Which cmdlets should you use?
DRAG DROP
You have an Exchange Server 2013 organization that contains five servers.
Several employees plan to use Microsoft Outlook to collaborate on some projects.
You need to configure access to Outlook to meet the following requirements:
Several employees must be able to open only the Inbox of a user named User1.
Several employees must be able to copy email messages from any folder in the mailbox of a user
named User2.
Several employees must be able to create only contacts in the mailbox of a user named User3.
Which cmdlets should you use?
To answer, drag the appropriate cmdlet to the correct requirement in the answer are
a. Each cmdlet may be used once, more than once, or not at all. Additionally, you may need to drag
the split bar between panes or scroll to view content.
Which three actions should you perform next?
DRAG DROP
You have an Exchange Server 2013 organization that contains three servers named EX1, EX2, and
EX3. The servers are members of a database availability group (DAG) named DAG1. A mailbox
database named DB1 is replicated to all the members of DAG1.
EX3 experiences a complete hardware failure.
You need to restore EX3 on a new server.
You reset the computer account for EX3.
Which three actions should you perform next?
To answer, move the three appropriate actions from the list of actions to the answer area and
arrange them in the correct order.
What should you configure for each requirement?
DRAG DROP
You have an Exchange Server 2013 organization named Contoso. The organization is configured to
apply a disclaimer to all email messages sent to external recipients.
Your company works with a partner company named
A.Datum Corporation. A. Datum has an SMTP domain named adatum.com.
You need to ensure that email messages sent to adatum.com meet the following compliance
requirements:
Messages sent to adatum.com must NOT include the disclaimer.
Messages that contain credit card numbers must NOT be sent to adatum.com.
If a user writes a message that contains a credit card number and the message is addressed to a
recipient at adatum.com, the user must receive a notification before the message is sent.
What should you configure for each requirement?
To answer, drag the appropriate configuration to the correct requirement in the answer area. Each
configuration may be used once, more than once, or not at all. Additionally, you may need to drag
the split bar between panes or scroll to view content.
You need to ensure that the hardware load balancer distributes traffic evenly across both Client Access server
You have an Exchange Server 2013 organization that contains one Client Access server. The Client
Access server is accessible from the Internet by using a network address translation (NAT) device.
You deploy an additional Client Access server.
You also deploy an L4 hardware load balancer between the Client Access servers and the NAT
device.
After deploying the hardware load balancer, you discover that all of the Exchange Server traffic is
directed to a single Client Access server.
You need to ensure that the hardware load balancer distributes traffic evenly across both Client
Access servers.
What should you do?
Which three actions should you perform?
DRAG DROP
You have an Exchange Server 2013 organization that contains two servers. The servers are
configured as shown in the following table.
You need to create a new database availability group (DAG) that contains EX1 and EX2.
Which three actions should you perform?
To answer, move the three appropriate actions from the list of actions to the answer area and
arrange them in the correct order.
What should you recommend doing first?
You plan to deploy an Exchange Server 2013 organization.
You need to recommend a solution to ensure that a user named User1 can access email messages by
using Exchange ActiveSync on an Android device.
The solution must prevent all other users from using Android devices to access email by using
Exchange ActiveSync.
What should you recommend doing first?
You need to prevent the finance users from accessing the extended storage on their mobile device
You have an Exchange Server 2013 organization that contains five servers.
All users connect to their mailbox by using a mobile device.
All of the users in the finance department are in an organizational unit (OU) named OU1.
You need to prevent the finance users from accessing the extended storage on their mobile device.
What should you do?
You need to ensure that Admin1 can synchronize the new Windows Phone device by using Exchange ActiveSync
You have an Exchange Server 2013 organization named for Contoso.
A user named Admin1 is a member of the Domain Admins group.
Admin1 fails to synchronize a new Windows Phone device by using Exchange ActiveSync and
receives an HTTP 500 error message. Admin1 successfully logs on to Outlook Web App and Outlook
Anywhere.
You need to ensure that Admin1 can synchronize the new Windows Phone device by using Exchange
ActiveSync.
What should you do?
Which two new policies should you create?
You have an Exchange Server 2013 organization that contains a server named EX1.
Your network contains a non-critical internal application that regularly connects to the POP3 Service
on EX1.
Users report that Outlook Web App performs more slowly than usual.
You discover that EX1 frequently has a CPU utilization that is greater than 85 percent.
You need to configure EX1 temporarily to allocate more processor resources to Outlook Web App
and to allocate less processor resources to POP3.
Which two new policies should you create? (Each correct answer presents part of the solution.
Choose two.)
Which design should you identify?
HOTSPOT
Your company has two offices. The offices are configured as shown in the following table.
The offices connect to each other by using a WAN link that has a latency of more than 700 ms.
You plan to deploy an Exchange Server 2013 organization to meet the following requirements:
Ensure that users can access their mailbox if the WAN link fails.
Ensure that users can access their mailbox if a single server fails.
Ensure that users can access their mailbox if a single database fails.
You recommend deploying one or more database availability groups (DAGs) and mailbox database
copies.
You need to identify which design meets the requirements for the planned deployment.
Which design should you identify?
To answer, select the appropriate design in the answer area.