Q1. HOTSPOT
You need to identify which names must be used as the URLs of each virtual directory on the planned Exchange Server 2013 servers.
Which names should you identify?
To answer, configure the appropriate name for each server in the answer area.
Answer:
Q2. You have an Exchange Server 2010 organization named adatum.com. You deploy a server that has Exchange Server 2013 installed. You plan to install eight additional servers that have exchange Server 2013 installed. You are a member of the Organization Management role group. You hire a temporary Exchange administrator named Temp1.
The company’s security policy states that all external consultants must have the minimum number of required permissions on the network.
You need to ensure that Temp1 can install a server named Server5. The solution must meet the requirements of the security policy.
Which two tasks should you perform? (Each correct answer presents part of the solution. Choose two.)
A. Run setup and specify the /newprovisionedserver:Server5 parameter.
B. Add Temp1 to the Delegated Setup management role group.
C. Add Temp1 to the Exchange Server role group.
D. Create a new management role and a new role assignment policy.
E. Run setup and specify the /roles:temp1 parameter
Answer: A,B
Q3. HOTSPOT
Your network contains an Active Directory forest. The forest contains two sites named
Site1 and Site2.
You have an Exchange Server 2013 organization. Site1 contains two Mailbox servers and one Client Access server. Site2 contains two Mailbox servers and two Client Access servers.
You need to prevent messages that cannot be protected by shadow redundancy from being delivered.
What command should you run? (To answer, select the appropriate options in the answer area.)
Answer:
Q4. You have an Exchange Server 2013 organization.
You create two distribution groups named Group1 and Group2. Group1 and Group2 each
contain several hundred users. Group1 contains a user named User1.
You need to configure moderation for Group2. The solution must meet the following requirements:
Email sent from the members of Group1 must NOT be moderated unless the sender is User1.
All other email must be moderated by a user named Admin1.
Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)
A. Create a transport rule that has a condition of The recipient is Group2. Configure the transport rule to have an action of Forward the message for approval to Admin1.
B. Run Set-DistributionGroup Group2 -ModeratedBy Admin1 -BypassModerationFromSendersOrMembers Group1 -ModerationEnabled $true.
C. Create a transport rule that has the conditions of The sender is User1 and The recipient is Group2. Configure the transport rule to have an action of Forward the message for approval to Admin1.
D. Create a transport rule that has the conditions of The sender is User1 and The recipient is Group2. Configure the transport rule to have an action of Forward the message for approval to Admin1.
Answer: B,C
Q5. You have an Exchange Server 2013 organization.
Each user has an In-Place Archive.
You discover that several items in a user's In-Place Archive are corrupt.
You need to ensure that the user can access the corrupt items.
Which tool should you use?
A. The Repair-FileIntegrity cmdlet
B. The Isinteg command
C. The New-MailboxRepairRequest cmdlet
D. The Eseutil command
Answer: C
Q6. You have an Exchange Server organization that contains three servers that have Exchange Server 2013 installed and one server that has Exchange Server 2010 installed.
You create the custom RBAC roles shown in the following table.
The Seattle help desk manages all of the users in an organizational unit (OU) named Seattle. The Miami help desk manages all of the users in an OU named Miami. The IT Administrators manage all of the users in the forest.
You need to recommend which commands must be run to prevent only the members of both help desks from modifying the properties of users who have a department attribute value of Manager.
Which three commands should you run? (Each correct answer presents part of the solution. Choose three.)
A. new-managementscope "executive users exclusive scope" -recipientrestrictionfilter { department -eq "manager" } -exclusive –force
B. new-managementroleassignment -name "managers" -securitygroup "managers" -role "mail recipients" -exclusiverecipientwritescope "executive users exclusive scope"
C. new-roleassignmentpolicy -name "limited end user policy" -roles "mypersonalinformation".
D. new-rolegroup -name "managers" -roles "mail recipients" -members admins
E. new-rolegroup -name "help desk" -roles "mail recipients" -members admins
Answer: A,B,D
Q7. You have network contoso.com. contoso.com consist of AD DS Domain contoso.com. All Servers running Windows Server 2012 and all Clients running Windows 8 Pro.
Server1 runs Mailbox Server Role and Client Access Server Role.
You are configuring Anti-Spam Filtering on Server1.
You need to ensure that all emails with the words “Free Credit Check” are rejected unless the email is sent to Finance Distribution Group.
You also need to ensure that all emails from partner company
Domain name adatum.com bypass the Anti-Spam Filter.
You run the Add-ContentFilterPhrase and add the words “Free Credit Check”
What should you do next?
A. Run the Set-TransportConfig and Set-ContentFilterConfig
B. Run the Set-SenderReputationConfig and Set-TransportConfig
C. Run the Set-ContentFilterConfig and Set-RecipientFilterConfig
D. Run the Set-SenderFilterConfig and Set-RecipientFilterConfig
Answer: C
Q8. You need to ensure that all of the email messages sent from the Internet to adatum.com are routed through the contoso.com organization.
What should you create in contoso.com? (Each corrects answer presents part of the solution. Choose all that apply.)
A. A contact object for each adatum.com recipient
B. An internal relay accepted domain for adatum.com
C. A Send connector that is configured to point to the contoso.com transport servers
D. A Send connector that is configured to point to the adatum.com transport servers
E. An authoritative accepted domain for adatum.com
Answer: B,D
Q9. HOTSPOT
You have an Exchange Server 2013 organization.
You have a user named User1 and a user named User2. Both users access their email by using Microsoft Outlook 2013.
You need to ensure that User2 can access all of the email messages in the mailbox of User1 the next time User2 opens Outlook.
What command should you run? (To answer, select the appropriate options in the answer area.)
Answer:
Q10. You have an Exchange Server 2013 organization that contains five servers.
All users connect to their mailbox by using a mobile device.
All of the users in the finance department are in an organizational unit (OU) named OU1.
You need to prevent the finance users from accessing the extended storage on their mobile
device.
What should you do?
A. Create a new mobile device mailbox policy, and then run the Set-CasMailboxcmdlet.
B. Create a new device access rule, and then run the Set-Mailbox cmdlet.
C. Create a new mobile device mailbox policy, and then run the Set-Mailboxcmdlet.
D. Create a new device access rule, and then run the Set-CasMailboxcmdlet.
Answer: A