Q1. (Topic 6)
You have a server named Server1 that has Exchange Server 2013 installed.
Users access their mailbox by using Microsoft Outlook 2010 and Outlook Web App.
You need to identify when a mailbox is accessed by someone other than the owner of the mailbox.
Which two actions should you perform? Each correct answer presents part of the solution.
A. Review the security event log.
B. Enable audit logging for all mailboxes.
C. Export the administrator audit log.
D. Run an administrator role group report.
E. Run a non-owner mailbox access report.
Answer: B,E
Explanation:
You have to enable mailbox audit logging for each mailbox that you want to run a non-owner mailbox access report.
The Non-Owner Mailbox Access Report in the Exchange Administration Center (EAC) lists the mailboxes that have been accessed by someone other than the person who owns the mailbox. When a mailbox is accessed by a non-owner, Microsoft Exchange logs information about this action in a mailbox audit log that’s stored as an email message in a hidden folder in the mailbox being audited. Entries from this log are displayed as search results and include a list of mailboxes accessed by a non-owner, who accessed the mailbox and when, the actions performed by the non-owner, and whether the action was successful.
Reference: Run a non-owner mailbox access report
https://technet.microsoft.com/en-us/library/jj150575(v=exchg.150).aspx
Q2. HOTSPOT - (Topic 6)
You have an Exchange Server 2013 organization.
All users are enabled for Unified Messaging (UM) and access their voice mail by using Microsoft Lync 2010. Callers report that when they press a key to dial an external telephone number, they hear a
message indicating that the intended destination cannot be reached.
You need to ensure that the callers can reach the external number successfully.
What should you modify?
To answer, select the appropriate object in the answer area.
Answer:
Q3. HOTSPOT - (Topic 4)
You need to configure the Exchange Server UM dial plan for the planned integration of UM and Lync Server.
How should you configure the UM dial plan? (To answer, select the appropriate dial plan type and VoIP security mode in the answer area.)
Answer:
Q4. DRAG DROP - (Topic 3)
You need to create a federation trust for the planned organization relationship.
Which three actions should you perform?
To answer, move the three appropriate actions from the list of actions to the answer area
and arrange them in the correct order.
Answer:
Q5. (Topic 6)
You have an Exchange Server organization that contains five servers. The servers are configured as shown in the following table.
You need to create a Lync Server SIP Unified Messaging (UM) dial plan to enable voice integration between Lync Server and Exchange Server.
Which three Exchange servers should you associate to the UM dial plans? (Each correct answer presents part of the solution. Choose three.)
A. EX1
B. EX2
C. EX3
D. EX4
E. EX5
Answer: C,D,E
Explanation:
C: You can enable Unified Messaging (UM) in Microsoft Exchange Server 2010. You must enable the Exchange computer running the Unified Messaging server role before the Unified Messaging server can process calls for UM-enabled Exchange 2010 recipients in your Exchange organization. However, the Unified Messaging server also must be added to a UM dial plan before it can process calls for Unified Messaging.
D, E:
* Requirements and Recommendations Client Access and Mailbox. In Microsoft Exchange Server 2013, Exchange UM runs as a service on these servers.
* Deploy the Exchange Mailbox server roles in each Exchange Unified Messaging (UM) forest where you want to enable users for Exchange UM.
Reference: Configuring Unified Messaging on Microsoft Exchange Server to Work with Lync Server 2013
Q6. HOTSPOT - (Topic 6)
You have an Exchange Server 2013 organization.
You are deploying Unified Messaging (UM) services on an Exchange server named EX1.
You need to ensure that EX1 accepts encrypted and unencrypted VoIP traffic.
What command should you run? To answer, select the appropriate options in the answer area.
Answer:
Q7. (Topic 6)
You have an Exchange Server 2013 organization.
The human resources (HR) department has a custom form used to enter the personal information of employees. The form uses the Microsoft Word format.
You need to encrypt the contents of the form automatically when users in the HR department send the form to users outside the organization.
You deploy an Active Directory Rights Management Services (AD RMS) template.
Which two of the following should you create next? Each correct answer presents a complete solution.
A. an Outlook protection rule.
B. a Mail Tip
C. a DLP policy template.
D. a Policy Tip.
Answer: A,C
Q8. (Topic 6)
You have an Exchange Server 2010 organization that contains three servers. The servers are configured as shown in the following table.
Microsoft Outlook is configured to connect to an FQDN of mail.adatum.com. Mail.adatum.com resolves to the IP address of a Layer 7 hardware load balancer. The hardware load balancer is configured to send traffic to EX2 and EX3.
You deploy an Exchange Server 2013 Mailbox server named EX4 and an Exchange Server 2013 Client Access server named EX5.
You plan to migrate all mailboxes to Exchange Server 2013.
You need to recommend a solution to ensure that users can access their mailbox on EX1 or EX4 during the migration.
What should you do?
A. Create a Client Access server array that contains EX1 and EX5.
B. Modify the autodiscover.contoso.com resource record to point to EX5.
C. Modify the properties of the hardware load balancer to point to EX5.
D. Create a DNS record named legacy.contoso.com in the internal DNS zone.
Answer: C
Explanation:
Note: So what is the Client Access server in Exchange 2013? The Client Access server role is comprised of three components, client protocols, SMTP, and a UM Call Router. The CAS role is a thin, protocol session stateless server that is organized into a load balanced configuration. Unlike previous versions, session affinity is not required at the load balancer (but you still want a load balancer to handle connection management policies and health checking). This is because logic now exists in CAS to authenticate the request, and then route the request to the Mailbox server that hosts the active copy of the mailbox database.
The Mailbox server role now hosts all the components and/or protocols that process, render and store the data. No clients will ever connect directly to the Mailbox server role; all client connections are handled by the Client Access server role.
Reference: Exchange 2013 Server Role Architecture
Q9. (Topic 6)
Your company has an Exchange Server 2010 organization.
The network contains an internal root certification authority (CA).
You plan to add a disclaimer to all email messages sent by users in the company.
You need to ensure that the disclaimer can be added to encrypted email messages.
What should you do?
A. Instruct users to encrypt email messages by using IRM only.
B. Instruct users to encrypt email messages by using S/'MIME only.
C. Enable the Content Filter agent on all of the Hub Transport servers.
D. Modify the priority of the Transport Rule agent on all of the Hub Transport servers.
Answer: A
Q10. (Topic 6)
Your company has a main office and a branch office. An Active Directory site exits for each office.
The offices are connected by a WAN link.
You plan to deploy Exchange Server 2013 in each site.
You need to identify the number of Exchange servers required to meet the following requirements:
-Maintain user access to mailboxes if a single server fails.
-Use the minimize account of Exchange servers in each site.
How many servers should you deploy in each site?
A. 1
B. 2
C. 3
D. 4
Answer: B