PrepAway - Latest Free Exam Questions & Answers

Category: 70-341 (v.3)

Exam 70-341: Core Solutions of Microsoft Exchange Server 2013 (updated March 3rd, 2016)

Which cmdlet should you run?

Your company, Fabrikam Inc., has an Exchange Server 2013 organization. The organization that
contains three servers named Server1, Server2, and Server3. Server1 and Server2 are members of a
database availability group (DAG) named DAG1.
DAG1 contains two mailbox databases. All databases are active on Server1 and replicate to Server2.
You start an unplanned maintenance on Server1 and shut down Server1. You discover that the
databases do not mount on Server2. You restart Server1 and the databases mount automatically on
Server1.
You need to identify what prevents the databases from switching over successfully to Server2.
Which cmdlet should you run?

Which two tasks should you perform?

You have an Exchange Server 2010 organization named adatum.com. You deploy a server that has
Exchange Server 2013 installed. You plan to install eight additional servers that have exchange
Server 2013 installed. You are a member of the Organization Management role group. You hire a
temporary Exchange administrator named Temp1.
The company’s security policy states that all external consultants must have the minimum number
of required permissions on the network.
You need to ensure that Temp1 can install a server named Server5. The solution must meet the
requirements of the security policy.
Which two tasks should you perform? (Each correct answer presents part of the solution. Choose
two.)

Which cmdlets should you use?

DRAG DROP
You have an Exchange Server 2013 organization that contains a server named Server1.
A user named User1 has an administrative assistant named Assistant1. A user named User2 has an
administrative assistant named Assistant2.
You need to configure access to Outlook to meet the following requirements:
Assistant1 must be able to send email messages as a User1.
Assistant2 must be able to send email messages on behalf of User2.
Which cmdlets should you use? (To answer, drag the appropriate cmdlets to the correct
requirements. Each cmdlet may be used once, more than once, or not at all. You may need to drag
the split bar between panes or scroll to view content.)

Which command should you run?

HOTSPOT
You have an Exchange Server 2013 organization that contains 10 mailbox servers.
You have a custom workload management policy named App1Policy. App1Policy is applied to three
Mailbox servers.
You deploy a new Mailbox server named EX11.
You need to ensure that App1Policy is applied to EX11.
Which command should you run? (To answer, configure the appropriate options in the answer area.)

Which command should you run?

HOTSPOT
You have an Exchange Server 2013 organization that contains two distribution groups named Groupl
and Group2.
You need to prevent the members of Groupl and Group2 from communicating with each other by
using email, unless the email messages contain the string Press Release in the subject.

Users whose email messages are rejected must receive a non-delivery report (NDR) that contains a
status code of 5.7.3.
Which command should you run? (To answer, configure the appropriate options in the answer area.)

Which solutions should you recommend?

HOTSPOT
You are planning to implement several servers on virtual machines. The servers have Exchange
Server 2013 installed.
The planned implementation must meet the following requirements:
Minimize the amount of overhead required for the virtualization solution.
Minimize the risk of data corruption for the Exchange Server databases.
You need to recommend a storage solution for the Exchange databases and a backup and recovery
solution for the planned servers.
Which solutions should you recommend?
To answer, select the appropriate solutions in the answer area.

Which two actions should you perform?

Your network contains an Active Directory forest. The forest contains a single domain named
contoso.com. You have an Exchange Server 2013 organization named Contoso.
You plan to create an additional SMTP domain named sales.contoso.com. You will use
sales.contoso.com as the primary SMTP address for the users in the sales department.
You create a new email address policy and apply the policy to the sales users.
New sales users report that when they attempt to access their email from the Internet for the first
time by using Microsoft Outlook 2010, they fail to connect. The sales users connect to their mailbox
internally successfully by using Outlook 2010. All other users can connect to their mailbox from the
Internet and internally.
You need to ensure that the new sales users can connect to the Exchange Server 2013 organization
by using Outlook Anywhere from the Internet.
Which two actions should you perform? (Each correct answer presents part of the solution. Choose
two.)

You need to ensure that the email messages are delivered to adatum.com

You have an Exchange Server 2013 organization named Contoso. The organization contains a server
named Server1 that has Exchange Server 2013 installed. Server1 has the Mailbox server role and the
Client Access server role installed.
Server1 has a Send connector for a partner company. The Send connector is configured for Domain
Security with a domain named adatum.com.
The only certificate installed on Server1 expires.
You discover that all email messages sent to adatum.com remain in the queue on Server1.
On Server1, you install a new certificate from a trusted third-party.
You need to ensure that the email messages are delivered to adatum.com.
What should you do?

Which three actions should you perform?

Your network contains an Active Directory forest named contoso.com. The forest contains an
enterprise root certification authority (CA) named CA1. The network contains a server named EX1
that has Exchange Server 2013 installed.
A partner company named
A.Datum Corporation has an Active Directory domain named adatum.com. The domain contains a
server named EX5 that has Exchange Server 2010 Service Pack 2 (SP2) installed. EX5 has a Receive
connector that is configured for mutual TLS.
Users in contoso.com plan to send email messages that contain sensitive data to users in
adatum.com.
You need to ensure that all of the email messages sent from contoso.com to adatum.com are
encrypted by using TLS. The solution must ensure that EX1 and EX5 validate server certificates.
Which three actions should you perform? (Each correct answer presents part of the solution. Choose
three.)


Page 11 of 21« First...910111213...20...Last »