Microsoft 70-341 Certification Exam Material - Free Download and Guaranteed Pass
Exam code : 70-341
Exam name : Core Solutions of Microsoft Exchange Server 2013
You need to recommend which configurations must be set for each network.
Which configurations should you recommend?
To answer, select the appropriate configurations for each network in the answer area.
Answer:
Question No : 1 HOTSPOT - (Topic 1)
An administrator recommends removing EDGE1 from the implementation plan and adding
a new Client Access server named CAS-8 instead.
You need to identify which anti-spam feature will NOT be available on CAS-8.
Which anti-spam feature should you identify?
A. Connection Filtering
B. Sender Filtering
C. Content Filtering
D. Recipient Filtering
Answer: A
Explanation:
EDGE1 is an exchange server 2010
CAS-8 would be an exchange server 2013
Typically, you would enable the anti-spam agents on a mailbox server if your organization
doesn't have an Edge Transport server, or doesn't do any prior anti-spam filtering before
accepting incoming messages.
Connection Filtering agent is only available on the Edge Transport server role. Exchange
2013 does not have an Edge Transport server role yet.
The Connection Filter agent and the Attachment Filter agent are only available on an Edge
Transport server.
Connection Filtering on Edge Transport Servers: Exchange 2013 Help
Anti-spam agents on Legacy Edge Transport servers
If your organization has an Exchange 2007 or Exchange 2010 Edge Transport server
installed in the perimeter network, all of the anti-spam agents that are available on a
Mailbox server are installed and enabled by default on the Edge Transport server.
However, the following anti-spam agents are only available on an Edge Transport server:
Connection Filtering agent Connection filtering inspects the IP address of the remote server
that's trying to send messages to determine what action, if any, to take on an inbound
message. The remote IP address is available to the Connection Filtering agent as a
byproduct of the underlying TCP/IP connection that's required for the SMTP session.
Connection filtering uses a variety of IP Block lists, IP Allow lists, as well as IP Block List
provider services or IP Allow List provider services to determine whether the connection
from the specific IP should be blocked or allowed in the organization. For more information
Question No : 2 - (Topic 1)
about connection filtering in Exchange
2010, see <fwlink to http://technet.microsoft.com/library/bb124320(v=exchg.141).aspx>.
Attachment Filter agent Attachment filtering filters messages based on attachment file
name, file name extension, or file MIME content type. You can configure attachment
filtering to block a message and its attachment, to strip the attachment and allow the
message to pass through, or to silently delete the message and its attachment. For more
information about attachment filtering in Exchange 2010, see <fwlink to
http://technet.microsoft.com/library/bb124399(v=exchg.141).aspx>
What's Discontinued in Exchange 2013
http://technet.microsoft.com/en-us/library/jj619283(v=exchg.150).aspx
Feature
Anti-spam agent management in the EMC
In Exchange 2010, when you enabled the anti-spam agents on the Hub Transport server,
you could manage the anti-spam agents in the Exchange Management Console (EMC). In
Exchange 2013, when you enable the anti-spam agents in the Transport service on a
Mailbox server, you can't manage the agents in the Exchange admin center (EAC). You
can only use the Exchange Management Shell. For information about how to enable the
anti-spam agents on a Mailbox server, see Enable Anti-Spam Functionality on a Mailbox
Server.
Connection Filtering agent on Hub Transport servers
In Exchange 2010, when you enabled the anti-spam agents on a Hub Transport server, the
Attachment Filter agent was the only anti-spam agent that wasn't available. In Exchange
2013, when you enable the antispam agents in the Transport service on a Mailbox server,
the Attachment Filter agent and the Connection Filtering agent aren't available. The
Connection Filtering agent provides IP Allow List and IP Block List capabilities. For
information about how to enable the anti-spam agents on a Mailbox server, see Enable
Anti-Spam Functionality on a Mailbox Server.
Note:
You can't enable the anti-spam agents on an Exchange 2013 Client Access server.
Therefore, the only way to get the Connection Filtering agent is to install an Exchange 2010
or Exchange 2007 Edge Transport server in the perimeter network. For more information,
see Use an Edge Transport Server in Exchange 2013.
Sender Filter agent
Sender filtering compares the sender on the MAIL FROM: SMTP command to an
administrator-defined list of senders or sender domains who are prohibited from sending
messages to the organization to determine what action, if any, to take on an inbound
message.
Content Filter agent
Content filtering assesses the contents of a message.
Spam quarantine is a feature of the Content Filter agent that reduces the risk of losing
legitimate messages that are incorrectly classified as spam. Spam quarantine provides a
temporary storage location for messages that are identified as spam and that shouldn't be
delivered to a user mailbox inside the organization. For more information, Recipient Filter
agent
Recipient filtering compares the message recipients on the RCPT TO: SMTP command to
an administratordefined Recipient Block list. If a match is found, the message isn't
permitted to enter the organization
A
You can't enable the anti-spam agents on an Exchange 2013 Client Access server.
Therefore, the only way to get the Connection Filtering agent is to install an Exchange 2010
or Exchange 2007
Edge Transport server in the perimeter network
Connection Filtering agent is only available on the Edge Transport server role. Exchange
2013 does not have an Edge Transport server role yet.
NOT B C D
Only need to identify 1 and this is connection filtering.
You need to recommend which task is required to prepare Active Directory for the planned
Exchange Server 2013 implementation.
What should you recommend?
A. On any domain controller in the Paris office, run setup.exe /preparead.
B. On any domain controller in the Amsterdam office, run setup.exe /preparead.
C. On any domain controller in the Paris office, run setup.exe /preparealldomains.
D. On any domain controller in the Amsterdam office, run setup.exe /preparedomain.
Answer: B
Explanation:
Question No : 3 - (Topic 1)
B
The schema master is in the Amsterdam office.
Before you install the release to manufacturing (RTM) version of Microsoft Exchange
Server 2013 or later cumulative updates (CU) on any servers in your organization, you
must prepare Active Directory and domains.
Run setup.exe /preparead on the schema master.
NOT A C
The schema master is in the Amsterdam office.
Run setup.exe /preparead on the schema master.
NOT D
Fabrikam has a single domain.
In order to prepare a domain, run the following command from an elevated command
prompt after browsing to the Exchange 2013 DVD/ISO.
Setup.exe /PrepareDomain /IAcceptExchangeServerLicenseTerms
If you have a single domain environment, you don’t have to prepare the domain as the local
domain is prepared for 2013 as part of preparing the AD. But, if you have a multi-domain
environment, all other domains (except the one on which the AD was prepared) has to be
ready for 2013.
You can prepare all the domains in one go by running the command below.
Setup.exe /PrepareAllDomains /IAcceptExchangeServerLicenseTerms (you will need
Enterprise Admin rights).
Prepare Active Directory and Domains: Exchange 2013 Help
You need to recommend a design that meets the technical requirements for communication
between Fabrikam and A. Datum.
Which three actions should you perform in fabrikam.com? (Each correct answer presents
part of the solution. Choose three.)
A. Create a remote domain for adatum.com.
B. Exchange certificates with the administrators of adatum.com.
C. From EDGE1, create a Send connector that has an address space for adatum.com
Question No : 4 - (Topic 1)
D. Run the Set-TransportConfigcmdlet.
E. Run the Set-TransportServercmdlet.
F. From a Mailbox server, create a Send connector that has an address space for
adatum.com.
Answer: B,D,F
Explanation:
NOT A
Applies to: Exchange Server 2013, Exchange Online
Remote domains are SMTP domains that are external to your Microsoft Exchange
organization. You can create remote domain entries to define the settings for message
transferred between your Exchange organization and specific external domains. The
settings in the remote domain entry for a specific external domain override the settings in
the default remote domain that normally apply to all external recipients. The remote domain
settings are global for the Exchange organization.
You can create remote domain entries to define the settings for message transfers
between your Exchange Online organization and external domains. When you create a
remote domain entry, you control the types of messages that are sent to that domain. You
can also apply message format policies and acceptable character sets for messages that
are sent from users in your organization to the remote domain.
NOT C
Edge1 is in the perimeter network and the send connector needs to be created on a
mailbox server
NOT E
Set-TransportServercmdlet.
Use the Set-TransportServer cmdlet to set the transport configuration options for the
Transport service on Mailbox servers or for Edge Transport servers.
This example sets the DelayNotificationTimeout parameter to 13 hours on server named
Mailbox01.
Set-TransportServer Mailbox01 -DelayNotificationTimeout 13:00:00
Need Set-TransportConfig and the TLSReceiveDomainSecureList parameter to specify the
domains from which you want to receive domain secured email by using mutual Transport
Layer Security (TLS) authentication.
B
To activate SSL encryption on an Exchange server, you need a server certificate on the
Client Access Server in each company. The client access server is the internet facing
server in an organization.
An SSL certificate is a digital certificate that authenticates the identity of the exchange
server and encrypts information that is sent to the server using Secure Sockets Layer
(SSL) technology
Mailbox server certificates
One key difference between Exchange 2010 and Exchange 2013 is that the certificates
that are used on the Exchange 2013 Mailbox server are self-signed certificates.
Because all clients connect to an Exchange 2013 Mailbox server through an Exchange
2013 Client Access server, the only certificates that you need to manage are those on the
Client Access server.
The Client Access server automatically trusts the self-signed certificate on the Mailbox
server, so clients will not receive warnings about a self-signed certificate not being trusted,
provided that the Client Access server has a non-self-signed certificate from either a
Windows certification authority (CA) or a trusted third party.
There are no tools or cmdlets available to manage self-signed certificates on the Mailbox
server. After the server has been properly installed, you should never need to worry about
the certificates on the Mailbox server.
D
Set-TransportConfig.
Use the Set-TransportConfig cmdlet to modify the transport configuration settings for the
whole
Exchange organization.
EXAMPLE 1
This example configures the Exchange organization to forward all DSN messages that
have the DSN codes
5.7.1, 5.7.2, and 5.7.3 to the postmaster email account.
Set-TransportConfig -GenerateCopyOfDSNFor 5.7.1,5.7.2,5.7.3
The TLSReceiveDomainSecureList parameter specifies the domains from which you want
to receive domain secured email by using mutual Transport Layer Security (TLS)
authentication.
F
If you want to ensure secure, encrypted communication with a partner, you can create a
Send connector that is configured to enforce Transport Layer Security (TLS) for messages
sent to a partner domain. TLS provides secure communication over the Internet.
Use the EAC to create a Send connector to send email to a partner, with TLS applied
To create a Send connector for this scenario, log in to the EAC and perform the following
steps:
In the EAC, navigate to Mail flow > Send connectors, and then click Add .
In the New send connector wizard, specify a name for the send connector and then select
Partner for the Type.
When you select Partner, the connector is configured to allow connections only to servers
that authenticate with TLS certificates. Click Next.
Verify that MX record associated with recipient domain is selected, which specifies that the
connector uses the domain name system (DNS) to route mail. Click Next.
Under Address space, click Add . In the Add domain window, make sure SMTP is listed as
the Type. For Fully Qualified Domain Name (FQDN), enter the name of your partner
domain. Click Save.
For Source server, click Add . In the Select a server window, select a Mailbox server that
will be used to send mail to the Internet via the Client Access server and click Add . After
you've selected the server, click Add .
Click OK.
Click Finish.
Once you have created the Send connector, it appears in the Send connector list.
Send Connector
In Microsoft Exchange Server 2013, a Send connector controls the flow of outbound
messages to the receiving server.
They are configured on Mailbox servers running the Transport service. Most commonly,
you configure a Send connector to send outbound email messages to a smart host or
directly to their recipient, using DNS.
Exchange 2013 Mailbox servers running the Transport service require Send connectors to
deliver messages to the next hop on the way to their destination.
Send connectors that are created on Mailbox servers are stored in Active Directory and are
available to all Mailbox servers running the Transport service in the organization.
Send Connectors: Exchange 2013 Help
You are evaluating the implementation of a second Edge Transport server named EDGE2
in the Amsterdam office.
You need to recommend which tasks must be performed to ensure that email messages
can be sent by the organization if a single Edge Transport server fails.
Which three actions should you include in the recommendation?
Question No : 5 DRAG DROP - (Topic 1)
To answer, move the three appropriate actions from the list of actions to the answer area
and arrange them in the correct order.
Answer:
You need to recommend which type of group must be used to create the planned
department lists.
Which type of group should you recommend?
A. Universal Distribution
B. Dynamic Distribution
C. Global Security
D. Universal Security
Answer: A
Explanation:
There are two types of groups that can be used to distribute messages:
Mail-enabled universal distribution groups (also called distribution groups) can be used only
to distribute messages.
Mail-enabled universal security groups (also called security groups) can be used to
distribute messages as well as to grant access permissions to resources in Active
Question No : 6 - (Topic 1)
Directory. For more information, see Manage Mail-Enabled Security Groups.
A mail-enabled security group is an Active Directory universal security group object that
can be used to assign access permissions to resources in Active Directory and can also be
used to distribute messages.
It's important to note the terminology differences between Active Directory and Exchange.
In Active Directory, a distribution group refers to any group that doesn't have a security
context, whether it's mail-enabled or not. In contrast, in Exchange, all mail-enabled groups
are referred to as distribution groups, whether they have a security context or not.
Dynamic Distribution Groups
Unlike regular distribution groups that contain a defined set of members, the membership
list for dynamic distribution groups is calculated each time a message is sent to the group,
based on the filters and conditions that you define. When an email message is sent to a
dynamic distribution group, it’s delivered to all recipients in the organization that match the
criteria defined for that group.
Manage Distribution Groups: Exchange Online Help
You need to recommend which tasks must be performed to meet the technical
requirements of the research and development (R&D) department.
Which two tasks should you recommend? (Each correct answer presents part of the
solution. Choose two.)
A. Create a new global address list (GAL) and a new address book policy.
B. Modify the permissions of the default global address list (GAL), and then create a new
GAL.
C. Run the Update AddressList cmdlet.
D. Run the Set-Mailbox cmdlet.
E. Create an OAB virtual directory.
Answer: A,D
Explanation:
NOT B
Need an address book policy
Question No : 7 - (Topic 1)
NOT C
Update AddressList cmdlet
Use the Update-AddressList cmdlet to update the recipients included in the address list that
you specify.
EXAMPLE 1
This example updates the recipients of the address list building4 and under the container
All Users\Sales.
Update-AddressList -Identity "All Users\Sales\building4"
NOT E
Will not resolve the issue
Need an address book policy and to assign this policy to users.
A
Address book policies (ABPs) allow you to segment users into specific groups to provide
customized views of your organization’s global address list (GAL).
When creating an ABP, you assign a GAL, an offline address book (OAB), a room list, and
one or more address lists to the policy.
You can then assign the ABP to mailbox users, providing them with access to a customized
GAL in Outlook and Outlook Web App.
The goal is to provide a simpler mechanism to accomplish GAL segmentation for onpremises
organizations that require multiple GALs.
D
After you create an address book policy (ABP), you must assign it to mailbox users. Users
aren’t assigned a default ABP when their user account is created.
If you don’t assign an ABP to a user, the global address list (GAL) for your entire
organization will be accessible to the user through Outlook and Outlook Web App.
This example assigns the ABP All Fabrikam to the existing mailbox user
joe@fabrikam.com.
Set-Mailbox -Identity joe@fabrikam.com -AddressBookPolicy "All Fabrikam"
Address Book Policies: Exchange Online Help
Set-Mailbox: Exchange 2013 Help
Question No : 8 - (Topic 1)
You are testing the planned implementation of Domain Security.
You discover that users fail to exchange domain-secured email messages.
You open the Exchange Management Shell and discover the output shown in the exhibit.
(Click the Exhibit button.)
You need to ensure that users can exchange email messages by using Domain Security.
Which two parameters should you modify by using the Set-SendConnector cmdlet? (Each
correct answer presents part of the solution. Choose two.)
A. tlsauthlevel
B. requiretls
C. ignorestarttls
D. tlsdomain
E. domainsecureenabled
F. smarthostauthmechanism
Answer: B,E
Explanation:
Domain Security
Domain Security is a feature of Exchange Server (both 2010 and 2013) that can secure
SMTP traffic between two Exchange organizations.
It is implemented on server level, and it works without configuring any options on user
(sender or recipient) side. Domain Security uses mutual TLS authentication to provide
session-based authentication and encryption.
Mutual TLS authentication is different from TLS as it’s usually implemented. Usually, when
you implement TLS, client will verify the server certificate, and authenticate the server,
before establishing a connection.
With mutual TLS authentication, each server verifies the connection with the other server
by validating a certificate that’s provided by that other server, so clients are not included at
all.
We establish secure SMTP channel between two Exchange Servers, usually over the
Internet.
Clients, Outlook and Outlook Web App, will be aware that Domain Security is established.
Green icon with check mark will be shown on each messages exchanged between servers
on which Domain
Security is implemented.
Set-SendConnector
Use the Set-SendConnector cmdlet to modify a Send connector.
EXAMPLE 1
This example makes the following configuration changes to the Send connector named
Contoso.com Send Connector:
Sets the maximum message size limit to 10 MB.
Changes the connection inactivity time-out to 15 minutes.
Set-SendConnector "Contoso.com Send Connector" -MaxMessageSize 10MB -
ConnectionInactivityTimeOut
00:15:00
PARAMETERS
Requiretls
The RequireTLS parameter specifies whether all messages sent through this connector
must be transmitted using TLS. The default value is $false.
Domainsecureenabled
The DomainSecureEnabled parameter is part of the process to enable mutual Transport
Layer Security (TLS) authentication for the domains serviced by this Send connector.
Mutual TLS authentication functions correctly only when the following conditions are met:
The value of the DomainSecureEnabled parameter must be $true.
The value of the DNSRoutingEnabled parameter must be $true.
The value of the IgnoreStartTLS parameter must be $false.
The wildcard character (*) is not supported in domains that are configured for mutual TLS
authentication. The same domain must also be defined on the corresponding Receive
connector and in the TLSReceiveDomainSecureList attribute of the transport configuration.
The default value for the DomainSecureEnabled parameter is $false for the following types
of Send connectors:
All Send connectors defined in the Transport service on a Mailbox server.
User-created Send connectors defined on an Edge server.
The default value for the DomainSecureEnabled parameter is $true for default Send
connectors defined on an Edge server.
NOT TLSAUTHLEVEL
The TlsAuthLevel parameter specifies the TLS authentication level that is used for
outbound TLS connections established by this Send connector. Valid values are:
EncryptionOnly: TLS is used only to encrypt the communication channel. No certificate
authentication is performed.
CertificateValidation: TLS is used to encrypt the channel and certificate chain validation
and revocation lists checks are performed.
DomainValidation: In addition to channel encryption and certificate validation, the Send
connector also verifies that the FQDN of the target certificate matches the domain specified
in the TlsDomain parameter. If no domain is specified in the TlsDomain parameter, the
FQDN on the certificate is compared with the recipient's domain.
You can't specify a value for this parameter if the IgnoreSTARTTLS parameter is set to
$true, or if the RequireTLS parameter is set to $false.
NOT ignorestarttls
The IgnoreSTARTTLS parameter specifies whether to ignore the StartTLS option offered
by a remote sending server.
This parameter is used with remote domains. This parameter must be set to $false if the
RequireTLS parameter is set to $true. Valid values for this parameter are $true or $false.
NOT tlsdomain The TlsDomain parameter specifies the domain name that the Send
connector uses to verify the FQDN of the target certificate when establishing a TLS
secured connection.
This parameter is used only if the TlsAuthLevel parameter is set to DomainValidation.
A value for this parameter is required if:
The TLSAuthLevel parameter is set to DomainValidation.
The DNSRoutingEnabled parameter is set to $false (smart host Send connector).
NOT smarthostauthmechanism
The SmartHostAuthMechanism parameter specifies the smart host authentication
mechanism to use for authentication with a remote server.
Use this parameter only when a smart host is configured and the DNSRoutingEnabled
parameter is set to $false.
Valid values are None, BasicAuth, BasicAuthRequireTLS, ExchangeServer, and
ExternalAuthoritative.
All values are mutually exclusive. If you select BasicAuth or BasicAuthRequireTLS, you
must use the AuthenticationCredential parameter to specify the authentication credential.
TLS Functionality and Related Terminology: Exchange 2013 Help
You need to recommend which script the administrators must run to create the reports
required to meet the technical requirements.
Which script should you recommend?
To answer, select the appropriate script in the answer area.
Answer:
Question No : 9 HOTSPOT - (Topic 1)
You need to recommend which recovery solution will restore access to all of the mailboxes
in AccountingDB if EX1 fails. The solution must restore access to email messages as
quickly as possible.
Which recovery solution should you recommend?
A. On EX2, create a new mailbox database. Restore the database files, and then mount
the database. Run the New-MailboxRestoreRequest cmdlet for all of the mailboxes in the
database.
B. On EX2, create a new mailbox database. Restore the database files, and then mount
the database. Run the Set-Mailbox cmdlet for all of the mailboxes in the database.
C. On replacement hardware, run setup /mode:recoverserver. Restore the database files,
and then mount the database. Run the Set-Mailbox cmdlet.
D. On replacement hardware, run setup /mode:recoverserver. Restore the database files,
and then mount the database. Run the New-MailboxRestoreRequest cmdlet for all of the
mailboxes in the database.
Answer: A
Explanation: Explanation/Reference:
Restore Data Using a Recovery Database
Question No : 10 - (Topic 1)
Create a Recovery Database
http://technet.microsoft.com/en-us/library/ee332351%28v=exchg.150%29.aspx
You need to recommend to a solution to deploy the Outlook app. Which three actions
should you recommend performing in sequence?
Answer:
Question No : 11 DRAG DROP - (Topic 1)
Topic 2, Contoso Ltd
Overview
General Overview
Contoso, Ltd., is a scientific research and supply company that has offices along the east
coast of North America. The company recently completed an upgrade to Exchange Server
2013.
Physical Locations
The company has three sales offices and a research office. The sales offices are located in
Atlanta, New York, and Montreal. The research office is located in Miami.
Existing Environment
Active Directory Environment
The network contains one Active Directory forest named contoso.com. The Miami office
has its own domain named research.contoso.com.
Each office is configured as an Active Directory site. Each site contains two domain
controllers that run Windows Server 2008 R2 x64. All of the FSMO roles for contoso.com
are owned by a domain controller in the New York site. All of the FSMO roles for the
research.contoso.com domain are owned by a domain controller in the Miami site.
One domain controller in each site is configured as a global catalog server. All of the
domain controllers are configured as DNS servers.
The functional level of the forest and domains is Windows Server 2008 R2.
Network Infrastructure
All client computers are configured to connect to the DNS servers in their respective office
only.
Contoso.com has a standalone certification authority (CA) on a server that runs Windows
Server 2008 R2.
All offices connect to the New York office by using a high-speed WAN link.
Email Infrastructure
The Exchange Server 2013 organization contains four servers in the New York office. The
servers are configured as shown in the following table.
All external access for the contoso.com organization is provided through an Internet link at
the New York office. Load balancing is provided by using DNS round robin. All inbound and
outbound email for the domain is routed through a mail appliance in the New York office.
The Exchange Server 2013 organization contains four servers in the Atlanta office. The
servers are configured as shown in the following table.
The file share witness for NY-DAG is on a file server in the Atlanta office.
The Exchange Server 2013 organization contains two servers in the Montreal office and
two servers in the Miami office. The servers are configured as shown the following table.
✑
✑
✑
All external access to the organization of the research.contoso.com domain is provided
through the Internet link at the Miami office. Load balancing is provided by using DNS
round robin. All inbound and outbound email for the domain goes through an email
appliance in the Miami office.
All Exchange Server 2013 servers run Windows Server 2012 Standard.
All users have Windows Phone devices that connect to the Exchange organization by using
Exchange ActiveSync.
User Issues
You discover the following user issues:
Some users report that, intermittently, they fail to connect to their email from their
Windows Phone device.
Some users from the New York office report that some searches from Outlook
Web App return incomplete results.
Some of the users in each office report that they fail to access their mailbox during
the maintenance period of the Active Directory domain controllers.
You verify that all of the remote users can connect to the network successfully by using a
VPN connection, and can then launch Outlook successfully.
Partnerships
Contoso recently entered into a partnership with a company named A. Datum Corporation.
A. Datum has a main office and four branch offices. The main office is located in Toronto.
A. Datum has a messaging infrastructure configured as shown in the following table.
✑
✑
✑
✑
Requirements
Planned Changes
Contoso plans to deploy a hardware load balancer in the New York office. The load
balancer must bridge all SSL connections to the Exchange servers.
You plan to deploy two new Exchange Server 2013 servers in a virtual server environment
in the Miami office. The servers will host a few mailboxes as part of an evaluation of
resource utilization for virtualized Exchange servers.
You also plan to deploy a high availability solution for Mailbox servers in the
You plan to replace the email appliance in New York because of recent power outages.
Business Requirements
Contoso identifies the following business requirements:
Minimize the hardware costs required for a load balancing solution.
Minimize the software costs required for a load balancing solution.
Minimize user interruptions if a service fails on a Mailbox server.
Minimize user interruptions if a service fails on a Client Access server.
Question No : 12 - (Topic 2)
You need to identify which business requirement will be met by implementing the planned
hardware load balancer.
Which business requirement should you identify?
A. Minimize the hardware costs required for a load balancing solution.
B. Minimize the software costs required for a load balancing solution.
C. Minimize user interruptions if a service fails on a Client Access server.
D. Minimize user interruptions if a service fails on a Mailbox server.
Answer: C
Explanation:
NOT A
Introducing a load balancing solution will not minimize hardware costs
NOT B
Introducing a hardware load balancing solution will not minimize software costs
NOT D
A hardware load balancer connects to the Client Access servers not the Mailbox servers.
C
A hardware load balancer connects to the Client Access servers not the Mailbox servers
AND is designed to minimize user interruptions
Understanding Load Balancing in Exchange 2010: Exchange 2010 Help
You need to resolve the search issue reported by the users in the New York office.
You restart the Microsoft Exchange Search service and discover that the active copy of the
mailbox database has a content indexing status of Unknown.
What should you do next?
A. Rebuild the content index.
Question No : 13 - (Topic 2)
B. Run the Update-MailboxDatabaseCopy cmdlet and specify the -manualresume
parameter.
C. Restart the Microsoft Exchange Mailbox Replication service.
D. Run the Update-MailboxDatabaseCopy cmdlet and specify the -catalogonly parameter.
Answer: A
Explanation:
Content Indexing also known as CI is a great feature to speed up item searching through
mailboxes.
Microsoft Exchange Search service
Exchange 2013 introduces the following changes to Exchange Search:
The underlying content indexing engine has been replaced with Microsoft Search
Foundation, which provides performance and functionality improvements and serves as the
common underlying content indexing engine in Exchange and SharePoint. The
management interface, however, remain the same.
By default, the Search Foundation handles the most common file formats in email
attachments. You no longer need to install Microsoft Office Filter Packs for Exchange
Search. For a list of the file formats handled by
Exchange Search, see File Formats Indexed By Exchange Search.
You can add support for any additional file formats by install IFilters, as in Exchange 2010.
Content indexing is more efficient because it now processes messages in the transport
pipeline. As a result, messages addressed to multiple recipients or distribution groups are
processed only once.
An annotation stream is attached to the message, significantly speeding up content
indexing while consuming fewer resources.
A
One of the first actions most Exchange Administrators generally take when troubleshooting
suspected problems with Exchange Content Indexing will be to rebuild the impacted
Mailbox Database's content index files (either manually or by using the
ResetSearchIndex.ps1 script found in the \Exchange Server\Scripts directory).
Makes sure that Exchange content index always remain healthy.
NOT B
Not a database replication issue
If the content index catalog for a mailbox database copy gets corrupted, you may need to
reseed the catalog.
Seeding is also known as updating.
Use the Update-MailboxDatabaseCopy cmdlet to seed or reseed a mailbox database copy.
EXAMPLE 1
This example seeds a copy of the database DB1 on the Mailbox server MBX1.
Update-MailboxDatabaseCopy -Identity DB1\MBX1
The ManualResume switch specifies whether to automatically resume replication on the
database copy. With this parameter, you can manually resume replication to the database
copy.
NOT C
Not related to an indexing issue.
In Exchange 2013, the Microsoft Exchange Replication service periodically monitors the
health of all mounted databases. In addition, it also monitors the Extensible Storage Engine
(ESE) for any I/O errors or failures.
When the service detects a failure, it notifies Active Manager. Active Manager then
determines which database copy should be mounted and what it requires to mount that
database. In addition, it tracks the active copy of a mailbox database (based on the last
mounted copy of the database) and provides the tracking results information to the Client
Access server to which the client is connected.
NOT D
Content index needs to be rebuilt
If the content index catalog for a mailbox database copy gets corrupted, you may need to
reseed the catalog.
Seeding is also known as updating.
Use the Update-MailboxDatabaseCopy cmdlet to seed or reseed a mailbox database copy.
EXAMPLE 1
This example seeds a copy of the database DB1 on the Mailbox server MBX1.
Update-MailboxDatabaseCopy -Identity DB1\MBX1
The CatalogOnly parameter specifies that only the content index catalog for the database
copy should be seeded.
Exchange Search: Exchange 2013 Help
Question No : 14 - (Topic 2)
You need to ensure that all of the email messages sent from the Internet to adatum.com
are routed through the contoso.com organization.
What should you create in contoso.com? (Each corrects answer presents part of the
solution. Choose all that apply.)
A. a contact object for each adatum.com recipient
B. an internal relay accepted domain for adatum.com
C. a Send connector that is configured to point to the contoso.com transport servers
D. a Send connector that is configured to point to the adatum.com transport servers
E. an authoritative accepted domain for adatum.com
Answer: B,D
Explanation:
Internal Relay Domain
You can configure a relay domain as an internal relay domain or as an external relay
domain. These two relay domain types are described in the following sections.
When you configure an internal relay domain, some or all of the recipients in this domain
don't have mailboxes in this Exchange organization. Mail from the Internet is relayed for
this domain through Transport servers in this Exchange organization. This configuration is
used in the scenarios that are described in this section.
An organization may have to share the same SMTP address space between two or more
different messaging systems. For example, you may have to share the SMTP address
space between Exchange and a third-party messaging system, or between Exchange
environments that are configured in different Active Directory forests. In these scenarios,
users in each email system have the same domain suffix as part of their email addresses.
To support these scenarios, you need to create an accepted domain that's configured as
an internal relay domain. You also need to add a Send connector that's sourced on a
Mailbox server and configured to send email to the shared address space. If an accepted
domain is configured as authoritative and a recipient isn't found in Active Directory, a nondelivery
report (NDR) is returned to the sender. The accepted domain that's configured as
an internal relay domain first tries to deliver to a recipient in the Exchange organization. If
the recipient isn't found, the message is routed to the Send connector that has the closest
address space match.
If an organization contains more than one forest and has configured global address list
(GAL) synchronization, the SMTP domain for one forest may be configured as an internal
relay domain in a second forest. Messages from the Internet that are addressed to
recipients in internal relay domains are relayed to the Mailbox servers in the same
organization. The receiving Mailbox servers then route the messages to the Mailbox
servers in the recipient forest. You configure the SMTP domain as an internal relay domain
to make sure that email that's addressed to that domain is accepted by the Exchange
organization. The connector configuration of your organization determines how messages
are routed.
B
An accepted domain is any SMTP namespace for which a Microsoft Exchange Server 2013
organization sends or receives email.
Accepted domains include those domains for which the Exchange organization is
authoritative. An Exchange organization is authoritative when it handles mail delivery for
recipients in the accepted domain.
Accepted domains also include domains for which the Exchange organization receives mail
and then relays it to an email server that's outside the organization for delivery to the
recipient.
D
2nd part of establishing an internal relay domain is to establish a Send Connector that is
configured to point to the other organization's mail servers (a datum)
NOT A
Better to establish an internal relay domain.
A mail-enabled Active Directory contact that contains information about people or
organizations that exist outside the Exchange organization. Each mail contact has an
external email address. All messages sent to the mail contact are routed to this external
email address.
NOT C
Need to establish a Send connector to adatum.com not contoso.com
NOT E
Need to establish an internal relay domain not an authorative accepted domain for
adatum.com
Accepted Domains: Exchange 2013 Help
Send Connectors: Exchange 2013 Help
You need to prevent several users in the Miami office from establishing more than two
Question No : 15 - (Topic 2)
concurrent Exchange ActiveSync connections to the Exchange Server organization. The
solution must affect only the users in the Miami office.
Which two actions should you perform? (Each correct answer presents part of the solution.
Choose two.)
A. Create a new throttling policy that has the Organization scope.
B. Create a new throttling policy that has the Global scope.
C. Create a new throttling policy that has the Regular scope.
D. Run the Set-ThrottlingPolicyAssociation cmdlet.
E. Run the Set-ThrottlingPolicy cmdlet.
F. Remove the default throttling policy.
Answer: C,D
Explanation:
New-ThrottlingPolicy
Use the New-ThrottlingPolicy cmdlet to create a non-default user throttling policy.
EXAMPLE 1
This example creates a non-default user throttling policy that can be associated with
specific users. Any parameters that you omit inherit the values from the default throttling
policy GlobalThrottlingPolicy_<GUID>.
After you create this policy, you must associate it with specific users.
New-ThrottlingPolicy -Name ITUserPolicy -EwsMaxConcurrency 4 -ThrottlingPolicyScope
Regular
The ThrottlingPolicyScope parameter specifies the scope of the throttling policy. You can
use the following values.
Regular Specifies a custom policy that applies to specific users.
Organization Specifies a custom policy that applies to all users in your organization.
Global Reserved for the default throttling policy.
C
Need to establish a New Throttling policy to limit the Exchange ActiveSync connections
and that has a regular scope to associate with specific users.
D
Use the Set-ThrottlingPolicyAssociation cmdlet to associate a throttling policy with a
specific object. The object can be a user with a mailbox, a user without a mailbox, a
contact, or a computer account.
EXAMPLE 1
This example associates a user with a user name of tonysmith to the throttling policy
ITStaffPolicy that has higher limits.
Set-ThrottlingPolicyAssociation -Identity tonysmith -ThrottlingPolicy ITStaffPolicy
NOT A
Need a regular scope
NOT B
Need a regular scope
NOT E
Need to associate the new thottling policy with respective users.
Use the Set-ThrottlingPolicy cmdlet to modify the settings for a user throttling policy.
EXAMPLE 1
This example modifies a throttling policy so that users associated with this policy can have
a maximum of four concurrent requests running in Exchange Web Services.
$a = Get-ThrottlingPolicy RemoteSiteUserPolicy
$a | Set-ThrottlingPolicy -EwsMaxConcurrency 4
NOT F
Need to create a new throttling policy
Set-ThrottlingPolicyAssociation: Exchange 2013 Help
Set-ThrottlingPolicy: Exchange 2013 Help
You need to recommend a temporary solution to reroute all of the outbound email
messages through the Miami mail appliance during the planned replacement of the New
York mail appliance.
What are three possible ways to achieve the goal? (Each correct answer presents a
complete solution. Choose three.)
A. Modify the value of the SmartHost of the Send connector in the New York office.
B. Increase the cost of the Send connector in the Miami office.
C. Increase the cost of the Send connector in the New York office.
D. Decrease the cost of the Send connector in the New York office,
E. Modify the value of the SmartHost of the Send connector in the Miami office.
Question No : 16 - (Topic 2)
F. Disable the Send connector in the New York office.
Answer: A,C,F
Explanation:
Both Miami and New York have external connections to the internet with Client Access
Servers
In Microsoft Exchange Server 2013, a Send connector controls the flow of outbound
messages to the receiving server
Internal Send connectors send e-mail to servers in your Exchange organization. This
connector is configured to route e-mail to your internal Exchange servers as smart hosts.
A smart host (also known as a relay host) is a server that redirects outbound mail.
Send connectors send e-mail to the Internet. This connector is configured to use Domain
Name System (DNS)
MX records to route e-mail.
The cost is important if there is more than one connector that can be used, where the lower
the cost the more preferred the route.
This is useful if you have two Internet connections, and only want to use the slower one
when the faster is down. Like weights in SRV records, the values are arbitrary. 1 vs 10 is
no different than 1 vs 2, as long as there are no others you want to squeeze between them.
Smart Host
In some situations you may want to route email through a third-party smart host, such as in
an instance where you have a network appliance that you want to perform policy checks on
outbound messages.
A smart host is a type of email message transfer agent which allows an SMTP server to
route email to an intermediate mailserver rather than directly to the recipient’s server. Often
this smart host requires authentication from the sender to verify that the sender has
privileges to have mail forwarded through the smart host. This is an important distinction
from an open mail relay that will forward mail from the sender without authentication.
Common authentication techniques include SMTP Authentication and POP before SMTP.
When configured to be a backup mail server (not the primary MX record), a smart host
configuration will accept mail on behalf of the primary mail server if it were to go offline.
When the primary mail server comes back online, mail is subsequently delivered via the
smart host.
Some ISPs, in an effort to reduce email spam originating at their customer’s IP addresses,
will not allow their customers to communicate directly with the recipient’s mail server via the
default SMTP port number 25. In this case the customer has no choice but to use the smart
host provided by the ISP.
When a host runs its own local mail server, a smart host is often used to transmit all mail to
other systems through a central mail server. This is used to ease the management of a
single mail server with aliases, security, and Internet access rather than maintaining
numerous local mail servers.
NOT B
Need to increase the cost of the Send Connect in the New York Office
NOT D
Need to increase the cost not decrease the cost of the Send Connector in the New York
Office
NOT E
Need to modify the value of the SmartHost of the Send connector in the New York office
A
Modify the value of the SmartHost of the Send connector in the New York office to point to
the smart host in the Miami office.
C
Increasing the cost of a Send Connector in the New York Office will make the Miami
connection to the internet the most preferred outbound connection.
F
Disabling the Send connector in the New York Office will make the Miami connection to the
internet the only outbound connection.
Send Connectors: Exchange 2013 Help
You are evaluating a DAG design for the New York and Atlanta offices.
You need to ensure that all of the users in the New York and Atlanta offices can access
their mailbox if the WAN link fails.
Which DAG design should you deploy?
To answer, select the appropriate DAG design in the answer area.
Answer:
Question No : 17 HOTSPOT - (Topic 2)
You discover that one of the Client Access servers in the New York office does not trust the
standalone CA.
You need to ensure that all of the users who have Windows Phone devices can connect
successfully to their mailbox.
In which node should you install the root CA certificate?
To answer, select the appropriate node in the answer area.
Question No : 18 HOTSPOT - (Topic 2)
Answer:
Topic 3, Litware, Inc
Overview
Litware, Inc., is a manufacturing company located in North America.
The company has a main office and two branch offices. The main office is located in
Chicago. The branch offices are located in Baltimore and Los Angeles.
Existing Environment
Active Directory Environment
The network contains one Active Directory forest named litwareinc.com. Each office is
configured as an Active Directory site.
All domain controllers in the Los Angeles office run Windows Server 2008 R2. All domain
controllers in the Chicago office run Windows Server 2003 Service Pack 1 (SP1). All
domain controllers in the Baltimore office run Windows Server 2012.
All of the FSMO roles are located on a domain controller in the Baltimore office. All of the
domain controllers are configured as global catalog servers.
You have a distribution group for each department. The distribution groups contain all of
the users in each respective department.
✑
✑
Network Infrastructure
The servers in each office are configured as shown in the following table.
The Baltimore and Chicago offices have independent Internet connections. Internet
connectivity for the Los Angeles office is provided through Chicago.
Users frequently send large email messages to other users in the company. Recently, you
increased the maximum message size to 50 MB.
Planned Changes
The company plans to deploy a new Exchange Server 2013 infrastructure that will contain
two Clients Access servers and two Mailbox servers in the Chicago office. The servers will
be configured as shown in the following table.
All client connections to the Exchange Server organization will be routed through a
hardware load balancer. The name client.litwareinc.com will point to the virtual IP address
of the hardware load balancer.
Once the transition to Exchange Server 2013 in the Chicago office is complete, all mail flow
to and from the Internet will be managed centrally through that office by using a Send
connector that has the following configurations:
Connector name: CH-to-Internet
Address space: *
✑
✑
Source servers: CH-EX2, CH-EX3
Cost: 10
You need to recommend changes to the network to ensure that you can deploy the
planned Exchange Server 2013 infrastructure.
What should you recommend?
A. Transfer of the FSMO roles to a domain controller in the Chicago office.
B. Change the forest functional level.
C. Change the domain functional level.
D. Change the operating system on one of the domain controllers in the Chicago office
Answer: D
Explanation:
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment