active Directory sites named Site1 and Site2.

You have an Exchange Server 2013 organization that contains six servers. The servers are configured as shown in the following table.

All of the mailbox databases replicate to all of the servers.

Users in Site1 connect to sitel-mail.contoso.com to access their mailbox. Users in Site2 connect to site2-mail.contoso.com to access their mailbox. All of the usersuse Microsoft Outlook 2013.

You need to identify which DNS modification must be made to fail over the email services from Site1 to Site2.

Which DNS modification should you identify? (To answer, select the appropriate record to modify and the new data for the record in the answer area.)

Page 119: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

Hot Area:

Correct Answer:

Page 120: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

Section: [none]Explanation

Explanation/Reference:

QUESTION 40You have an Exchange Server 2013 organization and a Microsoft Lync Server 2013 infrastructure.

You plan to implement voice mail for all users.

You need to prepare the environment for the planned implementation.

Which tool should you run in each environment? (To answer, drag the appropriate tool to the correct environment or environments. Each tool may be used once,more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.)

Select and Place:

Page 121: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

Correct Answer:

Section: [none]Explanation

Explanation/Reference:

QUESTION 41You have an Exchange Server 2013 organization that has mailbox audit logging enabled for all users.

You deploy two third-party applications named App1 and App2. Both applications access a mailbox named Mailbox1.

App1 uses a mail-enabled user account named App1_user. App2 uses a mailbox-enabled user account named App2_user.

Page 122: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

You need to prevent the audit logs from containing entries that relate to App2.

Which command should you run? (To answer, select the appropriate options in the answer area.)

Hot Area:

Correct Answer:

Page 123: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

Section: [none]Explanation

Explanation/Reference:Note:* Set-MailboxAuditBypassAssociationUse the Set-MailboxAuditBypassAssociation cmdlet to configure mailbox audit logging bypass for user or computer accounts such as service accounts forapplications that access mailboxes frequently.

When you configure a user or computer account to bypass mailbox audit logging, access or actions taken by the user or computer account to any mailbox isn'tlogged. By bypassing trusted user or computer accounts that need to access mailboxes frequently, you can reduce the noise in mailbox audit logs.

/ AuditBypassEnabledThe AuditBypassEnabled parameter specifies whether audit bypass is enabled for the user or computer. Valid values include the following:$true Enables mailbox audit logging bypass$false Disables mailbox audit logging bypass

QUESTION 42You company has offices in the United States and Germany.

Each office contains several servers that have Exchange Server 2013 installed. The Exchange Server organization is configured for Unified Messaging (UM). Eachoffice contains an IP-PBX device.

You need to ensure that callers to the German office can navigate the voice mail system menu in German.

In which sequence should you perform the actions? (To answer, move all of the actions from the list of actions to the answer area and arrange them in the correctorder.)

Select and Place:

Page 124: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

Correct Answer:

Page 125: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

Section: [none]Explanation

Explanation/Reference:

QUESTION 43You have an Exchange Server 2013 organization named contoso.com.

Your company, which is named Contoso, Ltd., has a partnership with another company named Fabrikam, Inc. Fabrikam has an Exchange Server 2013organization.

Both organizations have a federation trust to the Microsoft Federation Gateway.

You need to ensure that the users at Fabrikam can see the free/busy information of the users at Contoso, including the time, the location, and the subject ofappointments.

Which command should you run? (To answer, select the appropriate options in the answer area.)

Page 126: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

Hot Area:

Correct Answer:

Page 127: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

Section: [none]Explanation

Explanation/Reference:

QUESTION 44Your company has two offices. The offices are located in New York and San Francisco.

You have an Exchange Server 2013 organization that contains two servers. The servers are configured as shown in the following table.

The organization contains four mailbox databases. The mailbox databases are configured as shown in the following table.

Page 128: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

Recently, DB1 went offline because of a disk failure. The disk is restored and DB1 is mounted.

You discover that there are more than 10,000 email messages queued for delivery to DB1.

You need to preserve the messages and perform the following actions:Export the messages queued for delivery to a different drive.Clear the messages queued for delivery.Ensure that the messages queued for delivery to DB1 are delivered while preserving the original message header information.Prevent duplicate messages.

Which four actions should you perform in sequence? (To answer, move the appropriate four actions from the list of actions to the answer area and arrange them inthe correct order.)

Select and Place:

Page 129: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

Correct Answer:

Page 130: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

Section: [none]Explanation

Explanation/Reference:

QUESTION 45You have an Exchange Server 2013 organization.

You need to create a single transport rule that prevents users in a group named Group1 from exchanging messages with users in a group named Group2.

Which two options should you use?

To answer, select the two appropriate options in the answer area.

Hot Area:

Page 131: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

Page 132: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

Correct Answer:

Page 133: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

Section: [none]Explanation

Explanation/Reference:Explanation:Transport rule conditions and exceptions are used to define when a transport rule is applied.Conditions include:

* The sender is a member ofThis condition matches messages where the sender is a member of the specified distribution group.* The recipient is a member ofThis condition matches messages that contain recipients who are members of the specified distribution group. The distribution group can be listed in the To, Cc, orBcc fields.

QUESTION 46Contoso, Ltd., is a bank that has offices in North America and Europe.

The company must comply with different regulations for North America and Europe.

The company uses Information Right Management (IRM) to protect sensitive documents, such as internal financial reports.

You need to recommend a compliance solution to meet the following requirements:Prevent users from disclosing customers' personal information in email messages.Prevent users from disclosing internal financial data to people outside of the company.Prevent the permanent deletion of email messages of users who are under investigation.Allow compliance officers to search the mailbox of users who are under investigation without being able to alter the data in the mailbox.

Which technology should you recommend for each requirement?

To answer, drag the appropriate technology to the correct requirement in the answer area. Each technology may be used once, more than once, or not at all.Additionally, you may need to drag the split bar between panes or scroll to view content.

Select and Place:

Page 134: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

Correct Answer:

Page 135: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

Section: [none]Explanation

Explanation/Reference:

QUESTION 47You have an Exchange Server organization. The organization contains servers that have Exchange Server 2010 and Exchange Server 2013 installed.

A new compliance policy requires that all email messages remain stored for two years.

You create two retention tags named Tag1 and Tag2. Tag1 moves the email messages to an Archive mailbox after one year. Tag2 permanently deletes the emailmessages after two years.

You need to meet the compliance policy requirements. The solution must ensure that all email messages that are older than two years are removed as quickly aspossible.

Which three actions should you perform?

Page 136: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

To answer, move the three appropriate actions from the list of actions to the answer area and arrange them in the correct order.

Select and Place:

Correct Answer:

Page 137: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

Section: [none]Explanation

Explanation/Reference:Note:Box 1: First use the retention tags to create a new retention policy.Box 2: Use the Set-Mailbox cmdlet to modify the settings of an existing mailbox. You can use this cmdlet for one mailbox at a time.

Box 3: Use the Start-ManagedFolderAssistant cmdlet to immediately start messaging records management (MRM) processing of mailboxes that you specify/ The Managed Folder Assistant uses the retention policy settings of users' mailboxes to process retention of items. This mailbox processing occurs automatically.You can use the Start-ManagedFolderAssistant cmdlet to immediately start processing the specified mailbox.

*

Page 138: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

Page 139: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

Reference: Retention Tags and Retention Policies

QUESTION 48You work for a financial services company that has an Exchange Server 2013 organization.Mailbox audit logging is enabled for all mailboxes.

The company identifies the following requirements for the sales department:The manager of the sales department must be able to search for email messages that contain specific key words in the mailboxes of the users in the salesdepartment.The manager of the human resources department must receive a report that contains a list of all the sales users' mailboxes that were searched by the salesmanager.

You need to identify which tasks must be performed to meet the requirements.

Which tasks should you identify?

To answer, drag the appropriate task to the correct requirement in the answer area. Each task may be used once, more than once, or not at all. Additionally, youmay need to drag the split bar between panes or scroll to view content.

Select and Place:

Correct Answer:

Page 140: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

Section: [none]Explanation

Explanation/Reference:

QUESTION 49Your network contains two Active Directory sites named Site1 and Site2. Both sites contain an equal number of users. Each site contains two Exchange Server2013 Mailbox servers.

You need to recommend a high-availability solution that meets the following requirements:If a single Mailbox server fails, the active mailbox database copies on that server must fail over to a Mailbox server in the same site.If both Mailbox servers in the same site fail, the active mailbox databases copies must be switched over to the other site manually.If a WAN link fails, multiple copies of the same mailbox database must not be activated in both sites simultaneously.

How should you configure the database availability groups (DAGs)? (To answer, configure the appropriate options in the answer area.)

Page 141: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

Hot Area:

Correct Answer:

Page 142: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

Section: [none]Explanation

Explanation/Reference:

QUESTION 50You have a server that has Exchange Server 2013 installed.

You plan to deploy Unified Messaging (UM) to all users.

You have two UM IP gateways named GW1 and GW2.

You create, and then associate a new UM dial plan for each IP gateway. The IP gateways are configured as shown in the following table.

Page 143: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

You need to recommend a solution that meets the following security requirements:All voice traffic received by GW1 must be encrypted.All voice traffic received by GW2 must be unencrypted.All signaling traffic to GW1 and GW2 must be encrypted.

Which security settings should you recommend configuring for each dial plan?

To answer, drag the appropriate security setting to the correct UM dial plan in the answer area. Each security setting may be used once, more than once, or not atall. Additionally, you may need to drag the split bar between panes or scroll to view content.

Select and Place:

Correct Answer:

Page 144: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

Section: [none]Explanation

Explanation/Reference:

QUESTION 51You have an Exchange Server organization that contains five servers. The servers are configured as shown in the following table.

You need to create a Lync Server SIP Unified Messaging (UM) dial plan to enable voice integration between Lync Server and Exchange Server.

Which three Exchange servers should you associate to the UM dial plans? (Each correct answer presents part of the solution. Choose three.)

A. EX1B. EX2

Page 145: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

C. EX3D. EX4E. EX5

Correct Answer: CDESection: [none]Explanation

Explanation/Reference:C: You can enable Unified Messaging (UM) in Microsoft Exchange Server 2010. You must enable the Exchange computer running the Unified Messaging serverrole before the Unified Messaging server can process calls for UM-enabled Exchange 2010 recipients in your Exchange organization. However, the UnifiedMessaging server also must be added to a UM dial plan before it can process calls for Unified Messaging.D, E:* Requirements and RecommendationsClient Access and Mailbox. In Microsoft Exchange Server 2013, Exchange UM runs as a service on these servers.

* Deploy the Exchange Mailbox server roles in each Exchange Unified Messaging (UM) forest where you want to enable users for Exchange UM.

Reference: Configuring Unified Messaging on Microsoft Exchange Server to Work with Lync Server 2013

QUESTION 52You have an Exchange Server 2013 organization.

You successfully migrate the public folders from a previous version of Exchange Server.

You discover that one of the public folder mailboxes almost reached its quota size.

You need to move some of the public folders in the public folder mailbox to another public folder mailbox.

What should you run?

A. Split-PublicFolderMailbox.ps1B. Set-MailPublicFolderC. Update-PublicFolderMailboxD. Set-PublicFolderMailbox

Correct Answer: ASection: [none]Explanation

Page 146: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

Explanation/Reference:* Split-PublicFolderMailbox.ps1Splits the given public folder mailbox based on the size of the folders.

* If the content of a public folder mailbox begins to exceed your mailbox quotas, you may need to move public folders to a different public folder mailbox. There area couple ways to do this. To move one or more public folders that don't contain subfolders, you can use the PublicFolderMoveRequest cmdlets.Reference: Move a Public Folder to a Different Public Folder Mailbox

QUESTION 53You have a hybrid deployment of Exchange Server 2013 and Microsoft Office 365.

The network does not have Active Directory Federation Services (AD FS) 2.0 installed.

A user named User1 reports that he cannot access his mailbox because his account is locked out.

You verify that the mailbox of User1 is hosted on Office 365.

You need to unlock the account of User1.

Which cmdlet should you run?

A. Set-MailUserB. Set-MSolUserC. Set-MailboxD. Set-ADUser

Correct Answer: BSection: [none]Explanation

Explanation/Reference:Applies To: Office 365, Windows Azure, Windows Intune

The Set-MsolUser cmdlet is used to update a user object.

Parameters include:-BlockCredential <Boolean>When true, the user will not be able to sign in using their user ID.

Incorrect:Not C: Set-Mailbox

Page 147: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

Use the Set-Mailbox cmdlet to modify the settings of an existing mailbox.

Applies to: Exchange Server 2013, Exchange Online

QUESTION 54You have a hybrid deployment of Exchange Server 2013 and Office 365. The mail flow between Office 365 and the on-premises Exchange Server environment isrouted through an Exchange Server 2010 Edge Transport server.

Your company is assigned a new set of public IP addresses.

A network administrator updates the external firewall address and all of the associated DNS records.

Office 365 users report that they cannot receive email messages from on-premises users.

You discover that outgoing email messages to Office 365 are in the Office 365 SMTP queue on an Edge server.

You need to ensure that the on-premises users can send email messages successfully to the Office 365 users.

Which tool should you use?

A. The Exchange Management ConsoleB. The Exchange Control Panel in Office 365C. The Exchange Admin CenterD. The Exchange Remote Connectivity Analyzer

Correct Answer: CSection: [none]Explanation

Explanation/Reference:Note:* The section describes the user interface elements that are common across the EAC (Exchange Admin Center).

Page 148: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

* Check the mail flow setting.

Reference: Managing Directory Based Edge Blocking (DBEB) feature in Exchange Online Protection (EOP)

QUESTION 55You have an Exchange Server 2010 organization that contains three servers. The servers are configured as shown in the following table.

Page 149: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

Microsoft Outlook is configured to connect to an FQDN of mail.adatum.com. Mail.adatum.com resolves to the IP address of a Layer 7 hardware load balancer. Thehardware load balancer is configured to send traffic to EX2 and EX3.

You deploy an Exchange Server 2013 Mailbox server named EX4 and an Exchange Server 2013 Client Access server named EX5.

You plan to migrate all mailboxes to Exchange Server 2013.

You need to recommend a solution to ensure that users can access their mailbox on EX1 or EX4 during the migration.

What should you do?

A. Create a Client Access server array that contains EX1 and EX5.B. Modify the autodiscover.contoso.com resource record to point to EX5.C. Modify the properties of the hardware load balancer to point to EX5.D. Create a DNS record named legacy.contoso.com in the internal DNS zone.

Correct Answer: CSection: [none]Explanation

Explanation/Reference:Note: So what is the Client Access server in Exchange 2013? The Client Access server role is comprised of three components, client protocols, SMTP, and a UMCall Router. The CAS role is a thin, protocol session stateless server that is organized into a load balanced configuration. Unlike previous versions, session affinityis not required at the load balancer (but you still want a load balancer to handle connection management policies and health checking). This is because logic nowexists in CAS to authenticate the request, and then route the request to the Mailbox server that hosts the active copy of the mailbox database. The Mailbox serverrole now hosts all the components and/or protocols that process, render and store the data. No clients will ever connect directly to the Mailbox server role; all clientconnections are handled by the Client Access server role.

Reference: Exchange 2013 Server Role Architecture

QUESTION 56Your company has three data centers. The data centers are located in Montreal, New York, and Seattle.

Page 150: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

You have an Exchange Server 2013 organization that contains six servers. The servers are configured as shown in the following table.

The organization is configured as shown in the following exhibit. (Click the Exhibit button.)

Page 151: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

The file share witness for DAG1 is located on EX3.

You plan to implement site resiliency and use a single name space named mail.contoso.com.

You need to recommend a solution to minimize the amount of time that the Exchange Server services are unavailable if either the data center in Montreal or thedata center in Seattle fails.

Which two tasks should you recommend performing? (Each correct answer presents part of solution. Choose two.)

A. Deploy a hardware load balancer to EX3 and EX6.B. Create two DNS host (A) records for mail.contoso.com.C. Configure EX6 as an alternate file share witness.D. Move the file share witness to Server1.

Correct Answer: AD

Page 152: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

Section: [none]Explanation

Explanation/Reference:When a DAG has been deployed across two datacenters, a new configuration option in Exchange 2013 is to use a third location for hosting the witness server. Ifyour organization has a third location with a network infrastructure that is isolated from network failures that affect the two datacenters in which your DAG isdeployed, then you can deploy the DAG's witness server in that third location, thereby configuring your DAG with the ability automatically failover databases to theother datacenter in response to a datacenter-level failure event. By creating two DNS host (A) records for mail.contoso.com, we can use DNS Round Robin todistribute connections between the two CAS servers. If one server goes down, a client will attempt to connect to the CAS server specified in the second DNSrecord.

QUESTION 57You have an Exchange Server 2013 organization.

You create a data loss prevention (DLP) policy. The mode of the DLP policy is set to Enforce.

You need to ensure that email messages containing social security numbers from the United States are blocked.

Which two possible rules achieve this goal? (Each correct answer presents a complete solution.Choose two.)

A. U.S. State Breach: Allow OverrideB. U.S. State Breach: Scan email sent outside - low countC. U.S. State Breach: Scan email sent outside - high countD. U.S. State Breach: Scan text limit exceededE. U.S. State Breach: Attachment not supported

Correct Answer: BCSection: [none]Explanation

Explanation/Reference:Note:* In Microsoft Exchange Server 2013, you can use data loss prevention (DLP) policy templates to help meet the messaging policy and compliance needs of yourorganization. These templates contain pre-built sets of rules that can help you manage message data that is associated with several common legal and regulatoryrequirements.

* DLP policy templates in Exchange include:U.S. State Breach Notification LawsHelps detect the presence of information subject to U.S. State Breach Notification Laws, including data like social security and credit card numbers.

Page 153: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

QUESTION 58You have an Exchange Server 2013 organization.

You purchase a Microsoft Office 365 subscription and configure a hybrid deployment.

The network contains an SMTP relay server named smarthost.contoso.com. The server is configured to use a certificate that has a subject name ofsmarthost.contoso.com.

All users have Microsoft Outlook 2013 installed on their client computer. Outlook 2013 is configured to connect to mail.contoso.com.

All Exchange servers have a certificate that has a subject name of mail.contoso.com.

You discover that email messages sent from on-premises users are not delivered to Office 365 recipients. You discover that the Send connector for Office 365 usesa smart host of smarthost.contoso.com.

You need to ensure that the on-premises users can send email messages to the Office 365 recipients.Which two actions should you perform? (Each correct answer presents part of the solution.Choose two.)

A. Run the Hybrid Configuration Wizard again.B. Configure the Microsoft Exchange Online Protection (EOP) Send connector to use smarthost.contoso.comC. Configure the centralized mail transport option.D. Remove the smart host from the Send connector.E. Assign a certificate that has a subject name of smarthost.contoso.com to the Send connector.

Correct Answer: BDSection: [none]Explanation

Explanation/Reference:A: Creating and configuring a hybrid deployment with the Hybrid Configuration wizard is now a single process in Microsoft Exchange Server 2013. First, the wizardcreates the HybridConfiguration object in your on-premises Active Directory. This Active Directory object stores the hybrid configuration information for the hybriddeployment and is updated by the Hybrid Configuration wizard. Next, the wizard gathers existing on-premises Exchange and Active Directory topology configurationdata, Office 365 tenant and Exchange Online configuration data, defines several organization parameters and then runs an extensive sequence of configurationtasks in both the on-premises and Exchange Online organizations.

E:Note:* By default, Microsoft Exchange Server 2013 doesn't allow you to send mail outside of your domain. To send mail outside your domain, you need to create a Sendconnector.* Use the Set-SendConnector cmdlet to modify a Send connector.

Page 154: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

/ Parameters include TlsCertificateNameThe TlsCertificateName parameter specifies the X.509 certificate to use with TLS sessions and secure mail. Valid input for this parameter is [I]Issuer[S]Subject. TheIssuer value is found in the certificate's Issuer field, and the Subject value is found in the certificate's Subject field. You can find these values by running the Get-ExchangeCertificate cmdlet.

QUESTION 59You have a server named Server1 that has Exchange Server 2013 installed.

Users access their mailbox by using Microsoft Outlook 2010 and Outlook Web App.

You enable auditing for all of the mailboxes.You need to identify when a mailbox is accessed by someone other than the owner of the mailbox.

What are two possible ways to achieve this goal? (Each correct answer presents a complete solution. Choose two.)

A. Export the administrator audit log.B. Run an administrator role group report.C. Export the mailbox audit log.D. Run a non-owner mailbox access report.E. Review the security event log.

Correct Answer: CDSection: [none]Explanation

Explanation/Reference:C: Use the Auditing tab to run reports or export entries from the mailbox audit log and the administrator audit log./ The mailbox audit log records whenever a mailbox is accessed by someone other than the person who owns the mailbox. This can help you determine who hasaccessed a mailbox and what they have done./ The administrator audit log records any action, based on a Windows PowerShell cmdlet, performed by an administrator. This can help you troubleshootconfiguration issues or identify the cause of security- or compliance-related problems.

D: Run a Non-Owner Mailbox Access ReportUse this report to find mailboxes that have been accessed by someone other than the person who owns the mailbox.

QUESTION 60You have an Exchange Server organization. The organization contains a server named EX01 that has Exchange Server 2010 installed and a server named EX02that has Exchange Server 2013 installed.

Your mailbox is hosted on EX01.

Page 155: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

You need to access the Exchange Admin Center (EAC).

Which URL should you use?

A. https://EX01/ecp?ExchClientVer= 14B. https://EX02/ecp?ExchClientVer= 15C. https://EX02/eac?ExchClientVer=15D. https://EX01/ecp?ExchCfientVer=15

Correct Answer: BSection: [none]Explanation

Explanation/Reference:http://technet.microsoft.com/en-us/library/jj150562(v=exchg.150).aspx If you`re in a coexistence scenario, where you`re running Exchange 2010 and Exchange2013 in the same organization, and your mailbox is still housed on the Exchange 2010 Mailbox server, the browser will default to the Exchange 2010 ECP. You canaccess the EAC by adding the Exchange version to the URL. For example, to access the EAC whose virtual directory is hosted on the Client Access server CAS15-NA, use the following URL: https://CAS15- NA/ecp?ExchClientVer=15. Conversely, if you want to access the Exchange 2010 ECP and your mailbox resides on anExchange 2013 Mailbox server, use the following URL: https://CAS14- NA/ecp?ExchClientVer=14.

QUESTION 61You have an Exchange Server 2013 organization. The organization contains four servers in the same Active Directory site. The servers are configured as shown inthe following table.

EXB and EX4 are members of a database availability group (DAG) named DAG1. All users use Microsoft Outlook 2013 to connect to their mailbox.

You need to recommend a client access solution to ensure that all of the users can connect to their mailbox if EX1 or EX2 fails.

What should you recommend?

A. Add a layer 4 hardware load balancer that balances RPC traffic

Page 156: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

B. Add a layer 7 hardware load balancer that balances the traffic on port 443.C. Add a layer 7 hardware load balancer that balances RPC traffic.D. Replicate all of the databases in DAG1 to both DAG1 members.

Correct Answer: BSection: [none]Explanation

Explanation/Reference:In Exchange 2013, RPC over TCP has been disabled. All outlook communications are now through RPC over HTTP (Outlook Anywhere). This unifies the CASprotocol methods and provides a stable and reliable connectivity network between clients and server and between CAS and Mailbox Server. It also reduces thenumber of namespaces required. It also eliminates end user interruptions. Hence moving mailboxes around in DAG and moving mailboxes between mailboxdatabases are now easy.

QUESTION 62Your company has a main office and three branch offices. The main office is located in Austin. The branch offices are located in Denver, San Diego, and Chicago.

The network contains an Active Directory forest. The forest contains a single domain. Each office is configured as an Active Directory site.The site in Austin contains four domain controllers that run Windows Server 2008 R2 and are configured as global catalog servers. The sites in Denver, San Diego,and Chicago each contain a read-only domain controller (RODC) that runs Windows Server 2008 R2. No other domain controllers exist on the network.

You plan to deploy an Exchange Server 2013 organization. Exchange Server 2013 servers will be deployed in the Austin, Denver, and San Diego sites. Users fromthe Chicago site will access their mailbox remotely.

You need to recommend changes to the Active Directory infrastructure to support the planned deployment of Exchange Server 2013.

What should you recommend?

A. Replace the RODCs in the Denver and San Diego sites with domain controllers that are configured as global catalog servers.B. Configure the RODCs in the Denver and San Diego sites as read-only global catalog servers.C. Configure Active Directory automatic site coverage for the Chicago site.D. Upgrade all of the RODCs to Windows Server 2012.

Correct Answer: ASection: [none]Explanation

Explanation/Reference:http://technet.microsoft.com/en-us/library/aa996719.aspx There must be a writable copy of the global catalog at each site where an Exchange 2013 server is to beinstalled.

Page 157: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

QUESTION 63You have an Exchange Server 2013 organization that contains 5,000 mailboxes.

A user named User1 tests several Windows Phone devices.

You need to ensure that User1 can connect more than 20 Windows Phone devices to his mailbox,

Which cmdlet should you run?

A. Set-ThrottlingPolicyB. Set-MobileMailboxPolicyC. Set-ActiveSyncMailboxPolicyD. Set-CasMailbox

Correct Answer: ASection: [none]Explanation

Explanation/Reference:http://technet.microsoft.com/en-gb/library/dd298094(v=exchg.150).aspx http://www.msexchange.org/kbase/ExchangeServerTips/ExchangeServer2010/Mobility/Howtoin creasethemaximumnumberofActiveSyncDevicesforaUser.html Set-Throttlingpolicy "Increased ActiveSync Devices" -EasMaxDevices 25 -EasMaxConcurrency 20 Set-Mailbox User1 -ThrottlingPolicy "Increased ActiveSync Devices"

QUESTION 64You deploy an Exchange Server 2013 organization to a test network for evaluation.

You install the Mailbox server role and the Client Access server role on a server named ex01.contoso.com. You do not perform any other configurations.

All of the ports from the Internet to ex01.contoso.com are open. You successfully connect to ex01.contoso.com from the Internet and from the internal network.

You need to identify which types of Exchange Server clients will connect successfully to the organization without any further configurations.

What should you identify?

A. Internal Outlook Web App connectionsB. Android Phones using ActivesyncC. Windows RT devices running the Mail appD. Windows Phones that use Exchange ActiveSync

Page 158: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

Correct Answer: ASection: [none]Explanation

Explanation/Reference:

QUESTION 65You have an Exchange Server 2013 organization.

You create a public folder.

You assign an email address to the public folder.

You need to ensure that only a user named User1 can add content to the public folder by using email.

Which cmdlet should you run?

A. Set-MailPublicFolderB. Set-PublicFolderC. Set-MailboxD. Add-PublicFolderCMentPermission

Correct Answer: CSection: [none]Explanation

Explanation/Reference:Set-MailPublicFolderThis cmdlet is available in on-premises Exchange Server 2013 and in the cloud-based service. Use the Set-MailPublicFolder cmdlet to configure the mail-relatedsettings of mail-enabled public folders. If you want to configure basic settings that aren't mail related, use the Set- PublicFolder cmdlet.

EXAMPLE 1Set-MailPublicFolder -Identity [email protected] -AcceptMessagesOnlyFrom "User1"

EXAMPLE 2This example sets the primary SMTP address of the mail-enabled public folder [email protected] to [email protected]. Set-MailPublicFolder -Identity [email protected] -PrimarySmtpAddress [email protected]

Referenceshttp://technet.microsoft.com/en-us/library/aa997560(v=exchg.150).aspx http://technet.microsoft.com/en-us/library/bb123707(v=exchg.150).aspx http://

Page 159: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

technet.microsoft.com/en-gb/library/bb397214(v=exchg.150).aspx

QUESTION 66You have an Exchange Server 2013 organization that contains 20 servers.

You plan to deploy Exchange Server 2013 RTM Cumulative Update 1 (CU1) to the first Exchange server in the organization.

You need to ensure that a user named ExehangeAdmin can deploy CU1 to the first server, The solution must minimize the number of permissions assigned toExehangeAdmin.

To which groups should you add ExehangeAdmin?

A. Schema Admins, Domain Admins, and Enterprise AdminsB. Schema Admins, Domain Admins, and Delegated SetupC. Domain Admins and Organization ManagementD. Enterprise Admins and Organization Management

Correct Answer: ASection: [none]Explanation

Explanation/Reference:http://technet.microsoft.com/en-us/exdeploy2013/Checklist?state=2419-W- CABEAgAAQAAAAUEAAQAAAAg~A: Both Schema Admins and Enterprise Admins membership is needed to update the schema and prepare AD

Prepare Active Directory and DomainsBefore you install the release to manufacturing (RTM) version of Microsoft Exchange Server 2013 or later cumulative updates (CU) on any servers in yourorganization, you must prepare Active Directory and domains.The computers on which you plan to install Exchange 2013 must meet the system requirements. Your domains and the domain controllers must meet the systemrequirements in "Network and directory servers" in Exchange 2013 System Requirements.For multiple domain organizations running the following /Prepare* commands, we recommend the following:Run the commands from an Active Directory site that has an Active Directory server from every domain. Run the first server role installation from an Active Directorysite with a writeable global catalog server from every domain.Verify that replication of objects from the preceding actions is completed on the global catalog server in the Active Directory site before installing the first Exchange2013 server to that site. If you run the Exchange 2013 Setup wizard with an account that has the permissions required (Schema Admins, Domain Admins, andEnterprise Admins) to prepare Active Directory and the domain, the wizard automatically prepares Active Directory and the domain. For more information, seeInstall Exchange 2013 Using the Setup Wizard. However, you must first install the Active Directory management tools on the computer prior to preparing theschema or domains. To do this, see the Active Directory preparation section in Exchange 2013 Prerequisites.You must specify the /IAcceptExchangeServerLicenseTerms parameter when you run setup.exe to accept the Exchange 2013 license terms.http://technet.microsoft.com/en-us/library/bb125224(v=exchg.150).aspx http://technet.microsoft.com/en-gb/library/dd876881(v=exchg.150).aspx

Page 160: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

QUESTION 67You have an Exchange Server 2013 organization.

An Active Directory administrator is concerned about the permissions assigned to a group named Exchange Trusted Subsystem. Exchange Trusted Subsystem hasa member named Exchange Windows Permissions.

You need to show the Active Directory administrator all of the permissions assigned to Exchange Trusted Subsystem.

What should you use?

A. ADSI EditB. Active Directory Sites and ServicesC. DsgetD. Active Directory Users and Computers

Correct Answer: DSection: [none]Explanation

Explanation/Reference:D: ADUC would be the best choice to view permissions and group memberships assigned to an AD object.NOT A: Although possible to view the permissions assigned on an AD objects ACL, group memberships cannot be viewed via ADSIEdit.NOT B: Cannot view User/Group permissions in ADSS.NOT C: DSGET can retrieve user/group members and memberships, but not the permissions assigned to the object.

QUESTION 68A company named Fabrikam, Ltd. has an Exchange Server 2013 organization that contains two servers.

The servers are configured as shown in the following table.

You configure the internal and external namespaces named mail.fabrikam.com and autodiscover.fabrikam.com to point to EX2.

Page 161: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

You configure Outlook Anywhere on EX1 as shown in the following table.

You configure Outlook Anywhere on EX2 as shown in the following table.

You need to ensure that all of the users on EX1 can connect to their mailbox by using Microsoft Outlook from the Internet.

What should you do?

A. Change the authentication settings of EX1.B. Disable IPv6 on EX1.C. Change the authentication settings of EX2.D. Disable Outlook Anywhere on EX1.

Correct Answer: ASection: [none]Explanation

Explanation/Reference:

QUESTION 69You have an Exchange Server 2013 organization.

You need to ensure that an administrator named Adminl receives a daily email message that contains a log of all the Exchange Server administrative actions.

Page 162: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

Which cmdlet should you use in a scheduled task?

A. Search-AdminAuditLogB. Set-AdminAuditLogConfigC. New-AdminAuditLogSearchD. Write-AdminAuditLog

Correct Answer: CSection: [none]Explanation

Explanation/Reference:New-AdminAuditLogSearchhttp://technet.microsoft.com/en-us/library/ff459243(v=exchg.150).aspx After the New-AdminAuditLogSearch cmdlet is run, the report is delivered to the mailboxesyou specify within 15 minutes. The log is included as an XML attachment on the report email message. The maximum size of the log that can be generated is 10megabytes (MB). You need to be assigned permissions before you can run this cmdlet. Although all parameters for this cmdlet are listed in this topic, you may nothave access to some parameters if they're not included in the permissions assigned to you. To see what permissions you need, see the "View- only administratoraudit logging" entry in the Exchange and Shell infrastructure permissions topic.New-AdminAuditLogSearch -ExternalAccess $true -StartDate 07/25/2013 -EndDate 10/24/2013- StatusMailRecipients [email protected],[email protected] -Name "Datacenter admin audit log"

QUESTION 70You have an Exchange Server 2013 organization.

You plan to assign the default workload management policy to all of the servers in the organization.

You need to remove the Calendar Synchronization Assistant workload from the workload management policy before you assign the policy to the servers.

Which cmdlet should you run?

A. Remove-ResourcePolicyB. Set-ResourcePolicyC. Set-WorkloadPolicyD. Remove-WorkloadPolicy

Correct Answer: DSection: [none]Explanation

Page 163: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

Explanation/Reference:New-WorkloadManagementPolicy

EXAMPLE 1This example creates a custom workload management policy that will be used to control Exchange workloads at the Dublin, Ireland location of Contoso.com. Thename of the server in the Dublin, Ireland location of Contoso.com is Dublin01.

New-WorkloadManagementPolicy -Name DublinWorkloadManagementPolicy DomainController Dublin02.contoso.comSet-ExchangeServer -WorkloadManagementPolicy DublinWorkloadManagementPolicy Identity Dublin01.

EXAMPLE 2This example uses the Template parameter to create a policy object DallasWorkloadManagementPolicy based on the Default Workload Management Policy. It isthen customized to remove the ELC Assistant workload from the Workload Management Policy. The Workload Management Policy is then assigned to serverDallas01.

New-WorkloadManagementPolicy -Name DallasWorkloadManagementPolicy -Template DefaultWorkloadManagementPolicy_15.0.505.0 Remove-WorkloadPolicyDallasWorkloadManagementPolicy\ELCAssistant Set-ExchangeServer - WorkloadManagementPolicy DallasWorkloadManagementPolicy -Server Dallas01

QUESTION 71You have an Exchange Server 2013 organization named fabrikam.com.

You have a distribution group named DL1 and a user named User1. The managedBy attribute of DL1 is fabrikam.com\users\User1.

User1 attempts to add a user named User2 to DL1 and receives the following error message:"Changes to the public group membership cannot be saved. You do not have sufficient permissions to perform this operation on this object."

You need to ensure that User1 can add User2 to DLL

What are two possible ways to achieve this goal? (Each correct answer presents a complete solution. Choose two.)

A. From Exchange Management Shell, run New-ManagementRoleAssignment -Name "Default Role Assignment Policy- MyDistributionGroupMembership" -Policy"Default Role Assignment Policy" -Role "MyDistributionGroupMembership

B. From Exchange Admin Center, edit the Default Role Assignment Policy and select MyDistributionGroupsC. From Exchange Management Shell, run New-ManagementRoleAssignment -Name "Default Role Assignment Policy-MyDistributionGroups" -Policy "Default

Role Assignment Policy" - Role "MyDistributionGroups".D. From Exchange Admin Center, edit the Default Role Assignment Policy and select MyDistributionGroupMembership.

Correct Answer: ACSection: [none]Explanation

Page 164: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

Explanation/Reference:http://technet.microsoft.com/en-gb/library/jj657511(v=exchg.150).aspx Role Assignment Policies cannot be managed via the EAC.

QUESTION 72Your company has four offices. Each office connects to two of the other offices by using a direct WAN link. Each office is configured as an Active Directory site. Theoffice connections and the Active Directory site links are configured as shown in the exhibit (Click the Exhibit button.)

You have Exchange Server 2013 organization that contains four servers. The servers are configured as shown in the following table.

Page 165: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

You discover that email messages sent from the site in Montreal to the site in Miami are routed through the site in New York.

You need to ensure that all of the email messages sent from the Montreal site to the Miami site are routed through the Washington site.What should you run?

A. Set-AdSite1ink Site1inkl -ExchangeCost 25B. Set-AdSite Washington' -HubSiteEnabled $falseC. Set-AdSite1ink SiteUnkl -ExchangeCost 15D. Set-AdSite New York' -Hubsiteenabled Sfalse

Correct Answer: CSection: [none]Explanation

Explanation/Reference:Set-AdSiteLink: Exchange 2013 Help

QUESTION 73You create a mailbox named ConfRoom1 as shown in the exhibit. (Click the Exhibit button.)

Page 166: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

Users report that when they schedule meetings and attempt to locate ConfRoom1 in the All Rooms address list, they do not see ConfRoom1 on the list.

You need to ensure that the users can locate ConfRoom1 on the All Rooms address list.

What should you do?

Page 167: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

A. Modify the Sharing Policy that is associated to ConfRoom1.B. Run the Update-AddressList command and specify the -Identity parameter.C. Run the Set-Mailbox command and specify the -IsRootPublicFolderMailbox parameter.D. Delete the ConfRoom1 mailbox, and create a new resource mailbox.

Correct Answer: DSection: [none]Explanation

Explanation/Reference:New-MailboxThis example creates a user in Active Directory and a resource mailbox for a conference room. The resource mailbox is located in Mailbox Database 1. Thepassword must be reset at the next logon. The Exchange Management Shell prompts for the value of the initial password because it's not specified. New-Mailbox -UserPrincipalName [email protected] -Alias confmbx - Name ConfRoomMailbox - Database "Mailbox Database 1" -OrganizationalUnit Users -Room -ResetPasswordOnNextLogon $true

QUESTION 74You have an Exchange Server 2013 organization that contains two servers named EX1 and EX2. EX1 and EX2 are the members of a database availability group(DAG) named DAG1. DAG1 contains two mailbox databases named DB1 and DB2. DB1 is active on EX1. DB2 is active on EX2.

A disk on EX2 fails. DB2 fails over to EX1.

Users who have mailboxes in DB2 report that Microsoft Outlook can no longer connect to the Exchange Server organization.

You discover that DB2 is dismounted on EX1.

When you attempt to mount DB2 on EX1, the operation fails.

You need to identify what prevents DB2 from mounting on EX1.

What should you do?

A. Run the Resume-MailboxdatabaseCopy cmdlet.B. Run the Update-MailboxdatabaseCopy cmdlet.C. Run the eseutil.exe command and specify the A parameter.D. Run the eseutil.exe command and specify the/mft parameter.

Correct Answer: BSection: [none]

Page 168: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

Explanation

Explanation/Reference:http://technet.microsoft.com/en-us/library/dd335201(v=exchg.150).aspx

QUESTION 75Your company has four offices. Each office is configured as an Active Directory site.

You have an Exchange Server 2013 organization that contains nine servers. The servers are configured as shown in the following table.

A user named User1 is in a distribution group named D_Sales. The mailbox of User1 is in a database that is active on MBX4 and is configured to use MBX5 as anexpansion server.

You need to ensure that email sent to D_Sales from the Internet is received by CAS1, and then routed from MBX1 to MBX4.

What should you do?

A. Configure Site1 as a hub site.B. Modify the expansion server setting of D_Sales.C. Modify the SubmissionServerOverrideList list on MBX1.D. Configure Site3 as a hub site.

Correct Answer: DSection: [none]Explanation

Page 169: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

Explanation/Reference:As the messages are routed from sender Mailbox Server Transport Service to recipient Mailbox ServerTransport Service, I would say that it makes sense for the Expansion Server settings for the DL to be amended to MBX4.This action would remove MBX5 from the equation, and as the expansion server setting serves as the routing destination when specified, this would also ensure theemails are routed from MBX1 to MBX4.

Assuming that all external email is received by CAS1 in Site1, then MBX1 would be responsible for routing the email, via the transport service to the other mailboxservers at other sites. When a hub site is used, all email traffic from the sites configured to use the hub site is affected. The question states that email sent toD_Sales needs to be rerouted, not all traffic. There is no mention of the need for hub sites, AD site costs, or other sites with internet facing CAS servers.http://technet.microsoft.com/en-us/library/jj916681(v=exchg.150).aspx Exchange 2013 Mail Flowhttp://technet.microsoft.com/en-us/library/aa998825(v=exchg.150).aspx#RoutingDest

QUESTION 76You have an Exchange Server 2013 organization that contains four servers.

All users access their email by using Microsoft Outlook 2010.

An administrator deploys a shared mailbox named Project.

You assign all of the users in the marketing department Full Access permissions to Project.

You discover that Project automatically appears in Outlook to all of the marketing department users.

You need to ensure that Project only appears in Outlook to the marketing department users who add the mailbox manually to their Outlook profile.

Which two cmdlets should you run? (Each correct answer presents part of the solution. Choose two.)

A. Remove-MailboxPermissionB. Set-MailboxC. Remove-MailboxD. Add-MailboxPermissionE. New-Mailbox

Correct Answer: ABSection: [none]Explanation

Explanation/Reference:Set-Mailbox: Exchange 2013 Help

Remove-MailboxPermission: Exchange 2013 Help

Page 170: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

QUESTION 77You have an Exchange Server 2013 organization. The organization contains a Mailbox server that hosts several databases, including a database named ExecsDB.ExecsDB contains the mailboxes of the company executives.

The hard disk that contains ExecsDB fails.

You replace the hard disk with a new disk, and then you mount the database. You create a recovery database in an alternate location, and then you restore thedatabase files for ExecsDB to the alternate location.

You need to ensure that all data is consistent before merging the mailbox data into the dial-tone database.

What should you do first?

A. Run the isinteg.exe command and specify the -fix parameter.B. Run the Move-ActiveMailboxDatabase cmdlet.C. Run the Update-MailboxDatabaseCopy cmdlet.D. Run the eseutil.exe command and specify the/R parameter.

Correct Answer: ASection: [none]Explanation

Explanation/Reference:Perform a Dial Tone Recoveryhttp://technet.microsoft.com/en-us/library/aa998074(v=exchg.65).aspx

QUESTION 78Your company has offices in New York, Paris, and Montreal. An Active Directory site exists for each office.

You have an Exchange Server 2013 organization that contains two servers in each site. One server in each site has the Mailbox server role installed and the otherserver in each site has the Client Access server role installed.

You need to ensure that all of the outbound email from each site is routed through the Client Access server in that site.

Which should you do?

A. Remove the Mailbox servers from the list of source servers on each Send connector.B. Disable the Microsoft Exchange Transport service on each Mailbox server.C. Run the Set-SendConnector cmdlet and specify the -FrontendProxyEnabted.True parameter.

Page 171: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

D. Run the Set-TransportConfig cmdlet and specify the -InternatSMTPServers:$nult parameter.

Correct Answer: CSection: [none]Explanation

Explanation/Reference:Proxying Outbound Email Through Exchange 2013 Client Access Servers

QUESTION 79You have an Exchange Server 2010 organization.

Users access Outlook Web App by using the name mail.contoso.com.

You deploy Exchange Server 2013 to the existing organization.

You change the DNS record of mail.contoso.com to point to an Exchange Server 2013 Client Access server.

The users report that they can no longer access their mailbox from Outlook Web App.

The OWA virtual directory in Exchange Server 2010 is configured as shown in the exhibit.(Click the Exhibit button.)

You need to ensure that the users on Exchange Server 2010 can access Outlook Web App.

Which setting should you change?

Page 172: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

A. WindowsAuthenticationB. FormsAuthenticationC. LegacyRedirectTypeD. FailbackUri

Correct Answer: ASection: [none]Explanation

Explanation/Reference:Windows Authentication (NTLM) needs to be enabled on the Exchange 2010 Client Access Server to enable the Exchange 2013 Client Acess Server to proxyconnections.Exchange Server Deployment Assistant

Enable and configure Outlook AnywhereTo allow your Exchange 2013 Client Access server to proxy connections to your Exchange 2007 and Exchange 2010 servers, you must enable and configureOutlook Anywhere on all of the Exchange 2007 and Exchange 2010 servers in your organization. If some Exchange 2007 or Exchange 2010 servers in yourorganization are already configured to use Outlook Anywhere, their configuration must also be updated to support Exchange 2013. When you use the steps belowto configure Outlook Anywhere, the following configuration is set on each Exchange 2007 and Exchange 2010 server:The Outlook Anywhere external URL is set to the external hostname of the Exchange 2013 server.Client authentication, which is used to allow clients like Outlook 2013 to authenticate with Exchange, is set to Basic.Internet Information Services (IIS) authentication, which is used to allow Exchange servers to communicate, set to NTLM and Basic.

QUESTION 80You have an Exchange Server 2013 organization that contains two Mailbox servers and two Client Access servers.

You have a database availability group (DAG) that contains both Mailbox servers.You need to deploy public folders.

What should you do first?

A. Run the New-PublicFolderDatabase cmdlet and specify the -Server parameter.B. Run the New-PublicFolder cmdlet and specify the -Path parameter.C. Run the New-Mailbox cmdlet and specify the -Publicfolder parameter.D. Run the New-MailboxDatabase cmdlet and specify the -PublicFotderDatabase parameter.

Correct Answer: CSection: [none]Explanation

Page 173: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

Explanation/Reference:Set Up Public Folders in a New OrganizationNew-Mailbox -PublicFolder -Name MasterHierarchyhttp://www.msexchange.org/articles-tutorials/exchange-server-2013/migration- deployment/migrating-publicfolders-exchange-2013-part1.html http://www.msexchange.org/articles-tutorials/exchange-server-2013/migration- deployment/migrating-publicfolders-exchange-2013-part2.html

QUESTION 81You have an Exchange Server 2013 organization that contains mailboxes for multiple companies.

You need to segment the address lists in the organization per company.

What should you assign to the users of each company?

A. Address book policies (ABPs)B. Address listsC. Global Address Lists (GALs)D. Email address policies

Correct Answer: ASection: [none]Explanation

Explanation/Reference:Technically, answers A and C are correct as users are "assigned" ABPs and GALs during the process of GAL segmentation.I have chosen A as the answer however, as the overall process falls under the heading of "Address Book Policies"http://technet.microsoft.com/en-us/library/hh529948(v=exchg.150).aspx Address Book PoliciesGlobal address list (GAL) segmentation (also known as GAL segregation) is the process whereby administrators can segment users into specific populations toprovide customized views of their organization`s GAL. Address book policies (ABPs) allow you to segment users into specific groups to provide customized views ofyour organization`s global address list (GAL). When creating an ABP, you assign a GAL, an offline address book (OAB), a room list, and one or more address liststo the policy. You can then assign the ABP to mailbox users, providing them with access to a customized GAL in Outlook and Outlook Web App. The goal is toprovide a simpler mechanism to accomplish GAL segmentation for on-premises organizations that require multiple GALs.

QUESTION 82You have an Exchange Server 2013 organization that contains two servers named EX1 and EX2.

EX1 and EX2 are members of a database availability group (DAG) named DAG1. DAG1 contains four mailbox databases. All databases are active on EX1 andreplicate to EX2.

You start an unplanned maintenance on EX1 and shut down EX1.

Page 174: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

You discover that the databases do not mount on EX2.

You restart EX1 and the databases mount automatically on EX1. You need to identify what prevents the databases from switching over successfully to EX2.

Which cmdlet should you run?

A. Test-ServiceHealthB. Test-OutlookConnectivityC. Get-AvailabilityReportOutageD. Test-ReplicationHealth

Correct Answer: DSection: [none]Explanation

Explanation/Reference:Test-ReplicationHealth: Exchange 2013 Help

QUESTION 83Your company has three offices. Each office is configured as an Active Directory site.

You have three servers that have Exchange Server 2013 installed named EX1, EX2 and EX3. All three servers have the Client Access server role and the Mailboxserver role installed.

The Active Directory site links and costs are configured as shown in the exhibit. (Click the Exhibit button.)

Site B is designated as a hub site.

EX2 fails.

You discover that all email messages sent from the users in Site A to the users in Site C are queued on a server in Site A.

Page 175: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

You need to ensure that the email messages are sent to Site C as quickly as possible.What should you do first?

A. Modify the Active Directory site link costs.B. Configure Site A as a hub site.C. Modify the Exchange-specific site link cost.D. Remove the hub site.

Correct Answer: DSection: [none]Explanation

Explanation/Reference:

QUESTION 84Your network contains an internal network and a perimeter network. The internal network contains four offices. The perimeter network is located in a separateoffice. Each internal office has a direct WAN link to all other internal offices.

Each of the four offices that make up the internal network is configured as an Active Directory site. The Active Directory sites and site links are configured as shownin the exhibit. (Click the Exhibit button.)

Page 176: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

Your company has an Exchange Server 2013 organization. Each site contains two servers that have the Mailbox server role and the Client Access server roleinstalled.

To the perimeter network, you deploy two servers that have Exchange Server 2010 Service Pack 2 (SP2) and the Edge Transport server role installed. Youconfigure an Edge Subscription to Site1.You deploy a new email notification application to Site4. The application will send 25,000 email messages daily to external recipients.

You need to identify which WAN links will have increased traffic from the new email application.

Which WAN link or links should you identify? (Each answer presents part of the solution.

Page 177: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

Choose all that apply.)

A. The WAN link between Site4 and the perimeter networkB. The WAN link between Site4 and Site3C. The WAN link between Site1 and the perimeter networkD. The WAN link between Site4 and Site1E. The WAN link between Site4 and Site2

Correct Answer: CESection: [none]Explanation

Explanation/Reference:C: the traffic will increase on the single WAN link on the perimeter network.E: The traffic will increase between Site4 and Site2 since the cost of this link (5) plus the cost of the link between Site2 and Site1 (1) is lower the cost on the directlink between Site4 and Site1 (10).

Incorrect answers:Not A: There is no WAN link between Site4 and the perimeter network. Not B: The cost of the WAN link between site3 and site3 is high (10). This path will not bechosen.Not D: There is no WAN link between Site4 and Site1.

QUESTION 85You have network contoso.com. contoso.com consist of AD DS Domain contoso.com. All Servers running Windows Server 2012 and all Clients running Windows 8Pro.

Server1 runs Mailbox Server Role and Client Access Server Role.You are configuring Anti-Spam Filtering on Server1.

You need to ensure that all emails with the words Free Credit Check are rejected unless the email is sent to Finance Distribution Group.

You also need to ensure that all emails from partner company Domain name adatum.com bypass the Anti-Spam Filter.You run the Add-ContentFilterPhrase and add the words Free Credit Check

What should you do next?

A. Run the Set-TransportConfig and Set-ContentFilterConfigB. Run the Set-SenderReputationConfig and Set-TransportConfigC. Run the Set-ContentFilterConfig and Set-RecipientFilterConfigD. Run the Set-SenderFilterConfig and Set-RecipientFilterConfig

Page 178: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

Correct Answer: CSection: [none]Explanation

Explanation/Reference:Explanation:

NOT ASet-TransportConfig not required in this scenarioUse the Set-TransportConfig cmdlet to modify the transport configuration settings for the whole Exchange organization.

NOT BSet-TransportConfig not required in this scenarioUse the Set-TransportConfig cmdlet to modify the transport configuration settings for the whole Exchange organization.

Use the Set-SenderReputationConfig cmdlet to modify the sender reputation configuration on a Mailbox server or an Edge Transport server.

EXAMPLE 1This example makes the following modifications to the sender reputation configuration:It sets the sender reputation action to block all senders whose sender reputation level (SRL) rating exceeds the SRL threshold.

It sets the SRL blocking threshold to 6.It sets the number of hours that senders are put on the blocked senders list to 36 hours. Set-SenderReputationConfig -SenderBlockingEnabled $true -SrlBlockThreshold 6 - SenderBlockingPeriod 36

NOT DWho sent the emails is not required in this scenarioUse the Set-SenderFilterConfig cmdlet to modify the Sender Filter agent configuration.

EXAMPLE 1This example makes the following modifications to the Sender Filter agent configuration:It enables blocking of blank senders.It blocks messages from lucernepublishing.com and all subdomains. It adds [email protected] and [email protected] to the blocked senders list withoutaffecting any existing entries.

Set-SenderFilterConfig -BlankSenderBlockingEnabled $true -BlockedDomainsAndSubdomains lucernepublishing.com -BlockedSenders @{Add="[email protected]","[email protected]"} CUse the Set-ContentFilterConfig cmdlet to modify the content filter configuration on a Mailbox server or an Edge Transport server.

EXAMPLE 1This example specifies the sender domain woodgrovebank.com as a bypassed domain. Messages received from that domain bypass the Content Filter agent. Set-

Page 179: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

ContentFilterConfig -BypassedSenderDomains woodgrovebank.com Use the Set-RecipientFilterConfig cmdlet to enable and configure the Recipient Filter agent.

EXAMPLE 2This example makes the following changes to the Recipient Filter agent configuration:Enables the Blocked Recipients list.Adds two users to the Blocked Recipients list.

Set-RecipientFilterConfig -BlockListEnabled $true -BlockedRecipients [email protected],[email protected]

Set-ContentFilterConfig: Exchange 2013 HelpSet-RecipientFilterConfig: Exchange 2013 Help

QUESTION 86You are evaluating the implementation of a Database Availability Group (DAG).

You need to recommend changes to the planned implementation to minimize the loss of large email messages if a single DAG member fails.

What should you recommend changing?

A. The preference of the mail exchanger (MX) recordsB. The duration of single item recoveryC. The intervals of shadow redundancyD. The size of the transport dumpster

Correct Answer: CSection: [none]Explanation

Explanation/Reference:Explanation:Shadow redundancy intervals will need to be ammended

SafetyNet is a component of Shadow Redundancy. -> .http://technet.microsoft.com/en- us/library/dd351027(v=exchg.150).aspx

Example 1:

ShadowResubmitTimeSpan on Set-TransportConfig3 hoursHow long a server waits before deciding that a primary server has failed and assumes ownership of shadow messages in the shadow queue for the primary serverthat's unreachable.

Page 180: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

Example 2:SafetyNetHoldTime on Set-TransportConfig2 daysHow long successfully processed messages are retained in Safety Net. Unacknowledged shadow messages eventually expire from Safety Net after the sum ofSafetyNetHoldTime and MessageExpirationTimeout on Set-TransportService.

QUESTION 87A user fails to connect to his mailbox by using Outlook Anywhere. The user successfully connects to the mailbox by using an Exchange ActiveSync-enabled mobiledevice and Outlook Web App.

You need to identify what prevents the users from connecting to the mailbox by using Outlook Anywhere.

Which tool should you use?

A. Microsoft Outlook Connectivity TestB. Microsoft Exchange RPC ExtractorC. Microsoft Exchange Server Profile AnalyzerD. Exchange Server MAPI Editor

Correct Answer: ASection: [none]Explanation

Explanation/Reference:Explanation:

Outlook Web AppYou can use Outlook Web App to access your Office 365 or other Microsoft Exchange-based email account via a web browser.

The URL (web address) you`ll use to sign in to Outlook Web App depends on the type of account you have.

Outlook Web App can be used to access any email account that's hosted on a server that's running Microsoft Exchange Server 2013.

Page 181: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

Page 182: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

Mobile devices that are enabled for Microsoft Exchange ActiveSync let users access most of their Microsoft Exchange mailbox data any time, anywhere.

There are many different mobile phones and devices enabled for Exchange ActiveSync. These include Windows Phones, Nokia mobile phones, Android phones

Page 183: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

and tablets, and the Apple iPhone, iPod, and iPad.

Although both phone and non-phone mobile devices support Exchange ActiveSync, in most Exchange ActiveSync documentation, we use the term mobile device.Unless the feature or features we're discussing require a cellular telephone signal, such as SMS message notification, the term mobile device applies to both mobilephones and other mobile devices such as tablets.

EXCHANGE SERVER SETTINGS:

Page 184: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

Outlook Anywhere (RPC over HTTP) allows you to use Outlook to connect to your Exchange server from remote locations without first connecting to the VPN.

You can also/alternatively, use Outlook Web Access by logging in at https://xmail.bu.edu/ or www.bu.edu/webmail.

Page 185: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

For remote connections, Outlook offers Outlook Anywhere, an alternative to VPN connections that allows you to use Outlook just as you normally do at yourorganization, without the need for any special connections or hardware, such as smart cards and security tokens. Outlook can connect to Exchange through theInternet by using remote procedure call (RPC) over HTTP.

The Outlook Anywhere feature allows you to access your Exchange account remotely from the Internet when you are working outside your organization's firewall.

Test Outlook Anywhere Connectivityhttp://technet.microsoft.com/en-us/library/ee633453(v=exchg.150).aspx Applies to: Exchange Server 2013You can test for end-to-end client Outlook Anywhere connectivity by using either the Shell or the Exchange Remote Connectivity Analyzer (ExRCA). This includestesting for connectivity through the Autodiscover service, creating a user profile, and signing in to the user`s mailbox. All the required values are retrieved from theAutodiscover service.

Exchange Remote Connectivity Analyzer (ExRCAThe Exchange Remote Connectivity Analyzer (ExRCA) is a web-based tool designed to test connectivity with a variety of Exchange protocols. You can access theExRCA https://www.testexchangeconnectivity.com/.The Microsoft Exchange Remote Connectivity Analyzer (ExRCA) can help you confirm that connectivity for your Exchange servers is configured correctly anddiagnose any connectivity issues. The Remote Connectivity Analyzer website offers tests for Microsoft Exchange ActiveSync, Exchange Web Services, MicrosoftOutlook, and Internet email.

Page 186: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

Page 187: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

Use the Shell to test Outlook Anywhere connectivity

To use the Shell to test Outlook Anywhere connectivity, use the Test-OutlookConnectivity cmdlet.Run the following command.Test-OutlookConnectivity -ProbeIdentity 'OutlookMailboxDeepTestProbe' -MailboxId [email protected] -Hostname contoso.com

NOT BThe Microsoft Exchange RPC Extractor is a command-line tool that can parse network captures and interpret remote procedure calls made from a client toMicrosoft Exchange Server. RPX uses the information provided in the Microsoft Exchange Server protocol documentation to parse RPCs, remote operations(ROPs), and the parameters for each ROP.

NOT CThe Microsoft Exchange Server Profile Analyzer tool lets administrators collect estimated statistical information from a single mailbox store or across an ExchangeServer organization.

You can use the collected data to perform the following operations:Analyze the performance and health of a mailbox server.Improve capacity planning models.Improve testing methodologies and tools.Improve future client and server products.

NOT DUse the Microsoft Exchange MAPI Editor to view and modify the contents of a Messaging API (MAPI) store directly.

http://technet.microsoft.com/en-us/library/ee633453(v=exchg.150).aspx

QUESTION 88You need to create an exclusion for two helpdesk RBAC (Role Based Access Control) groups to not have access to managers.

You will need to pick 3 powershell commands from the available choices

A. New-ManagementRole, New-ManagementScope,Set-ManagementScope (Guessed)B. New-ManagementScope, RecipientRestrictionFilter ,New-ManagementRoleAssignment (Guessed)C. New-ManagementScope, New-ManagementRoleAssignment, CustomRecipientWriteScope (Guessed)D. Unsure of commands and correct answer

Correct Answer: CSection: [none]Explanation

Page 188: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

Explanation/Reference:Only chose C as Microsoft recommends that you:define the scope,then the role,then the role group, and finally,the role assignment.

However it appears that the custom scope with a recipient filter has to be created in order to filter the scope for the 2 helpdesk role based access groups. Thescope, role, and role group assignments are linked by the role assignment itself. Microsoft recommends that you first define the scope, then the role, then the rolegroup, and, finally, the role assignment.

Management Role ScopeManagement role scopes enable you to define the specific scope of impact or influence of a management role when a management role assignment is created.When you apply a scope, the role assignee assigned to the role can only modify the objects contained within that scope.A role assignee can be a management role group, management role, management role assignment policy, user, or universal security group (USG). For moreinformation about management roles, see Understanding Role Based Access Control.

Page 189: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

Every management role, whether it's a built-in role or a custom role, has management scopes.Management scopes can be either of the following:Regular A regular scope isn't exclusive. It determines where, in Active Directory, objects can be viewed or modified by users assigned the management role. Ingeneral, a management role indicates what you can create or modify, and a management role scope indicates where you can create or modify. Regular scopes canbe either implicit or explicit scopes, both of which are discussed later in this topic.Exclusive An exclusive scope behaves almost the same as a regular scope. The key difference is that it enables you to deny users access to objects containedwithin the exclusive scope if those users aren't assigned a role associated with the exclusive scope. All exclusive scopes are explicit scopes, which are discussedlater in this topic.Scopes can be inherited from the management role, specified as a predefined relative scope on a management role assignment, or created using custom filtersand added to a management role assignment. Scopes inherited from management roles are called implicit scopes while predefined and custom scopes are calledexplicit scopes. The following sections describe each type of scope:

Implicit ScopesExplicit ScopesPredefined Relative ScopesCustom ScopesRecipient Filter ScopesConfiguration Scopes

Each role can have the following types of scopes:Recipient read scope The implicit recipient read scope determines what recipient objects the user assigned the management role is allowed to read from ActiveDirectory. Recipient write scope The implicit recipient write scope determines what recipient objects the user assigned the management role is allowed to modify inActive Directory. Configuration read scope The implicit configuration read scope determines what configuration objects the user assigned the management role isallowed to read from Active Directory. Configuration write scope The implicit configuration write scope determines what organizational, database, and server objectsthe user assigned the management role is allowed to modify in Active Directory.

Recipient objects include mailboxes, distribution groups, mail enabled users, and other objects. Configuration objects include servers running Microsoft ExchangeServer 2013, and databases located on servers running Exchange. Each type of scope can be either an implicit scope or explicit scope.

Role Based Access Control GroupsRole Based Access Control (RBAC) is the permissions model used in Microsoft Exchange Server 2013. With RBAC, you don't need to modify and manage accesscontrol lists (ACLs), which was done in Exchange Server 2007.ACLs created several challenges in Exchange 2007, such as modifying ACLs without causing unintended consequences, maintaining ACL modifications throughupgrades, and troubleshooting problems that occurred due to using ACLs in a nonstandard way. RBAC enables you to control, at both broad and granular levels,what administrators and end- users can do. RBAC also enables you to more closely align the roles you assign users and administrators to the actual roles they holdwithin your organization. In Exchange 2007, the server permissions model applied only to the administrators who managed the Exchange 2007 infrastructure. InExchange 2013, RBAC now controls both the administrative tasks that can be performed and the extent to which users can now administer their own mailbox anddistribution groups.RBAC has two primary ways of assigning permissions to users in your organization, depending on whether the user is an administrator or specialist user, or an end-user: management role groups and management role assignment policies.Each method associates users with the permissions they need to perform their jobs. A third, more advanced method, direct user role assignment, can also be used

Page 190: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

Page 191: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

Built-in Role GroupsMicrosoft Exchange Server 2013 includes several management role groups by default. The following built-in role groups provide you with a preconfigured set ofroles that you can assign to various administrator and specialist users in your organization.Organization ManagementView-Only Organization ManagementRecipient ManagementUM ManagementHelp DeskHygiene ManagementCompliance ManagementRecords Management

Page 192: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

Discovery ManagementPublic Folder ManagementServer ManagementDelegated Setup

How to use Exclude switch in Remove-Item cmdlet in PowerShell today i was trying to remove some junk folders and files in a specific folder. But i don`t want toremove all of file and folder , i want to keep few folders. Then i think that i should use the Exclude switch with Remove-Item Cmdlet.I tried to use Exclude switch but somehow i failed to get it working because i don't know the exact patter used by Exclude switch. After few minutes of testing i get itdone and i thought i should share this tip with you.

$Lenovo = "D:\P-Temp\Lenovo\*"Remove-Item -Recurse -Path $Lenovo -Exclude system,temp,updates.ser,"*.xml" -Verbose ForceIn $Lenovo variable i specified the folder path in which I want to remove the items I want to Exclude folder name System,temp and file name updates.ser and all.XML Files in -Exclude switch give the folder name which you don`t want to delete, no need to put the in a double quotes in folder name . You can provide multiplefolder name separated by comma. in pattern matching make sure you put the wild cards in double quotes .

POWERSHELL COMMMANDS

New-ManagementScope (Example)http://technet.microsoft.com/en-us/library/dd335137(v=exchg.150).aspx

EXAMPLE 4This example creates the Protected Exec Users exclusive scope. Users that contain the string "VP" in their title match the recipient filter for the scope. When theexclusive scope is created, all users are immediately blocked from modifying the recipients that match the exclusive scope until the scope is associated with amanagement role assignment. If other role assignments are associated with other exclusive scopes that match the same recipients, those assignments can stillmodify the recipients.New-ManagementScope -Name "Protected Exec Users" -RecipientRestrictionFilter { Title -Like "*VP*" } -Exclusive

New-ManagementRoleAssignmentThe exclusive scope is then associated with a management role assignment that assigns the Mail Recipients management role to the Executive Administrators rolegroup. This role group contains administrators who are allowed to modify the mailboxes of high-profile executives. Only the administrators of the ExecutiveAdministrators role group can modify users with the string "VP" in their title.New-ManagementRoleAssignment -SecurityGroup "Executive Administrators" -Role "Mail Recipients" -CustomRecipientWriteScope "Protected Exec Users"

This example assigns the Eng Help Desk role to the Eng HD Personnel role group. The assignment restricts the recipient write scope of the role to thecontoso.com/Engineering/Users OU. Users who are members of the Eng HD Personnel role group can only create, modify, or remove objects contained within thatOU.New-ManagementRoleAssignment -Role "Eng Help Desk" -SecurityGroup "Eng HD Personnel" -RecipientOrganizationalUnitScope contoso.com/Engineering/Users

New-ManagementRoleUse the New-ManagementRole cmdlet to create a management role based on an existing role or create an unscoped management role.

Page 193: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

EXAMPLE 1This example creates the management role Redmond Journaling View-Only based on the Journaling parent role.New-ManagementRole -Name "Redmond Journaling View-Only" -Parent Journaling

New-RoleGroupUse the New-RoleGroup cmdlet to create a management role group on a server running Microsoft Exchange Server 2013.

EXAMPLE 1This example creates a role group. The Mail Recipients and Mail Enabled Public Folders roles are assigned to the role group, and the users Kim and Martin areadded as members. Because no scopes were provided, Kim and Martin can manage any recipient and reset passwords for any users in the organization.New-RoleGroup -Name "Limited Recipient Management" -Roles "Mail Recipients", "Mail Enabled Public Folders" -Members Kim, MartinLook here:Understanding Management Role Scopeshttp://technet.microsoft.com/en-us/library/dd335146(v=exchg.150).aspx

As we need to set deny access we want to set explicit recipcient filter scope for the existing helpdesk group, removing the managers from the scope. Then create anew RBAC group and implicit scope the managers mailboxes. So my guess would be something like

New-ManagementRole -Name "Management role for CEO"New-ManagementScope -Name "Management Scope for CEO" -RecipientRestrictionFilter { Title -Like "*CEO*" } -ExclusiveSet-ManagementScope "Helpdesk Users" -RecipientRestrictionFilter { Company -eq 'Contoso users' -and Function -like 'CEO'

As we do not know what RBAC setup already exists, this kind of smells like Microsoft, but hey this is a start.

QUESTION 89Your network contains an Active Directory forest. The forest contains a single domain named contoso.com. You have an Exchange Server 2013 organizationnamed Contoso.

You plan to create an additional SMTP domain named sales.contoso.com. You will use sales.contoso.com as the primary SMTP address for the users in the salesdepartment. You create a new email address policy and apply the policy to the sales users.

New sales users report that when they attempt to access their email from the Internet for the first time by using Microsoft Outlook 2010, they fail to connect. Thesales users connect to their mailbox internally successfully by using Outlook 2010. All other users can connect to their mailbox from the Internet and internally.

You need to ensure that the new sales users can connect to the Exchange Server 2013 organization by using Outlook Anywhere from the Internet.

Which two actions should you perform? (Each correct answer presents part of the solution.Choose two.)

A. Modify each existing Service Connection Point (5CP) object in Active Directory to point to autodiscover.sales.contoso.com.B. From DNS Manager, create a host (A) record for autodiscover.sales.contoso.com.C. On the Client Access servers, deploy a new certificate that includes the autodiscover.sales.contoso.com name.

Page 194: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

D. Create a new Autodiscover virtual directory on the Client Access servers and configure ExternalURL to use autodiscover.sales.contoso.com.E. Create a new Service Connection Point (SCP) object in Active Directory that points to autodiscover.sales.contoso.com.

Correct Answer: BCSection: [none]Explanation

Explanation/Reference:* Externally connected clients are different, because they can`t lookup the SCP in Active Directory from outside of the network. These clients might be roaminglaptop users with Outlook, or they might be ActiveSync capable smartphones such as iPhones. In either case they will attempt to connect to Autodiscover byperforming a DNS lookup for autodiscover.smtpdomainname.* You need the autodiscover.smtpdomainname name in the Exchange 2013 SSL certificate.(C)* You will only need an autodiscover name for each SMTP domain that a user is likely to enter as their email address. (B)Autodiscover Service: Exchange 2013 Help

QUESTION 90You have an Exchange Server 2013 organization named Contoso. The organization contains a server named Server1 that has Exchange Server 2013 installed.Server1 has the Mailbox server role and the Client Access server role installed.

Server1 has a Send connector for a partner company. The Send connector is configured for Domain Security with a domain named adatum.com.The only certificate installed on Server1 expires.You discover that all email messages sent to adatum.com remain in the queue on Server1. On Server1, you install a new certificate from a trusted third-party.

You need to ensure that the email messages are delivered to adatum.com.What should you do?

A. Assign the new certificate to the IIS service.B. Send the new certificate to the administrator at adatum.com.C. Assign the new certificate to the SMTP service.D. Create a new send connector that contains an address space to adatum.com.

Correct Answer: CSection: [none]Explanation

Explanation/Reference:Note:* The Enable-ExchangeCertificate cmdlet enables certificates when it updates the metadata that is stored with the certificate. To enable an existing certificate towork with different services, run the Enable-ExchangeCertificate command and specify the services that you want to enable. You can rerun this cmdlet if you want

Page 195: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

to add new services that use the certificate.

When you enable a certificate for the Simple Mail Transfer Protocol (SMTP) service and the certificate contains a FQDN that matches the FQDN of the localcomputer, the certificate may be published to the Active Directory directory service.

Enable-ExchangeCertificate: Exchange 2013 Help

QUESTION 91Your network contains an Active Directory forest named contoso.com. The forest contains an enterprise root certification authority (CA) named CA1. The networkcontains a server named EX1 that has Exchange Server 2013 installed.

A partner company named A. Datum Corporation has an Active Directory domain named adatum.com. The domain contains a server named EX5 that hasExchange Server 2010 Service Pack 2 (SP2) installed. EX5 has a Receive connector that is configured for mutual TLS.

Users in contoso.com plan to send email messages that contain sensitive data to users in adatum.com.

You need to ensure that all of the email messages sent from contoso.com to adatum.com are encrypted by using TLS. The solution must ensure that EX1 and EX5validate server certificates.

Which three actions should you perform? (Each correct answer presents part of the solution.Choose three.)

A. Run the set-transportconfig -tlssenddomainsecurelist contoso.com command.B. Install a certificate, and then assign the certificate to the IIS service. Send the root certificate for contoso.com to the administrators in adatum.com.C. Run the New-SendConnector cmdlet and specify the domainsecureenabled parameter.D. Run the New-SendConnector cmdlet and specify the tlsdomainparameter.E. Run the set-transportconfig -tlssenddomainsecurelist adatum.com command.F. Install a certificate, and then assign the certificate to the SMTP service. Send the root certificate for contoso.com to the administrators in adatum.com.

Correct Answer: ADFSection: [none]Explanation

Explanation/Reference:A: Use the Set-TransportConfig cmdlet to modify the transport configuration settings for the whole Exchange organization.TheTLSSendDomainSecureListparameter specifies the domains from which you want to send domain secured email by using mutual TLS authentication. In thisscenario we send from EX1 in the contoso.com domain.

D: Need to create a new send connector.The TlsDomain parameter specifies the domain name that the Send connector uses to verify the FQDN of the target certificate when establishing a TLS securedconnection.

Page 196: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

F: A new certificate is needed for the SMTP service.

Set-TransportConfig: Exchange 2013 Help

QUESTION 92You have an Exchange Server 2013 organization that contains five servers. Your company has a finance department, a marketing department, and a researchdepartment.

Users in the marketing department are prevented from creating more than two Exchange ActiveSync device associations.

You have a user named User5 in the finance department. You need to prevent User5 from creating more than two Exchange ActiveSync device associations.

Which cmdlet should you use?

A. Set-ThrottlingPolicyAssociationB. Set-ResourcePolicyC. Set-ActiveSyncMailboxPolicyD. Set-CASMailbox

Correct Answer: ASection: [none]Explanation

Explanation/Reference:Set-ThrottlingPolicyAssociation: Exchange 2013 HelpSet-ThrottlingPolicy: Exchange 2013 Help

QUESTION 93You have an Exchange Server organization that contains three servers that have Exchange Server 2013 installed and one server that has Exchange Server 2010installed.

You create the custom RBAC roles shown in the following table.

Page 197: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

The Seattle help desk manages all of the users in an organizational unit (OU) named Seattle. The Miami help desk manages all of the users in an OU namedMiami. The IT Administrators manage all of the users in the forest.

You need to recommend which commands must be run to prevent only the members of both help desks from modifying the properties of users who have adepartment attribute value of Manager.

Which three commands should you run? (Each correct answer presents part of the solution.Choose three.)

A. new-managementscope "executive users exclusive scope" -recipientrestrictionfilter { department -eq "manager" } -exclusive forceB. new-managementroleassignment -name "managers" -securitygroup "managers" -role "mail recipients" -exclusiverecipientwritescope "executive users exclusive

scope"C. new-roleassignmentpolicy -name "limited end user policy" -roles "mypersonalinformation".D. new-rolegroup -name "managers" -roles "mail recipients" -members adminsE. new-rolegroup -name "help desk" -roles "mail recipients" -members admins

Correct Answer: ABDSection: [none]Explanation

Explanation/Reference:Note:* (A) Use the New-ManagementScope cmdlet to create a regular or exclusive management scope.After you create a regular or exclusive scope, you need to associate the scope with a management role assignment. To associate a scope with a role assignment,use the New- ManagementRoleAssignment cmdlet.

* (B) Use the New-ManagementRoleAssignment cmdlet to assign a management role to a management role group, management role assignment policy, user, oruniversal security group (USG).

QUESTION 94You have an Exchange Server 2007 organization.

You recently deployed a server that has Exchange Server 2013 installed.

The Exchange Server organization contains three servers. The servers are configured as shown in the following table.

Page 198: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

Server2 contains a mailbox for a user named User1. You move the mailbox of User1 to Server3.

After the move, User1 fails to access his mailbox by using Outlook Web App. Users who have mailboxes on Server1 and Server2 can access their mailboxes byusing Outlook Web Access.

You need to ensure that User1 can access his mailbox from the Internet by using Outlook Web App at https://mail.contoso.com.

The solution must ensure that users who have mailboxes on Server1 and Server2 can continue to use Outlook Web Access.

Which three actions should you perform? (Each correct answer presents part of the solution.Choose three.)

A. Export the certificate on Server1 and import the certificate to Server 3.B. On all of the Exchange servers, install a new certificate that contains the mail.contoso.com and legacy.contoso.com names.C. Redirect all of the traffic from the Internet for mail.contoso.com to Server3.D. On all of the Exchange servers, install a new certificate that contains the Server1.contoso.com, server2.contoso.com, server3.contoso.com, and

legacy.contoso.com names.E. Create a host (A) record named legacy.contoso.com that points to Server1.

Correct Answer: ABESection: [none]Explanation

Explanation/Reference:Client Connectivity in an Exchange 2013 Coexistence Environment http://technet.microsoft.com/en-US/exdeploy2013/Checklist?state=2419-W-FgBEAgAAQACAAIECAQAAAAg~http://technet.microsoft.com/en-US/exdeploy2013/Checklist?state=2419-W- EQBEAgAAQACAAIECAQAAAAg~

QUESTION 95You host Exchange Server 2013 organizations for several hundred tenants. The infrastructure contains several custom transport agents.

Page 199: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

You need to prevent the transport agents from overloading the processors on one of the Exchange servers.

Which cmdlet should you run?

A. Set-WorkloadPolicyB. Set-ResourcePolicyC. Set-TransportAgentD. Set-ThrottlingPolicy

Correct Answer: ASection: [none]Explanation

Explanation/Reference:

QUESTION 96You have an Exchange Server 2013 organization named adatum.com. The organization contains two servers named EX1 and EX2 that are configured as shown inthe table.

Both servers are members of a database availability group (DAG). EX1 has the active copy of a database named Database1.

Several users who have mailboxes in Database1 discover that all of their outbound email messages remain in their Drafts folder when they use Outlook Web App.You need to ensure that the email messages are delivered.

What should you do?

A. On EX2, retry the message queues.B. On EX1, start the Microsoft Exchange Mailbox Transport Submission service.C. On EX2, start the Microsoft Exchange Mailbox Transport Submission service.D. On EX1, retry the message queues.

Page 200: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

Correct Answer: BSection: [none]Explanation

Explanation/Reference:Explanation:In Microsoft Exchange Server 2013, mail flow occurs through the transport pipeline. The transport pipeline is a collection of services, connections, components, andqueues that work together to route all messages to the categorizer in the Transport service on a Mailbox server inside the organization.

Page 201: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

Page 202: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

The Transport service on a Mailbox serverEvery message that's sent or received in an Exchange 2013 organization must be categorized in the Transport service on a Mailbox server before it can be routedand delivered. After a message has been categorized, it's put in a delivery queue for delivery to the destination mailbox database, the destination databaseavailability group (DAG), Active Directory site, or Active Directory forest, or to the destination domain outside the organization.

The Transport service on a Mailbox server consists of the following components and processes:SMTP Receive When messages are received by the Transport service, message content inspection is performed, transport rules are applied, and anti-spam andanti-malware inspection is performed if they are enabled. The SMTP session has a series of events that work together in a specific order to validate the contents ofa message before it's accepted. After a message has passed completely through SMTP Receive and isn't rejected by receive events, or by an anti- spam and anti-malware agent, it's put in the Submission queue.

Submission Submission is the process of putting messages into the Submission queue. The categorizer picks up one message at a time for categorization.Submission happens in three ways:Through an SMTP Receive connector.

Through the Pickup directory or the Replay directory. These directories exist on the Mailbox server. Correctly formatted message files that are copied into thePickup directory or the Replay directory are put directly into the Submission queue.

Through a transport agent.Categorizer The categorizer picks up one message at a time from the Submission queue. The categorizer completes the following steps:Recipient resolution, which includes top-level addressing, expansion, and bifurcation.

Routing resolution.Content conversion.Additionally, mail flow rules that are defined by the organization are applied. After messages have been categorized, they're put into a delivery queue that's basedon the destination of the message. Messages are queued by the destination mailbox database, DAG, Active Directory site, Active Directory forest or externaldomain.

SMTP Send How messages are routed from the Transport service depends on the location of the message recipients relative to the Mailbox server wherecategorization occurred. The message could be routed to the Mailbox Transport service on the same Mailbox server, the Mailbox Transport service on a differentMailbox server that's part of the same DAG, the Transport service on a Mailbox server in a different DAG, Active Directory site, or Active Directory forest, or to theFront End Transport service on a Client Access server for delivery to the Internet.

Retry a Message QueueWhen a transport server can't connect to the next hop, the delivery queue is put in a status of Retry.When you retry a delivery queue by using Queue Viewer or the Shell, you force an immediate connection attempt and override the next scheduled retry time.

If the connection isn't successful, the retry interval timer is reset. The delivery queue must be in a status of Retry for this action to have any effect.Use Queue Viewer in the Exchange Toolbox to retry a queue Click Start > All Programs > Microsoft Exchange 2013 > Exchange Toolbox.

In the Mail flow tools section, double-click Queue Viewer to open the tool in a new window. In Queue Viewer, click the Queues tab. A list of all queues on the server

Page 203: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

to which you're connected is displayed.

Click Create Filter, and enter your filter expression as follows:Select Status from the queue property drop-down list.Select Equals from the comparison operator drop-down list.Select Retry from the value drop-down list.Click Apply Filter. All queues that currently have a Retry status are displayed.

Select one or more queues from the list. Right-click, and then select Retry Queue. If the connection attempt is successful, the queue status changes to Active. If noconnection can be made, the queue remains in a status of Retry and the next retry time is updated.

Resubmit messages in queuesResubmitting a queue is similar to retrying a queue, except the messages are sent back to the Submission queue for the categorizer to reprocess. You canresubmit messages that have the following status:

Delivery queues that have the status of Retry. The messages in the queues can't be in the Suspended state.Messages in the Unreachable queue that aren't in the Suspended state.Messages in the poison message queue.OWA DRAFTS FOLDERhttp://thoughtsofanidlemind.wordpress.com/2013/03/25/exchange-2013-dns-stuck-messages/ OWA clients automatically capture copies of messages as they arebeing composed and store them in the Drafts folder. When the user issues a sent command, the Mailbox submit agent (running within the Store driver) takes overand processes the outbound message by giving it to either the Transport service running on the same mailbox server or to the Transport server running on anothermailbox server. The connection is made via SMTP.

Messages stay in the Drafts folder until they are successfully sent by being processed by the transport service.At this point, items are moved into the Sent Items folder. OWA 2013 behaves in the same way as OWA 2010 nothing has changed in the way that messages areheld in the Drafts folder until dispatch. What might account for user descriptions of items being stuck is when a problem occurs somewhere in the transport pipelinethat prevents outbound messages being processed. For instance, items will remain in the Drafts folder if the Store cannot pass them to the transport system. If thetransport service is not running on any available server or the mailbox transport service is not running on the mailbox server that hosts the active database for theuser`s mailbox, items will stay in the Drafts folder until the services come online and Exchange is able to process outbound items.

NOT A CActive copy of a database named Database1 (EX1) not on EX2

NOT DMessages stay in the Drafts folder until they are successfully sent by being processed by the transport service

BResubmitting a queue is similar to retrying a queue, except the messages are sent back to the Submission queue for the categorizer to reprocess.

Messages stay in the Drafts folder until they are successfully sent by being processed by the transport service If the transport service is not running on any availableserver or the mailbox transport service is not running on the mailbox server that hosts the active database for the user`s mailbox, items will stay in the Drafts folder

Page 204: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

until the services come online and Exchange is able to process outbound items.Mail Flow: Exchange 2013 Help

QUESTION 97Your company has four regional offices and 20 branch offices. The regional offices connect to each other by using a 30-Mbps WAN link. Each branch officeconnects to its nearest regional office by using a 1-Mbps WAN link.

The network contains an Active Directory forest. The forest contains a domain controller in each office. Each office maps to an Active Directory site. Each branchoffice site connects to the nearest regional office site by using an Active Directory site link.

You have an Exchange Server 2013 organization that contains one server in each office.

You need to implement a messaging solution to meet the following requirements:The users in the branch offices must only be able to send email messages that are up to 2 MB to the users in the other offices.The users in the regional offices must be prevented from sending email messages that are larger than 5 MB to the users in any of the regional offices.

Which cmdlet should you run?

A. Set-TransportRuleB. Set-ADSiteC. Set-AdSiteLinkD. Set-RoutingGroupConnector

Correct Answer: CSection: [none]Explanation

Explanation/Reference:Explanation:NOT ADoes not relate to message sizeSet-TransportRuleUse the Set-TransportRule cmdlet to modify an existing transport rule in your organization. For information about the parameter sets in the Syntax section below,see Syntax.

EXAMPLE 1This example modifies the Sales Team Disclaimer transport rule. Modifying the value of one predicate doesn't affect other predicates used in the rule's conditions orexceptions and doesn't affect actions on the same rule.

This example sets the FromMemberOf parameter to a value of Sales-Group, which specifies that the rule is applied if the sender of the message is a member of theSales-Group distribution group.

Page 205: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

Set-TransportRule "Sales Team Disclaimer" -FromMemberOf "Sales-Group"

NOT BDoes not relate to message sizeSet-ADSiteUse the Set-AdSite cmdlet to configure the Exchange settings of Active Directory sites.

EXAMPLE 1This example configures the Active Directory site named Default-First-Site-Name as a hub site. Set-AdSite Default-First-Site-Name -HubSiteEnabled $true

NOT DDoes not relate to message sizeSet-RoutingGroupConnectorWith routing groups and Routing Group connectors you can consolidate communication between servers by designating bridgehead servers that act ascommunication points between routing groups. For example, your organization may have a remote site connected through a wide-area- network (WAN) link to yourmain office. In this example, you can use a Routing Group connector to route Exchange traffic between a server at your main office and a server at your remotesite.

CThe only command that deals with message size.Set-AdSiteLinkUse the Set-AdSiteLink cmdlet to assign an Exchange-specific cost to an Active Directory IP site link. You can also use this cmdlet to configure the maximummessage size that can pass across an Active Directory IP site link.

EXAMPLE 1This example assigns an Exchange-specific cost of 25 to the IP site link DEFAULT_IP_SITE_LINK and configures a maximum message size limit of 10 MB on theIP site link.Set-AdSiteLink DEFAULT_IP_SITE_LINK -ExchangeCost 25 -MaxMessageSize 10MB

Set-AdSiteLink: Exchange 2013 Help

QUESTION 98You have an Exchange Server 2013 organization named for A.Datum Inc. A user named User1 is a member of the Domain Admins group. User1 fails tosynchronize a new Windows Phone device by using Exchange ActiveSync and receives an HTTP 500 error message.

User1 successfully logs on to Outlook Web App and Outlook Anywhere. You need to ensure that User1 can synchronize the new Windows Phone device by usingExchange ActiveSync. Which two tasks should you perform? (Each correct answer presents a complete solution. Choose two.)

A. Disable permission inheritance on the User1 user account.B. Enable permission inheritance on the User1 user account.C. Install a trusted root certificate on the Windows Phone device.

Page 206: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

D. Create a new mobile device mailbox policy.E. Modify the Exchange ActiveSync policy that applies to User1`s mailbox.

Correct Answer: BESection: [none]Explanation

Explanation/Reference:Explanation:HTTP 500 ERROR MESSAGEThe Web server (running the Web Site) encountered an unexpected condition that prevented it from fulfilling the request by the client (e.g. your Web browser or ourCheckUpDown robot) for access to the requested URL.

BSimply check include inheritable permissions from this object's parent.INHERITABLE PERMISSIONSNOT ANeed to enable permission inheritance on the User1 user account not disable it NOT CThis solution will fix a different error. (Error 80072F0D) error This error can occur when the root certificate authority that generated the SSL certificate being used bythe Exchange server is not trusted by the Windows Phone device.

This will commonly occur with Exchange servers that are still configured to use a self-signed certificate, or that have a certificate issued from a private CA.

NOT DNo need to create a new policy but need to modify the existing policy

Page 207: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

EIt appears that Exchange ActiveSync for User 1's mailbox may not be enabled.Use the EAC to enable or disable Exchange ActiveSyncIn the EAC, navigate to Recipients > Mailboxes.In the list of user mailboxes, click the mailbox that you want to enable or disable Exchange ActiveSync for, and then click Edit.

On the mailbox properties page, click Mailbox Features.Under Mobile Devices, do one of the following:To disable Exchange ActiveSync click Disable Exchange ActiveSync. A warning appears asking if you're sure you want to disable Exchange ActiveSync. Click Yes.To enable Exchange ActiveSync, click Enable Exchange ActiveSync.Click Save to save your change.Exchange ActiveSync mailbox policies control how users use and synchronize their mobile devices in your organization.

When you change an Exchange ActiveSync device policy, it affects all users whose mailbox is associated with that policy. The policy you set as the defaultautomatically affects all users in the organization except those you have explicitly assigned different device policies to.

Page 208: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

Not all mobile devices support all the Exchange ActiveSync policy settings. If a policy setting isn't supported on a particular device, the device may not apply thesetting.

You can control whether devices that don't support specific policies are allowed to connect in the General settings for the policy.

Page 209: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

Page 210: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

QUESTION 99Your network contains an Active Directory forest. The forest contains one domain. The domain contains two sites and three domain controllers. The sites anddomain controllers are configured as shown in the following table.

The sites connect to each other by using a WAN link.

You have an Exchange Server 2013 organization that contains two servers in the Main Office site.

In Branch1, you plan to deploy one server to the Exchange Server 2013 organization.

You need to ensure that all of the Exchange Server services in Branch1 are available if the WAN link fails after the planned deployment.

What should you do?

A. Create a site link bridge, and then configure Branch1 as a hub site.B. Replace the domain controller in Branch1 with an RODC that runs Windows Server 2012.C. Replace the domain controller in Branch1 with a writable domain controller that runs a Server Core installation of Windows Server 2008.D. Create an additional site link, and then configure Branch1 as a hub site.

Correct Answer: CSection: [none]Explanation

Explanation/Reference:Explanation:

Site link bridgeA site link bridge connects two or more site links and enables transitivity between site links. Each site link in a bridge must have a site in common with another site

Page 211: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

link in the bridge. The Knowledge Consistency Checker (KCC) uses the information on each site link to compute the cost of replication between sites in one site linkand sites in the other site links of the bridge. Without the presence of a common site between site links, the KCC also cannot establish direct connections betweendomain controllers in the sites that are connected by the same site link bridge.

By default, all site links are transitive.

This figure illustrates an organization`s hub-and-spoke network topology, consisting of two hub sites (A and B) and six satellite sites (C through H). The site linksbetween all sites are named A- B, A-C, A-D, A-E, B-F, B-G, and B-H.

Page 212: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

Hub SiteA hub site is based on having large numbers of outgoing links

NOT A B DIf you want to install or operate any Exchange 2013 server in a site, you must have a writable global catalog in the same AD site.Be aware that no versions of Exchange Server will make use of RODC or the Global Catalog server on a RODC although Exchange will work in the presence ofRODC as long as writable versions of domain controllers and GCs are available

CIf you want to install or operate any Exchange 2013 server in a site, you must have a writable global catalog in the same AD site.

The Global Catalog is the central repository of information about objects in a tree or forest but with a limited number of each objects attribute.

The domain controller that holds a copy of the Global Catalog is the Global Catalog Server. The global catalog server makes it possible to search the entire AD DSforest without referrals to the domain controller that stores the target of the search.

The global catalog server is also required for searching and processing domain logons in forests where universal groups is available Be aware that no versions of

Page 213: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

Exchange Server will make use of RODC or the Global Catalog server on a RODC although Exchange will work in the presence of RODC as long as writableversions of domain controllers and GCs are available

QUESTION 100Your company has a main office site and a disaster recovery site. The two sites connect to each other by using redundant WAN links. Each site connects directly tothe Internet. Each site contains one Exchange Server 2013 server that is accessible from the Internet.

The company uses the ©contoso.com email address suffix. The DNS records that can be resolved from the Internet are configured as shown in the following table.

When the Internet link at the main office site fails, the company cannot receive incoming email from the Internet.

You need to ensure that incoming email from the Internet is delivered to Server1. Incoming email from the Internet must be delivered to Server2 if Server1 isunavailable.

What should you create?

A. A CNAME record for the name mail.contoso.com that resolves to server2.contoso.comB. An MX record that has a cost of 20 and resolves to mail.contoso.comC. An MX record that has a cost of 20 and resolves to server2.contoso.comD. An A record for the name mail.contoso.com that resolves to 131.107.101.1

Correct Answer: CSection: [none]Explanation

Explanation/Reference:Explanation:CNAME recordA CNAME record is an abbreviation for Canonical Name record and is a type of resource record in the Domain Name System (DNS) that specifies that the domainname is an alias of another, canonical domain name. Here "canonical" usually means: a more generally accepted or standard name.

Page 214: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

For example, if there is a DNS zone as follows:NAME TYPE VALUE--------------------------------------------------bar.example.com. CNAME foo.example.com.foo.example.com. A 192.0.2.23

MX recordA mail exchanger record (MX record) is a type of resource record in the Domain Name System that specifies a mail server responsible for accepting emailmessages on behalf of a recipient's domain, and a preference value used to prioritize mail delivery if multiple mail servers are available. The set of MX records of adomain name specifies how email should be routed with the Simple Mail Transfer Protocol (SMTP).

A RecordAn A (address) record is a DNS record that can be used to point your domain name and host names to a static IP address.

NOT A B DNeed to increase the cost associated with the MX record of Server2 so that Server1 is preferred over Server2 but Server2 will be used if Server1 is not available.

CNeed to increase the cost associated with the MX record of Server2 so that Server1 is preferred over Server2 but Server2 will be used if Server1 is not available.There is already a CNAME (Alias) associated with mail.contoso.com which points to Server1.contoso.com

Record Name Record Type DataContoso.com Mail Exchanger (MX) [20] mail2.contoso.com Mail2 Alias CNAME Server2.contoso.com

QUESTION 101You have an Exchange Server 2013 organization.You create two distribution groups named Group1 and Group2. Group1 and Group2 each contain several hundred users. Group1 contains a user named User1.

You need to configure moderation for Group2. The solution must meet the following requirements:

Email sent from the members of Group1 must NOT be moderated unless the sender is User1. All other email must be moderated by a user named Admin1.

Which two actions should you perform? (Each correct answer presents part of the solution.Choose two.)

A. Create a transport rule that has a condition of The recipient is Group2. Configure the transport rule to have an action of Forward the message for approval toAdmin1.

B. Run Set-DistributionGroup Group2 -ModeratedBy Admin1 - BypassModerationFromSendersOrMembers Group1 -ModerationEnabled $true.C. Create a transport rule that has the conditions of The sender is User1 and The recipient is Group2. Configure the transport rule to have an action of Forward the

message for approval to Admin1.D. Create a transport rule that has the conditions of The sender is User1 and The recipient is Group2. Configure the transport rule to have an action of Forward the

Page 215: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

message for approval to Admin1.

Correct Answer: BCSection: [none]Explanation

Explanation/Reference:Explanation:Moderated TransportYou can require all messages sent to specific recipients be approved by moderators by Using the moderated transport feature in Microsoft Exchange Server 2013.

You can configure any type of recipient as a moderated recipient, and Exchange will ensure that all messages sent to those recipients go through an approvalprocess.

In any type of organization, you may need to restrict access to specific recipients. The most common scenario is the need to control messages sent to largedistribution groups.

Depending on your organization's requirements, you may also need to control the messages sent to executive mailboxes or partner contacts. You can usemoderated recipients to accomplish these tasks.

Transport RulesUsing Transport rules, you can look for specific conditions in messages that pass through your organization and take action on them.Transport rules let you apply messaging policies to email messages, secure messages, protect messaging systems, and prevent information leakage.

Many organizations today are required by law, regulatory requirements, or company policies to apply messaging policies that limit the interaction between recipientsand senders, both inside and outside the organization. In addition to limiting interactions among individuals, departmental groups inside the organization, andentities outside the organization, some organizations are also subject to the following messaging policy requirements:Preventing inappropriate content from entering or leaving the organization Filtering confidential organization informationTracking or archiving copying messages that are sent to or received from specific individuals Redirecting inbound and outbound messages for inspection beforedelivery Applying disclaimers to messages as they pass through the organization As messages go through the Transport pipeline, the Transport rules agent isinvoked. The Transport rules agent is a special Transport agent that processes the Transport rules you create. The Transport rules agent scans the message, andif the message fits the conditions you specify in a Transport rule, it takes the specified action on that message.

NOT AThis means that all email sent to Group2 will be moderated.

NOT DUnknown option

BWhen you configure a recipient for moderation, all messages sent to that recipient are subject to approval by the designated moderators.Allow the members of the distribution group named Group1 to bypass moderation.

Page 216: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

Combination of this rule and option C allows for only User1 to be affected by the moderator Admin1

CNeed to create a transport rule that identifies User1.Moderated Transport: Exchange 2013 Help

QUESTION 102You have an Exchange Server 2013 organization that contains one server named exl.contoso.com. The server has the Mailbox server role and the Client Accessserver role installed.

You plan to configure users to work from home and to access their email by using the Outlook Anywhere feature.Upon testing the planned configuration, you discover that the users can connect and synchronize email from home, but they cannot execute the following tasks:Set automatic replies for Out of Office.Download changes to the offline address book.View availability data when scheduling meetings with coworkers.

The users can execute these tasks when they work from the office.

You need to ensure that the users can execute the tasks when they work from home.

Which two actions should you perform? (Each correct answer presents part of the solution.Choose two.)

A. Install a new certificate on exl.contoso.comB. Modify the EWS virtual directory.C. Create a new Autodiscover virtual directory.D. Renew the certificate on exl.contoso.com.E. Modify the OAB virtual directory.

Correct Answer: BESection: [none]Explanation

Explanation/Reference:Explanation:http://blogs.msdn.com/b/mvpawardprogram/archive/2013/03/18/virtual-directories-exchange- 2013.aspx

EWS virtual directory (Exchange Web Services)A virtual directory is used by Internet Information Services (IIS) to allow access to a web applications in Exchange 2013 Autodiscover Service, ECP, EWS,ActiveSync, OWA, OAB, Powershell are the available virtual directories through EAC.

Page 217: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

You can manage a variety of virtual directory settings on Exchange 2013 including authentication, security, and reporting settings. I am explaining here, how youcan manage the Virtual Directories through Exchange Admin Center. I have also included some example PowerShell cmdltes to show how to manage thoseresources:

Page 218: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

Page 219: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

Default settings on Virtual Directories in Exchange Server 2013 http://maybe-i-know-it.blogspot.com.au/2013/05/default-settings-on-virtual-directories.htmlAutodiscover[PS] C:\Windows\system32>get-autodiscovervirtualdirectory exch01\autodiscover* | fl name, internal*, external*, *authentication

Name: Autodiscover (Default Web Site)InternalAuthenticationMethods : {Basic, Ntlm, WindowsIntegrated, WSSecurity, OAuth} InternalUrl :ExternalAuthenticationMethods : {Basic, Ntlm, WindowsIntegrated, WSSecurity, OAuth} ExternalUrl :LiveIdNegotiateAuthentication : FalseWSSecurityAuthentication : TrueLiveIdBasicAuthentication : FalseBasicAuthentication : TrueDigestAuthentication : FalseWindowsAuthentication : TrueOAuthAuthentication : TrueAdfsAuthentication : FalseIIS FE: Anonymous, Basic, Windows AuthenticationIIS BE: Anonymous, Windows AuthenticationECP[PS] C:\Windows\system32>Get-ecpvirtualDirectory exch01\ecp* | fl name, internal*, external*, *authenticationName : ecp (Default Web Site)InternalAuthenticationMethods : {Basic, Fba}InternalUrl : https://exch01.contoso.com/ecpExternalUrl :ExternalAuthenticationMethods : {Fba}BasicAuthentication : TrueWindowsAuthentication : FalseDigestAuthentication : FalseFormsAuthentication : TrueLiveIdAuthentication : FalseAdfsAuthentication : FalseIIS FE: Anonymous, BasicIIS BE: Anonymous, BasicEWS[PS] C:\Windows\system32>Get-WebServicesVirtualDirectory exch01\ews* | fl name, internal*, external*,*authenticationName : EWS (Default Web Site)InternalNLBBypassUrl :InternalAuthenticationMethods : {Ntlm, WindowsIntegrated, WSSecurity, OAuth} InternalUrl : https://exch01.contoso.com/EWS/Exchange.asmxExternalAuthenticationMethods : {Ntlm, WindowsIntegrated, WSSecurity, OAuth} ExternalUrl :CertificateAuthentication :LiveIdNegotiateAuthentication :

Page 220: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

WSSecurityAuthentication : TrueLiveIdBasicAuthentication : FalseBasicAuthentication : FalseDigestAuthentication : FalseWindowsAuthentication : TrueOAuthAuthentication : TrueAdfsAuthentication : FalseIIS FE: Anonymous, BasicIIS BE: Anonymous, BasicMicrosoft-Server-ActiveSync[PS] C:\Windows\system32>Get-activesyncvirtualDirectory exch01\microsoft* | fl name, internal*, external*,*authenticationName : Microsoft-Server-ActiveSync (Default Web Site)InternalUrl : https://exch01.contoso.com/Microsoft-Server-ActiveSync InternalAuthenticationMethods : {}ExternalUrl :ExternalAuthenticationMethods : {}IIS FE: BasicIIS FE: BasicOAB[PS] C:\Windows\system32>Get-oabVirtualDirectory exch01\oab* | fl name, internal*, external*, *authenticationName : OAB (Default Web Site)InternalUrl : https://exch01.contoso.com/OABInternalAuthenticationMethods : {WindowsIntegrated}ExternalUrl :ExternalAuthenticationMethods : {WindowsIntegrated}BasicAuthentication : FalseWindowsAuthentication : TrueIIS FE: Windows AuthenticationIIS FE: Windows AuthenticationOWA[PS] C:\Windows\system32>Get-OwaVirtualDirectory exch01\owa* | fl name, internal*, external*,*authentication Name : owa (Default Web Site)InternalAuthenticationMethods : {Basic, Fba}InternalUrl : https://exch01.contoso.com/owaExternalUrl :ExternalAuthenticationMethods : {Fba}BasicAuthentication : TrueWindowsAuthentication : FalseDigestAuthentication : FalseFormsAuthentication : TrueLiveIdAuthentication : FalseAdfsAuthentication : False

Page 221: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

IIS FE: BasicIIS BE: Anonymous, Windows AuthenticationPowerShell[PS] C:\Windows\system32>Get-powershellvirtualDirectory exch01\powershell* | fl name, internal*, external*,*authentication Name : PowerShell (Default Web Site)InternalAuthenticationMethods : {}InternalUrl : http://exch01.contoso.com/powershellExternalAuthenticationMethods : {}ExternalUrl :CertificateAuthentication : TrueLiveIdNegotiateAuthentication : FalseWSSecurityAuthentication : FalseLiveIdBasicAuthentication : FalseBasicAuthentication : FalseDigestAuthentication : FalseWindowsAuthentication : FalseOAuthAuthentication : FalseAdfsAuthentication : FalseIIS FE: NoneIIS BE: Windows AuthenticationRPC

[PS] C:\>Get-outlookanywhere exch01\rpc* | fl name, internal*, external*, *authentication Name : Rpc (Default Web Site)InternalHostname : exch01.contoso.comInternalClientAuthenticationMethod : NtlmInternalClientsRequireSsl : FalseExternalHostname :ExternalClientAuthenticationMethod : NegotiateExternalClientsRequireSsl : FalseIIS FE: Basic, Windows AuthenticationIIS FE: Windows AuthenticationNOT A DNot related to a certificate issueNOT CYou may create a new Autodiscover site if your organization has multiple e-mail domains and each requires its own Autodiscover site and corresponding virtualdirectory, use the New- AutodiscoverVirtualDirectory cmdlet tocreate a new Autodiscover virtual directory under a new Web site.Not required in this scenario.If you were going to create a new Autodiscover site then you would have to delete the old one first.BNeed to modify the EWS virtual directory in order to create the external URL.E

Page 222: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

Need to modify the OAB virtual directory to create the External URL

http://technet.microsoft.com/en-us/library/bb123710(v=exchg.150).aspx http://technet.microsoft.com/en-us/library/bb232155(v=exchg.150).aspx http://technet.microsoft.com/en-us/library/bb125170(v=exchg.150).aspx

QUESTION 103You plan to deploy 20 Client Access servers that will have Exchange Server 2013 installed.

You need to prepare the certificate required for the planned deployment. The solution must ensure that the same certificate can be used on all of the Client Access

Page 223: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

servers.

What should you do first?

A. On one of the Client Access servers, run the New-ExchangeCertificate cmdlet and specify the privatekeyexportable parameter.B. On all of the Client Access servers, run the Get-ExchangeCertificate cmdlet.C. On one of the Client Access servers, run the New-ExchangeCertificate cmdlet and specify the binaryencoded parameter.D. On one of the Client Access servers, start the Certificates console and run the Certificate Import Wizard.

Correct Answer: ASection: [none]Explanation

Explanation/Reference:We need to create a new certificate. We make it exportable.

Note:Use the New-ExchangeCertificate cmdlet to create a self-signed certificate, renew an existing self-signed certificate, or generate a new certificate request forobtaining a certificate from a certification authority (CA).

QUESTION 104Contoso, Ltd., and Fabrikam, Inc., are partner companies.

Each company has an Exchange Server 2013 organization in a data center that is connected to the Internet. All of the Exchange servers in both of the organizationshave the Client Access server role and the Mailbox role installed.

The data centers connect to each other by using a redundant high-speed WAN link.

The following mail exchanger (MX) records are configured:* Contoso.com MX 10 mail.contoso.com* Fabrikam.com MX 10 mail.fabrikam.com

You need to recommend a solution for inbound mail flow.

The solution must meet the following requirements:* Users in both companies must receive email from the Internet if either of the Internet links fails.* Mail from the Internet to contoso.com must be received by mail.contoso.com if the Internet link at the Contoso data center is available.* Mail from the Internet to fabrikam.com must be received by mail.fabrikam.com if the Internet link at the Fabrikam data center is available.

Which two actions should you recommend? (Each correct answer presents part of the solution.Choose two.)

Page 224: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

A. Create the following DNS records:* Contoso.com MX 20 mail.fabrikam.com* Fabrikam.com MX 20 mail.contoso.com

B. Create the following DNS records:* Contoso.com MX 10 mail.fabrikam.com* Fabrikam.com MX 10 mail.contoso.com

C. For each organization, configure an internal relay domain and a Send connector.D. For each organization, configure an external relay domain and a Receive connector.E. Create the following DNS records:

* Contoso.com MX 5 mail.fabrikam.com* Fabrikam.com MX 5 mail.contoso.com

Correct Answer: ACSection: [none]Explanation

Explanation/Reference:A: Use a priority above 10.D:"Each company has an Exchange Server 2013 organization". We therefore need to configure an External relay. An Internal relay would be used if the two SMTPdomains were in the same Exchange organization. We also need to configure a Receive connector in each organization to allow the organization to receive emaildestined for the other organization.

QUESTION 105You have an Exchange Server 2013 organization that contains two servers. The servers are configured as shown in the following table.

EX1 and EX2 are members of a database availability group (DAG) named DAG1. You have a database named DB1 that replicates to EX1 and EX2.

EX1 fails.

You discover that DB1 does not mount on EX2.

You view the status of the mailbox databases as shown in the following table.

Page 225: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

You need to ensure that the database attempts to mount on EX2 if EX1 fails.

What should you change?

A. The AutoDatabaseMountDial setting to LosslessB. The AutoDatabaseMountDial setting to BestAvailabiltyC. The activation preference of DB1\EX2D. The activation preference of DB1\EX1

Correct Answer: BSection: [none]Explanation

Explanation/Reference:* The MailboxServer.AutoDatabaseMountDial property gets or sets the automatic database mount behavior for an Exchange server that is running the Mailboxserver role in a continuous replication environment after a database failover.

* The AutoDatabaseMountDial property specifies the automatic database mount behavior of a Mailbox server after a failover. Each behavior is based on the copyqueue length, or the number of logs that are recognized by the passive copy that need to be replicated. If the copy queue length is greater than the value specifiedfor the behavior, the database does not automatically mount. If the copy queue length is less than or equal to the value specified for the behavior, the Mailbox servertries to copy the remaining logs to the passive copy and mounts the database.

* BestAvailabilityThe database automatically mounts immediately after a failover if the queue length is less than or equal to 12.

Incorrect:Not A: LosslessThe database does not automatically mount until all logs generated on the active device are copied to the passive device

QUESTION 106Your company has a data center in New York and a data center in Miami. The company has an Exchange Server 2013 organization that contains a databaseavailability group (DAG). The DAG contains servers in both data centers.

Page 226: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

The company plans to deploy Outlook Anywhere to all users.

You configure the following:All of the Exchange Server 2013 virtual directories in the New York data center use a host name ofmail.contoso.com.All of the Exchange Server 2013 virtual directories in the Miami data center use a host name ofmiami.mail.contoso.com.In each data center, a certificate from an enterprise certification authority (CA) is configured to contain the following:o A certificate principal name of mail.contoso.como Subject alternate names of mail.contoso.com andmiami.mail.contoso.com

You need to recommend which task must be performed to meet the following requirements:Users always must attempt to connect first to a server in the data center where their mailbox is located.Users must be able to access their mailbox if a single data center fails.

What should you recommend?

A. Change the external host name of the Miami data center to mail.contoso.com.B. Modify the ExternalUrl of the Autodiscover virtual directory of the Client Access servers.C. Run the Set-OutlookProvider cmdlet.D. Run the Add-AvailabilityAddressSpace cmdlet.

Correct Answer: BSection: [none]Explanation

Explanation/Reference:* The Set-OutlookProvider cmdlet creates the global settings for the Autodiscover service. It sets the AutoDiscoverConfig object under the Global Settings object inActive Directory and sets the attributes specified in the parameters listed in the Parameters section.

* The AutoDiscover feature in Exchange 2007/2010 is often overlooked during setup but is an important factor in ensuring smooth day to day running of yourExchange environment. Its main function is to provide the mail client with all the configuration options it needs, from only the user's email address and password.This is particularly useful for remote users and smartphone users, who no longer have to enter advanced settings like server names and domains. It is also vital forthe correct functioning of features such as Out Of Office and the Offline Address Book in Outlook.

QUESTION 107Your company, Fabrikam Inc., has an Exchange Server 2013 organization. The organization that contains three servers named Server1, Server2, and Server3.Server1 and Server2 are members of a database availability group (DAG) named DAG1.

DAG1 contains two mailbox databases. All databases are active on Server1 and replicate to Server2.

Page 227: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

You start an unplanned maintenance on Server1 and shut down Server1. You discover that the databases do not mount on Server2. You restart Server1 and thedatabases mount automatically on Server1.

You need to identify what prevents the databases from switching over successfully to Server2.

Which cmdlet should you run?

A. Test-ReplicationHealthB. Test-OutlookConnectivityC. Test-ServiceHealthD. Get-AvailabilityReportOutage

Correct Answer: ASection: [none]Explanation

Explanation/Reference:The cmdlet is designed for the proactive monitoring of continuous replication and the continuous replication pipeline, the availability of Active Manager, and thehealth and status of the underlying cluster service, quorum, and network components. The Test-ReplicationHealth cmdlet can be run locally or remotely against anyMailbox server in a DAG.

NOT BTest-OutlookConnectivityUse the Test-OutlookConnectivity cmdlet to test end-to-end Microsoft Outlook client connectivity in the Microsoft Exchange Server 2013 organization. This includestesting for Outlook Anywhere (RPC/HTTP) connections.

EXAMPLE 1This example runs a protocol test from the Mailbox server. Test-OutlookConnectivity -ProbeIdentity "OutlookSelfTestProbe"

NOT CUse the Test-ServiceHealth cmdlet to test whether all the Microsoft Windows services that Exchange requires on a server have started.

The Test-ServiceHealth cmdlet returns an error for any service required by a configured role when the service is set to start automatically and isn't currently running.EXAMPLE 1This example uses the Test-ServiceHealth command without parameters to test the services on the local server.

Test-ServiceHealthNOT DUse the Get-AvailabilityReportOutage cmdlet to return the daily downtime (if any) for each service entity and its overridden value (if set) to the overall reportedavailability for the day.

Page 228: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

For information about the parameter sets in the Syntax section below, see Syntax.

This example returns all outages that occurred the previous day. This cmdlet always returns outages for one day.

Get-AvailabilityReportOutageTest-ReplicationHealth: Exchange 2013 Help

QUESTION 108You have an Exchange Server 2010 organization named adatum.com. You deploy a server that has Exchange Server 2013 installed. You plan to install eightadditional servers that have exchange Server 2013 installed. You are a member of the Organization Management role group. You hire a temporary Exchangeadministrator named Temp1.

The company`s security policy states that all external consultants must have the minimum number of required permissions on the network.

You need to ensure that Temp1 can install a server named Server5. The solution must meet the requirements of the security policy.

Which two tasks should you perform? (Each correct answer presents part of the solution. Choose two.)

A. Run setup and specify the /newprovisionedserver:Server5 parameter.B. Add Temp1 to the Delegated Setup management role group.C. Add Temp1 to the Exchange Server role group.D. Create a new management role and a new role assignment policy.E. Run setup and specify the /roles:temp1 parameter

Correct Answer: ABSection: [none]Explanation

Explanation/Reference:Explanation:NOT CUnable to install a server given this management roleThe Exchange Servers management role enables administrators to do the following on individual servers:Add and remove database availability groups and configure database copies Enable, disable and configure Unified Messaging services Modify transportconfiguration on Mailbox and Client Access servers Enable and disable Microsoft Outlook Anywhere on Client Access servers Modify Mailbox and Client Accessserver configurationModify Outlook Anywhere configuration on Client Access servers Modify content filtering configuration on Mailbox servers Modify general Exchange serverconfigurationModify server monitoring configurationView the configuration for each server role

Page 229: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

This management role is one of several built-in roles in the Role Based Access Control (RBAC) permissions model in Microsoft Exchange Server 2013.Management roles, which are assigned to one or more management role groups, management role assignment policies, users, or universal security groups (USG),act as a logical grouping of cmdlets or scripts that are combined to provide access to view or modify the configuration of Exchange 2013 components, such asmailbox databases, transport rules, and recipients. If a cmdlet or script and its parameters, together called a management role entry, are included on a role, thatcmdlet or script and its parameters can be run by those assigned the role. For more information about management roles and management role entries, seeUnderstanding Management Roles.

NOT DNo need to create a new management role

NOT ENeed to use the /NewProvisionedServer parameter setup /roles command is OK for exchange With temp1 appears to be an invalid command and not applicable toexchange 2013

ATo delegate setup, you must first run Setup.com from a Command Prompt window with the / NewProvisionedServer parameter.

This will not install Exchange on the server, but instead will create a placeholder object for the server in Active Directory and will add the machine account for thisserver to the Exchange Servers group.

BNeed to Add Temp1 to the Delegated Setup management role group.

Delegated Setup management role groupThe Delegated Setup management role group is one of several built-in role groups that make up the Role Based Access Control (RBAC) permissions model inMicrosoft Exchange Server 2013. Role groups are assigned one or more management roles that contain the permissions required to perform a given set of tasks.The members of a role group are granted access to the management roles assigned to the role group. For more information about role groups, see UnderstandingManagement Role Groups.

Administrators who are members of the Delegated Setup role group can deploy servers running Exchange 2013 that have been previously provisioned by amember of the Organization Management role group.

Members of the Delegated Setup role group can only deploy Exchange 2013 servers. They can't manage the server after it's been deployed.To manage a server after it's been deployed, a user must be a member of the Server Management role group.For more information about RBAC, see Understanding Role Based Access Control.Delegated Setup: Exchange 2013 Help

QUESTION 109You have an Exchange Server 2013 organization that contains two servers named EX1 and EX2. EX1 and EX2 are the members of a database availability group(DAG) named DAG1.

Page 230: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

EX1 and EX2 each contain a copy of a mailbox database named DB1. DB1 is configured to retain deleted items for 120 days.

At the end of each month, the mailbox databases on EX1 are backed up to tape. The monthly backups are retained for two years.A user named User1 has a mailbox in DB1.

User1 discovers that a mailbox folder that contained important email messages was deleted more than six months ago.

You need to recover the deleted mailbox folder without affecting any other users who have mailboxes in DB1.

Which three actions should you perform? (Each correct answer presents part of the solution.Choose three.)

A. Run the New-MaiboxRestoreRequest cmdlet.B. Run the New-MailboxDatabase cmdlet and specify the Recovery parameter.C. Restore DB1 from the tape backup to an alternate location.D. Restore DB1 from the tape backup to the database`s original location.E. Run the New-Mailbox cmdlet and specify the Recovery parameter.

Correct Answer: ABCSection: [none]Explanation

Explanation/Reference:Explanation:Recovery DatabaseA recovery database is a special kind of mailbox database that allows you to mount a restored mailbox database and extract data from the restored database aspart of a recovery operation. You can use the New-MailboxRestoreRequest cmdlet to extract data from a recovery database. After extraction, the data can beexported to a folder or merged into an existing mailbox. Recovery databases enable you to recover data from a backup or copy of a database without disturbinguser access to current data.

ANew-MaiboxRestoreRequestcmdletUse the New-MailboxRestoreRequest cmdlet to restore a soft-deleted or disconnected mailbox. This cmdlet starts the process of moving content from the soft-deleted mailbox, disabled mailbox, or any mailbox in a recovery database into a connected primary or archive mailbox.

For information about the parameter sets in the Syntax section below, see Syntax.

EXAMPLE 1To create a restore request, you must provide the DisplayName, LegacyDN, or MailboxGUID for the softdeleted or disabled mailbox. This example uses the Get-MailboxStatistics cmdlet to return the DisplayName, LegacyDN, MailboxGUID, and DisconnectReason for all mailboxes on mailbox database MBD01 that have adisconnect reason of SoftDeleted or Disabled.

Page 231: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

Get-MailboxStatistics -Database MBD01 | Where { $_.DisconnectReason -eq "SoftDeleted" -or $_.DisconnectReason -eq "Disabled" } | Format-List LegacyDN, DisplayName, MailboxGUID, DisconnectReasonThis example restores the source mailbox with the MailboxGUID 1d20855f-fd54-4681-98e6- e249f7326ddd on mailbox database MBD01 to the target mailbox withthe alias Ayla. New-MailboxRestoreRequest -SourceDatabase "MBD01" -SourceStoreMailbox 1d20855f-fd54- 4681-98e6-e249f7326ddd -TargetMailbox Ayla

BUse the New-MailboxDatabase cmdlet to create a mailbox database object in the database container in Active Directory.For information about the parameter sets in the Syntax section below, see Syntax.EXAMPLE 1

This example creates the mailbox database MailboxDatabase01. This example also specifies where to create the .edb database file, which is different than thedefault location.

New-MailboxDatabase -Name "MailboxDatabase01" -EdbFilePathD:\DatabaseFiles\MailboxDatabase01.edbThe Recovery parameter specifies that the new database is designated as a recovery database.

NOT DNeed to recover data from a backup or copy of a database without disturbing user access to current data.Therefore restore to an alternate location.

NOT ENo recovery parameter exists for the New-Mailbox cmdlet.Reference: Create a Recovery Database

Reference: Restore Data Using a Recovery Database

QUESTION 110You have an Exchange Server 2010 organization.

All users connect to their mailbox by using Microsoft Outlook 2013 and Outlook Web App. All client connections to Exchange Server use the namemail.contoso.com.

You deploy Exchange Server 2013 to the organization, you move all of the users to Exchange Server 2013, and then you decommission all of the Exchange Server2010 servers.

The users report that when they open Outlook 2013, they receive a certificate warning message. The users do not receive a certificate error message or acertificate warning message when they open Outlook Web App.

You need to prevent the certificate warning message from occurring when the users open Outlook 2013.Which cmdlet should you run?

Page 232: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

A. Set-ClientAccessServerB. New-ExchangeCertficiateC. New-ClientAccessArrayD. Import-ExchangeCertificate

Correct Answer: ASection: [none]Explanation

Explanation/Reference:Explanation:UNABLE TO ASSOCIATE SET-CLIENTACCESSSERVER WITH CERTIFICATE ERROR D LOOKS LIKE A BETTER RESPONSE.IMPORT THE SSL CERTIFICATE AND THEN ASSIGN IT TO OUTLOOK 2013 Self-signed CertificateWhen you install Exchange 2013, a self-signed certificate is automatically configured on the Mailbox servers. A self-signed certificate is signed by the applicationthat created it. The subject and the name of the certificate match. The issuer and the subject are defined on the certificate. This self-signed certificate is used toencrypt communications between the Client Access server and the Mailbox server. The Client Access server trusts the self-signed certificate on the Mailbox serverautomatically, so no third-party certificate is needed on the Mailbox server. When you install Exchange 2013, a self-signed certificate is also created on the ClientAccess server. This self-signed certificate will allow some client protocols to use SSL for their communications.Exchange

ActiveSync and Outlook Web App can establish an SSL connection by using a self-signed certificate.Outlook Anywhere won't work with a self-signed certificate on the Client Access server. Self- signed certificates must be manually copied to the trusted rootcertificate store on the client computer or mobile device. When a client connects to a server over SSL and the server presents a self-signed certificate, the client willbe prompted to verify that the certificate was issued by a trusted authority. The client must explicitly trust the issuing authority. If the client confirms the trust, thenSSL communications can continue.

Note:By default, the digital certificate installed on the Mailbox server or servers is a self-signed certificate. You don`t need to replace the self-signed certificate on theMailbox servers in your organization with a trusted third-party certificate. The Client Access server automatically trusts the self-signed certificate on the Mailboxserver and no other configuration is needed for certificates on the Mailbox server.

Outlook 2013When connecting to an Exchange server using Outlook 2013 you may encounter an SSL trust error.This error occurs when the Exchange server is configured with a self-signed SSL certificate. Outlook makes connections to the Exchange server over HTTPS andtherefore must trust the SSL certificate that is configured on the server, otherwise it will display those error messages to the end user.

To resolve the issue install a valid SSL certificate on the Exchange server from a trusted certificate authority.

See Exchange Server 2013 SSL certificates for more details on this as well as step by step instructions.

Page 233: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

ASet-ClientAccessServerUse the Set-ClientAccessServer cmdlet to set properties on specified Client Access server objects.For information about the parameter sets in the Syntax section below, see Syntax.

EXAMPLE 1This example sets two properties on the Client Access server CAS-01. Set-ClientAccessServer -Identity "CAS-01" -AutoDiscoverServiceInternalUri "https://cas01.contoso.com/autodiscover/autodiscover.xml" -AutoDiscoverSiteScope "Mail"

EXAMPLE 2This example sets two properties on the Client Access server CASMail. Set-ClientAccessServer -Identity "CASMail" -AutoDiscoverServiceInternalUri "https://casmail.contoso.com/autodiscover/autodiscover.xml" -AutoDiscoverSiteScope "Mail"

NOT BNew-ExchangeCertficiateNot an Exchange 2013 command or any other Exchange version command

NOT CExchange 2010 commandUse the New-ClientAccessArray cmdlet to create an object that represents a load balanced array of Client Access servers within a single Active Directory site.

EXAMPLE 1This example creates the Client Access server array server.contoso.com. New-ClientAccessArray -Fqdn server.contoso.com -Site "Redmond" -Name"server.contoso.com"

NOT DExchange 2013 commandUse the Import-ExchangeCertificate cmdlet to import a certificate or chain of certificates. For information about the parameter sets in the Syntax section below, seeSyntax.EXAMPLE 1This example imports an existing certificate and private key from the PKCS #12 file ExportedCert.pfx.

Import-ExchangeCertificate -FileData ([Byte[]]$(Get-Content -Pathc:\certificates\ExportedCert.pfx -Encodingbyte -ReadCount 0)) -Password:(Get-Credential).password

QUESTION 111Your network contains an Active Directory forest. The forest contains two sites named Montreal and New York.

You have an Exchange Server 2013 organization that contains a Mailbox server and a Client Access server in each site.

Page 234: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

The users in the New York site report that the offline address book (OAB) is not updated after an extended WAN outage between the sites.

The Montreal site contains the OAB generation server.

You need to ensure that the New York site users download the OAB from a server in the New York site.

Which two cmdlets should you run? (Each correct answer presents part of the solution. Choose two.)

A. Set-MailboxB. New-OfflineAddressBookC. New-MailboxD. New-OabVirtualDirectoryE. Set-OfflineAddressBook

Correct Answer: ACSection: [none]Explanation

Explanation/Reference:Creating a new Organization Mailbox is a two step process:Step1: Create a new arbitration mailboxNew-Mailbox -Arbitration -Name "OAB Seattle" -Database DB2Seattle -UserPrincipalName [email protected] DisplayName OAB Mailbox for Seattle

Step2: Enable OABGen capabilitySet-Mailbox -Arbitration oabs -OABGen $truehttp://technet.microsoft.com/en-us/library/aa997663(v=exchg.150).aspx http://technet.microsoft.com/en-us/library/bb123981(v=exchg.150).aspx

QUESTION 112You have an Exchange Server organization. The organization contains servers that have either Exchange Server 2010 or Exchange Server 2013 installed.

You hire a junior administrator named Admin5. Admin5 is a member of the Recipient Management management role group.You discover that Admin5 created two new mailbox-enabled users by using the New-Mailbox command.

You need to identify which management role provides Admin5 with the permissions to create new mailbox-enabled users.

Page 235: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

http://www.gratisexam.com/

Which cmdlets should you run?

A. Get-ManagementRoleEntry and Get-RoleAssignmentPolicyB. Get-Rolegroup and Get-ManagementRoleAssignmentC. Get-ManagementRoleEntry and Get-ManagementRoleAssignmentD. Get-RolegroupMember and Get-ManagementRoleAssignment

Correct Answer: CSection: [none]Explanation

Explanation/Reference:* Use the Get-ManagementRoleEntry cmdlet to retrieve management role entries that have been configured on management roles.

* Use the Get-ManagementRoleAssignment cmdlet to retrieve management role assignments.

QUESTION 113You have an Exchange Server 2013 organization that contains one Client Access server named EX1 and one Mailbox server named EX2.

You have a perimeter network and an internal network. The perimeter network contains an Edge Transport server named EX3 that has Exchange Server 2010installed.

You need to ensure that all of the email messages sent to and received from the Internet are routed through the EX3. Which three actions should you perform?(Each correct answer presents part of the solution. Choose three.)

A. Allow SMTP traffic between EX3 and EX2.B. Create an Edge Subscription.C. Allow traffic over TCP 50636 from EX1 to EX3.D. Allow SMTP traffic between EX3 and EX1.E. Allow traffic over TCP 50636 from EX2 to EX3.F. Modify the default Receive connector on EX2.

Page 236: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

Correct Answer: ABESection: [none]Explanation

Explanation/Reference:To establish Internet mail through an Edge Transport server, subscribe the Edge Transport server to an Active Directory site. This automatically creates the twoSend connectors required for Internet mail flow:A Send connector configured to send outbound email to all Internet domains. A Send connector configured to send inbound email from the Edge Transport serverto an Exchange 2013 Mailbox server.

SMTP traffic and ports TCP 50636 must be allowed between the mailbox server (routing service) and the Edge server.

QUESTION 114You are an administrator for a company named Contoso, Ltd.

Contoso has an Exchange Server 2013 organization.

Contoso has a partnership agreement with a company named A. Datum Corporation. A. Datum has an Exchange server 2013 organization.

Both organizations have a federation trust to the Microsoft Federation Gateway. Users at Contoso plan to share their free/busy information with users at A. Datum.

You need to recommend which tasks must be performed to ensure that the A. Datum users can see the free/busy information of the Contoso users.

Which two actions should you recommend? (Each correct answer presents part of the solution.Choose two.)

A. In the Exchange Server organization of Contoso, configure directory synchronization.B. In the Exchange Server organization of A. Datum, create a sharing policy.C. In the Exchange Server organization of A. Datum, configure directory synchronization.D. In the Exchange Server organization of Contoso, create an organization relationship.E. In the Exchange Server organization of Contoso, create a sharing policy.F. In the Exchange Server organization of A. Datum, create an organization relationship.

Correct Answer: DESection: [none]Explanation

Explanation/Reference:Business-to-business calendar sharing is set up by creating organization relationships. User-to- user calendar sharing is set up by applying sharing policies.

Page 237: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

There is no requirement for Contoso users to view the free/busy information of the A.Datum users. Therefore, we don't need to create an organization relationshipin A.Datum.

Configure Federated SharingStep 1: Create and configure a federation trust(this has already been done here)Step 2 (D): Create an organization relationshipAn organization relationship enables users in your Exchange organization to share calendar free/busy information as part of federated sharing with other federatedExchange organizations.

Step 3 (E): Create a sharing policySharing policies enable user-established, people-to-people sharing of both calendar and contact information with different types of external users. They support thesharing of calendar and contact information with external federated organizations, external non-federated organizations, and individuals with Internet access. If youdon't need to configure people-to-people or contact sharing (organization-level sharing only), you don't need to configure a sharing policy.Step 4: Configure an Autodiscover public DNS record

Note:With federated sharing, users in your on-premises Exchange organization can share free/busy calendar information with recipients in other Exchange organizationsthat are also configured for federated sharing. Free/busy sharing can be enabled between two organizations running Exchange 2013 and also betweenorganizations with a mixed Exchange deployment.

QUESTION 115You have a database availability group (DAG). The DAG is configured as shown in the following table.

You need to prevent a split-brain condition if a restore operation of the DAG occurs.

What should you do?

Page 238: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

A. Deploy an alternate witness server to each site.B. Modify the Datacenter Activation Coordination (DAC) mode.C. Set the quorum model of the cluster to Node and Disk Majority.D. Deploy another Mailbox server to Site2.

Correct Answer: BSection: [none]Explanation

Explanation/Reference:Datacenter Activation Coordination (DAC) mode is a property setting for a database availability group (DAG). DAC mode is disabled by default and should beenabled for all DAGs with two or more members that use continuous replication.

If a catastrophic failure occurs that affects the DAG (for example, a complete failure of one of the datacenters), DAC mode is used to control the startup databasemount behavior of a DAG. When DAC mode isn't enabled and a failure occurs that affects multiple servers in the DAG, and then when a majority of the DAGmembers are restored after the failure, the DAG will restart and attempt to mount databases. In a multi-datacenter configuration, this behavior could cause splitbrain syndrome, a condition that occurs when all networks fail, and DAG members can't receive heartbeat signals from each other. Split brain syndrome can alsooccur when network connectivity is severed between datacenters. Split brain syndrome is prevented by always requiring a majority of the DAG members (and in thecase of DAGs with an even number of members, the DAG's witness server) to be available and interacting for the DAG to be operational. When a majority of themembers are communicating, the DAG is said to have quorum.

QUESTION 116You have a hybrid deployment of Exchange Server 2013 and Microsoft Office 365. The Exchange Server organization has a mailbox size limit of 2 GB.

You need to provide engineers with the ability to retain certain email messages indefinitely. The solution must meet the following requirements:Ensure that the engineers can access the retained email messages by using Outlook Web App.Ensure that the retained email messages do not apply to the mailbox size limit of the engineers.Minimize the storage requirements of the on-premises servers.

Which two actions should you perform? (Each correct answer presents part of the solution.Choose two.)

A. From Office 365, create Archive mailboxes.B. Instruct the engineers to create a personal folder.C. Create a retention policy.D. From the on-premises Exchange Server 2013 organization, create Archive mailboxes.E. Create a data loss prevention (DLP) policy.

Correct Answer: AC

Page 239: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

Section: [none]Explanation

Explanation/Reference:C:

A:

In Exchange Server an archive mailbox is a second mailbox provisioned for a user that is separate to their primary user mailbox.

QUESTION 117You have an Exchange Server organization that contains four servers. The servers are configured as shown in the following table.

Page 240: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

You are deploying Unified Messaging (UM).

You create a dial plan named UMPlan1 and a UM mailbox policy named UMPlan Mailbox Policy.

You need to ensure that all voice mail sent to the existing extension of a user is delivered to the user's mailbox.

Which three actions should you perform? (Each correct answer presents part of the solution.Choose three.)

A. Create a UM hunt groupB. Create a UM IP gateway.C. Configure the IP-PBX to route calls to EX3 and EX4D. Configure the IP-PBX to route calls to EX I and EX2.E. Assign EX I and EX2 to UMPlan1.F. Assign EX3 and EX4 to UMPlan1.

Correct Answer: ABCSection: [none]Explanation

Explanation/Reference:* When you're setting up Unified Messaging (UM), you must configure the IP PBXs on your network to communicate with the Client Access servers running theMicrosoft Exchange Unified Messaging Call Router service and the Mailbox servers running the Microsoft Exchange Unified Messaging service in your Exchangeorganization. You must also configure the Client Access and Mailbox servers to communicate with the IP PBXs.C: A Unified Messaging (UM) IP gateway represents a physical Voice over IP (VoIP) gateway, IP Private Branch eXchange (PBX), or session border controller(SBC) hardware device.

* Here are the basic steps for connecting VoIP gateways, IP PBXs, SIP-enabled PBXs, or SBCs to Client Access and Mailbox servers:Step 1: Install the Client Access and Mailbox servers in your organization. Step 2: Create and configure a Telephone Extension, SIP URI, or E.164 UM dial plan.Step 3: Create and configure a UM IP gateway. You must create and configure a UM IP gateway for each VoIP gateway, IP PBX, SIP-enabled PBX, or SBC that willbe accepting incoming calls and sending outgoing calls.

Page 241: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

Step 4: Create a new UM hunt group if needed. If you create a UM IP gateway and don't specify a UM dial plan, a UM hunt group will be automatically created.

Incorrect:

B, D:The question states, "You need to ensure that all voice mail sent to the existing extension of a user is delivered to the user's mailbox". The dial plan is therefore aTelephone Extension dial plan. Client Access and Mailbox servers cannot be associated with Telephone Extension or E.164 dial plans.

QUESTION 118You have an Exchange Server 2013 organization.

You successfully migrate the public folders from a previous version of Exchange Server. You discover that one of the public folder mailboxes almost reached itsquota size.

You need to move some of the public folders in the public folder mailbox to another public folder mailbox.

What should you run?

A. Update-PublicFolderMailboxB. New-PublicFolderMoveRequestC. New-PublicFolderMigrationRequestD. Set-PublicFolderMailbox

Correct Answer: BSection: [none]Explanation

Explanation/Reference:* If the content of a public folder mailbox begins to exceed your mailbox quotas, you may need to move public folders to a different public folder mailbox. There area couple ways to do this. To move one or more public folders that don't contain subfolders, you can use the PublicFolderMoveRequest cmdlets.

http://www.gratisexam.com/

Page 242: Microsoft.PracticeTest.70-342.v2016-02-21.by.Daniel · / There is a UM dial plan named UM1. * The Protected Voice Mail feature is available with Exchange 2010 and later versions of

http://www.gratisexam.com/

* Use the New-PublicFolderMoveRequest cmdlet to begin the process of moving public folder contents between public folder mailboxes. Moving public folders onlymoves the physical contents of the public folder; it doesn't change the logical hierarchy. When the move request is completed, you must run the Remove-PublicFolderMoveRequest cmdlet to remove the request or wait until the time specified in the CompletedRequestAgeLimit parameter has passed. The request mustbe removed before you can run another move request.

Incorrect:Not A: Use the Update-PublicFolderMailbox cmdlet to update the hierarchy for public folders. Not C: Use the New-PublicFolderMigrationRequest cmdlet to begin theprocess of migrating public folders from Microsoft Exchange Server 2007 or Exchange Server 2010 to Exchange Server 2013.

Reference: Move a Public Folder to a Different Public Folder Mailbox