PrepAway - Latest Free Exam Questions & Answers

Author: admin

Which tool should you use?

You are planning an Office 365 pilot.
You need to ensure that the environment is ready for Office 365.
Which tool should you use? make sure that your environment is prepared for the Office 365 services. It can find settings in your existing environment that might cause problems when you start to set up or use your services. This will allow you to fix or work around the potential problems to make your deployment path easier to complete.

You need to ensure that User1 can assign administrative…

Your company purchases an Office 365 plan. The company has an Active Directory Domain Services domain.
User1 must be able to manage Office 365 delegation for the company.
You need to ensure that User1 can assign administrative roles to other users.
What should you do? everything or the permission to add them to a dedicated role where they do not have permission (such as discovery management and assigning administrative roles to other users).

Which two tools will achieve the goal?

An organization plans to migrate to Office 365.
You need to estimate the post-migration network traffic.
Which two tools will achieve the goal? Each correct answer presents a complete solution.
NOTE: Each correct selection is worth one point. calculators work for on-premises as well as Office 365 deployments. You can use the Exchange client network bandwidth calculator to estimate the bandwidth required for a specific set of Outlook, Outlook Web App, and mobile device users in your Office 365 deployment. With the Skype for Business and 2013 bandwidth calculator, you enter information about users and the Skype for Business features you want to deploy, and the calculator helps you determine bandwidth requirements. requirements for a Lync Server deployment based on administrator-specified user profiles and network information.

Which ports must you open?

DRAG DROP
A company deploys an Office 365 tenant. All employees use Skype for Business Online.
You need to configure the network firewall to support Skype for Business Online.
Which ports must you open? To answer, drag the appropriate port number to the correct feature or features.
Each port number may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.
Select and Place:

to TCP/IP networking, intranets, and the Internet. Ports and protocol numbers provide access to a host computer. However, they also create a security hazard by allowing uninvited access. Therefore, knowing which port to allow or disable increases a network’s security. If the wrong ports or protocol numbers are disabled on a firewall, router, or proxy server as a security measure, essential services might become unavailable. connection over SSL.

Which cmdlet should you run?

HOTSPOT
You have an Office 365 subscription.
The Office 365 organization contains five temporary administrators. The administrators are members of multiple role groups.
You need to create a script that prevents the temporary administrators from performing administrative tasks from the Office 365 admin center. The solution must meet the following requirements:
Provide the ability to reestablish administrative access to the temporary administrators within 14 days.
Release the Office 365 licenses assigned to the temporary administrators.
Which cmdlet should you run? To answer, select the appropriate options in the answer area.

Explanation/Reference:
Explanation:
The Set-MsolUserLicense cmdlet can be used to adjust the licenses for a user. This can include adding a new license, removing a license, updating the license options, or any combination of these actions.
Example:
The following command removes the for enterprises license from the user. This may result in the user’s data being removed from each service.
Set-MsolUserLicense -UserPrincipalName user@contoso.com -RemoveLicenses
“contoso:ENTERPRISEPACK”
References: https://msdn.microsoft.com/en-us/library/azure/dn194094(v=azure.98).aspx

Hot Area:

Which Windows PowerShell cmdlet should you run?

A company has an Office 365 tenant that has an Enterprise E1 subscription. You synchronize disabled user accounts from an Active Directory Domain Services environment.
You need to enable the user accounts in Office 365.
Which Windows PowerShell cmdlet should you run? panes or scroll to view content. to TCP/IP networking, intranets, and the Internet. Ports and protocol numbers provide access to a host computer. However, they also create a security hazard by allowing uninvited access. Therefore, knowing which port to allow or disable increases a network’s security. If the wrong ports or protocol numbers are disabled on a firewall, router, or proxy server as a security measure, essential services might become unavailable. connection over SSL.

You need to define the methods that you can implement t…

DRAG DROP
You have an Office 365 tenant that has an Enterprise E3 subscription. You enable Azure Rights Management for users in the tenant.
You need to define the methods that you can implement to encrypt email messages.
What should you do? To answer, drag the appropriate method to the correct action. Each method may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.
Select and Place:

Explanation/Reference:

encrypted messages coming from inside your organization or from replies to encrypted messages sent from your organization. attachment, recipients see instructions for opening and viewing the message. Regardless of their type of email service, the experience is the same. The recipient can choose to sign in with a work account associated with https://technet.microsoft.com/en-us/library/dn569289.aspx https://technet.microsoft.com/en-us/library/dn569287.aspx

You need to activate Microsoft Azure Rights Management

You are the Office 365 administrator for a company. You plan to implement rights management.
You need to activate Microsoft Azure Rights Management.
What should you use? work or school account that has the global administrator role for your Office 365 deployment. You should then navigate to the rights management page via Settings > Services & add-ins > Microsoft Azure Information activate.

You need to determine whether someone other than the ma…

An Organization uses Exchange Online. You enable mailbox audit logging for all mailboxes.
User1 reports that her mailbox has been accessed by someone else.
You need to determine whether someone other than the mailbox owner has accessed the mailbox.
What should you do? have been accessed by someone other than the person who owns the mailbox. over the past two weeks. The mailboxes listed in the search results have been enabled for mailbox audit logging. search results in the details pane. mailbox audit log that’s stored as an email message in a hidden folder in the mailbox being audited. Entries from this log are displayed as search results and include a list of mailboxes accessed by a non-owner, who accessed the mailbox and when, the actions performed by the non-owner, and whether the action was successful.


Page 483 of 1,478« First...102030...481482483484485...490500510...Last »