Which two actions should you perform?
Your network contains an Active Directory domain named contoso.com. The domain
contains a server named Server1 that runs Windows Server 2012 R2. Server1 has the
Active Directory Certificate Services server role installed and is configured as an enterprise
certification authority (CA).
You need to ensure that all of the users in the domain are issued a certificate that can be
used for the following purposes:
Email security
Client authentication
Encrypting File System (EFS)
Which two actions should you perform? (Each correct answer presents part of the solution.
Choose two.)
Which DAG design should you recommend?
###BeginCaseStudy###
Case Study: 2
A)
Datum
Overview
General Overview
A)
Datum Corporation is a pet supply company that has stores across North
America.
A)
Datum has an Exchange Server 2007 organization. A. Datum plans to migrate to
Exchange Server 2013.
Physical Locations
A)
Datum has five locations. The locations are configured as shown in the following
table.
Existing Environment
Network Infrastructure
All of the locations connect to the each other by using a WAN link. The New York,
Toronto, and Chicago locations connect directly to the Internet.
All client computers run Windows 7 and Office 2010. All servers run Windows Server
2008.
Active Directory Environment
The network contains an Active Directory domain named adatum.local. Adatum.local
is the corporate domain based in the United States. The network contains a domain
named
Canada.adatum.local. Canada.adatum.local is the domain for the stores in Canada.
Each location is configured as an Active Directory site.
The forest functional level is Windows Server 2008.
The main office and both of the distribution centers each has two domain controllers
for their respective domain. All of the other locations have one domain controller for
their respective domain. All of the domain controllers are global catalog servers.
Exchange Infrastructure
The main office and the distribution centers each have three servers that have
Exchange Server 2007 installed.
The servers have the following configurations:
Two of the servers have cluster continuous replication (CCR) deployed
One of the servers has the Client Access server role and the Hub Transport server
role installed Each store contains a server that has Exchange Server 2007 installed.
Each server has mailboxes for active users and mailboxes for inactive users. Each
server has approximately 50 mailboxes.
Remote users access Outlook Web Access by using a namespace of
mail.adatum.com, which resolves to the Client Access server in the New York office.
Requirements
Planned Changes
The company plans to implement the following changes:
Migrate all of the mailboxes in the main office and the distribution centers to
Exchange Server 2013.
Integrate a new telephone system to the Exchange Server 2013 organization.
Deploy a standalone certification authority (CA) that will be used to issue all of the
certificates for the messaging infrastructure.
Technical Requirements
The company identifies the following technical requirements:
Hardware costs must be minimized whenever possible.
The impact on end users if a site fails must be minimized.
Voice mail traffic between the telephone system and the Exchange Server
environment must be encrypted.
Each user must be able to access the internal resources and their mailbox by using
a single user account.
Compliance Requirements
After a security review, the company identifies the following compliance
requirements for the new Exchange Server environment:
All administrative changes made to the mailboxes must be tracked.
The legal department must be able to search for messages in all of the mailboxes.
Users must be prevented from sending email during an upcoming statutory holiday.
All store managers must be prevented from permanently deleting email messages
from their Inbox.
All email messages must be archived for a minimum of five years to meet regulatory
requirements.
Management occasionally sends the staff internal memos that contain confidential
information, such as sales figures. The memos must be protected so that
unauthorized users cannot read the memos and internal users cannot forward the
memos to external recipients.
The users in the research department must be able to send email to anyone in the
organization, but only the members of a group named Execs must be able to send
email to the research users. All other users must be notified that email sent to the
research users will remain undelivered.
###EndCaseStudy###
HOTSPOT
You need to recommend a database availability group (DAG) design that meets the technical
requirements. Which DAG design should you recommend? To answer, select the appropriate design
in the answer area.
What should you recommend configuring?
###BeginCaseStudy###
Case Study: 2
A)
Datum
Overview
General Overview
A)
Datum Corporation is a pet supply company that has stores across North
America.
A)
Datum has an Exchange Server 2007 organization. A. Datum plans to migrate to
Exchange Server 2013.
Physical Locations
A)
Datum has five locations. The locations are configured as shown in the following
table.
Existing Environment
Network Infrastructure
All of the locations connect to the each other by using a WAN link. The New York,
Toronto, and Chicago locations connect directly to the Internet.
All client computers run Windows 7 and Office 2010. All servers run Windows Server
2008.
Active Directory Environment
The network contains an Active Directory domain named adatum.local. Adatum.local
is the corporate domain based in the United States. The network contains a domain
named
Canada.adatum.local. Canada.adatum.local is the domain for the stores in Canada.
Each location is configured as an Active Directory site.
The forest functional level is Windows Server 2008.
The main office and both of the distribution centers each has two domain controllers
for their respective domain. All of the other locations have one domain controller for
their respective domain. All of the domain controllers are global catalog servers.
Exchange Infrastructure
The main office and the distribution centers each have three servers that have
Exchange Server 2007 installed.
The servers have the following configurations:
Two of the servers have cluster continuous replication (CCR) deployed
One of the servers has the Client Access server role and the Hub Transport server
role installed Each store contains a server that has Exchange Server 2007 installed.
Each server has mailboxes for active users and mailboxes for inactive users. Each
server has approximately 50 mailboxes.
Remote users access Outlook Web Access by using a namespace of
mail.adatum.com, which resolves to the Client Access server in the New York office.
Requirements
Planned Changes
The company plans to implement the following changes:
Migrate all of the mailboxes in the main office and the distribution centers to
Exchange Server 2013.
Integrate a new telephone system to the Exchange Server 2013 organization.
Deploy a standalone certification authority (CA) that will be used to issue all of the
certificates for the messaging infrastructure.
Technical Requirements
The company identifies the following technical requirements:
Hardware costs must be minimized whenever possible.
The impact on end users if a site fails must be minimized.
Voice mail traffic between the telephone system and the Exchange Server
environment must be encrypted.
Each user must be able to access the internal resources and their mailbox by using
a single user account.
Compliance Requirements
After a security review, the company identifies the following compliance
requirements for the new Exchange Server environment:
All administrative changes made to the mailboxes must be tracked.
The legal department must be able to search for messages in all of the mailboxes.
Users must be prevented from sending email during an upcoming statutory holiday.
All store managers must be prevented from permanently deleting email messages
from their Inbox.
All email messages must be archived for a minimum of five years to meet regulatory
requirements.
Management occasionally sends the staff internal memos that contain confidential
information, such as sales figures. The memos must be protected so that
unauthorized users cannot read the memos and internal users cannot forward the
memos to external recipients.
The users in the research department must be able to send email to anyone in the
organization, but only the members of a group named Execs must be able to send
email to the research users. All other users must be notified that email sent to the
research users will remain undelivered.
###EndCaseStudy###
DRAG DROP
You need to recommend a solution to meet the compliance requirements for the research
department and the statutory holidays. What should you recommend configuring? To answer, drag
the appropriate object to the correct location in the answer area. Each object may be used once,
more than once, or not at all. Additionally, you may need to drag the split bar between panes or
scroll to view content.
You need to assign a user named User1 permission to add and delete records from the contoso.com zone only
Your network contains an Active Directory domain named contoso.com. The domain
contains a server named Server1 that runs Windows Server 2012 R2 and has the DNS
Server server role installed.
Server1 has a zone named contoso.com. The zone is configured as shown in the exhibit.
(Click the Exhibit button.)
You need to assign a user named User1 permission to add and delete records from the
contoso.com zone only.
What should you do first?
You need to identify which Group Policy object (GPO) name prefix must be used for IPAM Group Policies
Your network contains an Active Directory domain named contoso.com. The domain
contains a server named Server1 that runs Windows Server 2012 R2 and has the DHCP
Server server role installed.
An administrator installs the IP Address Management (IPAM) Server feature on a server
named Server2. The administrator configures IPAM by using Group Policy based
provisioning and starts server discovery.
You plan to create Group Policies for IPAM provisioning.
You need to identify which Group Policy object (GPO) name prefix must be used for IPAM
Group Policies.
What should you do on Server2?
What should you recommend doing before implementing the organization relationship?
###BeginCaseStudy###
Case Study: 3
Contoso Ltd
Overview
General Overview
Contoso, Ltd., is an aerospace engineering company that manufactures jet engine
parts for various industries and government agencies. Contoso has an Exchange
Server 2013 organization.
A partner company named Tailspin Toys has an Exchange Server 2010
organization.
Physical Locations
Contoso has two offices. The offices are located in Montreal and Chicago.
Each office contains a data center:
The Montreal and Chicago offices connect to each other by using a direct WAN link.
All connections to the Internet are routed through the Montreal office.
Most of Contoso’s employees work from the Montreal office.
Existing Environment
The network of Contoso is configured as shown in the exhibit. (Click the Exhibit
button.)
The network of Contoso contains the following components:
Client computers that run either Microsoft Outlook 2007 or Outlook 2010.
Users who have a primary SMTP address that uses the contoso.com suffix.
A retention policy that retains all email messages for 580 days and is associated to
all users.
Six servers that have Exchange Server installed. The servers are configured as
shown in the following table.
A data availability group (DAG) named DAG1 that contains all of the mailbox
servers. EX5 is configured as the witness server for DAG1. A file server in the
Chicago office is configured as an alternate witness server. DAG1 has Datacenter
Activation Coordination (DAC) mode enabled.
Requirements
Planned Changes
Contoso plans to implement the following changes:
Implement an organization relationship between Contoso and Tailspin Toys.
Move the mailboxes of all the members of the sales department to Office 365.
Evaluate Unified Messaging (UM) by conducting a small pilot in the Montreal office.
Security Requirements
Contoso identifies the following security requirements:
Ensure that the data in the Exchange Server databases cannot be read if a hard disk
is stolen.
Prevent temporary employees from executing a Reply All or a Forward of any email
messages they receive.
Prevent temporary contractors from changing the configurations of the user accounts
for the users in the research and development department.
Ensure that all of the connections to Outlook Web App from the Internet use
Extensible Authentication Protocol (EAP) protocols and Transport Layer Security
(TLS) protocols.
Secure all of the email messages from the users at Tailspin Toys to the Contoso
users. Ensure that all of the messages can be secured if the certificates at Tailspin
Toys are issued by a trusted third-party certification authority (CA).
Auditing Requirements
Contoso identifies the following requirements for auditing mailboxes:
The manager of the legal department must receive a daily report by email that
contains a record of all the eDiscovery mailbox searches.
Any access to a mailbox by a service account must be excluded from the daily
report.
Compliance Requirements
All of the email messages in the Sent Items folder of each user in the marketing
department of Contoso must be deleted automatically after 365 days.
Office 365 Coexistence Requirements
Contoso identifies the following Office 365 coexistence requirements:
Office 365 users must be able to access their mailbox by using their Active Directory
user account in Contoso.
On-premises users must be able to share free/busy information and calendar
information with the Office 365 users.
###EndCaseStudy###
You are evaluating the implementation of the organization relationship.
You need to recommend which tasks must be performed to ensure that the Contoso users can view
the Out of Office message of the Tailspin Toys users before the Contoso users send a message to the
Tailspin Toys users.
What should you recommend doing before implementing the organization relationship?
Which IPV6 scope prefix should you use?
Your network contains an Active Directory domain named contoso.com. The domain
contains a server named Server1 that runs Windows Server 2012 R2 and has the DHCP
Server server role installed.
You need to create an IPv6 scope on Server1. The scope must use an address space that is
reserved for private networks. The addresses must be routable.
Which IPV6 scope prefix should you use?
Which two technologies should you identify?
###BeginCaseStudy###
Case Study: 3
Contoso Ltd
Overview
General Overview
Contoso, Ltd., is an aerospace engineering company that manufactures jet engine
parts for various industries and government agencies. Contoso has an Exchange
Server 2013 organization.
A partner company named Tailspin Toys has an Exchange Server 2010
organization.
Physical Locations
Contoso has two offices. The offices are located in Montreal and Chicago.
Each office contains a data center:
The Montreal and Chicago offices connect to each other by using a direct WAN link.
All connections to the Internet are routed through the Montreal office.
Most of Contoso’s employees work from the Montreal office.
Existing Environment
The network of Contoso is configured as shown in the exhibit. (Click the Exhibit
button.)
The network of Contoso contains the following components:
Client computers that run either Microsoft Outlook 2007 or Outlook 2010.
Users who have a primary SMTP address that uses the contoso.com suffix.
A retention policy that retains all email messages for 580 days and is associated to
all users.
Six servers that have Exchange Server installed. The servers are configured as
shown in the following table.
A data availability group (DAG) named DAG1 that contains all of the mailbox
servers. EX5 is configured as the witness server for DAG1. A file server in the
Chicago office is configured as an alternate witness server. DAG1 has Datacenter
Activation Coordination (DAC) mode enabled.
Requirements
Planned Changes
Contoso plans to implement the following changes:
Implement an organization relationship between Contoso and Tailspin Toys.
Move the mailboxes of all the members of the sales department to Office 365.
Evaluate Unified Messaging (UM) by conducting a small pilot in the Montreal office.
Security Requirements
Contoso identifies the following security requirements:
Ensure that the data in the Exchange Server databases cannot be read if a hard disk
is stolen.
Prevent temporary employees from executing a Reply All or a Forward of any email
messages they receive.
Prevent temporary contractors from changing the configurations of the user accounts
for the users in the research and development department.
Ensure that all of the connections to Outlook Web App from the Internet use
Extensible Authentication Protocol (EAP) protocols and Transport Layer Security
(TLS) protocols.
Secure all of the email messages from the users at Tailspin Toys to the Contoso
users. Ensure that all of the messages can be secured if the certificates at Tailspin
Toys are issued by a trusted third-party certification authority (CA).
Auditing Requirements
Contoso identifies the following requirements for auditing mailboxes:
The manager of the legal department must receive a daily report by email that
contains a record of all the eDiscovery mailbox searches.
Any access to a mailbox by a service account must be excluded from the daily
report.
Compliance Requirements
All of the email messages in the Sent Items folder of each user in the marketing
department of Contoso must be deleted automatically after 365 days.
Office 365 Coexistence Requirements
Contoso identifies the following Office 365 coexistence requirements:
Office 365 users must be able to access their mailbox by using their Active Directory
user account in Contoso.
On-premises users must be able to share free/busy information and calendar
information with the Office 365 users.
###EndCaseStudy###
You need to identify which technologies must be deployed to meet the Office 365 coexistence
requirements.
Which two technologies should you identify? (Each correct answer presents part of the solution.
Choose two.)
Which three actions should you perform?
###BeginCaseStudy###
Case Study: 3
Contoso Ltd
Overview
General Overview
Contoso, Ltd., is an aerospace engineering company that manufactures jet engine
parts for various industries and government agencies. Contoso has an Exchange
Server 2013 organization.
A partner company named Tailspin Toys has an Exchange Server 2010
organization.
Physical Locations
Contoso has two offices. The offices are located in Montreal and Chicago.
Each office contains a data center:
The Montreal and Chicago offices connect to each other by using a direct WAN link.
All connections to the Internet are routed through the Montreal office.
Most of Contoso’s employees work from the Montreal office.
Existing Environment
The network of Contoso is configured as shown in the exhibit. (Click the Exhibit
button.)
The network of Contoso contains the following components:
Client computers that run either Microsoft Outlook 2007 or Outlook 2010.
Users who have a primary SMTP address that uses the contoso.com suffix.
A retention policy that retains all email messages for 580 days and is associated to
all users.
Six servers that have Exchange Server installed. The servers are configured as
shown in the following table.
A data availability group (DAG) named DAG1 that contains all of the mailbox
servers. EX5 is configured as the witness server for DAG1. A file server in the
Chicago office is configured as an alternate witness server. DAG1 has Datacenter
Activation Coordination (DAC) mode enabled.
Requirements
Planned Changes
Contoso plans to implement the following changes:
Implement an organization relationship between Contoso and Tailspin Toys.
Move the mailboxes of all the members of the sales department to Office 365.
Evaluate Unified Messaging (UM) by conducting a small pilot in the Montreal office.
Security Requirements
Contoso identifies the following security requirements:
Ensure that the data in the Exchange Server databases cannot be read if a hard disk
is stolen.
Prevent temporary employees from executing a Reply All or a Forward of any email
messages they receive.
Prevent temporary contractors from changing the configurations of the user accounts
for the users in the research and development department.
Ensure that all of the connections to Outlook Web App from the Internet use
Extensible Authentication Protocol (EAP) protocols and Transport Layer Security
(TLS) protocols.
Secure all of the email messages from the users at Tailspin Toys to the Contoso
users. Ensure that all of the messages can be secured if the certificates at Tailspin
Toys are issued by a trusted third-party certification authority (CA).
Auditing Requirements
Contoso identifies the following requirements for auditing mailboxes:
The manager of the legal department must receive a daily report by email that
contains a record of all the eDiscovery mailbox searches.
Any access to a mailbox by a service account must be excluded from the daily
report.
Compliance Requirements
All of the email messages in the Sent Items folder of each user in the marketing
department of Contoso must be deleted automatically after 365 days.
Office 365 Coexistence Requirements
Contoso identifies the following Office 365 coexistence requirements:
Office 365 users must be able to access their mailbox by using their Active Directory
user account in Contoso.
On-premises users must be able to share free/busy information and calendar
information with the Office 365 users.
###EndCaseStudy###
DRAG DROP
You need to create a federation trust for the planned organization relationship. Which three actions
should you perform?
To answer, move the three appropriate actions from the list of actions to the answer area and
arrange them in the correct order.
Which three actions should recommend?
###BeginCaseStudy###
Case Study: 3
Contoso Ltd
Overview
General Overview
Contoso, Ltd., is an aerospace engineering company that manufactures jet engine
parts for various industries and government agencies. Contoso has an Exchange
Server 2013 organization.
A partner company named Tailspin Toys has an Exchange Server 2010
organization.
Physical Locations
Contoso has two offices. The offices are located in Montreal and Chicago.
Each office contains a data center:
The Montreal and Chicago offices connect to each other by using a direct WAN link.
All connections to the Internet are routed through the Montreal office.
Most of Contoso’s employees work from the Montreal office.
Existing Environment
The network of Contoso is configured as shown in the exhibit. (Click the Exhibit
button.)
The network of Contoso contains the following components:
Client computers that run either Microsoft Outlook 2007 or Outlook 2010.
Users who have a primary SMTP address that uses the contoso.com suffix.
A retention policy that retains all email messages for 580 days and is associated to
all users.
Six servers that have Exchange Server installed. The servers are configured as
shown in the following table.
A data availability group (DAG) named DAG1 that contains all of the mailbox
servers. EX5 is configured as the witness server for DAG1. A file server in the
Chicago office is configured as an alternate witness server. DAG1 has Datacenter
Activation Coordination (DAC) mode enabled.
Requirements
Planned Changes
Contoso plans to implement the following changes:
Implement an organization relationship between Contoso and Tailspin Toys.
Move the mailboxes of all the members of the sales department to Office 365.
Evaluate Unified Messaging (UM) by conducting a small pilot in the Montreal office.
Security Requirements
Contoso identifies the following security requirements:
Ensure that the data in the Exchange Server databases cannot be read if a hard disk
is stolen.
Prevent temporary employees from executing a Reply All or a Forward of any email
messages they receive.
Prevent temporary contractors from changing the configurations of the user accounts
for the users in the research and development department.
Ensure that all of the connections to Outlook Web App from the Internet use
Extensible Authentication Protocol (EAP) protocols and Transport Layer Security
(TLS) protocols.
Secure all of the email messages from the users at Tailspin Toys to the Contoso
users. Ensure that all of the messages can be secured if the certificates at Tailspin
Toys are issued by a trusted third-party certification authority (CA).
Auditing Requirements
Contoso identifies the following requirements for auditing mailboxes:
The manager of the legal department must receive a daily report by email that
contains a record of all the eDiscovery mailbox searches.
Any access to a mailbox by a service account must be excluded from the daily
report.
Compliance Requirements
All of the email messages in the Sent Items folder of each user in the marketing
department of Contoso must be deleted automatically after 365 days.
Office 365 Coexistence Requirements
Contoso identifies the following Office 365 coexistence requirements:
Office 365 users must be able to access their mailbox by using their Active Directory
user account in Contoso.
On-premises users must be able to share free/busy information and calendar
information with the Office 365 users.
###EndCaseStudy###
DRAG DROP
You need to recommend which tasks must be performed to meet the compliance requirement for
the marketing department.
Which three actions should recommend?
To answer, move the three appropriate actions from the list of actions to the answer area and
arrange them in the correct order.