PrepAway - Latest Free Exam Questions & Answers

Author: admin

What should you do?

You install ISA Server 2006 on a computer that has three network adapters. One of the network adapters is connected to the Internet, one is connected to the Internal network, and one is connected to a perimeter network. The perimeter network adapter and the internal network adapter are connected to private address networks.
You configure ISA Server by applying the 3-Leg Perimeter network template. You run the 3-Leg Perimeter Network Template wizard. You then make the following changes to the firewall policy:
� Create an access rule to allow all traffic between the Internal network and the Internet. � Create an access rule to allow all traffic between the Internal network and the perimeter network.
� Create an access rule to allow SMTP traffic from an SMTP server on the perimeter network to a Microsoft Exchange Server computer on the Internal network. � Create a server publishing rule to allow SMTP traffic from the External network to the SMTP server on the perimeter network.
Users report that they cannot receive e-mail messages from users outside of the Internal network.
You need to allow users to receive e-mail messages from other users on the Internet. You do not want to create a server publishing rule.
What should you do?

What should you do?

Your network contains an ISA Server 2006 computer named ISA1. ISA1 provides Internet access for all users on the companys network. All computers on the network are configured as SecureNAT clients. You create an access rule on ISA1 that allows all users access to all protocols on the External network. You view the Firewall log and the Web Proxy filter log on ISA1 and notice that the URLs of Web sites visited by company users are not displayed. You need to ensure that the URLs of Web sites visited by company users are displayed in the ISA1 log files.
What should you do?

Which two System Monitor performance counters should you add?

Your network contains an ISA Server 2006 computer named ISA1. ISA1 is configured to provide forward Web caching for users on the Internal network. Microsoft SQL Server 2000 Desktop Engine (MSDE 2000) database logging is enabled on ISA1. ISA1 is configured with 512 MB of RAM and a single 60-GB hard disk. During periods of peak usage, users report that it takes longer than usual for Web pages to appear. You need to identify the source of the slow performance. Which two System Monitor performance counters should you add? (Each correct answer presents part of the solution. Choose two.)

What should you do?

You are the administrator of an ISA Server 2006 computer named ISA1. ISA1 is configured to generate daily and monthly reports. ISA1 publishes the reports to a folder named IsaReports. You generate custom reports to indicate user activity during the weekends of the last three months.
The reports for the last five weekends display correct data. However, reports for previous weekends cannot be displayed. Only monthly activity summary reports are available for previous months. You need to provide custom reports that show the actual activity for all the weekends during the last three months. What should you do?

Which two actions should you perform?

You are the Exchange administrator for Fabrikam, Inc. The network consists of a single Active Directory domain named fabrikam.com. Exchange Server 2003 is used as the messaging system.
The default recipient policy is configured to generate SMTP addresses based on the format of givenname_surname@fabrikam.com, in which givenname is the user’s given name or personal name and surname
is the user’s surname or last name.
A user named Karen Berg marries and changes her name to Karen Archer. You need to ensure that Karen’s new e-mail address and associated friendly name appear in her out bound e-mail address. Karen’s original e-mail
address must remain valid for inbound e-mail.
Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)

What are two possible ways to achieve this goal?

You are the Exchange administrator for your company. Some user mailboxes are on servers that run Exchange Server 2003, and other user mailboxes are on servers that run Lotus Notes.
The Lotus Notes connector is installed on an Exchange server. The sales department has been partially migrated from Lotus Notes to Exchange Server 2003. In Active Directory,
you create a mail-enabled universal distribution group named SalesDepartment, to which you add all the Exchange mailboxes for users in the sales department.
The other users in the sales department have Lotus Notes mailboxes. These users are members of a Lotus Notes group named Sales.
Mail-enabled contact objects have been created in Active Directory for users who have Lotus
Notes mailboxes. A mail-enabled contact named Sales has been created in Active Directory for the Sales group in Lotus Notes.
Currently, when an Exchange user sends an e-mail message to the SalesDepartment distribution group, it is delivered to users in the sales department who have Exchange mailboxes,
but it is not delivered to users who have Lotus Notes mailboxes.
You need to ensure that Exchange users can send messages to all users in the sales department.
However,Exchange administrators must not be required to make changes when additional mailboxes are added to Lotus Notes for users in the sales department.
Your solution should minimize traffic between the Exchange servers and Lotus Notes servers.
What are two possible ways to achieve this goal? (Each correct answer presents a complete solution. Choose two.)

What should you do?

You are the Configure the Wingtip Toys SMTP virtual server to forward all unresolved recipientsConfigure the Wingtip Toys SMTP virtual server to forward all unresolved recipients Wingtip Toys acquires a company named Tailspin Toys.
Wingtip Toys has a single Active Directory forest named wingtiptoys.com. Tailspin Toys has a single Active Directory forest named tailspintoys.com.
Wingtip Toys uses a directory synchronization tool to synchronize identity information between the directory services.
For business reasons, you cannot decommission either of the two forests. Users will continue to use either wingtiptoys.com or tailspintoys.com as their primary logon domain.
Users in each forest have mailboxes on servers in their local Exchange organization. When users in both forests search the global address list (GAL),
they must be able to see recipients from both forests.
You need to create the required directory objects in the two forests. For security reasons, you must create objects that have only the minimum necessary rights and permissions.
What should you do?

Which three actions should you perform?

You are the Exchange administrator for your company.
The Exchange organization consists of several sites containing Exchange Server 5.5 computers and several administrative groups containing Exchange Server 2003 computers.
The site named London contains an Exchange Server 5.5 computer named Mail1, which will be retained for the next two years. You install a computer named Mail2 into the London site. You install Exchange Server 2003 on Mail2. You move some mailboxes to Mail2. You find out that the hardware configuration of Mail2 is not adequate for the required workload. In preparation for replacing Mail2, you install a new computer named Mail3 into the administrative group. You install Exchange Server 2003 on Mail3 and move all mailboxes from Mail2 to Mail3. You need to ensure that Mail2 can be removed from the network without disrupting Exchange services.
To minimize the load on Mail3, you must not move any unnecessary roles to it.
Which three actions should you perform? (Each correct answer presents part of the solution. Choose three.)

What should you do on the POP3 virtual server ?

You are the Exchange administrator for your company. The Exchange organisation contains a single server that runs Exchange Server 2003.
The Exchange server supports POP3, IMAP4 and MAPI clients.
Company employees use various client software applications for e-mail.
POP3 users report that they receive a Winmail.dat attachment on every e-mail message that they recieve. The attached file contains only random characters.
You need to ensure that POP3 users do not receive Winmail.dat attachments.
What should you do on the POP3 virtual server ?

Which two actions should you perform?

You are the Exchange administrator for your company. One front-end server and three back-end servers run Exchange Server 2003.
The front-end server provides remote users with access to Microsoft Outlook Web Access.
The only server that is accessible from the internet is the front-end server.
Many users report problems to the helpdesk when using Outlook Web Access for the first time.
You discover that the majorirty of the problems are a result of the users’lack of familarity with Outlook Web Access.
You need to ensure that users are automatically presented with a customizable Help and Outlook Web Access logon Web page.
Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)