Achieve New Updated (September) Microsoft 70-342 Examination Questions Topic 2, A.Datum

Ensurepass

 

Topic 2, A.Datum

 

Overview

General Overview

A.Datum Corporation is a pet supply company that has stores across North America.

A.Datum has an Exchange Server 2007 organization.

A.Datum plans to migrate to Exchange Server 2013.

 

Physical Locations

A.Datum has five locations. The locations are configured as shown in the following table.

 

clip_image001

 

Existing Environment

Network Infrastructure

All of the locations connect to the each other by using a WAN link. The New York, Toronto, and Chicago locations connect directly to the Internet.

 

All client computers run Windows 7 and Office 2010. All servers run Windows Server 2008.

 

Active Directory Environment

The network contains an Active Directory domain named adatum.local. Adatum.local is the corporate domain based in the Uni

ted States. The network contains a domain named Canada.adatum.local. Canada.adatum.local is the domain for the stores in Canada.

 

Each location is configured as an Active Directory site.

The forest functional level is Windows Server 2008.

 

The main office and both of the distribution centers each has two domain controllers for their respective domain. All of the other locations have one domain controller for their respective domain. All of the domain controllers are global catalog servers.

 

Exchange Infrastructure

The main office and the distribution centers each have three servers that have Exchange Server 2007 installed.

 

The servers have the following configurations:

 

clip_image003Two of the servers have cluster continuous replication (CCR) deployed

clip_image003[1]One of the servers has the Client Access server role and the Hub Transport server role installed

 

Each store contains a server that has Exchange Server 2007 installed. Each server has mailboxes for active users and mailboxes for inactive users. Each server has approximately 50 mailboxes.

 

Remote users access Outlook Web Access by using a namespace of mail.adatum.com, which resolves to the Client Access server in the New York office.

 

Requirements

Planned Changes

The company plans to implement the following changes:

 

clip_image003[2]Migrate all of the mailboxes in the main office and the distribution centers to Exchange Server 2013.

clip_image003[3]Integrate a new telephone system to the Exchange Server 2013 organization.

clip_image003[4]Deploy a standalone certification authority (CA) that will be used to issue all of the certificates for the messaging infrastructure.

 

Technical Requirements

The company identifies the following technical requirements:

 

clip_image003[5]Hardware costs must be minimized whenever possible.

clip_image003[6]The impact on end users if a site fails must be minimized.

clip_image003[7]Voice mail traffic between the telephone system and the Exchange Server environment must be encrypted.

clip_image003[8]Each user must be able to access the internal resources and their mailbox by using a single user account.

 

Compliance Requirements

After a security review, the company identifies the following compliance requirements for the new Exchange Server environment:

 

clip_image003[9]All administrative changes made to the mailboxes must be tracked.

clip_image003[10]The legal department must be able to search for messages in all of the mailboxes.

clip_image003[11]Users must be prevented from sending email during an upcoming statutory holiday.

clip_image003[12]All store managers must be prevented from permanently deleting email messages from their Inbox.

clip_image003[13]All email messages must be archived for a minimum of five years to meet regulatory requirements.

clip_image003[14]Management occasionally sends the staff internal memos that contain confidential information, such as sales figures. The memos must be protected so that unauthorized users cannot read the memos and internal users cannot forward the memos to external recipients.

clip_image003[15]The users in the research department must be able to send email to anyone in the organization, but only the members of a group named Execs must be able to send email to the research users. All other users must be notified that email sent to the research users will remain undelivered.

 

 

QUESTION 1

You need to recommend a solution for the voice mail traffic. The solution must meet the technical requirements.

 

Which two configurations should you include in the recommendation? (Each correct answer presents part of the solution. Choose two.)

 

A.

A dial plan.

B.

A server certificate

C.

A transport rule

D.

A data loss prevention (DLP) policy

E.

A call answering rule

 

Correct Answer: AB

Explanation:

* Scenario: Voice mail traffic between the telephone system and the Exchange Server environment must be encrypted.

 

A:

Use the EAC to configure Protected Voice Mail from authenticated callers

In the EAC, navigate to Unified Messaging > UM dial plans. In the list view, select the UM dial plan you want to modify, and then click Edit.

On the UM Dial Plan page, under UM Mailbox Policies, select the UM mailbox policy you want to manage, and then click Edit.

On the UM Mailbox Policy page > Protected voice mail, under Protect voice message from authenticated callers, select one of the following options:

Click Save.

 

B:

* In on-premises and hybrid deployments, you can configure a Client Access and Mailbox server to use mutual Transport Layer Security (mutual TLS) to encrypt the SIP and RTP traffic sent and received from other devices and servers. When you configure the dial plan to use SIP secured mode, only the SIP signaling traffic will be encrypted, and the RTP media channels will still use TCP, which isn’t encrypted. However, when you configure the dial plan to use Secured mode, both the SIP signaling traffic and the RTP media channels are encrypted. An encrypted signaling media channel that uses Secure Realtime Transport Protocol (SRTP) also uses mutual TLS to encrypt the VoIP data.

* When you’re deploying Transport Layer Security (TLS) with UM, the certificates that are used on the Client Access server and the Mailbox server both must contain the local computer’s fully qualified domain name (FQDN) in the certificate’s Subject Name. To work around this issue, use a public certificate and import the certificate on all Client Access and Mailbox servers, any VoIP gateways, IP PBXs, and all the Lync servers.

 

 

QUESTION 2

You need to recommend a solution to ensure that during the planned migrations, all Autodiscover requests are processed by the Exchange Server 2013 Client Access servers.

 

What should you recommend?

 

A.

On the Exchange Server 2007 Client Access servers, modify the AutodiscoverServiceInternalURI.

B.

On the Exchange Server 2007 Client Access servers, modify the ExternalURL value of the Autodiscover virtual directory.

C.

On the Exchange Server 2013 Client Access servers, modify the ExternalURL value of the Autodiscover virtual directory.

D.

On the Exchange Server 2013 Client Access servers, modify the AutodiscoverServiceInternalURI.

 

Correct Answer: A

Explanation:

The Exchange Server 2007 Client Access servers must be configured to use the Exchange Server 2013 Client Access server. We do this by setting the AutodiscoverServiceInternalURI property.

 

 

QUESTION 3

You deploy a new certificate to a Client Access server.

 

You test the new certificate by using Outlook Anywhere from the Internet.

 

The test generates certificate errors.

 

You need to prevent the errors from reoccurring.

 

To which two stores should you add the root CA certificate? (Each correct answer presents part of the solution. Choose two.)

 

A.

the personal store on the client computers

B.

the personal store on the Client Access server

C.

the personal store on the Mailbox servers

D.

the Trusted Root Certification Authorities store on the client computers

E.

the Trusted Root Certification Authorities store on the Client Access server

F.

the Trusted Root Certification Authorities store on the Mailbox servers

 

Correct Answer: DE

Explanation:

D: Outlook Anywhere won’t work with a self-signed certificate on the Client Access server. Self-signed certificates must be manually copied to the trusted root certificate store on the client computer or mobile device. When a client connects to a server over SSL and the server presents a self-signed certificate, the client will be prompted to verify that the certificate was issued by a trusted authority. The client must explicitly trust the issuing authority. If the client confirms the trust, then SSL communications can continue.

 

E: If you are providing external access to Autodiscover by using Outlook Anywhere you must install a valid SSL certificate on the Client Access server.

 

 

QUESTION 4

DRAG DROP

You need to recommend a solution to meet the compliance requirements for the research department and the statutory holidays.

 

What should you recommend configuring?

 

To answer, drag the appropriate object to the correct location in the answer area. Each object may be used once, more than once, or not at all. Additionally, you may need to drag the split bar between panes or scroll to view content.

 

clip_image005

 

Correct Answer:

clip_image007

 

 

 

 

 

 

 

 

 

 

QUESTION 5

You need to recommend a solution for the memos. The solution must meet the compliance requirements. What should you include in the recommendation?

 

A.

Secure/Multipurpose Internet Mail Extensions (S/MIME)

B.

Information Rights Management (IRM)

C.

Domain Security

D.

Data loss prevention (DLP) policies

 

Correct Answer: B

Explanation:

* Scenario: Management occasionally sends the staff internal memos that contain confidential information, such as sales figures. The memos must be protected so that unauthorized users cannot read the memos and internal users cannot forward the memos to external recipients.

* With the IRM features in Exchange 2013, your organization and your users can control the rights recipients have for e-mail. IRM also helps allow or restrict recipient actions such as forwarding a message to other recipients, printing a message or attachment, or extracting message or attachment content by copying and pasting. IRM protection can be applied by users in Microsoft Outlook or Microsoft Office Outlook Web App, or it can be based on your organization’s messaging policies and applied using transport protection rules or Outlook protection rules.

 

Reference: Information Rights Management

 

 

QUESTION 6

You are creating a contingency plan to be implemented if the entire New York site fails after Exchange Server 2013 is deployed.

 

You need to recommend which tasks must be performed to ensure that all of the users can access Outlook Web App from the Chicago site if the New York fails.

 

Which three actions should you recommend? (Each correct answer presents part of the solution. Choose three.)

 

A.

On the Client Access server in t

he Chicago site, set the ExternalURL of Outlook Web App to mail.adatum.com.

B.

On the Mailbox server in the Chicago site, set the ExternalURL of Outlook Web App to mail.adatum.com.

C.

Modify the host (A) record for mail.adatum.com to point to the Client Access server in the Chicago site.

D.

On the Client Access server in the Chicago site, set the internal URL of Outlook Web App to mail.adatum.local.

E.

Install the mail.adatum.com certificate and private key on the Client Access server in the Chicago site.

 

Correct Answer: ACE

Explanation:

A: Example: To configure an external URL for Outlook Web App, run the following command in Exchange Management Shell.

Set-OwaVirtualDirectory “<CAS2013>OWA (Default Web Site)” -ExternalUrl https://mail.contoso.com/OWA

 

C: Need a new record in the DNS.

 

E: In Exchange 2013, you can use the Certificate Wizard to request a digital certificate from a certification authority. After you’ve requested a digital certificate, you’ll need to install it on the Client Access server.

 

Reference: Exchange 2013 Client Access server configuration

 

 

QUESTION 7

You need to recommend a solution to ensure that the store managers meet the compliance requirements. What should you include in the recommendation?

 

A.

Retention tags and retention policies

B.

Deleted item retention

C.

An in-place hold

D.

Personal archives

 

Correct Answer: C

Explanation:

* Scenario: All store managers must be prevented from permanently deleting email messages from their Inbox.

* In Exchange 2013, you can use In-Place Hold to accomplish the following goals:

Place user mailboxes on hold and preserve mailbox items immutably Preserve mailbox items deleted by users or automatic deletion processes such as MRM

* Preserve items indefinitely or for a specific duration

Etc.

 

Reference: n-Place Hold and Litigation Hold

 

 

QUESTION 8

HOTSPOT

You need to recommend a database availability group (DAG) design that meets the technical requirements.

 

Which DAG design should you recommend?

 

To answer, select the appropriate design in the answer area.

 

clip_image009

 

Correct Answer:

clip_image011

 

QUESTION 9

You need to recommend a solution to meet the compliance requirement for the legal department. What should you include in the recommendation?

 

A.

A retention hold

B.

The Discovery Management management role group

C.

A litigation hold

D.

The Recipient Management management role group

 

Correct Answer: B

Explanation:

* Scenario: The legal department must be able to search for messages in all of the mailboxes.

* Administrators or users who are members of the Discovery Management role group can perform searches of mailboxes in the Exchange organization for data that meets specific criteria and can also configure litigation holds on mailboxes.

 

 

QUESTION 10

You need to recommend an auditing solution that meets the compliance requirements. What should you recommend?

 

A.

Export the mailbox audit log.

B.

Run an administrator role group report.

C.

Run a non-owner mailbox access report.

D.

Export the administrator audit log.

 

Correct Answer: D

Explanation:

* Scenario: All administrative changes made to the mailboxes must be tracked.

* You can use administrator audit logging in Microsoft Exchange Server 2013 to log when a user or administrator makes a change in your organization. By keeping a log of the changes, you can trace changes to the person who made the change, augment your change logs with detailed records of the change as it was implemented, comply with regulatory requirements and requests for discovery, and more.

 

Reference: Administrator audit logging

 

 

Free VCE & PDF File for Microsoft 70-342 Real Exam

Instant Access to Free VCE Files: MCSE|MCSA|MCITP…
Instant Access to Free PDF Files: MCSE|MCSA|MCITP…