Company.com has recently configured an exchange server named
ex01 with a single mailbox database. Company.comis aware that the network users user
microsoft office outlook and outlook web app. During your routine maintenance you discover that
the network users are unable to restore e-mail messages from the Recover Deleted Items folder.
During the course of the business week you receive instruction from Company.com to ensure that
the network users are able to restore e-mail messages from the Recover Deleted Items folder.
What should you do?
A -
You should consider having a management rolecreated and assigned to all users from the Exchange Management Shell.
B -
You should consider having a retention policy created and assigned to all users from the Exchange Management Shell.
C -
You should consider having the propertiesof the mailbox database modified from the Exchange Management Console (EMC).
D -
You should consider having the properties of the Mailbox server object modified from the Exchange Management Console (EMC).
2-
Company.com has recently configured the mailbox server as members of a database
availability group (DAG) with a public folder database. During the course of the business week
you receive instruction from Company.com to create a new Active Directory site and install
Exchange server in the site whilst ensuring the public folders are stored on servers in both sites.
What should you do?
A -
You should consider having clustered continuous replication (CCR) configured on two servers in the new site. You should then have the replication settings for all public folder databases modified.
B -
You should consider having the standby continuous replication (SCR) configured on a server in the new site. You should then have the Enable-StorageGroupCopycmdlet run from a server in the new site.
C -
You should consider having a public folder database created on a server in the new site. You should then have the replication settings for all public folders modified.
D -
You should consider having a public folder database created on a server in the new site. You should then have the set-DatabaseAvailabilityGroup cmdlet run from a server in the new site.
3-
The Company.com organization makes use of Microsoft Exchange Server 2010
as their messaging solution. During the course ofthe business week you receive instruction from
Company.com to create Personal Archives for the users with mailboxes. What should you do?
A -
You should consider having the Exchange Management Console (EMC) tool used.
B -
You should consider having Microsoft Office Outlook tool used.
C -
You should consider having Active Directory Users and Computers tool used.
D -
You should consider having the Exchange Control Panel (ECP) tool used.
4-
The Company.com Exchange organization configuration is shown in
the table below: Company.com has additionallydeployed a new client access server named -ex04 and has successfully updates the required dns records for -ex04. During the course of the
business week you receive instruction from Company.com to ensure that the network users on -ex03 are able to successfully access their mailboxes using exchange activesync.
What should you do?
A -
you should consider having the set-activesyncvirtualdirectory -identity "server3\ microsoft-server-activesync (default web site)" -basicauthentication:$true command run from the exchange management shell on -ex03
B -
you should consider having the authentication type for the microsoft-server-activesync virtual directory set t ntlm on -ex01.
C -
you should consider having the new- activesyncdeviceaccessrule-query string * -characteristic device model -accesslevel allow command run from the exchange mangement shell on -ex04.
D -
you should consider having the authentication type for the microsoft-server-activesync virtual directory set to anonymous on -ex01.
5-
Company.com has recently deployed a computer named -ex01 which
has the client access, hub transport and mailbox server roles installed. during the course of the
business week you receive instruction from Company.com to ensure that the network users are
able to send and receive e-mail using windows live mail or microsoft office outlook express.
What should you do?
A -
You should consider having the propertiesof the MSExchangePOP3 (TCP-in) Windows Firewall rule modified.
B -
You should consider having the properties of the MSExchangeMailSubmission -RPC (TCP-in) Windows Firewall rule modified.
C -
You should consider having the SMTP server feature installed and configured.
D -
You should consider having the Microsoft Exchange POP3 service started. You should then have the startup type set to Automatic.
6-
The Company.com organization makes use of Microsoft Exchange Server 2010
as their messaging solution. During the course ofthe business week you receive instruction from
Company.com to prevent the network user named Rory Allen from downloading attachments
which are larger than 50 KB when making use ofExchange ActiveSync whilst ensuring your
solution affects no other users.
What should you do?
A -
You should consider having the properties of Rory Allen's mailbox modified.
B -
You should consider having the properties ifthe default Exchange ActiveSync Mailbox policy modified.
C -
You should consider having a new ActiveSynce Device Access rule created.
D -
You should consider having a new Exchange ActiveSync Mailbox policy created.
7-
The Company.com network
currently consists of a single Active Directory forest containing a single domain named
Company.com. The Company.com organization makes use of Microsoft Exchange Server 2010
as their messaging solution. During the course ofthe business week you receive instruction from
Company.com to install a new Exchange server tothe network whilst ensuring that the network
users are able to connect from the Internet to the new server using Exchange ActiveSync.
What should you do?
A -
You should consider having the external URL for the Microsoft-Server-ActiveSync virtual directory modified.
B -
You should consider having the internal URL for the Microsoft-Server-ActiveSync virtual directory modified.
C -
You should consider having the Windows Integrated Authentication enabled for the Microsoft-Server-ActiveSync virtual directory.
D -
You should consider having the Anonymous authentication enabled for the Microsoft-Server-ActiveSync virtual directory.
8-
Company.com has an
Exchange Server 2010 organization. the Company.com contains an exchange server 2010 client
access server named -ex12. Company.com has an employee named andy booth. he uses
exchange activesync to down load attachment. you have received instructions from the cio to limit
andy booth's attachments size; however your action should not in any way affect the other
employees at Company.com. What should you do?
A -
The best option is to set up a new managed content setting.
B -
The best option is to change Andy Booth's message size restrictions.
C -
The best option is to set up a new Exchange ActiveSync mailbox policy.
D -
The best option is to change the default Exchange ActiveSync mailbox policy.
9-
The Company.com contains an exchange server 2010 client
access server named -ex13. the mobile clients at Company.com are configured to either run
windows mobile 5.0, windows mobile 6.1 or windows mobile 6.5. the mobile users use the
internet to connect to -ex13, using mail.Company.com. you have received instructions from the
cio to equip -ex13 with a certificate. however, the mobile users need to connect to -ex13 from the
internet via exchange activesync. What should you do?
A -
You should consider including Company.com in the certificate.
B -
You should consider including -ex13.Company.com in the certificate.
C -
You should consider including EAS.Company.com in the certificate.
D -
You should consider including mail.Company.com in the certificate.
10-
Company.com has an
Exchange Server 2010 organization. the Company.com contains two exchange server 2010 client
access server named -ex14 and -ex15 that has imap4installed. remote users from the internet
make use of imap4 to connect to -ex14 and -ex15. you have received instructions from the cio not
to allow the users to use imap4 to connect to their mailboxes on -ex15.
What should you do?
A -
the best option is to change the imap4 retrieval settings on -ex15.
B -
the best option is to access the -ex15 and disable the imap4 mailbox feature for the mailboxes.
C -
the best option is to configure the windows firewall on -ex14 to block tcp port 25 and 110.
D -
the best option is to configure the windows firewall on -ex14 to block tcp port 110 and 995.