PrepAway - Latest Free Exam Questions & Answers

Author: seenagape

Which three actions should you perform?

You have an Exchange Server organization that contains four servers.
The servers are configured as shown in the following table.

You are deploying Unified Messaging (UM).
You create a dial plan named UMPIan1 and a UM mailbox policy named UMPlan Mailbox Policy.
You need to ensure that all voice mail sent to
the existing extension of a user is delivered to the user’s mailbox.
Which three actions should you perform?
(Each correct answer presents part of the solution. Choose three.)
A. Configure the IP-PBX to route calls to EX3 and EX4
B. Assign EX1 and EX2 to UMPIan1.
C. Create a UM IP Gateway.
D. Assign EX3 and EX4 to UMPIan1.
E. Configure the IP-PBX to route calls to EX1 and EX2.

Which task should you perform in each environment?

You have an Exchange Server 2013 organization that contains two Mailbox Servers and two Client Access
Servers.
You have an Active Directory Rights Management Services (AD RMS) Cluster.
Information Rights Management (IRM) is enabled for the Exchange Server Organization.
All company executives are in a Security Group named Execs.
All of the executives use Smartphones that are managed by using a Mobile Device Mailbox Policy.
The executives frequently read IRM-Protected email messages by using Microsoft Outlook.
You need to ensure that the executives can read theIRM-Protected messages on their Smartphone.
Which task should you perform in each environment?

Which three commands should you run in sequence?

Your company has two offices.
Each office is configured as an Active Directory Site.
The sites are named Site1 and Site2.
You have an Exchange Server 2013 organization that is configured as shown in
the following exhibit. (Click the Exhibit button.)
Datacenter Activation Coordination (DAC) mode is enabled on
the Database Availability Group (DAG) named DAG1.
You are testing a Site Failover by shutting down all of the Servers in Site1.
You need to mount the Databases in Site2.
Which three commands should you run in sequence?

Which technologies should you recommend?

You have an Exchange Server 2013 organization.
Your company identifies the following security requirements:
USERS MUST BE ABLE TO SEND ENCRYPTED EMAIL MESSAGES
THAT CAN ONLY BE DECRYPTED BY THE INTENDED RECIPIENT.
ALL EMAIL MESSAGES SENT BY A USER NAMED USER1
TO AN EXTERNAL RECIPIENT MUST BE PROTECTED BY USINGTLS.
ALL SMTP SESSIONS TO A REMOTE SMTP HOST
NAMED SMTP1 MUST BE ENCRYPTED.
You need to recommend which technology must be usedto meet each requirement.
Which technologies should you recommend?

You need to prevent an Automatic Failover of DAG1 if the WAN Link between the two sites fails but the Servers

Your Company has a main office and a Disaster Recovery Site.
An Active Directory Site named MainSite exists for the Main Office.
An Active Directory Site named DRSite exists for the Disaster Recovery Site.
The two Sites connect to each other by using a WAN Link. All users work in the Main Office.
You have an Exchange Server 2013 organization.
The organization contains six Servers.
The servers are configured as shown in the following table.

All of the Mailbox Servers are members of a Database Availability Group (DAG) named DAG1.
After a WAN Link failure, you discover that all of the Active Mailbox Database Copies are located
on MBX3, even though MBX1 and MBX2 are still running.
You need to prevent an Automatic Failover of DAG1 if the WAN Link between the two sites fails but the Servers
in both sites are still running.
The solution must prevent two active copies of the same Database.
What should you do?

You need to recommend a solution to ensure that users can access their mailbox on EX1 or EX4 during the migra

You have an Exchange Server 2010 Organization that contains three Servers.
The Servers are configured as shown in the following table.

Microsoft Outlook is configured to connect to an FQDNof mail.adatum.com.
mail.adatum.com resolves to the IP Address of a Layer 7 Hardware Load Balancer.
The Hardware Load Balancer is configured to send traffic to EX2 and EX3.
You deploy an Exchange Server 2013 Mailbox Server and an Exchange Server 2013 Client Access Server.
You plan to migrate all Mailboxes to Exchange Server 2013.
You need to recommend a solution to ensure that users can
access their mailbox on EX1 or EX4 during the migration.
What should you do?
A. Create a Client Access Server Array that containsEX1 and EX5.
B. Modify the autodiscover.contoso.com Resource Record to point to EX5.
C. Modify the properties of the Hardware Load Balancer to point to EX5.
D. Create a DNS Record named legacy.contoso.com in the Internal DNS Zone.

Which two tasks should you recommend performing?

Your company has three Datacenters.
The data centers are located in Montreal, New York,and Seattle.
You have an Exchange Server 2013 Organization that contains six Servers.
The Servers are configured as shown in the following table.

The organization is configured as shown in the following exhibit. (Click the Exhibit button.)

The File Share Witness for DAG1 is located on EX3.
You plan to implement Site Resiliency and use a Single Name Space named mail.contoso.com.
You need to recommend a solution to minimize the amount of time that the Exchange Server Services are
unavailable if either the data center in Montreal or the Datacenter in Seattle fails.
Which two tasks should you recommend performing?
(Each correct answer presents part of solution. Choose two.)
A. Deploy a Hardware Load Balancer to EX3 and EX6.
B. Create two DNSHost (A) Records for mail.contoso.com.
C. Configure EX6 as an alternate File Share Witness.
D. Move the File Share Witness to Server1.

Which two possible rules achieve this goal?

You have an Exchange Server 2013 organization.
You create a Data Loss Prevention (DLP) policy.
The mode of the DLPPolicy is set to Enforce.
You need to ensure that email messages containing
Social Security Numbers from the United States are blocked.
Which two possible rules achieve this goal?
(Each correct answer presents a complete solution.Choose two.)
A. U.S. State Breach: Allow Override
B. U.S. State Breach: Scan email sent outside – low count
C. U.S. State Breach: Scan email sent outside – highcount
D. U.S. State Breach: Scan text limit exceeded
E. U.S. State Breach: Attachment not supported

Which two actions should you perform?

You have an Exchange Server 2013 Organization.
You purchase a Microsoft Office 365 Subscription and configure a Hybrid Deployment.
The Network contains an SMTP Relay Server named smarthost.contoso.com.
The Server is configured to use a certificate that has a subject name of smarthost.contoso.com.
All users have Microsoft Outlook 2013 installed on their client computer.
Outlook 2013 is configured to connect to mail.contoso.com.
All Exchange servers have a certificate that has a subject name of mail.contoso.com.
You discover that email messages sent from on-premises users are not delivered to Office 365 recipients.
You discover that the Send connector for Office 365uses a smart host of smarthost.contoso.com.
You need to ensure that the on-premises users can send email messages to the Office 365 recipients.
Which two actions should you perform?
(Each correct answer presents part of the solution. Choose two.)
A. Run the Hybrid Configuration Wizard again.
B. Configure the Microsoft Exchange Online Protection (EOP) Send Connector to use smarthost.contoso.com
C. Configure the Centralized Mail Transport option.
D. Remove the Smart Host from the Send Connector.
E. Assign a certificate that has a Subject Name of smarthost.contoso.com to the Send Connector.

What are two possible ways to achieve this goal?

Users access their mailbox by using Microsoft Outlook 2010 and Outlook Web App.
You enable auditing for all of the mailboxes.
You need to identify when a mailbox is accessed by someone other than the owner of the mailbox.
What are two possible ways to achieve this goal?
(Each correct answer presents a complete solution. Choose two.)
A. Export the Administrator Audit Log.
B. Run an Administrator Role Group Report.
C. Export the Mailbox Audit Log.
D. Run a Non-Owner Mailbox Access Report.
E. Review the Security Event Log.