Which user role should you assign to User1?
You have a server named Server1.
You install the IP Address Management (IPAM) Server feature on Server1.
You need to provide a user named User1 with the ability to set the access scope of all the
DHCP servers that are managed by IPAM. The solution must use the principle of least
privilege.
Which user role should you assign to User1?
You need to ensure that you can use IPAM on Server1 to manage DNS on DC1
Your network contains an Active Directory domain named contoso.com. The domain
contains a domain controller named DC1 and a member server named Server1. Server1 has
the IP Address Management (IPAM) Server feature installed.
On Dc1, you configure Windows Firewall to allow all of the necessary inbound ports for
IPAM.
On Server1, you open Server Manager as shown in the exhibit. (Click the Exhibit button.)
You need to ensure that you can use IPAM on Server1 to manage DNS on DC1.
What should you do?
Which command should you include in the recommendation?
###BeginCaseStudy###
Case Study: 4
Trey Research
Overview
General Overview
Trey Research is a brokerage firm that has 5,000 users. Trey Research has a
finance department, a human resources department, an investment department, and
a legal department.
Trey Research is acquiring a partner company named Fabrikam, Inc.
Physical Locations
Trey Research has four main offices located in Boston, Chicago, New York, and
Atlanta.
The offices connect to each other by using a WAN link. The Chicago office connects
directly to the Internet.
Existing Environment
Network Environment
Trey Research has an Active Directory forest named treyresearch.com. The forest
contains a single domain. All domain controllers run Windows Server 2012.
Each office is configured as an Active Directory site.
All user accounts are in an organizational unit (OU) based on their department. All
users are in a universal security group based on their department.
Trey Research has a Lync Server 2013 infrastructure. The infrastructure is
configured to required encryption for voice traffic.
Exchange Server Organization
Trey Research has an Exchange Server organization that contains five servers. The
servers are configured as shown in the following table.
The mailbox databases are mounted on the Exchange servers shown in the
following table.
All of the mailboxes of the users in the executives department are mounted on DB3.
A public folder database named PF1 is mounted on EX5.
The Exchange Server organization has the following configurations:
Users in the legal department use a shared mailbox named Legal. Legal is enabled
for In-Place Hold. Legal is the only mailbox on DB2.
All inbound and outbound email messages to and from the Internet are routed
through EX1.
Email messages sent and received by Fabrikam are secured by using Mutual TLS.
All public folders are stored in PF1.
All users connect to their mailbox by using Microsoft Outlook 2013 and Outlook Web
App.
Fabrikam has an Exchange Server 2013 organization.
Problem Statements
Trey Research identifies the following issues:
After a change to a certificate, users report that email messages sent to Fabrikam
are not delivered.
The storage for DB3 fails. The storage will be offline for the next two days.
Requirements
Planned Changes
Trey Research plans to implement the following changes:
Move all public folders to an Exchange Server 2013 server. The solution must
ensure that all users cannot modify the public folders stored on EX5 after the
planned move.
Integrate Unified Messaging (UM) services with the Lync Server 2013 infrastructure.
Collaboration Requirements
Custom recipient MailTips created in the Exchange Server organization of Trey
Research must be visible to the users at Fabrikam. The solution must ensure that
administrators can define a subset of users who can share their MailTips.
Auditing Requirements
The following actions must be audited for actions in the Legal mailbox only:
Delegate – Purge mailbox content
Delegate – Transfer file between folders
Administrator – Messages sent by administrator
Administrator – Open any content within the mailbox
Security Requirements
Trey Research identifies the following security requirements:
Ensure that the users in the finance department can protect email messages from
being altered in transit, regardless of the recipient.
Prevent the email messages sent to the users in the human resources department
from being forwarded to external recipients.
Prevent the audio files in voice mail message marked as Private from being
extracted from email messages.
Redirect email messages that contain social security information to the legal
department.
Compliance Requirements
Trey Research identifies the following compliance requirements:
All users must be notified before they send an email message that contains any five
bank account numbers to an external recipient. The users must be able to override
the requirement if they have a valid business reason to send the email message.
Users must use a custom message classification when they send email messages
that contain information about the planned acquisition of Fabrikam.
1 Only the users in the legal department must be able to use eDiscovery to view the
contents of email messages sent by the finance department users.
###EndCaseStudy###
HOTSPOT
You need to recommend a solution that meets the compliance requirements for emailing bank
account numbers.
Which command should you include in the recommendation? (To answer, select the appropriate
options in the answer area.)
Which tool should you use?
You have a server named SCI that runs a Server Core Installation of Windows Server 2012
R2. Shadow copies are enabled on all volumes.
You need to delete a specific shadow copy. The solution must minimize server downtime.
Which tool should you use?
Which two PowerShell cmdlets should you run in the script?
You have 20 servers that run Windows Server 2012 R2.
You need to create a Windows PowerShell script that registers each server in Windows
Azure Backup and sets an encryption passphrase.
Which two PowerShell cmdlets should you run in the script? (Each correct answer presents
part of the solution. Choose two.)
Which three actions should you recommend?
###BeginCaseStudy###
Case Study: 4
Trey Research
Overview
General Overview
Trey Research is a brokerage firm that has 5,000 users. Trey Research has a
finance department, a human resources department, an investment department, and
a legal department.
Trey Research is acquiring a partner company named Fabrikam, Inc.
Physical Locations
Trey Research has four main offices located in Boston, Chicago, New York, and
Atlanta.
The offices connect to each other by using a WAN link. The Chicago office connects
directly to the Internet.
Existing Environment
Network Environment
Trey Research has an Active Directory forest named treyresearch.com. The forest
contains a single domain. All domain controllers run Windows Server 2012.
Each office is configured as an Active Directory site.
All user accounts are in an organizational unit (OU) based on their department. All
users are in a universal security group based on their department.
Trey Research has a Lync Server 2013 infrastructure. The infrastructure is
configured to required encryption for voice traffic.
Exchange Server Organization
Trey Research has an Exchange Server organization that contains five servers. The
servers are configured as shown in the following table.
The mailbox databases are mounted on the Exchange servers shown in the
following table.
All of the mailboxes of the users in the executives department are mounted on DB3.
A public folder database named PF1 is mounted on EX5.
The Exchange Server organization has the following configurations:
Users in the legal department use a shared mailbox named Legal. Legal is enabled
for In-Place Hold. Legal is the only mailbox on DB2.
All inbound and outbound email messages to and from the Internet are routed
through EX1.
Email messages sent and received by Fabrikam are secured by using Mutual TLS.
All public folders are stored in PF1.
All users connect to their mailbox by using Microsoft Outlook 2013 and Outlook Web
App.
Fabrikam has an Exchange Server 2013 organization.
Problem Statements
Trey Research identifies the following issues:
After a change to a certificate, users report that email messages sent to Fabrikam
are not delivered.
The storage for DB3 fails. The storage will be offline for the next two days.
Requirements
Planned Changes
Trey Research plans to implement the following changes:
Move all public folders to an Exchange Server 2013 server. The solution must
ensure that all users cannot modify the public folders stored on EX5 after the
planned move.
Integrate Unified Messaging (UM) services with the Lync Server 2013 infrastructure.
Collaboration Requirements
Custom recipient MailTips created in the Exchange Server organization of Trey
Research must be visible to the users at Fabrikam. The solution must ensure that
administrators can define a subset of users who can share their MailTips.
Auditing Requirements
The following actions must be audited for actions in the Legal mailbox only:
Delegate – Purge mailbox content
Delegate – Transfer file between folders
Administrator – Messages sent by administrator
Administrator – Open any content within the mailbox
Security Requirements
Trey Research identifies the following security requirements:
Ensure that the users in the finance department can protect email messages from
being altered in transit, regardless of the recipient.
Prevent the email messages sent to the users in the human resources department
from being forwarded to external recipients.
Prevent the audio files in voice mail message marked as Private from being
extracted from email messages.
Redirect email messages that contain social security information to the legal
department.
Compliance Requirements
Trey Research identifies the following compliance requirements:
All users must be notified before they send an email message that contains any five
bank account numbers to an external recipient. The users must be able to override
the requirement if they have a valid business reason to send the email message.
Users must use a custom message classification when they send email messages
that contain information about the planned acquisition of Fabrikam.
1 Only the users in the legal department must be able to use eDiscovery to view the
contents of email messages sent by the finance department users.
###EndCaseStudy###
You need to recommend a solution that meets the compliance requirements for email messages
that contain information about the Fabrikam acquisition.
Which three actions should you recommend? (Each correct answer presents part of the solution.
Choose three.)
Which four cmdlets should you recommend running in sequence?
###BeginCaseStudy###
Case Study: 4
Trey Research
Overview
General Overview
Trey Research is a brokerage firm that has 5,000 users. Trey Research has a
finance department, a human resources department, an investment department, and
a legal department.
Trey Research is acquiring a partner company named Fabrikam, Inc.
Physical Locations
Trey Research has four main offices located in Boston, Chicago, New York, and
Atlanta.
The offices connect to each other by using a WAN link. The Chicago office connects
directly to the Internet.
Existing Environment
Network Environment
Trey Research has an Active Directory forest named treyresearch.com. The forest
contains a single domain. All domain controllers run Windows Server 2012.
Each office is configured as an Active Directory site.
All user accounts are in an organizational unit (OU) based on their department. All
users are in a universal security group based on their department.
Trey Research has a Lync Server 2013 infrastructure. The infrastructure is
configured to required encryption for voice traffic.
Exchange Server Organization
Trey Research has an Exchange Server organization that contains five servers. The
servers are configured as shown in the following table.
The mailbox databases are mounted on the Exchange servers shown in the
following table.
All of the mailboxes of the users in the executives department are mounted on DB3.
A public folder database named PF1 is mounted on EX5.
The Exchange Server organization has the following configurations:
Users in the legal department use a shared mailbox named Legal. Legal is enabled
for In-Place Hold. Legal is the only mailbox on DB2.
All inbound and outbound email messages to and from the Internet are routed
through EX1.
Email messages sent and received by Fabrikam are secured by using Mutual TLS.
All public folders are stored in PF1.
All users connect to their mailbox by using Microsoft Outlook 2013 and Outlook Web
App.
Fabrikam has an Exchange Server 2013 organization.
Problem Statements
Trey Research identifies the following issues:
After a change to a certificate, users report that email messages sent to Fabrikam
are not delivered.
The storage for DB3 fails. The storage will be offline for the next two days.
Requirements
Planned Changes
Trey Research plans to implement the following changes:
Move all public folders to an Exchange Server 2013 server. The solution must
ensure that all users cannot modify the public folders stored on EX5 after the
planned move.
Integrate Unified Messaging (UM) services with the Lync Server 2013 infrastructure.
Collaboration Requirements
Custom recipient MailTips created in the Exchange Server organization of Trey
Research must be visible to the users at Fabrikam. The solution must ensure that
administrators can define a subset of users who can share their MailTips.
Auditing Requirements
The following actions must be audited for actions in the Legal mailbox only:
Delegate – Purge mailbox content
Delegate – Transfer file between folders
Administrator – Messages sent by administrator
Administrator – Open any content within the mailbox
Security Requirements
Trey Research identifies the following security requirements:
Ensure that the users in the finance department can protect email messages from
being altered in transit, regardless of the recipient.
Prevent the email messages sent to the users in the human resources department
from being forwarded to external recipients.
Prevent the audio files in voice mail message marked as Private from being
extracted from email messages.
Redirect email messages that contain social security information to the legal
department.
Compliance Requirements
Trey Research identifies the following compliance requirements:
All users must be notified before they send an email message that contains any five
bank account numbers to an external recipient. The users must be able to override
the requirement if they have a valid business reason to send the email message.
Users must use a custom message classification when they send email messages
that contain information about the planned acquisition of Fabrikam.
1 Only the users in the legal department must be able to use eDiscovery to view the
contents of email messages sent by the finance department users.
###EndCaseStudy###
DRAG DROP
You need to recommend a solution that supports the planned changes for the public folders.
Which four cmdlets should you recommend running in sequence? (To answer, move the appropriate
four cmdlets from the list of cmdlets to the answer area and arrange them in the correct order.)
Which technologies should you identify?
###BeginCaseStudy###
Case Study: 4
Trey Research
Overview
General Overview
Trey Research is a brokerage firm that has 5,000 users. Trey Research has a
finance department, a human resources department, an investment department, and
a legal department.
Trey Research is acquiring a partner company named Fabrikam, Inc.
Physical Locations
Trey Research has four main offices located in Boston, Chicago, New York, and
Atlanta.
The offices connect to each other by using a WAN link. The Chicago office connects
directly to the Internet.
Existing Environment
Network Environment
Trey Research has an Active Directory forest named treyresearch.com. The forest
contains a single domain. All domain controllers run Windows Server 2012.
Each office is configured as an Active Directory site.
All user accounts are in an organizational unit (OU) based on their department. All
users are in a universal security group based on their department.
Trey Research has a Lync Server 2013 infrastructure. The infrastructure is
configured to required encryption for voice traffic.
Exchange Server Organization
Trey Research has an Exchange Server organization that contains five servers. The
servers are configured as shown in the following table.
The mailbox databases are mounted on the Exchange servers shown in the
following table.
All of the mailboxes of the users in the executives department are mounted on DB3.
A public folder database named PF1 is mounted on EX5.
The Exchange Server organization has the following configurations:
Users in the legal department use a shared mailbox named Legal. Legal is enabled
for In-Place Hold. Legal is the only mailbox on DB2.
All inbound and outbound email messages to and from the Internet are routed
through EX1.
Email messages sent and received by Fabrikam are secured by using Mutual TLS.
All public folders are stored in PF1.
All users connect to their mailbox by using Microsoft Outlook 2013 and Outlook Web
App.
Fabrikam has an Exchange Server 2013 organization.
Problem Statements
Trey Research identifies the following issues:
After a change to a certificate, users report that email messages sent to Fabrikam
are not delivered.
The storage for DB3 fails. The storage will be offline for the next two days.
Requirements
Planned Changes
Trey Research plans to implement the following changes:
Move all public folders to an Exchange Server 2013 server. The solution must
ensure that all users cannot modify the public folders stored on EX5 after the
planned move.
Integrate Unified Messaging (UM) services with the Lync Server 2013 infrastructure.
Collaboration Requirements
Custom recipient MailTips created in the Exchange Server organization of Trey
Research must be visible to the users at Fabrikam. The solution must ensure that
administrators can define a subset of users who can share their MailTips.
Auditing Requirements
The following actions must be audited for actions in the Legal mailbox only:
Delegate – Purge mailbox content
Delegate – Transfer file between folders
Administrator – Messages sent by administrator
Administrator – Open any content within the mailbox
Security Requirements
Trey Research identifies the following security requirements:
Ensure that the users in the finance department can protect email messages from
being altered in transit, regardless of the recipient.
Prevent the email messages sent to the users in the human resources department
from being forwarded to external recipients.
Prevent the audio files in voice mail message marked as Private from being
extracted from email messages.
Redirect email messages that contain social security information to the legal
department.
Compliance Requirements
Trey Research identifies the following compliance requirements:
All users must be notified before they send an email message that contains any five
bank account numbers to an external recipient. The users must be able to override
the requirement if they have a valid business reason to send the email message.
Users must use a custom message classification when they send email messages
that contain information about the planned acquisition of Fabrikam.
1 Only the users in the legal department must be able to use eDiscovery to view the
contents of email messages sent by the finance department users.
###EndCaseStudy###
DRAG DROP
You need to identify which technologies must be used to meet the security requirements.
Which technologies should you identify? (To answer, drag the appropriate technologies to the
correct requirements. Each technology may be used once, more than once, or not at all. You may
need to drag the split bar between panes or scroll to view content.)
Which Windows PowerShell cmdlets should you run on each server?
You have 30 servers that run Windows Server 2012 R2.
All of the servers are backed up daily by using Windows Azure Online Backup.
You need to perform an immediate backup of all the servers to Windows Azure Online
Backup.
Which Windows PowerShell cmdlets should you run on each server?
You need to implement a solution that meets the collaboration requirements
###BeginCaseStudy###
Case Study: 4
Trey Research
Overview
General Overview
Trey Research is a brokerage firm that has 5,000 users. Trey Research has a
finance department, a human resources department, an investment department, and
a legal department.
Trey Research is acquiring a partner company named Fabrikam, Inc.
Physical Locations
Trey Research has four main offices located in Boston, Chicago, New York, and
Atlanta.
The offices connect to each other by using a WAN link. The Chicago office connects
directly to the Internet.
Existing Environment
Network Environment
Trey Research has an Active Directory forest named treyresearch.com. The forest
contains a single domain. All domain controllers run Windows Server 2012.
Each office is configured as an Active Directory site.
All user accounts are in an organizational unit (OU) based on their department. All
users are in a universal security group based on their department.
Trey Research has a Lync Server 2013 infrastructure. The infrastructure is
configured to required encryption for voice traffic.
Exchange Server Organization
Trey Research has an Exchange Server organization that contains five servers. The
servers are configured as shown in the following table.
The mailbox databases are mounted on the Exchange servers shown in the
following table.
All of the mailboxes of the users in the executives department are mounted on DB3.
A public folder database named PF1 is mounted on EX5.
The Exchange Server organization has the following configurations:
Users in the legal department use a shared mailbox named Legal. Legal is enabled
for In-Place Hold. Legal is the only mailbox on DB2.
All inbound and outbound email messages to and from the Internet are routed
through EX1.
Email messages sent and received by Fabrikam are secured by using Mutual TLS.
All public folders are stored in PF1.
All users connect to their mailbox by using Microsoft Outlook 2013 and Outlook Web
App.
Fabrikam has an Exchange Server 2013 organization.
Problem Statements
Trey Research identifies the following issues:
After a change to a certificate, users report that email messages sent to Fabrikam
are not delivered.
The storage for DB3 fails. The storage will be offline for the next two days.
Requirements
Planned Changes
Trey Research plans to implement the following changes:
Move all public folders to an Exchange Server 2013 server. The solution must
ensure that all users cannot modify the public folders stored on EX5 after the
planned move.
Integrate Unified Messaging (UM) services with the Lync Server 2013 infrastructure.
Collaboration Requirements
Custom recipient MailTips created in the Exchange Server organization of Trey
Research must be visible to the users at Fabrikam. The solution must ensure that
administrators can define a subset of users who can share their MailTips.
Auditing Requirements
The following actions must be audited for actions in the Legal mailbox only:
Delegate – Purge mailbox content
Delegate – Transfer file between folders
Administrator – Messages sent by administrator
Administrator – Open any content within the mailbox
Security Requirements
Trey Research identifies the following security requirements:
Ensure that the users in the finance department can protect email messages from
being altered in transit, regardless of the recipient.
Prevent the email messages sent to the users in the human resources department
from being forwarded to external recipients.
Prevent the audio files in voice mail message marked as Private from being
extracted from email messages.
Redirect email messages that contain social security information to the legal
department.
Compliance Requirements
Trey Research identifies the following compliance requirements:
All users must be notified before they send an email message that contains any five
bank account numbers to an external recipient. The users must be able to override
the requirement if they have a valid business reason to send the email message.
Users must use a custom message classification when they send email messages
that contain information about the planned acquisition of Fabrikam.
1 Only the users in the legal department must be able to use eDiscovery to view the
contents of email messages sent by the finance department users.
###EndCaseStudy###
You need to implement a solution that meets the collaboration requirements.
What should you do?