Core Solutions of Microsoft Exchange Server 2013
Question No: 91 HOTSPOT – (Topic 7)
You have an Exchange Server 2013 organization that contains a server named EX1. The network contains two domain controllers named DC1 and DC2.
You plan to make changes to the Active Directory infrastructure and to remove DC2 from the network.
You need to verify whether EX1 writes Active Directory changes to DC2.
What command should you run? To answer, select the appropriate options in the answer area.
Box 1: Get-OrganizationConfig
Box 2: DC2
Question No: 92 HOTSPOT – (Topic 7)
You have an Exchange Server 2013 organization that contains three servers. The servers
are configured as shown in the following table.
All inbound email messages from the Internet are routed through EX01. You plan to remove EX01 from the organization.
You need to ensure that all of the functionalities of EX01 are transferred to EX02 and EX03. The solution must minimize administrative effort.
Which functionality should you transfer to each server? (To answer, select the appropriate server for each functionality in the answer area.)
Question No: 93 – (Topic 7)
You have an Exchange Server 2013 organization named adatum.com. The organization contains five Mailbox servers and two Client Access servers.
You need to ensure that an administrator named user1 receives a daily email message that contains a log of all the Exchange Server administrative actions.
Which cmdlet should you use in a scheduled task?
Question No: 94 – (Topic 7)
You have an Exchange Server 2010 organization.
You deploy a server that has Exchange Server 2013 installed.
You plan to install five additional servers that have Exchange Server 2013 installed. You are a member of the Organization Management management role group.
Your company hires an external IT consultant named Admin1.
The company#39;s security policy states that all external consultants must have the minimum number of required permissions on the network.
You need to ensure that Admin1 can install a server named EX2. The solution must meet the requirements of the security policy.
Which two tasks should you perform? (Each correct answer presents part of the solution. Choose two.)
Add Admin1 to the Exchange Server role group.
Create a new management role and a new role assignment policy.
Run setup and specify the/newprovisionectservenex2 parameter.
Add Admin1 to the Delegated Setup management role group.
Question No: 95 – (Topic 7)
You have network contoso.com. contoso.com consist of AD DS Domain contoso.com. All Servers running Windows Server 2012 and all Clients running Windows 8 Pro.
Server1 runs Mailbox Server Role and Client Access Server Role. You are configuring Anti-Spam Filtering on Server1.
You need to ensure that all emails with the words 鈥淔ree Credit Check鈥?are rejected unless the email is sent to Finance Distribution Group.
You also need to ensure that all emails from partner company
Domain name adatum.com bypass the Anti-Spam Filter.
You run the Add-ContentFilterPhrase and add the words 鈥淔ree Credit Check鈥?What should you do next?
Run the Set-TransportConfig and Set-ContentFilterConfig
Run the Set-SenderReputationConfig and Set-TransportConfig
Run the Set-ContentFilterConfig and Set-RecipientFilterConfig
Run the Set-SenderFilterConfig and Set-RecipientFilterConfig
Question No: 96 – (Topic 7)
You have an Exchange Server 2013 organization that contains two servers named EX1 and EX2.
EX1 and EX2 are members of a database availability group (DAG) named DAG1. DAG1 contains four mailbox databases. All databases are active on EX1 and replicate to EX2.
You start an unplanned maintenance on EX1 and shut down EX1. You discover that the databases do not mount on EX2.
You restart EX1 and the databases mount automatically on EX1.
You need to identify what prevents the databases from switching over successfully to EX2. Which cmdlet should you run?
Question No: 97 DRAG DROP – (Topic 7)
You have an Exchange Server 2013 organization that contains several custom RBAC management roles.
You need to identify which RBAC scopes must be used to meet the following requirements:
-> Manage only the mailboxes of the users in the sales department.
-> Manage the properties of all the mailbox databases.
Which RBAC scopes should you identify? (To answer, drag the appropriate RBAC scopes to the correct requirements. Each RBAC scope may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.)
Question No: 98 – (Topic 7)
You have an Exchange Server 2013 organization. The organization contains a Mailbox server that hosts several databases, including a database named ExecsDB. ExecsDB contains the mailboxes of the company executives.
The hard disk that contains ExecsDB fails.
You replace the hard disk with a new disk, and then you mount the database.
You create a recovery database in an alternate location, and then you restore the database files for ExecsDB to the alternate location.
You need to ensure that all data is consistent before merging the mailbox data into the dial- tone database.
What should you do first?
Run the isinteg.exe command and specify the -fix parameter.
Run the Move-ActiveMailboxDatabase cmdlet.
Run the Update-MailboxDatabaseCopy cmdlet.
Run the eseutil.exe command and specify the/R parameter.
Question No: 99 – (Topic 7)
You need to install and configure anti-spam and antimalware filtering. Which servers should you install the anti-spam agents and enable the anti-spam and antimalware filtering? (Choose two)
You should install the anti-spam agents on the Client Access Servers only.
You should install the anti-spam agents on the Mailbox servers only.
You should install the anti-spam agents on the Client Access Servers and the Mailbox Servers.
You should enable antimalware filtering on the Client Access Servers only.
You should enable antimalware filtering on the Mailbox servers only.
You enable antimalware filtering on the Client Access Servers and the Mailbox Servers.
Question No: 100 – (Topic 7)
You have an Exchange Server 2013 organization.
You plan to deploy Exchange ActiveSync for mobile devices. Each mobile device will be authenticated by using certificates issued by an internal certification authority (CA).
You need to configure the organization to authenticate the mobile devices by using the certificates.
Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)
From Internet Information Services (IIS) Manager on each Client Access server, configure the Microsoft-Server-ActiveSync virtual directory to require client certificates.
From Exchange Admin Center, configure the Microsoft-Server-ActiveSync virtual directory to require client certificates.
From Internet Information Services (IIS) Manager on each Client Access server, enable Active Directory Client Certificate Authentication.
From Internet Information Services (IIS) Manager on each Mailbox server, enable Active Directory Client Certificate Authentication.
|Lowest Price Guarantee||Yes||No||No|
|Free VCE Simulator||Yes||No||No|