You need to ensure that all of the email messages queued on Server3 and Server4 are delivered to the Internet
You have an Exchange Server 2013 organization named adatum.com.
You have a database availability group (DAG) that contains four Exchange servers named Server1,
Server2, Server3, and Server4. The file share witness is on a server named Share1.
The organization has two Send connectors. The Send connectors are configured as shown in the
following table.
Users report that email sent to external recipients is not being received.
You discover that outbound email messages are queued on Server3 and Server4.
You need to ensure that all of the email messages queued on Server3 and Server4 are delivered to
the Internet as quickly as possible.
What should you do?
What should you configure?
Your network contains an Active Directory domain named contoso.com. The domain
contains two member servers named Server1 and Server2. All servers run Windows Server
2012 R2.
Server1 and Server2 have the Failover Clustering feature installed. The servers are
configured as nodes in a failover cluster named Cluster1.
You add two additional nodes to Cluster1.
You have a folder named Folder1 on Server1 that contains Application data.
You plan to provide continuously available access to Folder1.
You need to ensure that all of the nodes in Cluster1 can actively respond to the client
requests for Folder1.
What should you configure?
Which two components should you identify?
You are a network administrator for a company named Humongous Insurance. Humongous
Insurance has an Active Directory forest that contains two domains.
You install the Active Directory Rights Management Services server role on a server named ADRMS1.
The Active Directory Rights Management Services (AD RMS) server uses an internal certification
authority (CA) for all certificates.
You plan to provide users with the ability to use AD RMS to protect all of the email messages sent to
a partner company named Contoso, Ltd.
Contoso does not have AD RMS deployed.
You need to identify which components from the Humongous Insurance network must be accessible
to Contoso to ensure that the users at Contoso can open protected messages.
Which two components should you identify? (Each correct answer presents part of the solution.
Choose two.)
You need to configure the adatum.com zone to support Name Protection
Your network contains an Active Directory domain named contoso.com. The domain
contains a domain controller named DC1 that runs Windows Server 2012 R2. DC1 has the
DNS Server server role installed.
The network contains client computers that run either Linux, Windows 7, or Windows 8.
You have a zone named adatum.com as shown in the exhibit. (Click the Exhibit button.)
You plan to configure Name Protection on all of the DHCP servers.
You need to configure the adatum.com zone to support Name Protection.
What should you do?
Which two settings should you configure?
HOTSPOT
Your network contains an Active Directory domain named contoso.com. All domain
controllers run Windows Server 2012 R2.
The network has the physical sites and TCP/IP subnets configured as shown in the following
table.
You have a web application named App1 that is hosted on six separate Web servers. DNS
has the host names and IP addresses registered as shown in the following table.
You discover that when users connect to appl.contoso.com, they are connected frequently to
a server that is not on their local subnet.
You need to ensure that when the users connect to appl.contoso.com, they connect to a
server on their local subnet. The connections must be distributed across the servers that
host appl.contoso.com on their subnet.
Which two settings should you configure?
To answer, select the appropriate two settings in the answer area.
Which three actions should you perform?
You have an Exchange Server organization that contains four servers. The servers are configured as
shown in the following table.
You are deploying Unified Messaging (UM).
You create a dial plan named UMPlan1 and a UM mailbox policy named UMPlan Mailbox Policy.
You need to ensure that all voice mail sent to the existing extension of a user is delivered to the
user’s mailbox.
Which three actions should you perform? (Each correct answer presents part of the solution. Choose
three.)
You need to ensure that users can resolve contoso.com names
You have a server named Server1 that runs Windows Server 2012 R2. Server1 is located in
the perimeter network and has the DNS Server server role installed.
Server1 has a zone named contoso.com.
You App1y a security template to Server1.
After you App1y the template, users report that they can no longer resolve names from
contoso.com.
On Server1, you open DNS Manager as shown in the DNS exhibit. (Click the Exhibit button.)
On Server1, you open Windows Firewall with Advanced Security as shown in the Firewall
exhibit. (Click the Exhibit button.)
You need to ensure that users can resolve contoso.com names.
What should you do?
which server should you install IPAM?
Your network contains an Active Directory forest named contoso.com. All servers run
Windows Server 2012 R2.
The domain contains four servers. The servers are configured as shown in the following
table.
You need to deploy IP Address Management (IPAM) to manage DNS and DHCP.
On which server should you install IPAM?
Which task should you perform in each environment?
You have an Exchange Server 2013 organization that contains two Mailbox servers and two Client
Access servers.
You have an Active Directory Rights Management Services (AD RMS) cluster. Information Rights
Management (IRM) is enabled for the Exchange Server organization.
All company executives are in a security group named Execs. All of the executives use smartphones
that are managed by using a mobile device mailbox policy. The executives frequently read IRMprotected email messages by using Microsoft Outlook.
You need to ensure that the executives can read the IRM-protected messages on their smartphone.
Which task should you perform in each environment? (To answer, drag the appropriate tasks to the
correct environments. Each task may be used once, more than once, or not at all. You may need to
drag the split bar between panes or scroll to view content.)
Which two actions should you perform?
Your network contains an Active Directory domain named contoso.com. The domain
contains two member servers named Server1 and Server2.
You install the DHCP Server server role on Server1 and Server2. You install the IP Address
Management (IPAM) Server feature on Server1.
You notice that you cannot discover Server1 or Server2 in IPAM.
You need to ensure that you can use IPAM to discover the DHCP infrastructure.
Which two actions should you perform? (Each correct answer presents part of the solution.
Choose two.)