Advanced Solutions of Microsoft Exchange Server 2013
Question No: 51 DRAG DROP – (Topic 6)
You company has offices in the United States and Germany.
Each office contains several servers that have Exchange Server 2013 installed. The Exchange Server organization is configured for Unified Messaging (UM). Each office contains an IP-PBX device.
You need to ensure that callers to the German office can navigate the voice mail system menu in German.
In which sequence should you perform the actions? (To answer, move all of the actions from the list of actions to the answer area and arrange them in the correct order.)
Question No: 52 – (Topic 6)
You are a network administrator for a company named Humongous Insurance. Humongous Insurance has an Active Directory forest that contains two domains.
You install the Active Directory Rights Management Services server role on a server named ADRMS1. The Active Directory Rights Management Services (AD RMS) server uses an internal certification authority (CA) for all certificates.
You plan to provide users with the ability to use AD RMS to protect all of the email messages sent to a partner company named Contoso, Ltd.
Contoso does not have AD RMS deployed.
You need to identify which components from the Humongous Insurance network must be accessible to Contoso to ensure that the users at Contoso can open protected messages.
Which two components should you identify? (Each correct answer presents part of the solution. Choose two.)
the AD RMS cluster
the certificate revocation list (CRL)
the Active Directory domain controllers
the Client Access servers
the Mailbox servers
the Global Catalog servers
Answer: B,C Explanation:
B: The CRL is exactly what its name implies: a list of subscribers paired with digital certificate status. The list enumerates revoked certificates along with the reason(s) for revocation. The dates of certificate issue, and the entities that issued them, are also included. In addition, each list contains a proposed date for the next release. When a potential user attempts to access a server, the server allows or denies access based on the CRL entry for that particular user.
C: If federation cannot be implemented and the external organization cannot implement their own AD RMS infrastructure, hosting the user accounts can be the best option.
However, the cost of managing such accounts (for both the IT department and each user) must be considered.
In this case, the users will need to be authenticated by a domain controller.
Question No: 53 – (Topic 6)
You have an Exchange Server organization. The organization contains servers that have either Exchange Server 2010 or Exchange Server 2013 installed.
You hire a new helpdesk technician named helpdesk1. Helpdesk1 is a member of the Recipient Management management role group.
You discover that helpdesk1 created nine new mailbox-enabled users by using the New- Mailbox command.
You need to identify which management role provides helpdesk1 with the permissions to create new mailbox-enabled users.
Which cmdlets should you run?
Get-ManagementRoleEntry and Get-ManagementRoleAssignment
Get-RolegroupMember and Get-ManagementRoleAssignment
Get-ManagementRoleEntry and Get-RoleGroup
Get-Rolegroup and Get-RoleGroupMember
Answer: A Explanation:
Use the Get-ManagementRoleEntry cmdlet to retrieve management role entries that have been configured on management roles.
Use the Get-ManagementRoleAssignment cmdlet to retrieve management role assignments.
Question No: 54 – (Topic 6)
You have an Exchange Server 2013 organization that contains multiple Hub Transport servers. You need to recommend a message hygiene solution to| meet the following requirements:
Block servers that are known to send spam
Minimize administrative effort What should you recommend?
an IP Block list
IP Block list providers
Question No: 55 – (Topic 6)
You have an Exchange Server 2013 Organization. You plan to use the documentation fingerprinting.
You need to identify which file type cannot be used as a template for document fingerprinting.
Which document type should you identify?
Question No: 56 – (Topic 6)
You have a server named Server1 that has Exchange Server 2013 installed.
Users access their mailbox by using Microsoft Outlook 2010 and Outlook Web App. You enable auditing for all of the mailboxes.
You need to identify when a mailbox is accessed by someone other than the owner of the mailbox.
What are two possible ways to achieve this goal? (Each correct answer presents a complete solution. Choose two.)
Export the administrator audit log.
Run an administrator role group report.
Export the mailbox audit log.
Run a non-owner mailbox access report.
Review the security event log.
Answer: C,D Explanation:
C: Use the Auditing tab to run reports or export entries from the mailbox audit log and the administrator audit log.
/ The mailbox audit log records whenever a mailbox is accessed by someone other than the person who owns the mailbox. This can help you determine who has accessed a mailbox and what they have done.
/ The administrator audit log records any action, based on a Windows PowerShell cmdlet, performed by an administrator. This can help you troubleshoot configuration issues or identify the cause of security- or compliance-related problems.
D: Run a Non-Owner Mailbox Access Report
Use this report to find mailboxes that have been accessed by someone other than the person who owns the mailbox.
Question No: 57 – (Topic 6)
You have an Exchange Server 2013 organization.
You successfully migrate the public folders from a previous version of Exchange Server. You discover that one of the public folder mailboxes almost reached its quota size.
You need to move some of the public folders in the public folder mailbox to another public folder mailbox.
What should you run?
Answer: A Explanation:
Splits the given public folder mailbox based on the size of the folders.
If the content of a public folder mailbox begins to exceed your mailbox quotas, you may need to move public folders to a different public folder mailbox. There are a couple ways to do this. To move one or more public folders that don’t contain subfolders, you can use the PublicFolderMoveRequest cmdlets.
Reference: Move a Public Folder to a Different Public Folder Mailbox
Question No: 58 DRAG DROP – (Topic 6)
You have an Exchange Server 2013 organization and a Microsoft Lync Server 2013 infrastructure.
You plan to implement voice mail for all users.
You need to prepare the environment for the planned implementation.
Which tool should you run in each environment? (To answer, drag the appropriate tool to the correct environment or environments. Each tool may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.)
Question No: 59 DRAG DROP – (Topic 6)
You have a server that has Exchange Server 2013 installed. You plan to deploy Unified Messaging (UM) to all users.
You have two UM IP gateways named GW1 and GW2.
You create, and then associate a new UM dial plan for each IP gateway. The IP gateways are configured as shown in the following table.
You need to recommend a solution that meets the following security requirements:
->All voice traffic received by GW1 must be encrypted.
->All voice traffic received by GW2 must be unencrypted.
->All signaling traffic to GW1 and GW2 must be encrypted.
Which security settings should you recommend configuring for each dial plan?
To answer, drag the appropriate security setting to the correct UM dial plan in the answer area. Each security setting may be used once, more than once, or not at all. Additionally, you may need to drag the split bar between panes or scroll to view content.
Question No: 60 – (Topic 6)
You have an Exchange Server 2013 organization that is integrated with Microsoft Lync Server 2013.
You need to get a list of all the calls received and placed by a user named User1 during the last 90 days.
Which cmdlet should you use?
Answer: C Explanation:
The Get-UMCallDataRecord cmdlet displays UM call data records for the last 90 days for a UM-enabled mailbox that you specify. Each UM call data record provides detailed information about all calls either placed to or received by the specified user.
|Lowest Price Guarantee||Yes||No||No|
|Free VCE Simulator||Yes||No||No|