Q1. You have an Exchange Server 2013 organization.
The help desk reports that users fail to access their mailbox by using the URL http://mail.contoso.com. All of the users successfully connect to their mailbox by using Exchange ActiveSync.
You need to ensure that all of the users can access their mailbox by using the URL http://maif.contoso.com.
What should you configure on a Client Access server?
A. From Internet Information Services (IIS) Manager, configure HTTP Response Headers on the OWA virtual directory.
B. From Exchange Admin Center, create a new Outlook Web App mailbox policy.
C. From File Explorer, modify the permissions of the Web.config file in the Default Web Site folder.
D. From Internet Information Services (IIS) Manager, configure HTTP Redirect on the default web site.
Answer: D
Q2. DRAG DROP
You have an Exchange Server 2013 organization that contains four servers named EX1, EX2, EX3, and EX4. All of the servers are members of a database availability group (DAG) named DAG1.
Each server has a copy of a mailbox database named DB1. DB1 has the following characteristics:
The replay lag time on Ex4 is set to 14 days.
Single item recovery on all of the servers is set to 14 days.
None of the servers have Volume Shadow Copy Service (VSS) backups.
Ex4 has a folder named F:\RDB that is used to store database files during restore operations.
Twenty days ago, a user named User1 deleted an email message that had a subject of "Sales Report".
You need to restore the deleted email message to the mailbox of User1.
You copy the lagged database and the log files that are older than 20 days to F:\RDB.
Which three actions should you perform?
To answer, move the three appropriate actions from the list of actions to the answer area and arrange them in the correct order.
Answer:
Q3. You need to ensure that if a volume fails on EX2 again, a mailbox database copy is recreated automatically on a different volume.
Which command should you run?
A. Set-MailboxDatabase
B. Set-MailboxDatabaseCopy
C. Set-DatabaseAvailabilityGroup
D. Set-MailboxAutoRcplyConfigu ration
Answer: C
Q4. You need to recommend a solution for the New York office that meets the technical requirements for client access.
What should you include in the recommendation? (Each correct answer presents a complete solution. Choose all that apply.)
A. DNS round robin
B. a Layer 4 hardware load balancer
C. a Layer 7 hardware load balancer
D. the Network Load Balancing (NLB) feature
E. a Client Access server array
Answer: C,E
Q5. Fabrikam, Ltd. has an Exchange Server organization that contains two servers. The servers are configured as shown in the following table.
Recently, the internal and external namespaces named mail.fabrikam.com and autodiscover.fabrikam.com were changed to point to EX2.
You configure all of the users on EX2 to access their mailbox by using Microsoft Outlook from the Internet.
You enable Outlook Anywhere on EX1.
You need to ensure that users who have mailboxes on EX1 can connect to their mailbox from the Internet.
What should you do on EX1?
A. Set the ExternalHostName value to NULL.
B. Set the ExternalClientAuthenticationMethod value to Basic and NTLM.
C. Set the IISAuthenticationMethods value to Basic and NTLM.
D. Set the InternalHostName value to NULL
Answer: C
Q6. HOTSPOT
You are planning to implement several servers on virtual machines. The servers have Exchange Server 2013 installed.
The planned implementation must meet the following requirements: . Minimize the amount of overhead required for the virtualization solution.
. Minimize the risk of data corruption for the Exchange Server databases.
You need to recommend a storage solution for the Exchange databases and a backup and
recovery solution for the planned servers.
Which solutions should you recommend?
To answer, select the appropriate solutions in the answer area.
Answer:
Q7. Your network contains an Active Directory forest named contoso.com. The forest contains an enterprise root certification authority (CA) named CA1. The network contains a server named EX1 that has Exchange Server 2013 installed.
A partner company named A. Datum Corporation has an Active Directory domain named adatum.com. The domain contains a server named EX5 that has Exchange Server 2010 Service Pack 2 (SP2) installed. EX5 has a Receive connector that is configured for mutual TLS.
Users in contoso.com plan to send email messages that contain sensitive data to users in adatum.com.
You need to ensure that all of the email messages sent from contoso.com to adatum.com are encrypted by using TLS. The solution must ensure that EX1 and EX5 validate server certificates.
Which three actions should you perform? (Each correct answer presents part of the solution. Choose three.)
A. Run the set-transportconfig -tlssenddomainsecurelist contoso.com command.
B. Install a certificate, and then assign the certificate to the IIS service. Send the root certificate for contoso.com to the administrators in adatum.com.
C. Run the New-SendConnector cmdlet and specify the domainsecureenabled parameter.
D. Run the New-SendConnector cmdlet and specify the tlsdomainparameter.
E. Run the set-transportconfig -tlssenddomainsecurelist adatum.com command.
F. Install a certificate, and then assign the certificate to the SMTP service. Send the root certificate for contoso.com to the administrators in adatum.com.
Answer: A,D,F
Q8. You have an Exchange Server 2013 organization named adatum.com. The organization contains five Mailbox servers and two Client Access servers.
You need to ensure that an administrator named user1 receives a daily email message that contains a log of all the Exchange Server administrative actions.
Which cmdlet should you use in a scheduled task?
A. Search-AdminAuditLog
B. Set-Mailbox
C. New-AdminAuditLogSearch
D. Set-ExchangeServer
E. Set-AdminAuditLogConfig
Answer: C
Q9. You deploy an Exchange Server 2013 organization to a test network for evaluation.
You install the Mailbox server role and the Client Access server role on a server named ex01.contoso.com. You do not perform any other configurations.
All of the ports from the Internet to ex01.contoso.com are open. You successfully connect to ex01.contoso.com from the Internet and from the internal network.
You need to identify which types of Exchange Server clients will connect successfully to the organization without any further configurations.
What should you identify?
A. Internal Outlook Web App connections
B. Android Phones using Activesync
C. Windows RT devices running the Mail app
D. Windows Phones that use Exchange ActiveSync
Answer: A
Q10. You have an Exchange Server 2013 organization named for A.Datum Inc. A user named User1 is a member of the Domain Admins group. User1 fails to synchronize a new Windows Phone device by using Exchange ActiveSync and receives an HTTP 500 error message.
User1 successfully logs on to Outlook Web App and Outlook Anywhere. You need to ensure that User1 can synchronize the new Windows Phone device by using Exchange ActiveSync. Which two tasks should you perform? (Each correct answer presents a complete solution. Choose two.)
A. Disable permission inheritance on the User1 user account.
B. Enable permission inheritance on the User1 user account.
C. Install a trusted root certificate on the Windows Phone device.
D. Create a new mobile device mailbox policy.
E. Modify the Exchange ActiveSync policy that applies to User1’s mailbox.
Answer: B,E