Q1. (Topic 6)
You have a server named Server1 that has Exchange Server 2013 installed.
Users access their mailbox by using Microsoft Outlook 2010 and Outlook Web App.
You enable auditing for all of the mailboxes.
You need to identify when a mailbox is accessed by someone other than the owner of the mailbox.
What are two possible ways to achieve this goal? (Each correct answer presents a complete solution. Choose two.)
A. Export the administrator audit log.
B. Run an administrator role group report.
C. Export the mailbox audit log.
D. Run a non-owner mailbox access report.
E. Review the security event log.
Answer: C,D
Explanation:
C: Use the Auditing tab to run reports or export entries from the mailbox audit log and the
administrator audit log.
/ The mailbox audit log records whenever a mailbox is accessed by someone other than
the person who owns the mailbox. This can help you determine who has accessed a
mailbox and what they have done.
/ The administrator audit log records any action, based on a Windows PowerShell cmdlet,
performed by an administrator. This can help you troubleshoot configuration issues or
identify the cause of security- or compliance-related problems.
D: Run a Non-Owner Mailbox Access Report
Use this report to find mailboxes that have been accessed by someone other than the
person who owns the mailbox.
Q2. (Topic 6)
You have an Exchange Server organization that contains Exchange Server 2010 servers and Exchange Server 2013 servers. You have a Microsoft Lync Server 2010 environment that is integrated with Unified Messaging (UM) services.
You have an Exchange Server 2010 server named EX1 that has the Unified Messaging server role installed.
You are migrating the UM services to Exchange Server 2013.
You need to prevent EX1 from providing call answering services during the migration.
What should you modify?
A. the UM mailbox policies
B. the UM auto attendants
C. the UM dial plans
D. the UM hunt groups
Answer: C
Q3. (Topic 6)
You have an Exchange Server 2013 organization.
A user named User1 has a mailbox that is enabled for Unified Messaging (UM). User1 has nine call answering rules. When User1 attempts to create a new call answering rule, the user receives an error
message.
You need to identify what prevents User1 from creating a call answering rule.
What should you identify?
A. The mailbox of User1 has the CallAnsweringRulesEnabled parameter set to $false
B. The UM mailbox policy of User1 has the AllowCallAnsweringRules parameter set to $false.
C. User1 exceeds the Inbox rules storage quota.
D. User1 has the maximum number of call answering rules allowed.
Answer: D
Explanation:
A total of nine call answering rules can be set up for each UM-enabled mailbox.
Q4. (Topic 6)
Your company acquires a new internet domain name.
You need to ensure that all users can receive email messages sent to the new domain name.
Which two actions should you perform? (Each correct answer presents part of the solution. Choose two).
A. Modify the email address policy.
B. Create an Authoritative accepted domain.
C. Create an External Relay accepted domain.
D. Modify the properties of the default Receive connector.
E. Generate a new Exchange certificate that contains the new domain name.
Answer: A,B
Q5. (Topic 4)
You need to implement a solution that meets the compliance requirements for the members of the legal department.
Which two cmdlets should you use? (Each correct answer presents part of the solution. Choose two.)
A. New-RoleAssignmentPolicy
B. Add-ManagementRoleEntry
C. New-ManagementRoleAssignment
D. New-ManagementRole
E. New-ManagementScope
Answer: C,D
Explanation:
* From scenario:
/ Only the users in the legal department must be able to use eDiscovery to view the
contents of email messages sent by the finance department users.
/ Users in the legal department use a shared mailbox named Legal. Legal is enabled for In-
Place Hold. Legal is the only mailbox on DB2.
We need to assign the role to the legal department users using the New-
ManagementRoleAssignment cmdlet.
To restrict the eDiscovery access to the finance users emails, we need to create a scope
using the New-ManagementScope cmdlet.
Q6. DRAG DROP - (Topic 6)
You have an Exchange Server organization. The organization contains servers that have Exchange Server 2010 and Exchange Server 2013 installed.
A new compliance policy requires that all email messages remain stored for two years.
You create two retention tags named Tag1 and Tag2. Tag1 moves the email messages to an Archive mailbox after one year. Tag2 permanently deletes the email messages after two years.
You need to meet the compliance policy requirements. The solution must ensure that all email messages that are older than two years are removed as quickly as possible.
Which three actions should you perform?
To answer, move the three appropriate actions from the list of actions to the answer area and arrange them in the correct order.
Answer:
Q7. HOTSPOT - (Topic 1)
You plan to create two retention tags named Tag1 and Tag2. Tag1 will be used to move email messages to the Archive mailbox. Tag2 will be used to delete the email messages.
You need to identify which settings must be configured in the retention tags to meet the technical requirements.
How should you configure each retention tag?
To answer, configure the appropriate options for each retention tag setting in the answer area.
Answer:
Q8. (Topic 6)
You have an Exchange Server 2013 organization.
The human resources (HR) department has a custom form used to enter the personal information of employees. The form uses the Microsoft Word format.
You need to prevent users in the HR department from sending any completed forms to users outside of the organization.
Which two of the following should you create? Each correct answer presents part of the solution.
A. A transport rule
B. A DLP policy template
C. A Send connector of the Partner type
D. A document fingerprint
E. A Policy Tip
Answer: A,D
Explanation:
First create a document fingerprint then create a Transport Rule to take action on the fingerprinted document.
Note: Information workers in your organization handle many kinds of sensitive information during a typical day. Document Fingerprinting makes it easier for you to protect this information by identifying standard forms that are used throughout your organization. Document Fingerprinting is a Data Loss Prevention (DLP) feature that converts a standard form into a sensitive information type, which you can use to define transport rules and DLP policies.
Reference: Protect Your IP Using Document Fingerprints
http://blogs.technet.com/b/lystavlen/archive/2014/03/04/protect-your-ip-using-document-fingerprints.aspx
Q9. (Topic 6)
You have a hybrid deployment of Exchange Server 2013 and Office 365.
The mail flow between Office 365 and the on-premises Exchange Server environment is
routed through an Exchange Server 2010 Edge Transport server.
Your company is assigned a new set of public IP addresses.
A network administrator updates the external firewall address and all of the associated
DNS records.
Office 365 users report that they cannot receive email messages from on-premises users.
You discover that outgoing email messages to Office 365 are in the Office 365 SMTP
queue on an Edge server.
You need to ensure that the on-premises users can send email messages successfully to
the Office 365 users.
Which tool should you use?
A. The Exchange Management Console
B. The Exchange Control Panel in Office 365
C. The Exchange Admin Center
D. The Exchange Remote Connectivity Analyzer
Answer: C
Explanation:
Note:
* The section describes the user interface elements that are common across the EAC (Exchange Admin Center).
* Check the mail flow setting.
Reference: Managing Directory Based Edge Blocking (DBEB) feature in Exchange Online Protection (EOP)
Q10. (Topic 5)
You need to recommend a solution to meet the technical requirements for redundancy during email delivery.
Which cmdlet should you include in the recommendation?
A. Set-FrontendTransportService
B. Set-TransportConfig
C. Set-MailboxTransportService
D. Set-TransportService
Answer: B
Explanation:
/ Internal email messages must be rejected if the messages cannot be protected by using Shadow Redundancy
We need to use the Set-TransportConfig cmdlet with the RejectMessageOnShadowFailure parameter.
Q11. (Topic 6)
You have an Exchange Server 2013 organization.
You successfully migrate the public folders from a previous version of Exchange Server.
You discover that one of the public folder mailboxes almost reached its quota size.
You need to move some of the public folders in the public folder mailbox to another public
folder mailbox.
What should you run?
A. Set-PublicFolderMailbox
B. Merge PublicFolderMailbox.ps1
C. Split-PublicFolderMailbox.ps1
D. New-PublicFolderMigrationRequest
Answer: C
Explanation:
* Split-PublicFolderMailbox.ps1
Splits the given public folder mailbox based on the size of the folders.
* If the content of a public folder mailbox begins to exceed your mailbox quotas, you may
need to move public folders to a different public folder mailbox. There are a couple ways to
do this. To move one or more public folders that don’t contain subfolders, you can use the
PublicFolderMoveRequest cmdlets.
Reference: Move a Public Folder to a Different Public Folder Mailbox
Q12. HOTSPOT - (Topic 6)
You have an Exchange Server 2013 organization named contoso.com.
Contoso.com has a federated trust to another Exchange Server 2013 organization named
fabrikam.com.
You need to ensure that users from fabrikam.com can view the availability of users in contoso.com.
What command should you run? To answer, select the appropriate options in the answer area.
Answer:
Q13. (Topic 6)
You have a hybrid deployment of Exchange Server 2013 and Microsoft Office 365. The Exchange Server organization has a mailbox size limit of 2 GB.
You need to provide engineers with the ability to retain certain email messages indefinitely. The solution must meet the following requirements:
. Ensure that the engineers can access the retained email messages by using Outlook Web App.
. Ensure that the retained email messages do not apply to the mailbox size limit of the engineers.
. Minimize the storage requirements of the on-premises servers.
Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)
A. From Office 365, create Archive mailboxes.
B. Instruct the engineers to create a personal folder.
C. Create a retention policy.
D. From the on-premises Exchange Server 2013 organization, create Archive mailboxes.
E. Create a data loss prevention (DLP) policy.
Answer: A,C
Explanation:
C:
A:
In Exchange Server an archive mailbox is a second mailbox provisioned for a user that is
separate to their primary user mailbox.
Q14. (Topic 6)
You have an Exchange Server 2013 organization named adatum.com.
You have a database availability group (DAG) that contains four Exchange servers named Server1, Server2, Server3, and Server4. The file share witness is on a server named Share1.
The organization has two Send connectors. The Send connectors are configured as shown in the following table.
Users report that email sent to external recipients is not being received.
You discover that outbound email messages are queued on Server3 and Server4.
You need to ensure that all of the email messages queued on Server3 and Server4 are delivered to the Internet as quickly as possible.
What should you do?
A. Modify the cost of External2.
B. Disable External1.
C. Modify the list of source bridgehead servers of External2.
D. Modify the cost of External1.
Answer: B
Explanation:
Note:
* In Microsoft Exchange Server 2013, a Send connector controls the flow of outbound messages to the receiving server.
* When a message is to be delivered to a remote delivery group, a routing path must be determined for the message. Exchange 2013 uses the same logic as Exchange 2010 to select the routing path for a message:
Calculate the least-cost routing path by adding the cost of the IP site links that must be traversed to reach the destination. If the destination is a connector, the cost assigned to the address space is added to the cost to reach the selected connector. If multiple routing paths are possible, the routing path with the lowest aggregate cost is used; If more than one routing path has the same cost, the routing path with the least number of hops is used; If more than one routing path is still available, the name assigned to the AD sites before the destination is considered. The routing path where the AD site nearest the destination is lowest in alphanumeric order is used. If the site nearest the destination is the same for all routing paths being evaluated, an earlier site name is considered.
Q15. HOTSPOT - (Topic 6)
You have an Exchange Server 2013 organization.
All users are enabled for Unified Messaging (UM) and access their voice mail by using Microsoft Lync 2010. Callers report that when they press a key to dial an external telephone number, they hear a
message indicating that the intended destination cannot be reached.
You need to ensure that the callers can reach the external number successfully.
What should you modify?
To answer, select the appropriate object in the answer area.
Answer: