aiotestking uk

70-342 Exam Questions - Online Test


70-342 Premium VCE File

Learn More 100% Pass Guarantee - Dumps Verified - Instant Download
150 Lectures, 20 Hours

Q1. DRAG DROP - (Topic 5) 

You are preparing the environment for the planned retention solution. 

You need to identify which policy tags must be created to meet the retention requirements. 

Which policy tag types should you identify? (To answer, drag the appropriate policy tag types to the correct message types. Each policy tag may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.) 

Answer:  

Q2. DRAG DROP - (Topic 6) 

You have an Exchange Server 2013 organization that contains two Mailbox servers and two Client Access servers. 

You have an Active Directory Rights Management Services (AD RMS) cluster. Information Rights Management (IRM) is enabled for the Exchange Server organization. 

All company executives are in a security group named Execs. All of the executives use smartphones that are managed by using a mobile device mailbox policy. The executives frequently read IRM-protected email messages by using Microsoft Outlook. 

You need to ensure that the executives can read the IRM-protected messages on their smartphone. 

Which task should you perform in each environment? (To answer, drag the appropriate tasks to the correct environments. Each task may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.) 

Answer:  

Q3.  (Topic 3) 

You implement the UM pilot. 

You capture and analyze a network trace from the IP-PBX. 

You discover that SIP/MTLS requests for TCP 5061 to EX1 are dropped. 

You need to ensure that the IP-PBX can route calls successfully to the Exchange Server 

2013 organization. 

What should you do? 

A. Modify the IP-PBX to route calls to EX5 and EX6. 

B. Modify the port used on the IP-PBX. 

C. Modify the SIP listening port on EX1. 

D. Deploy a server that has Exchange Server 2010 and the Unified Messaging server role installed. 

Answer:

Q4.  (Topic 6) 

You have an Exchange Server 2013 organization that has two sites. The sites use a single namespace. 

Each site contains two Exchange servers and a hardware load balancer. Mailboxes are distributed evenly between the sites. 

Your company’s IT policy states that all users must be able to access their mailbox if one site fails. 

You implement a DNS round robin solution for the Client Access server infrastructure. 

When a site outage occurs, some users report experiencing intermittent slowness when they connect to their mailbox. 

You need to recommend a solution to resolve the issue. 

What are two possible recommendations to achieve this goal? Each correct answer presents a complete solution. 

A. Remove the Virtual IP (VIP) of the failed data center. 

B. Implement geo-dns 

C. Add one additional Client Access server to each site. 

D. Deploy a Windows Failover Cluster in each site. 

E. Lower the TTL of the DNS records. 

Answer: A,E 

Q5.  (Topic 2) 

You need to recommend an auditing solution that meets the compliance requirements. What should you recommend? 

A. Export the mailbox audit log. 

B. Run an administrator role group report. 

C. Run a non-owner mailbox access report. 

D. Export the administrator audit log. 

Answer:

Explanation: 

* Scenario: All administrative changes made to the mailboxes must be tracked. 

* You can use administrator audit logging in Microsoft Exchange Server 2013 to log when a user or administrator makes a change in your organization. By keeping a log of the changes, you can trace changes to the person who made the change, augment your change logs with detailed records of the change as it was implemented, comply with regulatory requirements and requests for discovery, and more. 

Reference: Administrator audit logging 

Q6.  (Topic 6) 

You have an Exchange Server 2013 organization. 

You need to ensure that a user named User1 can prevent the deletion of every email message that contains a specific word from all of the mailboxes. The solution must minimize the number of permissions assigned to User1. 

What should you do? 

A. Add User1 to the Records Management management role group. Instruct User1 to run the New-ManagedContentSettings cmdlet. 

B. Add User1 to the Records Management management role group. Instruct User1 to run the New-MailboxSearch cmdlet. 

C. Add User1 to the Discovery Management management role group. Instruct User1 to run the New-ManagedContentSettings cmdlet. 

D. Add User1 to the Discovery Management management role group. Instruct User1 to run the New-MailboxSearch cmdlet. 

Answer:

Explanation: 

* If you want users to be able to use Microsoft Exchange Server 2013 In-Place eDiscovery, you must first authorize them by adding them to the Discovery Management role group. Members of the Discovery Management role group have Full Access mailbox permissions for the Discovery mailbox that's created by Exchange Setup. 

* The New-MailboxSearch cmdlet creates an In-Place eDiscovery search or an In-Place Hold. Unless specified, mailboxes on all Exchange 2013 servers in an organization are searched. You can stop, start, modify, or remove the search. 

Q7.  (Topic 2) 

You need to recommend a solution for the memos. The solution must meet the compliance requirements. 

What should you include in the recommendation? 

A. Secure/Multipurpose Internet Mail Extensions (S/MIME) 

B. Information Rights Management (IRM) 

C. Domain Security 

D. Data loss prevention (DLP) policies 

Answer:

Explanation: 

* Scenario: Management occasionally sends the staff internal memos that contain confidential information, such as sales figures. The memos must be protected so that unauthorized users cannot read the memos and internal users cannot forward the memos to external recipients. 

* With the IRM features in Exchange 2013, your organization and your users can control the rights recipients have for e-mail. IRM also helps allow or restrict recipient actions such as forwarding a message to other recipients, printing a message or attachment, or extracting message or attachment content by copying and pasting. IRM protection can be applied by users in Microsoft Outlook or Microsoft Office Outlook Web App, or it can be based on your organization's messaging policies and applied using transport protection rules or Outlook protection rules. 

Reference: Information Rights Management 

Q8.  (Topic 5) 

You need to resolve the content filtering issue for the Office 365 pilot users. 

What should you do? 

A. Run the Set-Mailbox cmdlet and specify the -MaxBlockedSenders and the -MicrosoftOnlineServicesID parameters. 

B. Run the Microsoft Online Services Directory Synchronization Configuration Wizard and select Enable Exchange hybrid deployment. 

C. Modify the default content filter policy from the Office 365 portal. 

D. Run the Set-Mailbox cmdlet and specify the -MaxSafeSenders and the -MicrosoftOnlineServicesID parameters. 

Answer:

Explanation: 

* Scenario: 

/ The pilot users report that entries added to their Safe Senders list and their Blocked 

Senders list fail to work. 

/ For the pilot mailboxes, all inbound email messages from the Internet are delivered to the 

Exchange Server organization, and then forwarded to Office 365. 

* Hybrid Configuration wizard Exchange 2013 includes the Hybrid Configuration wizard which provides you with a streamlined process to configure a hybrid deployment between on-premises Exchange and Exchange Online organizations. 

Reference: Exchange Server 2013 Hybrid Deployments 

Q9.  (Topic 2) 

You are creating a contingency plan to be implemented if the entire New York site fails after Exchange Server 2013 is deployed. 

You need to recommend which tasks must be performed to ensure that all of the users can access Outlook Web App from the Chicago site if the New York fails. 

Which three actions should you recommend? (Each correct answer presents part of the solution. Choose three.) 

A. On the Client Access server in the Chicago site, set the ExternalURL of Outlook Web App to mail.adatum.com. 

B. On the Mailbox server in the Chicago site, set the ExternalURL of Outlook Web App to mail.adatum.com. 

C. Modify the host (A) record for mail.adatum.com to point to the Client Access server in the Chicago site. 

D. On the Client Access server in the Chicago site, set the internal URL of Outlook Web App to mail.adatum.local. 

E. Install the mail.adatum.com certificate and private key on the Client Access server in the Chicago site. 

Answer: A,C,E 

Explanation: 

A: Example: To configure an external URL for Outlook Web App, run the following command in Exchange Management Shell. Set-OwaVirtualDirectory "<CAS2013>\OWA (Default Web Site)" -ExternalUrl https://mail.contoso.com/OWA 

C: Need a new record in the DNS. 

E: In Exchange 2013, you can use the Certificate Wizard to request a digital certificate from a certification authority. After you’ve requested a digital certificate, you’ll need to install it on the Client Access server. 

Reference: Exchange 2013 Client Access server configuration 

Q10. HOTSPOT - (Topic 1) 

You need to configure transport rules to meet the technical requirements for the PII data and the financial data. 

How should you configure the rules? 

To answer, disable the appropriate rule or rules in the answer area. 

Answer: