Achieve New Updated (September) Microsoft 70-342 Examination Questions 11-20

Ensurepass

 

QUESTION 11

Your company has three offices. Each office has 1,000 users and is configured as an Active Directory site. Each site connects directly to the Internet.

 

The network contains six servers that have Exchange Server 2013 installed. The servers are configured as shown in the following table.

 

clip_image001

 

An administrator performs a datacenter switchover by changing the DNS record for webl.adatum.com to point to the IP address of web2.adatum.com.

 

Users from Main1 report that when they connect to Outlook Web App, they receive a certificate warning message.

 

You need to recommend a solution to ensure that the users do not receive a certificate warning message when a datacenter switchover is performed.

 

What should you include in the recommendation?

 

A.

Three host headers for the Default Web Site on each Client Access server

B.

One certificate that contains all of the external names as subject alternative names

C.

Three certificates that each contains one of the external names

D.

An external URL for each Client Access server set to $null

 

Correct Answer: B

Explanation:

SAN Certificates (Subject Alternative Names) This type of certificate allows more than a single name in a single SSL certificate which makes total sense for the new Microsoft products (Lync and Exchange) because several services are using names and all of them are underneath the same IIS Web Site. In some Public CA these certificates are also known as UC Certificates.

 

Reference: Managing Certificates in Exchange Server 2013

 

 

QUESTION 12

You have a hybrid deployment of Exchange Server 2013 and Microsoft Office 365.

 

The network does not have Active Directory Federation Services (AD FS) 2.0 installed.

 

A user named User1 reports that he cannot access his mailbox because his account is locked out.

 

You verify that the mailbox of User1 is hosted on Office 365.

 

You need to unlock the account of User1.

 

Which cmdlet should you run?

 

A.

Set-MailUser

B.

Set-MSolUser

C.

Set-Mailbox

D.

Set-ADUser

 

Correct Answer: B

Explanation:

Applies To: Office 365, Windows Azure, Windows Intune

 

The Set-MsolUser cmdlet is used to update a user object.

 

Parameters include: BlockCredential <Boolean>

When true, the user will not be able to sign in using their user ID.

 

Incorrect:

Not C: Set-Mailbox

 

Use the Set-Mailbox cmdlet to modify the settings of an existing mailbox.

 

Applies to: Exchange Server 2013, Exchange Online

 

 

QUESTION 13

HOTSPOT

You have an Exchange Server 2013 organization.

 

All users are enabled for Unified Messaging (UM) and access their voice mail by using Microsoft Lync 2010.

 

Callers report that when they press a key to dial an external telepho

ne number, they hear a message indicating that the intended destination cannot be reached.

 

You need to ensure that the callers can reach the external number successfully.

 

What should you modify?

 

To answer, select the appropriate object in the answer area.

 

clip_image003

 

Correct Answer:

clip_image005

 

 

QUESTION 14

You have an Exchange Server organization. The organization contains servers that have either Exchange Server 2010 or Exchange Server 2013 installed.

 

You hire a new helpdesk technician named helpdesk1. Helpdesk1 is a member of the Recipient Management management role group.

 

You discover that helpdesk1 created nine new mailbox-enabled users by using the New- Mailbox command.

 

You need to identify which management role provides helpdesk1 with the permissions to create new mailbox-enabled users.

 

Which cmdlets should you run?

 

A.

Get-ManagementRoleEntry and Get-ManagementRoleAssignment

B.

Get-RolegroupMember and Get-ManagementRoleAssignment

C.

Get-ManagementRoleEntry and Get-RoleGroup

D.

Get-Rolegroup and Get-RoleGroupMember

 

Correct Answer: A

Explanation:

* Use the Get-ManagementRoleEntry cmdlet to retrieve management role entries that have been configured on management roles.

* Use the Get-ManagementRoleAssignment cmdlet to retrieve management role assignments.

 

 

QUESTION 15

You have an Exchange Server 2013 organization.

 

You need to ensure that a user named User1 can prevent the deletion of every email message that contains a specific word from all of the mailboxes.

 

The solution must minimize the number of permissions assigned to User1.

 

What should you do?

 

A.

Add User1 to the Records Management management role group. Instruct User1 to run the New-ManagedContentSettings cmdlet.

B.

Add User1 to the Records Management management role group. Instruct User1 to run the New-MailboxSearch cmdlet.

C.

Add User1 to the Discovery Management management role group. Instruct User1 to run the New-ManagedContentSettings cmdlet.

D.

Add User1 to the Discovery Management management role group. Instruct User1 to run the New-MailboxSearch cmdlet.

 

Correct Answer: D

Explanation:

* If you want users to be able to use Microsoft Exchange Server 2013 In- Place eDiscovery, you must first authorize them by adding them to the Discovery Management role group. Members of the Discovery Management role group have Full Access mailbox permissions for the Discovery mailbox that’s created by Exchange Setup.

* The New-MailboxSearch cmdlet creates an In-Place eDiscovery search or an In-Place Hold. Unless specified, mailboxes on all Exchange 2013 servers in an organization are searched. You can stop, start, modify, or remove the search.

 

 

QUESTION 16

You have an Exchange Server 2013 organization that contains multiple Hub Transport servers. You need to recommend a message hygiene solution to| meet the following requirements:

 

clip_image007Block servers that are known to send spam

clip_image007[1]Minimize administrative effort

 

What should you recommend?

 

A.

an IP Block list

B.

IP Block list providers

C.

recipient filtering

D.

sender filtering

 

Correct Answer: B

 

 

QUESTION 17

You have an Exchange Server 2013 organization.

 

You successfully migrate the public folders from a previous version of Exchange Server.

 

You discover that one of the public folder mailboxes almost reached its quota size.

 

You need to move some of the public folders in the public folder mailbox to another public folder mailbox.

 

What should you run?

 

A.

Set-PublicFolderMailbox

B.

Merge PublicFolderMailbox.ps1

C.

Split-PublicFolderMailbox.ps1

D.

New-PublicFolderMigrationRequest

 

Correct Answer: C

Explanation:

* Split-PublicFolderMailbox.ps1

Splits the given public folder mailbox based on the size of the folders.

 

* If the content of a public folder mailbox begins to exceed your mailbox quotas, you may need to move public folders to a different public folder mailbox. There are a couple ways to do this. To move one or more public folders that don’t contain subfolders, you can use the PublicFolderMoveRequest cmdlets.

 

Reference: Move a Public Folder to a Different Public Folder Mailbox

 

 

QUESTION 18

You have an Exchange Server 2013 organization that contains the servers configured as shown in the following table.

 

clip_image009

 

All mailbox servers are members of a database availability group (DAG) named DAG1. DAG1 has Datacenter Activation Coordination (DAC) mode enabled. The data center in Dallas experiences a power failure, causing quorum to be lost.

 

You need to mount the databases in the data center in Houston.

 

Which command should you run first?

 

A.

Stop-DatabaseAvailabilityGroup -Identity DAG1 -MailboxServer EX1 -ConfigurationOnly.

B.

Restore-DatabaseAvailabilityGroup -Identity DAG1 -ActiveDirectorySite Exchange-Site -AlternateWitnessServer -AlternateWitnessDirectory D:DAG1

C.

Stop-DatabaseAvailabilityGroup -Identity DAG1 -ActiveDirectorySite Exchange-Site

D.

Stop-Service -DisplayName ClusSvc -Force.

 

Correct Answer: A

Explanation:

Reference: Datacenter Switchovers

https://technet.microsoft.com/en-us/library/dd351049(v=exchg.150).aspx

 

 

QUESTION 19

DRAG DROP

You have an Exchange Server organization. The organization contains servers that have Exchange Server 2010 and Exchange Server 2013 installed.

 

A new compliance policy requires that all email messages remain stored for two years.

 

You create two retention tags named Tag1 and Tag2. Tag1 moves the email messages to an Archive mailbox after one year. Tag2 permanently deletes the email messages after two years.

 

You need to meet the compliance policy requirements. The solution must ensure that all email messages that are older than two years are removed as quickly as possible.

 

Which three actions should you perform?

 

To answer, move the three appropriate actions from the list of actions to the answer area and arrange them in the correct order.

 

clip_image011

 

Correct Answer:

Free VCE & PDF File for Microsoft 70-342 Real Exam

Instant Access to Free VCE Files: MCSE|MCSA|MCITP…
Instant Access to Free PDF Files: MCSE|MCSA|MCITP…

 

 

QUESTION 20

You have an Exchange Server 2013 organization.

 

You create a data loss prevention (DLP) policy. The mode of the DLP policy is set to Enforce.

 

You need to ensure that email messages containing social security numbers from the United States are blocked.

 

Which two possible rules achieve this goal? (Each correct answer presents a complete solution. Choose two.)

 

A.

U.S. State Breach: Allow Override

B.

U.S. State Breach: Scan email sent outside – low count

C.

U.S. State Breach: Scan email sent outside – high count

D.

U.S. State Breach: Scan text limit exceeded

E.

U.S. State Breach: Attachment not supported

 

Correct Answer: BC

Explanation:

Note:

* In Microsoft Exchange Server 2013, you can use data loss prevention (DLP) policy templates to help meet the messaging policy and compliance needs of your organization. These templates contain pre-built sets of rules that can help you manage message data that is associated with several common legal and regulatory requirements.

 

* DLP policy templates in Exchange include:

U.S. State Breach Notification Laws

Helps detect the presence of information subject to U.S. State Breach Notification Laws, including data like social security and credit card numbers.