PrepAway - Latest Free Exam Questions & Answers

Tag: Briefing 70-346 (update January 18th, 2018)

Briefing 70-346: Managing Office 365 Identities and Requirements (update January 18th, 2018)

Which cmdlet should you run?

HOTSPOT
You have an Office 365 subscription.
The Office 365 organization contains five temporary administrators. The administrators are members of multiple role groups.
You need to create a script that prevents the temporary administrators from performing administrative tasks from the Office 365 admin center. The solution must meet the following requirements:
Provide the ability to reestablish administrative access to the temporary administrators within 14 days.
Release the Office 365 licenses assigned to the temporary administrators.
Which cmdlet should you run? To answer, select the appropriate options in the answer area.

Explanation/Reference:
Explanation:
The Set-MsolUserLicense cmdlet can be used to adjust the licenses for a user. This can include adding a new license, removing a license, updating the license options, or any combination of these actions.
Example:
The following command removes the for enterprises license from the user. This may result in the user’s data being removed from each service.
Set-MsolUserLicense -UserPrincipalName user@contoso.com -RemoveLicenses
“contoso:ENTERPRISEPACK”
References: https://msdn.microsoft.com/en-us/library/azure/dn194094(v=azure.98).aspx

Hot Area:

Which Windows PowerShell cmdlet should you run?

A company has an Office 365 tenant that has an Enterprise E1 subscription. You synchronize disabled user accounts from an Active Directory Domain Services environment.
You need to enable the user accounts in Office 365.
Which Windows PowerShell cmdlet should you run? panes or scroll to view content. to TCP/IP networking, intranets, and the Internet. Ports and protocol numbers provide access to a host computer. However, they also create a security hazard by allowing uninvited access. Therefore, knowing which port to allow or disable increases a network’s security. If the wrong ports or protocol numbers are disabled on a firewall, router, or proxy server as a security measure, essential services might become unavailable. connection over SSL.

You need to define the methods that you can implement t…

DRAG DROP
You have an Office 365 tenant that has an Enterprise E3 subscription. You enable Azure Rights Management for users in the tenant.
You need to define the methods that you can implement to encrypt email messages.
What should you do? To answer, drag the appropriate method to the correct action. Each method may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.
Select and Place:

Explanation/Reference:

encrypted messages coming from inside your organization or from replies to encrypted messages sent from your organization. attachment, recipients see instructions for opening and viewing the message. Regardless of their type of email service, the experience is the same. The recipient can choose to sign in with a work account associated with https://technet.microsoft.com/en-us/library/dn569289.aspx https://technet.microsoft.com/en-us/library/dn569287.aspx

You need to activate Microsoft Azure Rights Management

You are the Office 365 administrator for a company. You plan to implement rights management.
You need to activate Microsoft Azure Rights Management.
What should you use? work or school account that has the global administrator role for your Office 365 deployment. You should then navigate to the rights management page via Settings > Services & add-ins > Microsoft Azure Information activate.

You need to determine whether someone other than the ma…

An Organization uses Exchange Online. You enable mailbox audit logging for all mailboxes.
User1 reports that her mailbox has been accessed by someone else.
You need to determine whether someone other than the mailbox owner has accessed the mailbox.
What should you do? have been accessed by someone other than the person who owns the mailbox. over the past two weeks. The mailboxes listed in the search results have been enabled for mailbox audit logging. search results in the details pane. mailbox audit log that’s stored as an email message in a hidden folder in the mailbox being audited. Entries from this log are displayed as search results and include a list of mailboxes accessed by a non-owner, who accessed the mailbox and when, the actions performed by the non-owner, and whether the action was successful.

What should you configure from Settings in the Office 3…

You have an Office 365 subscription.
You plan to create a report about Microsoft OneDrive for Business usage that will be given to a third party.
You need to ensure that the OneDrive for Business report shows anonymous identifiers instead of user names.
What should you configure from Settings in the Office 365 admin center? change the privacy setting for all these reports. change in the Office 365 admin center.

Which two Windows PowerShell cmdlets should you run?

An organization is migrating from an on-premises Exchange organization to Office 365 tenant.
Users report that they cannot see the free/busy information for other users.
You need to determine why free/busy information does not display.
Which two Windows PowerShell cmdlets should you run? Each correct answer presents a complete solution.

command: environment and in Exchange Online match. To determine this, run the following command in the Exchange

Which tool should you use?

You have an Office 365 subscription.
All users have mailboxes hosted in Microsoft Exchange Online.
The network administrators in your organization are updating the network infrastructure, including making changes to the DNS providers and updating the SSL certificates.
You need to perform the following test in the Exchange Online environment:

Verify that the mail exchanger (MX) records for Exchange Online are published correctly.
Send the test message from an external recipient to an Exchange Online recipient.
Verify that the SMTP service is accessible from the Internet.
Which tool should you use?


Page 8 of 21« First...678910...20...Last »