Which three actions should you perform in sequence?
DRAG DROP
You have an Exchange Server 2016 organization. The organization contains two Mailbox servers.
You have a database that is replicated to both servers. The database contains 500 mailboxes.
You add new volumes to the Mailbox servers.
You need to move all of the mailbox data to the new volumes. The solution must meet the following
requirements:
Ensure that multiple copies of the mailbox data are available at all times.
Minimize downtime for the mailbox users.
Which three actions should you perform in sequence? To answer, move the appropriate actions from the list of
actions to the answer area and arrange them in the correct order.
Select and Place:
You need to ensure that a user named Contoso\\User1 can…
Your network contains an Active Directory domain named contoso.com. All domain controllers run Windows
Server 2012 R2.
In a remote site, a support technician installs a server named DC10 that runs Windows Server 2012 R2. DC10
is currently a member of a workgroup.
You plan to promote DC10 to a read-only domain controller (RODC).
You need to ensure that a user named Contoso\\User1 can promote DC10 to a RODC in the contoso.com
domain.
The solution must minimize the number of permissions assigned to User1.
What should you do?
Which two objects should you include in the recommendation?
###BeginCaseStudy###
Testlet 1
Overview
General Overview
Contoso, Ltd. is an international company that has 3,000 employees. The company has sales, marketing,
research, and human resource departments.
Physical Locations
Contoso has two main offices. The offices are located in New York and Chicago. Each office has a data center.
The New York office uses a network subnet of 10.1.0.0/16. The Chicago office uses a network subnet of
10.128.0.0/16.
The offices connect to each other by using a WAN link. Each office connects directly to the Internet.
Existing Environment
Active Directory
The network contains an Active Directory forest named contoso.com. The forest contains a single domain. All
domain controllers run Windows Server 2012 R2. The forest functional level is Windows Server 2012 R2.
The forest contains six domain controllers configured as shown in the following table.
The forest is configured as a single Active Directory site.
Active Directory administrators manage the Active Directory schema. Exchange Server administrators do not
have access to modify the schema.
Contoso has deployed Active Directory Rights Management Services (AD RMS).
Current Business Model
Contoso partners with a company names Fabrikam, Inc. on manufacturing initiatives. The partnership between
Contoso and Fabrikam requires that both companies share confidential information frequently.
Requirements
Business Goals
Contoso plans to install Exchange Server 2016 to provide messaging services for its users.
It must be as easy as possible for the users at Contoso to share free/busy information with the users at
Fabrikam.
As much as possible, Contoso plans to minimize the costs associated with purchasing hardware and software.
Planned Changes
Contoso plans to implement the following changes before installing Exchange Server 2016:Install hardware Network Load Balancing (NLB) devices in the New York and Chicago offices.
Implement Microsoft Office Online Servers in the New York and Chicago offices.
Provide Contoso users with company-approved tablets.
Planned Messaging Infrastructure
You plan to create an Exchange Server 2016 organization named Contoso. You plan to deploy seven servers
that will have Exchange Server 2016 installed. The servers will be configured as shown in the following table.
All of the servers will be members of a database availability group (DAG) named DAG01.
Client Access Requirements
Contoso identifies the following client access requirements for the planned deployment:
Users must be able to configure their tablet to synchronize email by using Autodiscover.
Users must be able to access the Exchange Server organization by using the following names:
– Mail.contoso.com
– Autodiscover.contoso.com
Users must be able to access Outlook on the web internally and externally from their tablet.
Users must be able to access Office Online Server by using the URL of office-online.contoso.com.
Security Requirements
Contoso identifies the following security requirements for the planned deployment:
Exchange Server mailbox databases must be encrypted while at rest.
Users must be prevented from using Outlook on the web while they are offline.
Contoso users must be able to share Calendar details with approved external domains only.
Email messages sent to the users in the fabrikam.com SMTP domain must be encrypted automatically.
Whenever possible, client computers must be directed to the same Exchange server for log collection.
Users must be able to access their mailbox by using Exchange ActiveSync on the company-approved
tablets only.
Email messages sent from the users in the human resources department of Contoso must be protected by
using AD RMS, regardless of the mail client.
Availability Requirements
Contoso identifies the following high-availability requirements for the planned deployment:
Servers must be able to complete a restart without administrative intervention.
The network load balancer must be able to probe the health of each workload.
If a data center fails, the databases in the other data center must be activated automatically.
Redundant copies of all email messages must exist in the transport pipeline before and after delivery.
Email messages must be made highly available by the Exchange Server organization before and after
delivery.
If you manually mount the databases following the data center failure, the databases in the failed site mustbe prevented from mounting automatically.
###EndCaseStudy###
You need to recommend a solution that meets the security requirements for the tablets.
Which two objects should you include in the recommendation? Each correct answer presents part of the
solution.
Which three actions should you perform in sequence?
###BeginCaseStudy###
Testlet 1
Overview
General Overview
Contoso, Ltd. is an international company that has 3,000 employees. The company has sales, marketing,
research, and human resource departments.
Physical Locations
Contoso has two main offices. The offices are located in New York and Chicago. Each office has a data center.
The New York office uses a network subnet of 10.1.0.0/16. The Chicago office uses a network subnet of
10.128.0.0/16.
The offices connect to each other by using a WAN link. Each office connects directly to the Internet.
Existing Environment
Active Directory
The network contains an Active Directory forest named contoso.com. The forest contains a single domain. All
domain controllers run Windows Server 2012 R2. The forest functional level is Windows Server 2012 R2.
The forest contains six domain controllers configured as shown in the following table.
The forest is configured as a single Active Directory site.
Active Directory administrators manage the Active Directory schema. Exchange Server administrators do not
have access to modify the schema.
Contoso has deployed Active Directory Rights Management Services (AD RMS).
Current Business Model
Contoso partners with a company names Fabrikam, Inc. on manufacturing initiatives. The partnership between
Contoso and Fabrikam requires that both companies share confidential information frequently.
Requirements
Business Goals
Contoso plans to install Exchange Server 2016 to provide messaging services for its users.
It must be as easy as possible for the users at Contoso to share free/busy information with the users at
Fabrikam.
As much as possible, Contoso plans to minimize the costs associated with purchasing hardware and software.
Planned Changes
Contoso plans to implement the following changes before installing Exchange Server 2016:Install hardware Network Load Balancing (NLB) devices in the New York and Chicago offices.
Implement Microsoft Office Online Servers in the New York and Chicago offices.
Provide Contoso users with company-approved tablets.
Planned Messaging Infrastructure
You plan to create an Exchange Server 2016 organization named Contoso. You plan to deploy seven servers
that will have Exchange Server 2016 installed. The servers will be configured as shown in the following table.
All of the servers will be members of a database availability group (DAG) named DAG01.
Client Access Requirements
Contoso identifies the following client access requirements for the planned deployment:
Users must be able to configure their tablet to synchronize email by using Autodiscover.
Users must be able to access the Exchange Server organization by using the following names:
– Mail.contoso.com
– Autodiscover.contoso.com
Users must be able to access Outlook on the web internally and externally from their tablet.
Users must be able to access Office Online Server by using the URL of office-online.contoso.com.
Security Requirements
Contoso identifies the following security requirements for the planned deployment:
Exchange Server mailbox databases must be encrypted while at rest.
Users must be prevented from using Outlook on the web while they are offline.
Contoso users must be able to share Calendar details with approved external domains only.
Email messages sent to the users in the fabrikam.com SMTP domain must be encrypted automatically.
Whenever possible, client computers must be directed to the same Exchange server for log collection.
Users must be able to access their mailbox by using Exchange ActiveSync on the company-approved
tablets only.
Email messages sent from the users in the human resources department of Contoso must be protected by
using AD RMS, regardless of the mail client.
Availability Requirements
Contoso identifies the following high-availability requirements for the planned deployment:
Servers must be able to complete a restart without administrative intervention.
The network load balancer must be able to probe the health of each workload.
If a data center fails, the databases in the other data center must be activated automatically.
Redundant copies of all email messages must exist in the transport pipeline before and after delivery.
Email messages must be made highly available by the Exchange Server organization before and after
delivery.
If you manually mount the databases following the data center failure, the databases in the failed site mustbe prevented from mounting automatically.
###EndCaseStudy###
DRAG DROP
You need to configure the Exchange Server organization to support the security requirements for Calendar
sharing.
Which three actions should you perform in sequence? To answer, move the appropriate actions from the list of
actions to the answer area and arrange them in the correct order.
Select and Place:
You need to restore the membership of Group1
Your network contains an Active Directory forest named contoso.com. The forest contains a single domain. All
domain controllers run Windows Server 2012 R2.
The domain contains two domain controllers. The domain controllers are configured as shown in the following
table.
Active Directory Recycle Bin is enabled.
You discover that a support technician accidentally removed 100 users from an Active Directory group named
Group1 an hour ago.
You need to restore the membership of Group1.
What should you do?
What command should you instruct administrators to run?
###BeginCaseStudy###
Testlet 1
Overview
General Overview
Contoso, Ltd. is an international company that has 3,000 employees. The company has sales, marketing,
research, and human resource departments.
Physical Locations
Contoso has two main offices. The offices are located in New York and Chicago. Each office has a data center.
The New York office uses a network subnet of 10.1.0.0/16. The Chicago office uses a network subnet of
10.128.0.0/16.
The offices connect to each other by using a WAN link. Each office connects directly to the Internet.
Existing Environment
Active Directory
The network contains an Active Directory forest named contoso.com. The forest contains a single domain. All
domain controllers run Windows Server 2012 R2. The forest functional level is Windows Server 2012 R2.
The forest contains six domain controllers configured as shown in the following table.
The forest is configured as a single Active Directory site.
Active Directory administrators manage the Active Directory schema. Exchange Server administrators do not
have access to modify the schema.
Contoso has deployed Active Directory Rights Management Services (AD RMS).
Current Business Model
Contoso partners with a company names Fabrikam, Inc. on manufacturing initiatives. The partnership between
Contoso and Fabrikam requires that both companies share confidential information frequently.
Requirements
Business Goals
Contoso plans to install Exchange Server 2016 to provide messaging services for its users.
It must be as easy as possible for the users at Contoso to share free/busy information with the users at
Fabrikam.
As much as possible, Contoso plans to minimize the costs associated with purchasing hardware and software.
Planned Changes
Contoso plans to implement the following changes before installing Exchange Server 2016:Install hardware Network Load Balancing (NLB) devices in the New York and Chicago offices.
Implement Microsoft Office Online Servers in the New York and Chicago offices.
Provide Contoso users with company-approved tablets.
Planned Messaging Infrastructure
You plan to create an Exchange Server 2016 organization named Contoso. You plan to deploy seven servers
that will have Exchange Server 2016 installed. The servers will be configured as shown in the following table.
All of the servers will be members of a database availability group (DAG) named DAG01.
Client Access Requirements
Contoso identifies the following client access requirements for the planned deployment:
Users must be able to configure their tablet to synchronize email by using Autodiscover.
Users must be able to access the Exchange Server organization by using the following names:
– Mail.contoso.com
– Autodiscover.contoso.com
Users must be able to access Outlook on the web internally and externally from their tablet.
Users must be able to access Office Online Server by using the URL of office-online.contoso.com.
Security Requirements
Contoso identifies the following security requirements for the planned deployment:
Exchange Server mailbox databases must be encrypted while at rest.
Users must be prevented from using Outlook on the web while they are offline.
Contoso users must be able to share Calendar details with approved external domains only.
Email messages sent to the users in the fabrikam.com SMTP domain must be encrypted automatically.
Whenever possible, client computers must be directed to the same Exchange server for log collection.
Users must be able to access their mailbox by using Exchange ActiveSync on the company-approved
tablets only.
Email messages sent from the users in the human resources department of Contoso must be protected by
using AD RMS, regardless of the mail client.
Availability Requirements
Contoso identifies the following high-availability requirements for the planned deployment:
Servers must be able to complete a restart without administrative intervention.
The network load balancer must be able to probe the health of each workload.
If a data center fails, the databases in the other data center must be activated automatically.
Redundant copies of all email messages must exist in the transport pipeline before and after delivery.
Email messages must be made highly available by the Exchange Server organization before and after
delivery.
If you manually mount the databases following the data center failure, the databases in the failed site mustbe prevented from mounting automatically.
###EndCaseStudy###
HOTSPOT
You need to instruct the Active Directory administrators how to prepare the Active Directory environment to
support the planned Exchange Server 2016 deployment.
What command should you instruct administrators to run? To answer, select the appropriate options in the
answer area.
Hot Area:
What should you configure in the DirectAccess client Gr…
Your network contains one Active Directory domain. The domain contains a DirectAccess deployment.
You need to ensure that when the DirectAccess connection is active, the connection appear as “Contoso
Internal Network – Authorized Users Only” on the DirectAccess clients.
What should you configure in the DirectAccess client Group Policy object (GPO)?
What should you include in the recommendation?
###BeginCaseStudy###
Testlet 1
Overview
General Overview
Contoso, Ltd. is an international company that has 3,000 employees. The company has sales, marketing,
research, and human resource departments.
Physical Locations
Contoso has two main offices. The offices are located in New York and Chicago. Each office has a data center.
The New York office uses a network subnet of 10.1.0.0/16. The Chicago office uses a network subnet of
10.128.0.0/16.
The offices connect to each other by using a WAN link. Each office connects directly to the Internet.
Existing Environment
Active Directory
The network contains an Active Directory forest named contoso.com. The forest contains a single domain. All
domain controllers run Windows Server 2012 R2. The forest functional level is Windows Server 2012 R2.
The forest contains six domain controllers configured as shown in the following table.
The forest is configured as a single Active Directory site.
Active Directory administrators manage the Active Directory schema. Exchange Server administrators do not
have access to modify the schema.
Contoso has deployed Active Directory Rights Management Services (AD RMS).
Current Business Model
Contoso partners with a company names Fabrikam, Inc. on manufacturing initiatives. The partnership between
Contoso and Fabrikam requires that both companies share confidential information frequently.
Requirements
Business Goals
Contoso plans to install Exchange Server 2016 to provide messaging services for its users.
It must be as easy as possible for the users at Contoso to share free/busy information with the users at
Fabrikam.
As much as possible, Contoso plans to minimize the costs associated with purchasing hardware and software.
Planned Changes
Contoso plans to implement the following changes before installing Exchange Server 2016:Install hardware Network Load Balancing (NLB) devices in the New York and Chicago offices.
Implement Microsoft Office Online Servers in the New York and Chicago offices.
Provide Contoso users with company-approved tablets.
Planned Messaging Infrastructure
You plan to create an Exchange Server 2016 organization named Contoso. You plan to deploy seven servers
that will have Exchange Server 2016 installed. The servers will be configured as shown in the following table.
All of the servers will be members of a database availability group (DAG) named DAG01.
Client Access Requirements
Contoso identifies the following client access requirements for the planned deployment:
Users must be able to configure their tablet to synchronize email by using Autodiscover.
Users must be able to access the Exchange Server organization by using the following names:
– Mail.contoso.com
– Autodiscover.contoso.com
Users must be able to access Outlook on the web internally and externally from their tablet.
Users must be able to access Office Online Server by using the URL of office-online.contoso.com.
Security Requirements
Contoso identifies the following security requirements for the planned deployment:
Exchange Server mailbox databases must be encrypted while at rest.
Users must be prevented from using Outlook on the web while they are offline.
Contoso users must be able to share Calendar details with approved external domains only.
Email messages sent to the users in the fabrikam.com SMTP domain must be encrypted automatically.
Whenever possible, client computers must be directed to the same Exchange server for log collection.
Users must be able to access their mailbox by using Exchange ActiveSync on the company-approved
tablets only.
Email messages sent from the users in the human resources department of Contoso must be protected by
using AD RMS, regardless of the mail client.
Availability Requirements
Contoso identifies the following high-availability requirements for the planned deployment:
Servers must be able to complete a restart without administrative intervention.
The network load balancer must be able to probe the health of each workload.
If a data center fails, the databases in the other data center must be activated automatically.
Redundant copies of all email messages must exist in the transport pipeline before and after delivery.
Email messages must be made highly available by the Exchange Server organization before and after
delivery.
If you manually mount the databases following the data center failure, the databases in the failed site mustbe prevented from mounting automatically.
###EndCaseStudy###
You need to recommend a solution that meets the security requirements for the mailbox databases.
What should you include in the recommendation?
Which domain controller should you identify?
Your network contains an Active Directory forest. The forest contains a single domain named contoso.com and
corp.contoso.com. The forest contains four domain controllers.
The domain controllers are configured as shown in the following table.
All domain controllers are DNS servers.
In the corp.contoso.com domain, you plan to deploy a new domain controller named DC5.
You need to identify which domain controller must be online to ensure that DC5 can be promoted successfully
to a domain controller.
Which domain controller identify which domain controller must be online to ensure that DC5 can be promoted
successfully to a domain controller.
Which domain controller should you identify?
Which two actions should you recommend?
###BeginCaseStudy###
Testlet 1
Overview
General Overview
Contoso, Ltd. is an international company that has 3,000 employees. The company has sales, marketing,
research, and human resource departments.
Physical Locations
Contoso has two main offices. The offices are located in New York and Chicago. Each office has a data center.
The New York office uses a network subnet of 10.1.0.0/16. The Chicago office uses a network subnet of
10.128.0.0/16.
The offices connect to each other by using a WAN link. Each office connects directly to the Internet.
Existing Environment
Active Directory
The network contains an Active Directory forest named contoso.com. The forest contains a single domain. All
domain controllers run Windows Server 2012 R2. The forest functional level is Windows Server 2012 R2.
The forest contains six domain controllers configured as shown in the following table.
The forest is configured as a single Active Directory site.
Active Directory administrators manage the Active Directory schema. Exchange Server administrators do not
have access to modify the schema.
Contoso has deployed Active Directory Rights Management Services (AD RMS).
Current Business Model
Contoso partners with a company names Fabrikam, Inc. on manufacturing initiatives. The partnership between
Contoso and Fabrikam requires that both companies share confidential information frequently.
Requirements
Business Goals
Contoso plans to install Exchange Server 2016 to provide messaging services for its users.
It must be as easy as possible for the users at Contoso to share free/busy information with the users at
Fabrikam.
As much as possible, Contoso plans to minimize the costs associated with purchasing hardware and software.
Planned Changes
Contoso plans to implement the following changes before installing Exchange Server 2016:Install hardware Network Load Balancing (NLB) devices in the New York and Chicago offices.
Implement Microsoft Office Online Servers in the New York and Chicago offices.
Provide Contoso users with company-approved tablets.
Planned Messaging Infrastructure
You plan to create an Exchange Server 2016 organization named Contoso. You plan to deploy seven servers
that will have Exchange Server 2016 installed. The servers will be configured as shown in the following table.
All of the servers will be members of a database availability group (DAG) named DAG01.
Client Access Requirements
Contoso identifies the following client access requirements for the planned deployment:
Users must be able to configure their tablet to synchronize email by using Autodiscover.
Users must be able to access the Exchange Server organization by using the following names:
– Mail.contoso.com
– Autodiscover.contoso.com
Users must be able to access Outlook on the web internally and externally from their tablet.
Users must be able to access Office Online Server by using the URL of office-online.contoso.com.
Security Requirements
Contoso identifies the following security requirements for the planned deployment:
Exchange Server mailbox databases must be encrypted while at rest.
Users must be prevented from using Outlook on the web while they are offline.
Contoso users must be able to share Calendar details with approved external domains only.
Email messages sent to the users in the fabrikam.com SMTP domain must be encrypted automatically.
Whenever possible, client computers must be directed to the same Exchange server for log collection.
Users must be able to access their mailbox by using Exchange ActiveSync on the company-approved
tablets only.
Email messages sent from the users in the human resources department of Contoso must be protected by
using AD RMS, regardless of the mail client.
Availability Requirements
Contoso identifies the following high-availability requirements for the planned deployment:
Servers must be able to complete a restart without administrative intervention.
The network load balancer must be able to probe the health of each workload.
If a data center fails, the databases in the other data center must be activated automatically.
Redundant copies of all email messages must exist in the transport pipeline before and after delivery.
Email messages must be made highly available by the Exchange Server organization before and after
delivery.
If you manually mount the databases following the data center failure, the databases in the failed site mustbe prevented from mounting automatically.
###EndCaseStudy###
You run the Get-SendConnector cmdlet and you receive the following output.
You need to recommend which actions are required to secure email connectivity between the contoso.com
SMTP domain and the fabrikam.com SMTP domain.
Which two actions should you recommend? Each correct answer presents part of the solution.