Achieve New Updated (September) Microsoft 70-342 Examination Questions 61-70

Ensurepass

 

QUESTION 61

Your company has a data center in New York and a data center in Miami.

 

The company has an Exchange Server 2013 organization that contains a database availability group (DAG). The DAG contains servers in both data centers.

 

The company plans to deploy Outlook Anywhere to all users.

 

You configure the following:

 

clip_image002All of the Exchange Server 2013 virtual directories in the New York data center use a host name of mail.contoso.com.

clip_image002[1]All of the Exchange Server 2013 virtual directories in the Miami data center use a host name of miami.mail.contoso.com.

clip_image002[2]In each data center, a certificate from an enterprise certification authority (CA) is configured to contain the following:

clip_image002[3]A certificate principal name of mail.contoso.com

clip_image002[4]Subject alternate names of mail.contoso.com and miami.mail.contoso.com

 

You need to recommend which task must be performed to meet the following requirements:

 

clip_image002[5]Users always must attempt to connect first to a server in the data center where their mailbox is located.

clip_image002[6]Users must be able to access their mailbox if a single data center fails.

 

What should you recommend?

 

A.

Change the external host name of the Miami data center to mail.contoso.com.

B.

Modify the ExternalUrl of the Autodiscover virtual directory of the Client Access servers.

C.

Run the Set-OutlookProvider cmdlet.

D.

Run the Add-AvailabilityAddressSpace cmdlet.

 

Correct Answer: B

Explanation:

* The Set-OutlookProvider cmdlet creates the global settings for the Autodiscover service. It sets the AutoDiscoverConfig object under the Global Settings object in Active Directory and sets the attributes specified in the parameters listed in the Parameters section.

 

* The AutoDiscover feature in Exchange 2007/2010 is often overlooked during setup but is an important factor in ensuring smooth day to day running of your Exchange environment. Its main function is to provide the mail client with all the configuration options it needs, from only the user’s email address and password. This is particularly useful for remote users and smartphone users, who no longer have to enter advanced settings like server names and domains. It is also vital for the correct functioning of features such as Out Of Office and the Offline Address Book in Outlook.

 

 

QUESTION 62

You have an Exchange Server organization that contains five servers. The servers are configured as shown in the following table.

 

clip_image003

 

You deploy Microsoft Lync Server 2010. You need to create a Lync Server SIP Unified Messaging (UM) dial plan to enable voice integration between Lync Server and Exchange Server.

 

Which three Exchange servers should you associate to the UM dial plans? (Each correct answer presents part of the solution. Choose three.)

 

A.

EX1

B.

EX2

C.

EX3

D.

EX4

E.

EX5

 

Correct Answer: BDE

Explanation:

Add all Client Access and Mailbox servers to the SIP URI dial plan. However, if you have multiple SIP URI dial plans, you must add all Client Access and Mailbox servers to all SIP URl dial plans.

 

Reference:

Deploying Exchange 2013 UM and Lync Server overview

https://technet.microsoft.com/en-us/library/bb676409(v=exchg.150).aspx

 

 

QUESTION 63

HOTSPOT

You have an organization that has Exchange Server 2010 and Exchange Server 2013 deployed.

 

Half of the mailboxes are on Exchange Server 2010 servers and the other half are on Exchange Server 2013 servers.

 

You plan to implement Kerberos authentication for all mailbox access.

 

You need to identify which Service Principal Names (SPNs) to associate with each version of Exchange Server.

 

In the table below identify which SPNs to associate with each Exchange Server version.

 

NOTE: Make only one selection in each row.

 

clip_image004

 

Correct Answer:

clip_image005

 

QUESTION 64

HOTSPOT

You have an Exchange Server organization that contains four servers. The servers are configured as shown in the following table.

 

clip_image007

 

SiteA contains an IP gateway that uses a dial plan named Dialplan1. SiteB contains a Lync Server 2013 server that uses a dial plan named Dialplan2.

 

You plan to migrate all Unified Messaging (UM) functionalities to Exchange Server 2013.

 

You need to identify which tasks must be performed to complete the migration.

 

Which tasks should you identify?

 

To answer, select the tasks that are required and not required in the answer area.

 

clip_image008

 

Correct Answer:

clip_image009

 

 

QUESTION 65

HOTSPOT

Your network contains two Active Directory sites named Site1 and Site2.

 

You have an Exchange Server 2013 organization that contains six servers. The servers are configured as shown in the following table.

 

clip_image010

 

All of the mailbox databases replicate to all of the servers.

 

Users in Site1 connect to sitel-mail.contoso.com to access their mailbox. Users in Site2 connect to site2-mail.contoso.com to access their mailbox. All of the users use Microsoft Outlook 2013.

 

You need to identify which DNS modification must be made to fail over the email services from Site1 to Site2.

 

Which DNS modification should you identify?

To answer, select the appropriate record to modify and the new data for the record in the answer area.

 

clip_image011

 

Correct Answer:

clip_image012

 

 

 

 

 

 

 

 

 

 

 

 

 

QUESTION 66

HOTSPOT

You have an Exchange Server 2013 organization named contoso.com.

 

Contoso.com has a federated trust to another Exchange Server 2013 organization named fabrikam.com.

 

You need to ensure that users from fabrikam.com can view the availability of users in contoso.com.

 

What command should you run?

 

To answer, select the appropriate options in the answer area.

 

clip_image014

 

Correct Answer:

clip_image016

 

 

QUESTION 67

HOTSPOT

You have an Exchange Server 2013 organization and a Microsoft SharePoint Server 2013 server farm.

 

You plan to use a SharePoint eDiscovery Center.

 

You need to recommend which component must be deployed before you can use the SharePoint eDiscovery Center for In-Place eDiscovery.

 

What should you recommend?

 

To answer, select the appropriate options in the answer area.

 

clip_image018

 

Correct Answer:

clip_image020

 

 

QUESTION 68

You are an administrator for an international finance company.

 

You plan to deploy an Exchange Server 2013 organization.

 

The company’s compliance policy requires that all users be prevented from sending email messages that contain more than one bank account number to external recipients.

 

You need to meet the compliance policy requirement.

 

What should you create?

 

A.

A data loss prevention (DLP) policy and a DLP policy rule

B.

A retention policy, a retention tag, and a Policy Tip

C.

A throttling policy and a throttling policy association

D.

A transport rule and a moderated mailbox

 

Correct Answer: A

Explanation:

Sensitive Information Types in DLP Policies

When you create DLP policies, you can include rules that include checks for sensitive information. The conditions that you establish within a policy, such as how many times something has to be found before an action is taken or exactly what that action is can be customized within your new custom policies in order to meet your business requirements. Sensitive information rules are integrated with the transport rules framework by introduction of a condition that you can customize: If the message contains…Sensitive Information. This condition can be configured with one or more sensitive information types that are contained within the messages.

 

 

QUESTION 69

You have an Exchange Server 2013 organization that is integrated with Information Rights Management (IRM).

 

A user is unable to create and read IRM-protected messages from a mobile device. The user can open IRM- protected messages *missing text*.

 

You need to identify the most likely cause of the issue.

 

What should you identify?

 

A.

the value of DevicePasswordEnabled of a mobile device policy

B.

the value of AllowNonProvisionableDevices of a mobile device policy

C.

the Exchange ActiveSync protocol version

D.

the value of RequireDeviceEncryption of a mobile device policy

 

Correct Answer: D

Explanation:

Mobile IRM protection in Exchange 2013

When you set the RequireDeviceEncryption parameter to $true, mobile devices that don’t support device encryption will be unable to connect.

 

Note:

Using IRM in Exchange ActiveSync, mobile device users can:

* Create IRM-protected messages.

* Read IRM-protected messages.

* Reply to and forward IRM-protected messages.

 

Reference:

Information Rights Management in Exchange ActiveSync

https://technet.microsoft.com/en-us/library/ff657743(v=exchg.150).aspx

 

 

QUESTION 70

You have a server named Server1 that has Exchange Server 2013 installed.

 

Users access their mailbox by using Microsoft Outlook 2010 and Outlook Web App.

 

You need to identify when a mailbox is accessed by someone other than the owner of the mailbox.

 

Which two actions should you perform? Each correct answer presents part of the solution.

 

A.

Review the security event log.

B.

Enable audit logging for all mailboxes.

C.

Export the administrator audit log.

D.

Run an administrator role group report.

E.

Run a non-owner mailbox access report.

 

Correct Answer: BE

Explanation:

You have to enable mailbox audit logging for each mailbox that you want to run a non-owner mailbox access report.

 

The Non-Owner Mailbox Access Report in the Exchange Administration Center (EAC) lists the mailboxes that have been accessed by someone other than the person who owns the mailbox. When a mailbox is accessed by a non-owner, Microsoft Exchange logs information about this action in a mailbox audit log that’s stored as an email message in a hidden folder in the mailbox being audited. Entries from this log are displayed as search results and include a list of mailboxes accessed by a non-owner, who accessed the mailbox and when, the actions performed by the non-owner, and whether the action was successful.

 

Reference:

Run a non-owner mailbox access report

https://technet.microsoft.com/en-us/library/jj150575(v=exchg.150).aspx

Free VCE & PDF File for Microsoft 70-342 Real Exam

Instant Access to Free VCE Files: MCSE|MCSA|MCITP…
Instant Access to Free PDF Files: MCSE|MCSA|MCITP…