Which tool should you use?
You are the Office 365 administrator for your company. The company is running Microsoft
Exchange Server 2007 with Service Pack 3 on-premises and has 500 mailboxes.
Management requests that you migrate all mailboxes to Office 365. You are researching the
available migration types.
You need to generate a custom step-by-step checklist for multiple migration types.
Which tool should you use?
Which content filter option should you turn on in the Exchange admin center?
Your company subscribes to the Office 365 Enterprise El plan. You are the Microsoft
Exchange Online administrator.
In the last week, employees have reported that they are receiving non-delivery report
messages from other companies. The employees have not sent messages to recipients
within those companies.
You need to prevent non-delivery report messages from reaching employees.
Which content filter option should you turn on in the Exchange admin center?
Which two actions should you perform?
You are the Office 365 administrator for Contoso, Ltd.
Some email messages sent from the trusted domain fabrikam.com are being rejected as
spam. Some of these email messages originate inside the fabnkam.com network, and some
of them originate from an application in the fabrikam.com co-located data center.
The fabrikam.com systems administrators have asked you to add their domain and the IP
addresses of the data center that hosts their external application to your list of safe senders.
You need to configure Microsoft Exchange Online Protection.
Which two actions should you perform? Each correct answer presents part of the solution.
Which strategies should you recommend?
DRAG DROP
You are an Office 365 specialist for a consulting company.
Your company has been hired by several companies to migrate their legacy email solutions to Office 365.
You need to recommend mailbox migration strategies for the scenarios described in the following table.
Which strategies should you recommend? To answer, drag the appropriate migration types
to the correct targets. Each migration type may be used once, more than once, or not at all.
You may need to drag the split bar between panes or scroll to view content.
Which tool should you use?
Your company has a hybrid deployment of Office 365. You need to identify which certificate
is used for token signing between the on-premises environment and Office 365. Which tool
should you use?
You need to ensure that all of the email messages sent and received by Test5 are accessible to members of the
Your company has an Office 365 subscription. A user named Test5 has a mailbox. You need
to ensure that all of the email messages sent and received by Test5 are accessible to
members of the audit department for 60 days, even if Test5 permanently deletes the
messages. What should you do?
You need to identify which user sent the message
You deploy Office 365. All the members of a team named Sales have full access to a shared
mailbox named Sales. You enable auditing for all shared mailboxes. From the Sales
mailbox, an email message that contains inappropriate content is sent. You need to identify
which user sent the message. What should you do?
You need to prevent users from modifying the Advanced Connection Settings on the Lync 2010 client
Your company deploys Microsoft Lync Online. You deploy the Microsoft Lync 2010 client to
all client computers. All users log on to the local domain. You need to prevent users from
modifying the Advanced Connection Settings on the Lync 2010 client. What should you do?
Which deployment methods should you use?
You subscribe to Office 365. You plan to implement single sign-on. You need to deploy
Active Directory Federation Services (AD FS) to a server for the planned implementation.
Which deployment methods should you use? (Each correct answer presents a complete
solution. Choose all that apply.)
You need to identify why the user accounts are unavailable in Office 365
Your company has a hybrid deployment of Office 365. You discover that some Active
Directory user accounts are unavailable in Office 365. You need to identify why the user
accounts are unavailable in Office 365. What should you do?