How should you configure the UMDial Plan?
which Directory on EX1 should you review the LogFiles?
Which three actionsshould you perform in sequence?
Which two cmdletsshould you use?
You need to implement a solution that meets the compliance
requirements for the members of the Legal Department.
Which two cmdletsshould you use?
(Each correct answer presents part of the solution. Choose two.)
********************************************************************
Overview
General Overview
Trey Research is a brokerage firm that has 5,000 users. Trey Research has a finance department, a human
resources department, an investment department, anda legal
department.
Trey Research is acquiring a partner company named Fabrikam, Inc.
Physical Locations
Trey Research has four main offices located in Boston, Chicago, New York, and Atlanta. The offices connect to
each other by using a WAN link. The Chicago office
connects directly to the Internet.
Existing Environment
Network Environment
Trey Research has an Active Directory forest named treyresearch.com. The forest contains a single domain. All
domain controllers run Windows Server 2012.
Each office is configured as an Active Directory site.
All user accounts are in an organizational unit (OU) based on their department. All users are in a universal
security group based on their department.
Trey Research has a Lync Server 2013 infrastructure. The infrastructure is configured to required encryption for
voice traffic.
Exchange Server Organization
Trey Research has an Exchange Server organization that contains five servers. The servers are configured as
shown in the following table.
The mailbox databases are mounted on the Exchange servers shown in the following table.
All of the mailboxes of the users in the executivesdepartment are mounted on DB3.
A public folder database named PF1 is mounted on EX5.
The Exchange Server organization has the following configurations:
Users in the legal department use a shared mailbox named Legal. Legal is enabled for In-Place
Hold. Legal is the only mailbox on DB2.
All inbound and outbound email messages to and fromthe Internet are routed through EX1.
Email messages sent and received by Fabrikam are secured by using Mutual TLS.
All public folders are stored in PF1.
All users connect to their mailbox by using Microsoft Outlook 2013 and Outlook Web App.
Fabrikam has an Exchange Server 2013 organization.
Problem Statements
Trey Research identifies the following issues:
After a change to a certificate, users report that email messages sent to Fabrikam are not delivered.
The storage for DB3 fails. The storage will be offline for the next two days.
Requirements
Planned Changes
Trey Research plans to implement the following changes:
Move all public folders to an Exchange Server 2013 server. The solution must ensure that all users cannot
modify the public folders stored on EX5 after the planned move.
Integrate Unified Messaging (UM) services with the Lync Server 2013 infrastructure.
Collaboration Requirements
Custom recipient MailTips created in the Exchange Server organization of Trey Research must be
visible to the users at Fabrikam. The solution mustensure that administrators can define a subset of users who
can share their MailTips.
Auditing Requirements
The following actions must be audited for actions in the Legal mailbox only:
Delegate – Purge mailbox content
Delegate – Transfer file between folders
Administrator – Messages sent by administrator
Administrator – Open any content within the mailbox
Security Requirements
Trey Research identifies the following security requirements:
Ensure that the users in the finance department canprotect email messages from being altered in transit,
regardless of the recipient.
Prevent the email messages sent to the users in thehuman resources department from being forwarded to
external recipients.
Prevent the audio files in voice mail message marked as Private from being extracted from email messages.
Redirect email messages that contain social security information to the legal department.
Compliance Requirements
Trey Research identifies the following compliance requirements:
All users must be notified before they send an email message that contains any five bank account numbers to
an external recipient. The users must be able to override the
requirement if they have a valid business reason tosend the email message.
Users must use a custom message classification whenthey send email messages that contain information
about the planned acquisition of Fabrikam.
Only the users in the legal department must be ableto use eDiscovery to view the contents of email messages
sent by the finance department users.
********************************************************************
A. New-RoleAssignmentPolicy
B. Add-ManagementRoleEntry
C. New-ManagementRole Assignment
D. New-ManagementRole
E. New-ManagementScope
Which four actions should you recommend?
You have an Exchange Server 2013 Organization that has Information Rights Management (IRM) configured.
Users report that they cannot apply IRMProtection to email messages from Outlook Web App.
You verify that the users can protect the messages by using IRMfrom Microsoft Outlook.
You need to recommend a solution to ensure that theusers can protect email messages
by using IRMfrom Outlook Web App.
Which four actions should you recommend?
You need to prepare the certificate required for the planned deployment
You plan to deploy 20 Client Access Servers that will have Exchange Server 2013 installed.
You need to prepare the certificate required for the planned deployment.
The solution must ensure that the same certificate can be used on all of the Client Access Servers.
What should you do first?
A. On one of the Client Access Servers, run the New-ExchangeCertificate cmdlet and specify the
PrivateKeyExportable parameter.
B. On all of the Client Access Servers, run the Get-ExchangeCertificate cmdiet.
C. On one of the Client Access Servers, run the New-ExchangeCertificate cmdiet and specify the
BinaryEncoded parameter.
D. On one of the Client Access Servers, start the Certificates Console and run the Certificate Import W izard.
Which two actions should you recommend?
********************************************************************
Contoso, Ltd., and Fabnkam, Inc., are partner companies.
Each company has an Exchange Server 2013 organization in
a Datacenter that is connected to the Internet.
All of the Exchange Servers in both of the organizations have
the Client Access Server Role and the Mailbox Role installed.
The data centers connect to each other by using a redundant High-Speed WAN link.
The following Mail Exchanger (MX) Records are configured:
Contoso.com MX 10 mail.contoso.com
Fabrikam.com MX 10 mail.fabrikam.com
********************************************************************
You need to recommend a solution for Inbound Mail Flow.
The solution must meet the following requirements:
Users in both companies must receive email from theInternet
if either of the Internet links fails.
Mail from the Internet to contoso.com must be received by mail.contoso.com
if the Internet link at the Contoso Datacenter is available.
Mail from the Internet to fabrikam.com must be received by mail.fabrikam.com
if the Internet link at the Fabrikam Datacenter is available.
Which two actions should you recommend?
(Each correct answer presents part of the solution. Choose two.)
A. Create the following DNS Records:
Contoso.com MX 20 mail.fabrikam.com Fabrikam.com MX20 mail.contoso.com
B. Create the following DNS Records:
Contoso.com MX 10 mail.fabrikam.com Fabrikam.com MX10 mail.contoso.com
C. For each Organization, configure an Internal Relay Domain and a Send Connector.
D. For each Organization, configure an External Relay Domain and a Receive Connector.
E. Create the following DNS records:
Contoso.com MX 5 mail.fabrikam.com Fabrikam.com MX 5 mail.contoso.com
Which three actions should you perform?
You have an Exchange Server 2013 Database Availability Group (DAG).
Each member of the DAGhas two Network Interfaces named Network1 and Network2.
Network1is used for Client Connections.
Network2is used for Database Replication.
Network2 fails.
You discover that replication traffic is sent over Network1.
You need to ensure that all of the Database Replication traffic is sent over Network2.
The solution must minimize Database Replication downtime.
Which three actions should you perform?
What should you change?
You have an Exchange Server 2013 Organization that contains two Servers.
The Servers are configured as shown in the following table.
EX1 and EX2 are members of a Database Availability Group (DAG) named DAG1.
You have a Database named DB1 that replicates to EX1 and EX2.
EX1 fails.
You discover that DB1 does not mount on EX2.
You view the status of the Mailbox Databases as shown in the following table.
You need to ensure that the database attempts to mount on EX2 if EX1 fails.
What should you change?
A. The AutoDatabaseMountDial setting to Lossless
B. The AutoDatabaseMountDial setting to BestAvailabilty
C. The Activation Preference of DB1\EX2
D. The Activation Preference of DB1\EX1
What should you recommend?
Your company has a data center in New York and a Datacenter in Miami.
The company has an Exchange Server 2013 Organization that
contains a Database Availability Group (DAG).
The DAG contains Servers in both Datacenters.
The company plans to deploy Outlook Anywhere to allusers.
You configure the following:
All of the Exchange Server 2013 Virtual Directoriesin the New York Datacenter use a host name of
mail.contoso.com.
All of the Exchange Server 2013 Virtual Directoriesin the Miami Datacenter use a host name of
miami.mail.contoso.com.
In each Datacenter, a certificate from an Enterprise Certification Authority (CA) is configured to contain the
following:
A certificate principal name of mail.contoso.com Subject Alternate Names of mail.contoso.com and
miami.mail.contoso.com
You need to recommend which task must be performed to meet the following requirements:
Users always must attempt to connect first to a Server in the Datacenter where their mailbox is located.
Users must be able to access their mailbox if a Single Datacenter fails.
What should you recommend?
A. Change the External Host Name of the Miami Datacenter to mail.contoso.com.
B. Modify the ExternalUrl of the Autodiscover Virtual Directory of the Client Access Servers.
C. Run the Set-OutlookProvider cmdlet.
D. Run the Add-AvailabilityAddressSpace cmdlet.