Which cmdlet should you use in a scheduled task?
You have an Exchange Server 2013 organization named adatum.com. The organization contains five
Mailbox servers and two Client Access servers.
You need to ensure that an administrator named user1 receives a daily email message that contains
a log of all the Exchange Server administrative actions.
Which cmdlet should you use in a scheduled task?
Which two actions should you perform?
You have an Exchange Server 2013 organization.
You plan to deploy Exchange ActiveSync for mobile devices. Each mobile device will be
authenticated by using certificates issued by an internal certification authority (CA).
You need to configure the organization to authenticate the mobile devices by using the certificates.
Which two actions should you perform? (Each correct answer presents part of the solution. Choose
two.)
What should you configure?
Your network contains an Active Directory domain named contoso.com.
The domain contains two member servers named Server1 and Server2. All servers run Windows
Server 2012 R2. Server1 and Server2 have the Network Load Balancing (NLB) feature installed.
The servers are configured as nodes in an NLB cluster named Cluster1.
Port rules are configured for all clustered applications.
You need to ensure that Server2 handles all client requests to the cluster that are NOT covered
by a port rule.
What should you configure?
Which three actions should you perform?
You have an Exchange Server 2013 organization that contains two servers named EX1 and EX2.
EX1 and EX2 are the members of a database availability group (DAG) named DAG1.
EX1 and EX2 each contain a copy of a mailbox database named DB1. DB1 is configured to retain
deleted items for 120 days.
At the end of each month, the mailbox databases on EX1 are backed up to tape. The monthly
backups are retained for two years.
A user named User1 has a mailbox in DB1.
User1 discovers that a mailbox folder that contained important email messages was deleted more
than six months ago.
You need to recover the deleted mailbox folder without affecting any other users who have
mailboxes in DB1.
Which three actions should you perform? (Each correct answer presents part of the solution. Choose
three.)
Which cmdlet should you run?
You have an Exchange Server 2010 organization.
All users connect to their mailbox by using Microsoft Outlook 2013 and Outlook Web App. All client
connections to Exchange Server use the name mail.contoso.com.
You deploy Exchange Server 2013 to the organization, you move all of the users to Exchange Server
2013, and then you decommission all of the Exchange Server 2010 servers.
The users report that when they open Outlook 2013, they receive a certificate warning message.
The users do not receive a certificate error message or a certificate warning message when they
open Outlook Web App.
You need to prevent the certificate warning message from occurring when the users open Outlook
2013.
Which cmdlet should you run?
Which two cmdlets should you run?
Your network contains an Active Directory forest. The forest contains two sites named Montreal and
New York.
You have an Exchange Server 2013 organization that contains a Mailbox server and a Client Access
server in each site.
The users in the New York site report that the offline address book (OAB) is not updated after an
extended WAN outage between the sites.
The Montreal site contains the OAB generation server.
You need to ensure that the New York site users download the OAB from a server in the New York
site.
Which two cmdlets should you run? (Each correct answer presents part of the solution. Choose two.)
What should you create?
Your network contains an Active Directory forest. The forest contains two domains named
contoso.com and fabrikam.com. The functional level of the forest is Windows Server 2003.
You have a domain outside the forest named adatum.com.
You need to configure an access solution to meet the following requirements:
– Users in adatum.com must be able to access resources in contoso.com.
– Users in adatum.com must be prevented from accessing resources in
fabrikam.com.
– Users in both contoso.com and fabrikam.com must be prevented from
accessing resources in adatum.com.
What should you create?
Your network contains two Web servers named Server1 and Server2.
Hotspot Question
Your network contains two Web servers named Server1 and Server2.
Both servers run Windows Server 2012 R2.
Server1 and Server2 are nodes in a Network Load Balancing (NLB) cluster.
The NLB cluster contains an application named App1 that is accessed by using the name
appl.contoso.com.
The NLB cluster has the port rules configured as shown in the exhibit. (Click the Exhibit button.)
To answer, complete each statement according to the information presented in the exhibit.
Each correct selection is worth one point.
You need to ensure that all of the Exchange Server services in Branch1 are available if the WAN link fails aft
Your network contains an Active Directory forest. The forest contains one domain. The domain
contains two sites and three domain controllers. The sites and domain controllers are configured as
shown in the following table.
The sites connect to each other by using a WAN link.
You have an Exchange Server 2013 organization that contains two servers in the Main Office site.
In Branch1, you plan to deploy one server to the Exchange Server 2013 organization.
You need to ensure that all of the Exchange Server services in Branch1 are available if the WAN link
fails after the planned deployment.
What should you do?
What should you create?
Your company has a main office site and a disaster recovery site. The two sites connect to each other
by using redundant WAN links. Each site connects directly to the Internet. Each site contains one
Exchange Server 2013 server that is accessible from the Internet.
The company uses the ©contoso.com email address suffix. The DNS records that can be resolved
from the Internet are configured as shown in the following table.
When the Internet link at the main office site fails, the company cannot receive incoming email from
the Internet.
You need to ensure that incoming email from the Internet is delivered to Server1. Incoming email
from the Internet must be delivered to Server2 if Server1 is unavailable.
What should you create?