Ensurepass.com : Ensure you pass the IT Exams
2018 Jan Microsoft Official New Released 70-342
100% Free Download! 100% Pass Guaranteed!
http://www.EnsurePass.com/70-342.html
Advanced Solutions of Microsoft Exchange Server 2013
Question No: 21 – (Topic 3)
You are evaluating the implementation of the organization relationship.
You need to recommend which tasks must be performed to ensure that the Contoso users can view the Out of Office message of the Tailspin Toys users before the Contoso users send a message to the Tailspin Toys users.
What should you recommend doing before implementing the organization relationship?
-
Create a Policy Tip.
-
Upgrade all of the client computers to Outlook 2010.
-
Create a MailTip.
-
Publish the Autodiscover service of Tailspin Toys.
-
Create a remote domain.
Answer: B
Explanation: * Scenario: Implement an organization relationship between Contoso and Tailspin Toys.
Question No: 22 DRAG DROP – (Topic 3)
You need to implement a solution to meet the security requirement for the temporary employees.
You deploy an Active Directory Rights Management Services (AD RMS) cluster, and then you run the Set-IRMConfiguration cmdlet.
Which three actions should you perform?
To answer, move the three appropriate actions from the list of actions to the answer area and arrange them in the correct order.
Answer:
Question No: 23 – (Topic 3)
You need to recommend which tasks must be performed to meet the security requirements for Tailspin Toys.
Which two tasks should you recommend? (Each correct answer presents part of the solution. Choose two.)
-
Run the set-transportserver -transportsyncenabled $true command.
-
Run the set-transportconfig -tlsreceivedomainsecurelist tailspintoys.com command.
-
Run the set-transportservice -transportsyncenabled $true command.
-
Create a new Receive connector.
-
Create a new Send connector.
Answer: B,D Explanation:
Scenario:
Secure all of the email messages from the users at Tailspin Toys to the Contoso users. Ensure that all of the messages can be secured if the certificates at Tailspin Toys are issued by a trusted third-party certification authority (CA).
Configuring Domain Security on Exchange Server 2013
-
Establish certificate trust between organizations
-
Configure Domain Security
TLSReceiveDomainSecureList – specifies the domains from which you want to receive domain secured email by using mutual Transport Layer Security (TLS) authentication.
-
Configure connectors
Reference: Configuring Domain Security on Exchange Server 2013
Question No: 24 DRAG DROP – (Topic 3)
The Montreal data center experiences a power failure.
You need to ensure that all the users can access their mailbox. Which three actions should you perform?
To answer, move the three appropriate actions from the list of actions to the answer area and arrange them in the correct order.
Answer:
Question No: 25 DRAG DROP – (Topic 3)
You need to create a federation trust for the planned organization relationship.
Which three actions should you perform?
To answer, move the three appropriate actions from the list of actions to the answer area and arrange them in the correct order.
Answer:
Question No: 26 – (Topic 3)
You need to identify which technologies must be deployed to meet the Office 365 coexistence requirements.
Which two technologies should you identify? (Each correct answer presents part of the solution. Choose two.)
-
the Microsoft Online Services Directory Synchronization tool
-
Active Directory Federation Services (AD FS) 2.0
-
Active Directory Rights Management Services (AD RMS)
-
an internal root CA
-
Active Directory Lightweight Directory Services (AD LDS)
-
Answer: A,B Explanation:
Scenario: Contoso identifies the following Office 365 coexistence requirements:
/ Office 365 users must be able to access their mailbox by using their Active Directory user account in Contoso.
/ On-premises users must be able to share free/busy information and calendar information with the Office 365 users.
A: When you create an Office 365 mailbox in Exchange Online in a hybrid deployment, the mail user is created in Active Directory on-premises. Directory synchronization, if it#39;s configured, automatically synchronizes this new user object to Office 365, where it’s converted to a cloud mailbox in Exchange Online. You can create Office 365 mailboxes as regular user mailboxes, resource mailboxes for meeting rooms and equipment, and shared mailboxes.
B: Step-By-Step: Setting up AD FS and Enabling Single Sign-On to Office 365
Question No: 27 DRAG DROP – (Topic 3)
You need to recommend which tasks must be performed to meet the compliance requirement for the marketing department.
Which three actions should recommend?
To answer, move the three appropriate actions from the list of actions to the answer area and arrange them in the correct order.
Answer:
Topic 4, Trey Research Overview
General Overview
Trey Research is a brokerage firm that has 5,000 users. Trey Research has a finance department, a human resources department, an investment department, and a legal department.
Trey Research is acquiring a partner company named Fabrikam, Inc.
Physical Locations
Trey Research has four main offices located in Boston, Chicago, New York, and Atlanta. The offices connect to each other by using a WAN link. The Chicago office connects directly to the Internet.
Existing Environment Network Environment
Trey Research has an Active Directory forest named treyresearch.com. The forest contains a single domain. All domain controllers run Windows Server 2012.
Each office is configured as an Active Directory site.
All user accounts are in an organizational unit (OU) based on their department. All users are in a universal security group based on their department.
Trey Research has a Lync Server 2013 infrastructure. The infrastructure is configured to required encryption for voice traffic.
Exchange Server Organization
Trey Research has an Exchange Server organization that contains five servers. The servers are configured as shown in the following table.
The mailbox databases are mounted on the Exchange servers shown in the following table.
All of the mailboxes of the users in the executives department are mounted on DB3. A public folder database named PF1 is mounted on EX5.
The Exchange Server organization has the following configurations:
->Users in the legal department use a shared mailbox named Legal. Legal is enabled for In-Place Hold. Legal is the only mailbox on DB2.
->All inbound and outbound email messages to and from the Internet are routed through EX1.
->Email messages sent and received by Fabrikam are secured by using Mutual TLS.
->All public folders are stored in PF1.
All users connect to their mailbox by using Microsoft Outlook 2013 and Outlook Web App. Fabrikam has an Exchange Server 2013 organization.
Problem Statements
Trey Research identifies the following issues:
->After a change to a certificate, users report that email messages sent to Fabrikam are not delivered.
->The storage for DB3 fails. The storage will be offline for the next two days.
Requirements Planned Changes
Trey Research plans to implement the following changes:
->Move all public folders to an Exchange Server 2013 server. The solution must ensure that all users cannot modify the public folders stored on EX5 after the planned move.
->Integrate Unified Messaging (UM) services with the Lync Server 2013 infrastructure.
Collaboration Requirements
Custom recipient MailTips created in the Exchange Server organization of Trey Research must be visible to the users at Fabrikam. The solution must ensure that administrators can define a subset of users who can share their MailTips.
Auditing Requirements
The following actions must be audited for actions in the Legal mailbox only:
->Delegate – Purge mailbox content
->Delegate – Transfer file between folders
->Administrator – Messages sent by administrator
->Administrator – Open any content within the mailbox
Security Requirements
Trey Research identifies the following security requirements:
->Ensure that the users in the finance department can protect email messages from being altered in transit, regardless of the recipient.
->Prevent the email messages sent to the users in the human resources department from being forwarded to external recipients.
->Prevent the audio files in voice mail message marked as Private from being extracted from email messages.
->Redirect email messages that contain social security information to the legal department.
Compliance Requirements
Trey Research identifies the following compliance requirements:
->All users must be notified before they send an email message that contains any five bank account numbers to an external recipient. The users must be able to override the requirement if they have a valid business reason to send the email message.
->Users must use a custom message classification when they send email messages that contain information about the planned acquisition of Fabrikam.
->Only the users in the legal department must be able to use eDiscovery to view the contents of email messages sent by the finance department users.
Question No: 28 HOTSPOT – (Topic 4)
You need to recommend a solution that meets the compliance requirements for emailing bank account numbers.
Which command should you include in the recommendation? (To answer, select the appropriate options in the answer area.)
Answer:
Explanation:
* Scenario: All users must be notified before they send an email message that contains any five bank account numbers to an external recipient. The users must be able to override the requirement if they have a valid business reason to send the email message.
*
Transport rules apply actions to messages, most with corresponding action values. RejectUnlessSilentOverride
Message is rejected unless the sender has chosen to override the policy restriction. RejectUnlessExplicitOverride
This is the same as RejectUnlessSilentOverride, but the sender can also provide a justification for overriding the policy restriction.
Question No: 29 DRAG DROP – (Topic 4)
You need to recommend a solution that supports the planned changes for the public folders.
Which four cmdlets should you recommend running in sequence? (To answer, move the appropriate four cmdlets from the list of cmdlets to the answer area and arrange them in the correct order.)
Answer:
Question No: 30 HOTSPOT – (Topic 4)
You need to recommend a solution that meets the auditing requirements.
Which command should you include in the recommendation? (To answer, select the appropriate options in the answer area.)
Answer:
Explanation:
* Scenario:
The following actions must be audited for actions in the Legal mailbox only:
->Delegate – Purge mailbox content
->Delegate – Transfer file between folders
->Administrator – Messages sent by administrator
->Administrator – Open any content within the mailbox
* Use the Set-Mailbox cmdlet to modify the settings of an existing mailbox. HardDelete: An e-mail is permanently deleted
Move: An e-mail is moved to another folder
MessageBind: An e-mail is opened or viewed in the preview pane
Create: An item (excluding folders) is created in the mailbox (a message is sent, for example)
100% Ensurepass Free Download!
–Download Free Demo:70-342 Demo PDF
100% Ensurepass Free Guaranteed!
–70-342 Dumps
EnsurePass | ExamCollection | Testking | |
---|---|---|---|
Lowest Price Guarantee | Yes | No | No |
Up-to-Dated | Yes | No | No |
Real Questions | Yes | No | No |
Explanation | Yes | No | No |
PDF VCE | Yes | No | No |
Free VCE Simulator | Yes | No | No |
Instant Download | Yes | No | No |
100-105 Dumps VCE PDF
200-105 Dumps VCE PDF
300-101 Dumps VCE PDF
300-115 Dumps VCE PDF
300-135 Dumps VCE PDF
300-320 Dumps VCE PDF
400-101 Dumps VCE PDF
640-911 Dumps VCE PDF
640-916 Dumps VCE PDF
70-410 Dumps VCE PDF
70-411 Dumps VCE PDF
70-412 Dumps VCE PDF
70-413 Dumps VCE PDF
70-414 Dumps VCE PDF
70-417 Dumps VCE PDF
70-461 Dumps VCE PDF
70-462 Dumps VCE PDF
70-463 Dumps VCE PDF
70-464 Dumps VCE PDF
70-465 Dumps VCE PDF
70-480 Dumps VCE PDF
70-483 Dumps VCE PDF
70-486 Dumps VCE PDF
70-487 Dumps VCE PDF
220-901 Dumps VCE PDF
220-902 Dumps VCE PDF
N10-006 Dumps VCE PDF
SY0-401 Dumps VCE PDF