You need to ensure that access requests are unaffected when the rule is published
Your network contains an Active Directory domain named contoso.com. All servers run
Windows Server 2012 R2.
You are creating a central access rule named TestFinance that will be used to audit
members of the Authenticated Users group for access failure to shared folders in the finance
department.
You need to ensure that access requests are unaffected when the rule is published.
What should you do?
Which cmdlet should you use?
###BeginCaseStudy###
Case Study: 5
Proseware, Inc
Overview
General Overview
Proseware, Inc., is an international manufacturing company that has 1,000 users.
Proseware has a sales department, a marketing department, a research department,
and a human resources department.
Proseware purchases another company named Contoso, Ltd. Contoso has 500
users.
Physical Locations
Proseware has two main offices located in New York and London.
The offices connect to each other by using a WAN link. Each office connects directly
to the Internet. Contoso has a single office in Dallas.
Existing Environment
Active Directory Environment
The Proseware network contains an Active Directory forest named proseware.com.
The forest contains a single domain. All domain controllers run Windows Server
2012.
Each office contains three domain controllers. Each office is configured as an Active
Directory site.
The Contoso network contains an Active Directory forest named contoso.com. The
forest contains a single domain. All domain controllers run Windows Server 2012.
Exchange Server Organization
Proseware has an Exchange Server 2013 organization that contains four servers.
The servers are configured as shown in the following table.
EX3 and EX4 are the members of a database availability group (DAG) named
DAG1.
DAG1 has two DAG networks. The networks are configured as shown in the
following table.
Users connect to mail.proseware.com for Microsoft Outlook and Outlook Web App
services. Mail.proseware.com resolves to an IP address on a hardware load
balancer.
All Outlook Anywhere users are enabled for Cached Exchange Mode.
Proseware pilots a hybrid deployment of Exchange Server 2013 and Microsoft Office
365.
The mailbox of each pilot user is moved to Office 365. For the pilot mailboxes, all
inbound email messages from the Internet are delivered to the Exchange Server
organization, and then forwarded to Office 365.
Contoso has an Exchange Server 2010 organization.
Problem Statements
Proseware identifies the following issues:
MapiNet is saturated with network traffic caused by the database replication between
the members of DAG1 over MapiNet.
The pilot users report that entries added to their Safe Senders list and their Blocked
Senders list fail to work.
A recent power outage in the New York office prevents all users from accessing their
mailbox.
A user named User1 reports that email messages are being sent from her mailbox
without her consent.
Requirements
Planned Changes
Proseware plans to implement the following changes:
Several users at Contoso will use a mailbox at Proseware as their primary mailbox.
The Contoso users will use Autodiscover to configure their client settings and will
use single sign-on.
For a special project, an IT administrator will create 20 distribution groups that will
each contain 200 members.
Certain users in both companies will have a contoso.com SMTP suffix as their
primary email address.
Technical Requirements
Proseware identifies the following technical requirements for the Exchange Server
organization:
Internal email messages must be rejected if the messages cannot be protected by
using Shadow Redundancy.
All database replication between DAG1 members must occur over the ReplNet
network.
Site Resiliency Requirements
Proseware identifies the following site resiliency requirements for the Exchange
Server organization:
All mailboxes must be available if a single site becomes unavailable. The solution
must not require administrator intervention.
User traffic on the WAN links must be minimized.
Email Security Requirements
Proseware identifies the following requirements for securing email messages:
Email recipients must be able to identify whether an email message was modified
during delivery.
All email messages stored in the mailbox databases must be protected from theft.
Users must be able to encrypt email messages from Outlook Web App.
Retention Requirements
Proseware plans to reduce mailbox server storage usage and to limit company
liability.
Proseware identifies the following requirements:
Email messages in the Deleted Items folder must be retained for only 30 days.
Email messages in a mailbox folder named Projects must be retained for 540 days,
unless the messages contain contractual information.
Email messages in the Projects folder that contain contractual information must be
retained indefinitely.
All other email messages must be removed after one year.
###EndCaseStudy###
You discover that the Large Audience MailTip is not displayed when users compose an email
message to the 20 new distribution groups.
You need to ensure that the Large Audience MailTip is displayed for the new distribution groups
immediately.
Which cmdlet should you use?
You need to ensure that the virtual disk has a write-back cache of 5 GB
You create a new virtual disk in a storage pool by using the New Virtual Disk Wizard. You
discover that the new virtual disk has a write-back cache of 1 GB.
You need to ensure that the virtual disk has a write-back cache of 5 GB.
What should you do?
What should you configure?
Your network contains an Active Directory domain named contoso.com. The domain
contains two member servers named Server1 and Server2. All servers run Windows Server
2012 R2.
Server1 and Server2 have the Failover Clustering feature installed. The servers are
configured as nodes in a failover cluster named Cluster1.
You configure File Services and DHCP as clustered resources for Cluster1. Server1 is the
active node for both clustered resources.
You need to ensure that if two consecutive heartbeat messages are missed between
Server1 and Server2, Server2 will begin responding to DHCP requests. The solution must
ensure that Server1 remains the active node for the File Services clustered resource for up
to five missed heartbeat messages.
What should you configure?
You need to prepare the certificate required for the planned deployment
You plan to deploy 20 Client Access servers that will have Exchange Server 2013 installed.
You need to prepare the certificate required for the planned deployment. The solution must ensure
that the same certificate can be used on all of the Client Access servers.
What should you do first?
Which four actions should you recommend?
DRAG DROP
You have an Exchange Server 2013 organization that has Information Rights Management
(IRM) configured. Users report that they cannot apply IRM protection to email messages from
Outlook Web App.
You verify that the users can protect the messages by using IRM from Microsoft Outlook.
You need to recommend a solution to ensure that the users can protect email messages by using
IRM from Outlook Web App. Which four actions should you recommend? To answer, move the four
appropriate actions from the list of actions to the answer area and arrange them in the correct
order.
What should you configure?
Your network contains an Active Directory domain named contoso.com. The domain
contains two member servers named Server1 and Server2. All servers run Windows Server
2012 R2.
Server1 and Server2 have the Failover Clustering feature installed. The servers are
configured as nodes in a failover cluster named Cluster1.
You add two additional nodes to Cluster1.
You need to ensure that Cluster1 stops running if three nodes fail.
What should you configure?
What should you configure?
Information and details provided in a question App1y only to that question.
Your network contains an Active Directory domain named contoso.com. The domain
contains two member servers named Server1 and Server2. All servers run Windows Server
2012 R2.
Server1 and Server2 have the Network Load Balancing (NLB) feature installed. The servers
are configured as nodes in an NLB cluster named Cluster1.
Cluster1 hosts a secure web Application named WebApp1. WebApp1 saves user state
information locally on each node.
You need to ensure that when users connect to WebApp1, their session state is maintained.
What should you configure?
Which two actions should you recommend?
Contoso, Ltd., and Fabrikam, Inc., are partner companies.
Each company has an Exchange Server 2013 organization in a data center that is connected to the
Internet. All of the Exchange servers in both of the organizations have the Client Access server role
and the Mailbox role installed.
The data centers connect to each other by using a redundant high-speed WAN link.
The following mail exchanger (MX) records are configured:
Contoso.com MX 10 mail.contoso.com
Fabrikam.com MX 10 mail.fabrikam.com
You need to recommend a solution for inbound mail flow.
The solution must meet the following requirements:
Users in both companies must receive email from the Internet if either of the Internet links fails.
Mail from the Internet to contoso.com must be received by mail.contoso.com if the Internet link at
the Contoso data center is available.
Mail from the Internet to fabrikam.com must be received by mail.fabrikam.com if the Internet link at
the Fabrikam data center is available.
Which two actions should you recommend? (Each correct answer presents part of the solution.
Choose two.)
What should you configure?
Your network contains an Active Directory domain named contoso.com. The domain
contains two member servers named Server1 and Server2. All servers run Windows Server
2012 R2.
Server1 and Server2 have the Failover Clustering feature installed. The servers are
configured as nodes in a failover cluster named Cluster1.
You add two additional nodes in Cluster1.
You have a folder named Folder1 on Server1 that hosts Application data. Folder1 is a folder
target in a Distributed File System (DFS) namespace.
You need to provide highly available access to Folder1. The solution must support DFS
Replication to Folder1.
What should you configure?