Which four cmdlets should you recommend running in sequence?
###BeginCaseStudy###
Case Study: 4
Trey Research
Overview
General Overview
Trey Research is a brokerage firm that has 5,000 users. Trey Research has a
finance department, a human resources department, an investment department, and
a legal department.
Trey Research is acquiring a partner company named Fabrikam, Inc.
Physical Locations
Trey Research has four main offices located in Boston, Chicago, New York, and
Atlanta.
The offices connect to each other by using a WAN link. The Chicago office connects
directly to the Internet.
Existing Environment
Network Environment
Trey Research has an Active Directory forest named treyresearch.com. The forest
contains a single domain. All domain controllers run Windows Server 2012.
Each office is configured as an Active Directory site.
All user accounts are in an organizational unit (OU) based on their department. All
users are in a universal security group based on their department.
Trey Research has a Lync Server 2013 infrastructure. The infrastructure is
configured to required encryption for voice traffic.
Exchange Server Organization
Trey Research has an Exchange Server organization that contains five servers. The
servers are configured as shown in the following table.
The mailbox databases are mounted on the Exchange servers shown in the
following table.
All of the mailboxes of the users in the executives department are mounted on DB3.
A public folder database named PF1 is mounted on EX5.
The Exchange Server organization has the following configurations:
Users in the legal department use a shared mailbox named Legal. Legal is enabled
for In-Place Hold. Legal is the only mailbox on DB2.
All inbound and outbound email messages to and from the Internet are routed
through EX1.
Email messages sent and received by Fabrikam are secured by using Mutual TLS.
All public folders are stored in PF1.
All users connect to their mailbox by using Microsoft Outlook 2013 and Outlook Web
App.
Fabrikam has an Exchange Server 2013 organization.
Problem Statements
Trey Research identifies the following issues:
After a change to a certificate, users report that email messages sent to Fabrikam
are not delivered.
The storage for DB3 fails. The storage will be offline for the next two days.
Requirements
Planned Changes
Trey Research plans to implement the following changes:
Move all public folders to an Exchange Server 2013 server. The solution must
ensure that all users cannot modify the public folders stored on EX5 after the
planned move.
Integrate Unified Messaging (UM) services with the Lync Server 2013 infrastructure.
Collaboration Requirements
Custom recipient MailTips created in the Exchange Server organization of Trey
Research must be visible to the users at Fabrikam. The solution must ensure that
administrators can define a subset of users who can share their MailTips.
Auditing Requirements
The following actions must be audited for actions in the Legal mailbox only:
Delegate – Purge mailbox content
Delegate – Transfer file between folders
Administrator – Messages sent by administrator
Administrator – Open any content within the mailbox
Security Requirements
Trey Research identifies the following security requirements:
Ensure that the users in the finance department can protect email messages from
being altered in transit, regardless of the recipient.
Prevent the email messages sent to the users in the human resources department
from being forwarded to external recipients.
Prevent the audio files in voice mail message marked as Private from being
extracted from email messages.
Redirect email messages that contain social security information to the legal
department.
Compliance Requirements
Trey Research identifies the following compliance requirements:
All users must be notified before they send an email message that contains any five
bank account numbers to an external recipient. The users must be able to override
the requirement if they have a valid business reason to send the email message.
Users must use a custom message classification when they send email messages
that contain information about the planned acquisition of Fabrikam.
1 Only the users in the legal department must be able to use eDiscovery to view the
contents of email messages sent by the finance department users.
###EndCaseStudy###
DRAG DROP
You need to recommend a solution that supports the planned changes for the public folders.
Which four cmdlets should you recommend running in sequence? (To answer, move the appropriate
four cmdlets from the list of cmdlets to the answer area and arrange them in the correct order.)
Which three actions should you recommend?
###BeginCaseStudy###
Case Study: 4
Trey Research
Overview
General Overview
Trey Research is a brokerage firm that has 5,000 users. Trey Research has a
finance department, a human resources department, an investment department, and
a legal department.
Trey Research is acquiring a partner company named Fabrikam, Inc.
Physical Locations
Trey Research has four main offices located in Boston, Chicago, New York, and
Atlanta.
The offices connect to each other by using a WAN link. The Chicago office connects
directly to the Internet.
Existing Environment
Network Environment
Trey Research has an Active Directory forest named treyresearch.com. The forest
contains a single domain. All domain controllers run Windows Server 2012.
Each office is configured as an Active Directory site.
All user accounts are in an organizational unit (OU) based on their department. All
users are in a universal security group based on their department.
Trey Research has a Lync Server 2013 infrastructure. The infrastructure is
configured to required encryption for voice traffic.
Exchange Server Organization
Trey Research has an Exchange Server organization that contains five servers. The
servers are configured as shown in the following table.
The mailbox databases are mounted on the Exchange servers shown in the
following table.
All of the mailboxes of the users in the executives department are mounted on DB3.
A public folder database named PF1 is mounted on EX5.
The Exchange Server organization has the following configurations:
Users in the legal department use a shared mailbox named Legal. Legal is enabled
for In-Place Hold. Legal is the only mailbox on DB2.
All inbound and outbound email messages to and from the Internet are routed
through EX1.
Email messages sent and received by Fabrikam are secured by using Mutual TLS.
All public folders are stored in PF1.
All users connect to their mailbox by using Microsoft Outlook 2013 and Outlook Web
App.
Fabrikam has an Exchange Server 2013 organization.
Problem Statements
Trey Research identifies the following issues:
After a change to a certificate, users report that email messages sent to Fabrikam
are not delivered.
The storage for DB3 fails. The storage will be offline for the next two days.
Requirements
Planned Changes
Trey Research plans to implement the following changes:
Move all public folders to an Exchange Server 2013 server. The solution must
ensure that all users cannot modify the public folders stored on EX5 after the
planned move.
Integrate Unified Messaging (UM) services with the Lync Server 2013 infrastructure.
Collaboration Requirements
Custom recipient MailTips created in the Exchange Server organization of Trey
Research must be visible to the users at Fabrikam. The solution must ensure that
administrators can define a subset of users who can share their MailTips.
Auditing Requirements
The following actions must be audited for actions in the Legal mailbox only:
Delegate – Purge mailbox content
Delegate – Transfer file between folders
Administrator – Messages sent by administrator
Administrator – Open any content within the mailbox
Security Requirements
Trey Research identifies the following security requirements:
Ensure that the users in the finance department can protect email messages from
being altered in transit, regardless of the recipient.
Prevent the email messages sent to the users in the human resources department
from being forwarded to external recipients.
Prevent the audio files in voice mail message marked as Private from being
extracted from email messages.
Redirect email messages that contain social security information to the legal
department.
Compliance Requirements
Trey Research identifies the following compliance requirements:
All users must be notified before they send an email message that contains any five
bank account numbers to an external recipient. The users must be able to override
the requirement if they have a valid business reason to send the email message.
Users must use a custom message classification when they send email messages
that contain information about the planned acquisition of Fabrikam.
1 Only the users in the legal department must be able to use eDiscovery to view the
contents of email messages sent by the finance department users.
###EndCaseStudy###
You need to recommend a solution that meets the compliance requirements for email messages
that contain information about the Fabrikam acquisition.
Which three actions should you recommend? (Each correct answer presents part of the solution.
Choose three.)
You need to implement a solution that meets the collaboration requirements
###BeginCaseStudy###
Case Study: 4
Trey Research
Overview
General Overview
Trey Research is a brokerage firm that has 5,000 users. Trey Research has a
finance department, a human resources department, an investment department, and
a legal department.
Trey Research is acquiring a partner company named Fabrikam, Inc.
Physical Locations
Trey Research has four main offices located in Boston, Chicago, New York, and
Atlanta.
The offices connect to each other by using a WAN link. The Chicago office connects
directly to the Internet.
Existing Environment
Network Environment
Trey Research has an Active Directory forest named treyresearch.com. The forest
contains a single domain. All domain controllers run Windows Server 2012.
Each office is configured as an Active Directory site.
All user accounts are in an organizational unit (OU) based on their department. All
users are in a universal security group based on their department.
Trey Research has a Lync Server 2013 infrastructure. The infrastructure is
configured to required encryption for voice traffic.
Exchange Server Organization
Trey Research has an Exchange Server organization that contains five servers. The
servers are configured as shown in the following table.
The mailbox databases are mounted on the Exchange servers shown in the
following table.
All of the mailboxes of the users in the executives department are mounted on DB3.
A public folder database named PF1 is mounted on EX5.
The Exchange Server organization has the following configurations:
Users in the legal department use a shared mailbox named Legal. Legal is enabled
for In-Place Hold. Legal is the only mailbox on DB2.
All inbound and outbound email messages to and from the Internet are routed
through EX1.
Email messages sent and received by Fabrikam are secured by using Mutual TLS.
All public folders are stored in PF1.
All users connect to their mailbox by using Microsoft Outlook 2013 and Outlook Web
App.
Fabrikam has an Exchange Server 2013 organization.
Problem Statements
Trey Research identifies the following issues:
After a change to a certificate, users report that email messages sent to Fabrikam
are not delivered.
The storage for DB3 fails. The storage will be offline for the next two days.
Requirements
Planned Changes
Trey Research plans to implement the following changes:
Move all public folders to an Exchange Server 2013 server. The solution must
ensure that all users cannot modify the public folders stored on EX5 after the
planned move.
Integrate Unified Messaging (UM) services with the Lync Server 2013 infrastructure.
Collaboration Requirements
Custom recipient MailTips created in the Exchange Server organization of Trey
Research must be visible to the users at Fabrikam. The solution must ensure that
administrators can define a subset of users who can share their MailTips.
Auditing Requirements
The following actions must be audited for actions in the Legal mailbox only:
Delegate – Purge mailbox content
Delegate – Transfer file between folders
Administrator – Messages sent by administrator
Administrator – Open any content within the mailbox
Security Requirements
Trey Research identifies the following security requirements:
Ensure that the users in the finance department can protect email messages from
being altered in transit, regardless of the recipient.
Prevent the email messages sent to the users in the human resources department
from being forwarded to external recipients.
Prevent the audio files in voice mail message marked as Private from being
extracted from email messages.
Redirect email messages that contain social security information to the legal
department.
Compliance Requirements
Trey Research identifies the following compliance requirements:
All users must be notified before they send an email message that contains any five
bank account numbers to an external recipient. The users must be able to override
the requirement if they have a valid business reason to send the email message.
Users must use a custom message classification when they send email messages
that contain information about the planned acquisition of Fabrikam.
1 Only the users in the legal department must be able to use eDiscovery to view the
contents of email messages sent by the finance department users.
###EndCaseStudy###
You need to implement a solution that meets the collaboration requirements.
What should you do?
How should you configure the UM dial plan?
###BeginCaseStudy###
Case Study: 4
Trey Research
Overview
General Overview
Trey Research is a brokerage firm that has 5,000 users. Trey Research has a
finance department, a human resources department, an investment department, and
a legal department.
Trey Research is acquiring a partner company named Fabrikam, Inc.
Physical Locations
Trey Research has four main offices located in Boston, Chicago, New York, and
Atlanta.
The offices connect to each other by using a WAN link. The Chicago office connects
directly to the Internet.
Existing Environment
Network Environment
Trey Research has an Active Directory forest named treyresearch.com. The forest
contains a single domain. All domain controllers run Windows Server 2012.
Each office is configured as an Active Directory site.
All user accounts are in an organizational unit (OU) based on their department. All
users are in a universal security group based on their department.
Trey Research has a Lync Server 2013 infrastructure. The infrastructure is
configured to required encryption for voice traffic.
Exchange Server Organization
Trey Research has an Exchange Server organization that contains five servers. The
servers are configured as shown in the following table.
The mailbox databases are mounted on the Exchange servers shown in the
following table.
All of the mailboxes of the users in the executives department are mounted on DB3.
A public folder database named PF1 is mounted on EX5.
The Exchange Server organization has the following configurations:
Users in the legal department use a shared mailbox named Legal. Legal is enabled
for In-Place Hold. Legal is the only mailbox on DB2.
All inbound and outbound email messages to and from the Internet are routed
through EX1.
Email messages sent and received by Fabrikam are secured by using Mutual TLS.
All public folders are stored in PF1.
All users connect to their mailbox by using Microsoft Outlook 2013 and Outlook Web
App.
Fabrikam has an Exchange Server 2013 organization.
Problem Statements
Trey Research identifies the following issues:
After a change to a certificate, users report that email messages sent to Fabrikam
are not delivered.
The storage for DB3 fails. The storage will be offline for the next two days.
Requirements
Planned Changes
Trey Research plans to implement the following changes:
Move all public folders to an Exchange Server 2013 server. The solution must
ensure that all users cannot modify the public folders stored on EX5 after the
planned move.
Integrate Unified Messaging (UM) services with the Lync Server 2013 infrastructure.
Collaboration Requirements
Custom recipient MailTips created in the Exchange Server organization of Trey
Research must be visible to the users at Fabrikam. The solution must ensure that
administrators can define a subset of users who can share their MailTips.
Auditing Requirements
The following actions must be audited for actions in the Legal mailbox only:
Delegate – Purge mailbox content
Delegate – Transfer file between folders
Administrator – Messages sent by administrator
Administrator – Open any content within the mailbox
Security Requirements
Trey Research identifies the following security requirements:
Ensure that the users in the finance department can protect email messages from
being altered in transit, regardless of the recipient.
Prevent the email messages sent to the users in the human resources department
from being forwarded to external recipients.
Prevent the audio files in voice mail message marked as Private from being
extracted from email messages.
Redirect email messages that contain social security information to the legal
department.
Compliance Requirements
Trey Research identifies the following compliance requirements:
All users must be notified before they send an email message that contains any five
bank account numbers to an external recipient. The users must be able to override
the requirement if they have a valid business reason to send the email message.
Users must use a custom message classification when they send email messages
that contain information about the planned acquisition of Fabrikam.
1 Only the users in the legal department must be able to use eDiscovery to view the
contents of email messages sent by the finance department users.
###EndCaseStudy###
How should you configure the UM dial plan? (To answer, select the appropriate dial plan type and
VoIP security mode in the answer area.)
which directory on EX1 should you review the log files?
###BeginCaseStudy###
Case Study: 4
Trey Research
Overview
General Overview
Trey Research is a brokerage firm that has 5,000 users. Trey Research has a
finance department, a human resources department, an investment department, and
a legal department.
Trey Research is acquiring a partner company named Fabrikam, Inc.
Physical Locations
Trey Research has four main offices located in Boston, Chicago, New York, and
Atlanta.
The offices connect to each other by using a WAN link. The Chicago office connects
directly to the Internet.
Existing Environment
Network Environment
Trey Research has an Active Directory forest named treyresearch.com. The forest
contains a single domain. All domain controllers run Windows Server 2012.
Each office is configured as an Active Directory site.
All user accounts are in an organizational unit (OU) based on their department. All
users are in a universal security group based on their department.
Trey Research has a Lync Server 2013 infrastructure. The infrastructure is
configured to required encryption for voice traffic.
Exchange Server Organization
Trey Research has an Exchange Server organization that contains five servers. The
servers are configured as shown in the following table.
The mailbox databases are mounted on the Exchange servers shown in the
following table.
All of the mailboxes of the users in the executives department are mounted on DB3.
A public folder database named PF1 is mounted on EX5.
The Exchange Server organization has the following configurations:
Users in the legal department use a shared mailbox named Legal. Legal is enabled
for In-Place Hold. Legal is the only mailbox on DB2.
All inbound and outbound email messages to and from the Internet are routed
through EX1.
Email messages sent and received by Fabrikam are secured by using Mutual TLS.
All public folders are stored in PF1.
All users connect to their mailbox by using Microsoft Outlook 2013 and Outlook Web
App.
Fabrikam has an Exchange Server 2013 organization.
Problem Statements
Trey Research identifies the following issues:
After a change to a certificate, users report that email messages sent to Fabrikam
are not delivered.
The storage for DB3 fails. The storage will be offline for the next two days.
Requirements
Planned Changes
Trey Research plans to implement the following changes:
Move all public folders to an Exchange Server 2013 server. The solution must
ensure that all users cannot modify the public folders stored on EX5 after the
planned move.
Integrate Unified Messaging (UM) services with the Lync Server 2013 infrastructure.
Collaboration Requirements
Custom recipient MailTips created in the Exchange Server organization of Trey
Research must be visible to the users at Fabrikam. The solution must ensure that
administrators can define a subset of users who can share their MailTips.
Auditing Requirements
The following actions must be audited for actions in the Legal mailbox only:
Delegate – Purge mailbox content
Delegate – Transfer file between folders
Administrator – Messages sent by administrator
Administrator – Open any content within the mailbox
Security Requirements
Trey Research identifies the following security requirements:
Ensure that the users in the finance department can protect email messages from
being altered in transit, regardless of the recipient.
Prevent the email messages sent to the users in the human resources department
from being forwarded to external recipients.
Prevent the audio files in voice mail message marked as Private from being
extracted from email messages.
Redirect email messages that contain social security information to the legal
department.
Compliance Requirements
Trey Research identifies the following compliance requirements:
All users must be notified before they send an email message that contains any five
bank account numbers to an external recipient. The users must be able to override
the requirement if they have a valid business reason to send the email message.
Users must use a custom message classification when they send email messages
that contain information about the planned acquisition of Fabrikam.
1 Only the users in the legal department must be able to use eDiscovery to view the
contents of email messages sent by the finance department users.
###EndCaseStudy###
HOTSPOT
You are attempting to resolve the email delivery issue for Fabrikam.
You need to identify which certificate is being used by the servers in the Exchange Server
organization of Fabrikam.
In which directory on EX1 should you review the log files? (To answer, select the appropriate
directory in the answer area.)
Which three actions should you perform in sequence?
###BeginCaseStudy###
Case Study: 4
Trey Research
Overview
General Overview
Trey Research is a brokerage firm that has 5,000 users. Trey Research has a
finance department, a human resources department, an investment department, and
a legal department.
Trey Research is acquiring a partner company named Fabrikam, Inc.
Physical Locations
Trey Research has four main offices located in Boston, Chicago, New York, and
Atlanta.
The offices connect to each other by using a WAN link. The Chicago office connects
directly to the Internet.
Existing Environment
Network Environment
Trey Research has an Active Directory forest named treyresearch.com. The forest
contains a single domain. All domain controllers run Windows Server 2012.
Each office is configured as an Active Directory site.
All user accounts are in an organizational unit (OU) based on their department. All
users are in a universal security group based on their department.
Trey Research has a Lync Server 2013 infrastructure. The infrastructure is
configured to required encryption for voice traffic.
Exchange Server Organization
Trey Research has an Exchange Server organization that contains five servers. The
servers are configured as shown in the following table.
The mailbox databases are mounted on the Exchange servers shown in the
following table.
All of the mailboxes of the users in the executives department are mounted on DB3.
A public folder database named PF1 is mounted on EX5.
The Exchange Server organization has the following configurations:
Users in the legal department use a shared mailbox named Legal. Legal is enabled
for In-Place Hold. Legal is the only mailbox on DB2.
All inbound and outbound email messages to and from the Internet are routed
through EX1.
Email messages sent and received by Fabrikam are secured by using Mutual TLS.
All public folders are stored in PF1.
All users connect to their mailbox by using Microsoft Outlook 2013 and Outlook Web
App.
Fabrikam has an Exchange Server 2013 organization.
Problem Statements
Trey Research identifies the following issues:
After a change to a certificate, users report that email messages sent to Fabrikam
are not delivered.
The storage for DB3 fails. The storage will be offline for the next two days.
Requirements
Planned Changes
Trey Research plans to implement the following changes:
Move all public folders to an Exchange Server 2013 server. The solution must
ensure that all users cannot modify the public folders stored on EX5 after the
planned move.
Integrate Unified Messaging (UM) services with the Lync Server 2013 infrastructure.
Collaboration Requirements
Custom recipient MailTips created in the Exchange Server organization of Trey
Research must be visible to the users at Fabrikam. The solution must ensure that
administrators can define a subset of users who can share their MailTips.
Auditing Requirements
The following actions must be audited for actions in the Legal mailbox only:
Delegate – Purge mailbox content
Delegate – Transfer file between folders
Administrator – Messages sent by administrator
Administrator – Open any content within the mailbox
Security Requirements
Trey Research identifies the following security requirements:
Ensure that the users in the finance department can protect email messages from
being altered in transit, regardless of the recipient.
Prevent the email messages sent to the users in the human resources department
from being forwarded to external recipients.
Prevent the audio files in voice mail message marked as Private from being
extracted from email messages.
Redirect email messages that contain social security information to the legal
department.
Compliance Requirements
Trey Research identifies the following compliance requirements:
All users must be notified before they send an email message that contains any five
bank account numbers to an external recipient. The users must be able to override
the requirement if they have a valid business reason to send the email message.
Users must use a custom message classification when they send email messages
that contain information about the planned acquisition of Fabrikam.
1 Only the users in the legal department must be able to use eDiscovery to view the
contents of email messages sent by the finance department users.
###EndCaseStudy###
DRAG DROP
You restore the files of DB3 to EX3.
You need to mount DB3 on EX3. The solution must ensure that email messages sent to the users of
DB3 while the database was offline are delivered once DB3 is mounted.
Which three actions should you perform in sequence? (To answer, move the appropriate three
actions from the list of actions to the answer area and arrange them in the correct order.)
Which two cmdlets should you use?
###BeginCaseStudy###
Case Study: 4
Trey Research
Overview
General Overview
Trey Research is a brokerage firm that has 5,000 users. Trey Research has a
finance department, a human resources department, an investment department, and
a legal department.
Trey Research is acquiring a partner company named Fabrikam, Inc.
Physical Locations
Trey Research has four main offices located in Boston, Chicago, New York, and
Atlanta.
The offices connect to each other by using a WAN link. The Chicago office connects
directly to the Internet.
Existing Environment
Network Environment
Trey Research has an Active Directory forest named treyresearch.com. The forest
contains a single domain. All domain controllers run Windows Server 2012.
Each office is configured as an Active Directory site.
All user accounts are in an organizational unit (OU) based on their department. All
users are in a universal security group based on their department.
Trey Research has a Lync Server 2013 infrastructure. The infrastructure is
configured to required encryption for voice traffic.
Exchange Server Organization
Trey Research has an Exchange Server organization that contains five servers. The
servers are configured as shown in the following table.
The mailbox databases are mounted on the Exchange servers shown in the
following table.
All of the mailboxes of the users in the executives department are mounted on DB3.
A public folder database named PF1 is mounted on EX5.
The Exchange Server organization has the following configurations:
Users in the legal department use a shared mailbox named Legal. Legal is enabled
for In-Place Hold. Legal is the only mailbox on DB2.
All inbound and outbound email messages to and from the Internet are routed
through EX1.
Email messages sent and received by Fabrikam are secured by using Mutual TLS.
All public folders are stored in PF1.
All users connect to their mailbox by using Microsoft Outlook 2013 and Outlook Web
App.
Fabrikam has an Exchange Server 2013 organization.
Problem Statements
Trey Research identifies the following issues:
After a change to a certificate, users report that email messages sent to Fabrikam
are not delivered.
The storage for DB3 fails. The storage will be offline for the next two days.
Requirements
Planned Changes
Trey Research plans to implement the following changes:
Move all public folders to an Exchange Server 2013 server. The solution must
ensure that all users cannot modify the public folders stored on EX5 after the
planned move.
Integrate Unified Messaging (UM) services with the Lync Server 2013 infrastructure.
Collaboration Requirements
Custom recipient MailTips created in the Exchange Server organization of Trey
Research must be visible to the users at Fabrikam. The solution must ensure that
administrators can define a subset of users who can share their MailTips.
Auditing Requirements
The following actions must be audited for actions in the Legal mailbox only:
Delegate – Purge mailbox content
Delegate – Transfer file between folders
Administrator – Messages sent by administrator
Administrator – Open any content within the mailbox
Security Requirements
Trey Research identifies the following security requirements:
Ensure that the users in the finance department can protect email messages from
being altered in transit, regardless of the recipient.
Prevent the email messages sent to the users in the human resources department
from being forwarded to external recipients.
Prevent the audio files in voice mail message marked as Private from being
extracted from email messages.
Redirect email messages that contain social security information to the legal
department.
Compliance Requirements
Trey Research identifies the following compliance requirements:
All users must be notified before they send an email message that contains any five
bank account numbers to an external recipient. The users must be able to override
the requirement if they have a valid business reason to send the email message.
Users must use a custom message classification when they send email messages
that contain information about the planned acquisition of Fabrikam.
1 Only the users in the legal department must be able to use eDiscovery to view the
contents of email messages sent by the finance department users.
###EndCaseStudy###
You need to implement a solution that meets the compliance requirements for the members of the
legal department.
Which two cmdlets should you use? (Each correct answer presents part of the solution. Choose two.)
Which three cmdlets should you run next in sequence?
###BeginCaseStudy###
Case Study: 5
Proseware, Inc
Overview
General Overview
Proseware, Inc., is an international manufacturing company that has 1,000 users.
Proseware has a sales department, a marketing department, a research department,
and a human resources department.
Proseware purchases another company named Contoso, Ltd. Contoso has 500
users.
Physical Locations
Proseware has two main offices located in New York and London.
The offices connect to each other by using a WAN link. Each office connects directly
to the Internet. Contoso has a single office in Dallas.
Existing Environment
Active Directory Environment
The Proseware network contains an Active Directory forest named proseware.com.
The forest contains a single domain. All domain controllers run Windows Server
2012.
Each office contains three domain controllers. Each office is configured as an Active
Directory site.
The Contoso network contains an Active Directory forest named contoso.com. The
forest contains a single domain. All domain controllers run Windows Server 2012.
Exchange Server Organization
Proseware has an Exchange Server 2013 organization that contains four servers.
The servers are configured as shown in the following table.
EX3 and EX4 are the members of a database availability group (DAG) named
DAG1.
DAG1 has two DAG networks. The networks are configured as shown in the
following table.
Users connect to mail.proseware.com for Microsoft Outlook and Outlook Web App
services. Mail.proseware.com resolves to an IP address on a hardware load
balancer.
All Outlook Anywhere users are enabled for Cached Exchange Mode.
Proseware pilots a hybrid deployment of Exchange Server 2013 and Microsoft Office
365.
The mailbox of each pilot user is moved to Office 365. For the pilot mailboxes, all
inbound email messages from the Internet are delivered to the Exchange Server
organization, and then forwarded to Office 365.
Contoso has an Exchange Server 2010 organization.
Problem Statements
Proseware identifies the following issues:
MapiNet is saturated with network traffic caused by the database replication between
the members of DAG1 over MapiNet.
The pilot users report that entries added to their Safe Senders list and their Blocked
Senders list fail to work.
A recent power outage in the New York office prevents all users from accessing their
mailbox.
A user named User1 reports that email messages are being sent from her mailbox
without her consent.
Requirements
Planned Changes
Proseware plans to implement the following changes:
Several users at Contoso will use a mailbox at Proseware as their primary mailbox.
The Contoso users will use Autodiscover to configure their client settings and will
use single sign-on.
For a special project, an IT administrator will create 20 distribution groups that will
each contain 200 members.
Certain users in both companies will have a contoso.com SMTP suffix as their
primary email address.
Technical Requirements
Proseware identifies the following technical requirements for the Exchange Server
organization:
Internal email messages must be rejected if the messages cannot be protected by
using Shadow Redundancy.
All database replication between DAG1 members must occur over the ReplNet
network.
Site Resiliency Requirements
Proseware identifies the following site resiliency requirements for the Exchange
Server organization:
All mailboxes must be available if a single site becomes unavailable. The solution
must not require administrator intervention.
User traffic on the WAN links must be minimized.
Email Security Requirements
Proseware identifies the following requirements for securing email messages:
Email recipients must be able to identify whether an email message was modified
during delivery.
All email messages stored in the mailbox databases must be protected from theft.
Users must be able to encrypt email messages from Outlook Web App.
Retention Requirements
Proseware plans to reduce mailbox server storage usage and to limit company
liability.
Proseware identifies the following requirements:
Email messages in the Deleted Items folder must be retained for only 30 days.
Email messages in a mailbox folder named Projects must be retained for 540 days,
unless the messages contain contractual information.
Email messages in the Projects folder that contain contractual information must be
retained indefinitely.
All other email messages must be removed after one year.
###EndCaseStudy###
DRAG DROP
You need to resolve the network traffic issue for MapiNet.
You suspend database replication.
Which three cmdlets should you run next in sequence? (To answer, move the appropriate three
cmdlets from the list of actions to the answer area and arrange them in the correct order.)
Which policy tag types should you identify?
###BeginCaseStudy###
Case Study: 5
Proseware, Inc
Overview
General Overview
Proseware, Inc., is an international manufacturing company that has 1,000 users.
Proseware has a sales department, a marketing department, a research department,
and a human resources department.
Proseware purchases another company named Contoso, Ltd. Contoso has 500
users.
Physical Locations
Proseware has two main offices located in New York and London.
The offices connect to each other by using a WAN link. Each office connects directly
to the Internet. Contoso has a single office in Dallas.
Existing Environment
Active Directory Environment
The Proseware network contains an Active Directory forest named proseware.com.
The forest contains a single domain. All domain controllers run Windows Server
2012.
Each office contains three domain controllers. Each office is configured as an Active
Directory site.
The Contoso network contains an Active Directory forest named contoso.com. The
forest contains a single domain. All domain controllers run Windows Server 2012.
Exchange Server Organization
Proseware has an Exchange Server 2013 organization that contains four servers.
The servers are configured as shown in the following table.
EX3 and EX4 are the members of a database availability group (DAG) named
DAG1.
DAG1 has two DAG networks. The networks are configured as shown in the
following table.
Users connect to mail.proseware.com for Microsoft Outlook and Outlook Web App
services. Mail.proseware.com resolves to an IP address on a hardware load
balancer.
All Outlook Anywhere users are enabled for Cached Exchange Mode.
Proseware pilots a hybrid deployment of Exchange Server 2013 and Microsoft Office
365.
The mailbox of each pilot user is moved to Office 365. For the pilot mailboxes, all
inbound email messages from the Internet are delivered to the Exchange Server
organization, and then forwarded to Office 365.
Contoso has an Exchange Server 2010 organization.
Problem Statements
Proseware identifies the following issues:
MapiNet is saturated with network traffic caused by the database replication between
the members of DAG1 over MapiNet.
The pilot users report that entries added to their Safe Senders list and their Blocked
Senders list fail to work.
A recent power outage in the New York office prevents all users from accessing their
mailbox.
A user named User1 reports that email messages are being sent from her mailbox
without her consent.
Requirements
Planned Changes
Proseware plans to implement the following changes:
Several users at Contoso will use a mailbox at Proseware as their primary mailbox.
The Contoso users will use Autodiscover to configure their client settings and will
use single sign-on.
For a special project, an IT administrator will create 20 distribution groups that will
each contain 200 members.
Certain users in both companies will have a contoso.com SMTP suffix as their
primary email address.
Technical Requirements
Proseware identifies the following technical requirements for the Exchange Server
organization:
Internal email messages must be rejected if the messages cannot be protected by
using Shadow Redundancy.
All database replication between DAG1 members must occur over the ReplNet
network.
Site Resiliency Requirements
Proseware identifies the following site resiliency requirements for the Exchange
Server organization:
All mailboxes must be available if a single site becomes unavailable. The solution
must not require administrator intervention.
User traffic on the WAN links must be minimized.
Email Security Requirements
Proseware identifies the following requirements for securing email messages:
Email recipients must be able to identify whether an email message was modified
during delivery.
All email messages stored in the mailbox databases must be protected from theft.
Users must be able to encrypt email messages from Outlook Web App.
Retention Requirements
Proseware plans to reduce mailbox server storage usage and to limit company
liability.
Proseware identifies the following requirements:
Email messages in the Deleted Items folder must be retained for only 30 days.
Email messages in a mailbox folder named Projects must be retained for 540 days,
unless the messages contain contractual information.
Email messages in the Projects folder that contain contractual information must be
retained indefinitely.
All other email messages must be removed after one year.
###EndCaseStudy###
DRAG DROP
You are preparing the environment for the planned retention solution.
You need to identify which policy tags must be created to meet the retention requirements.
Which policy tag types should you identify? (To answer, drag the appropriate policy tag types to the
correct message types. Each policy tag tag may be used once, more than once, or not at all. You may
need to drag the split bar between panes or scroll to view content.)
Which four commands should you run in sequence?
###BeginCaseStudy###
Case Study: 5
Proseware, Inc
Overview
General Overview
Proseware, Inc., is an international manufacturing company that has 1,000 users.
Proseware has a sales department, a marketing department, a research department,
and a human resources department.
Proseware purchases another company named Contoso, Ltd. Contoso has 500
users.
Physical Locations
Proseware has two main offices located in New York and London.
The offices connect to each other by using a WAN link. Each office connects directly
to the Internet. Contoso has a single office in Dallas.
Existing Environment
Active Directory Environment
The Proseware network contains an Active Directory forest named proseware.com.
The forest contains a single domain. All domain controllers run Windows Server
2012.
Each office contains three domain controllers. Each office is configured as an Active
Directory site.
The Contoso network contains an Active Directory forest named contoso.com. The
forest contains a single domain. All domain controllers run Windows Server 2012.
Exchange Server Organization
Proseware has an Exchange Server 2013 organization that contains four servers.
The servers are configured as shown in the following table.
EX3 and EX4 are the members of a database availability group (DAG) named
DAG1.
DAG1 has two DAG networks. The networks are configured as shown in the
following table.
Users connect to mail.proseware.com for Microsoft Outlook and Outlook Web App
services. Mail.proseware.com resolves to an IP address on a hardware load
balancer.
All Outlook Anywhere users are enabled for Cached Exchange Mode.
Proseware pilots a hybrid deployment of Exchange Server 2013 and Microsoft Office
365.
The mailbox of each pilot user is moved to Office 365. For the pilot mailboxes, all
inbound email messages from the Internet are delivered to the Exchange Server
organization, and then forwarded to Office 365.
Contoso has an Exchange Server 2010 organization.
Problem Statements
Proseware identifies the following issues:
MapiNet is saturated with network traffic caused by the database replication between
the members of DAG1 over MapiNet.
The pilot users report that entries added to their Safe Senders list and their Blocked
Senders list fail to work.
A recent power outage in the New York office prevents all users from accessing their
mailbox.
A user named User1 reports that email messages are being sent from her mailbox
without her consent.
Requirements
Planned Changes
Proseware plans to implement the following changes:
Several users at Contoso will use a mailbox at Proseware as their primary mailbox.
The Contoso users will use Autodiscover to configure their client settings and will
use single sign-on.
For a special project, an IT administrator will create 20 distribution groups that will
each contain 200 members.
Certain users in both companies will have a contoso.com SMTP suffix as their
primary email address.
Technical Requirements
Proseware identifies the following technical requirements for the Exchange Server
organization:
Internal email messages must be rejected if the messages cannot be protected by
using Shadow Redundancy.
All database replication between DAG1 members must occur over the ReplNet
network.
Site Resiliency Requirements
Proseware identifies the following site resiliency requirements for the Exchange
Server organization:
All mailboxes must be available if a single site becomes unavailable. The solution
must not require administrator intervention.
User traffic on the WAN links must be minimized.
Email Security Requirements
Proseware identifies the following requirements for securing email messages:
Email recipients must be able to identify whether an email message was modified
during delivery.
All email messages stored in the mailbox databases must be protected from theft.
Users must be able to encrypt email messages from Outlook Web App.
Retention Requirements
Proseware plans to reduce mailbox server storage usage and to limit company
liability.
Proseware identifies the following requirements:
Email messages in the Deleted Items folder must be retained for only 30 days.
Email messages in a mailbox folder named Projects must be retained for 540 days,
unless the messages contain contractual information.
Email messages in the Projects folder that contain contractual information must be
retained indefinitely.
All other email messages must be removed after one year.
###EndCaseStudy###
DRAG DROP
You need to implement UM for the sales department users.
Which four commands should you run in sequence? (To answer, move the appropriate four
commands from the list of commands to the answer area and arrange them in the correct order.)