You work as the enterprise exchange administrator at company.com. Company.com makes use of
Microsoft exchange server messaging solution. The company.com network consists of a single
Active directory domain named company.com. A firewall at .com separates the internal network
And a perimeter network. The perimeter network contains an exchange server 2010 edge
Transport server. You have received instructions from the cio to install an internal exchange server
2010 with the following criteria:
1. The support of edgesync synchronization and encrypted delivery of outbound e-mail messages
To the edge transport server.
2. The minimization of the attack surface ofthe internal network . What should you do?
A -
The best option is to use port 3309 and 25 from the internal network to the perimeter network.
B -
The best option is to use port 3309 and 636 from the internal network to the perimeter network.
C -
The best option is to use port 50636 and 25 from the internal network to the perimeter network.
D -
The best option is to use port 50636 and 135 from the internal network to the perimeter Network.
2-
You work as the enterprise exchange administrator at company.com. Company.com makes use of
Microsoft exchange server messaging solution. The company.com network consists of a single
Active directory domain named company.com. Company.com is configured to run in an exchange
Server 2010 environment. You have received instructions from the cio to deploy a public folder
Access solution. To accomplish this task you need toensure that the admin department is able to
Send e-mail messages to public folders as well as prohibiting them from using outlook web app
(owa) to read any document in the public folders. What should you do?
A -
This can be achieved by using owa segmentation and send as permissions.
B -
This can be achieved by using mail-enabled public folders and editor permissions.
C -
This can be achieved by using mail-enabled public folders and contributor permissions.
D -
This can be achieved by using owa segmentation and reviewer permissions.
3-
You work as the enterprise exchange administrator at company.com. Company.com makes use of
Microsoft exchange server messaging solution. The company.com network consists of a single
Active directory domain named company.com. Company.com is configured to run in an exchange
Server 2010 environment. Company.com contains 30offices that consist of 1,500 users. At
Present company.com users make use of microsoft exchange server to access their e-mail
Messages. During the course of the day you receive an instruction from the cio to ensure that
Users in their respective offices is only able download the list of recipients for their office as well
As ensuring that they are able to communicate toany other user in the organization via e-mail.
What should you do?
A -
The best option is to set up 30 new managed folder mailbox policies and 20 e-mail address Policies.
B -
The best option is to set up 30 new mailbox databases and then move the mailboxes from each Office to a separate mailbox database.
C -
The best option is to set up 30 new address lists and 30 offline address books (oabs).
D -
The best option is to set up 30 new dynamic distribution groups and then create 20 new global Address lists (gals).
4-
You work as the enterprise exchange administrator at company.com. Company.com makes use of
Microsoft exchange server messaging solution. Company.com is configured to run in an exchange
Server 2010 environment. You have received instructions from the cio to install public folder
Access that will ensure that users in the admin department is able send e-mail messages to
Public folders as well as post documents in the public folders using outlook web app (owa). To
Accomplish this task you need to recommend the appropriate changes to management. What
should you do?
A -
You should consider changing the public folder client permissions.
B -
You should consider changing the owa segmentation settings.
C -
You should consider changing the public folder administrative permissions.
D -
You should consider changing the mailbox permissions.
5-
The company.com network contains an
Exchange server 2010 organization. You are responsible for managing the exchange network for
Company.com. The organization contains three exchange server 2010 edge transport servers and
Seven exchange server 2010 hub transport servers. The edge transport servers is used to transfer
E-mail from your organization to the internet. During the course of the day you receive an
Instruction from the cio to ensure that all clients is able to send encrypted messages to other
Organizations over the internet as well asensuring that communications between the hub
Transport servers and the edge transport servers is encrypted. What should you do?
A -
Your best option would be to deploy smtp over ssl.
B -
Your best option would be to implement security/multipurpose internet mail extensions (s/mime)
C -
Your best option would be to deploy ipsec.
D -
Your best option would be to implement domain security.
6-
The company.com network contains an
Exchange server 2010 organization. You are responsible for managing an active directory
Management services server named -ex01. Company.com users currently make use of outlook
Web app (owa) to access their mailboxes. During the course of the day you receive an instruction
From management to devise a security solution plan for the organization. Management wants you
To ensure that e-mail messages are stored in an encrypted format and that the administrator
Defined templates are used to secure messages. What else should you incorporate?
A -
You should consider incorporating domain security into the plan.
B -
You should consider incorporating a legal hold into the plan.
C -
You should consider incorporating outlook protection rules into the plan.
D -
You should consider incorporating secure/multipurpose internet mail extensions (s/mime) into The plan.
7-
The company.com network
Contains an exchange 2010 organization. Company.com has its headquarters in stockholm where
You are located. The company.com network contains a database availability group (dag). You
Receive an instruction from the management to devise a mailbox database security solution for
The organization. Management wants the read/write performance to be maximized as well as
Ensuring that any access tothe database files is prohibited in the event of theft. What should you
do?
A -
You should recommend that management make use of dag network encryption.
B -
You should recommend that management make use of encrypted file system (efs).
C -
You should recommend that management makeuse of windows bittlocker drive encryption.
D -
You should recommend that management make use of rights management service (rms).
8-
The company.com network
Contains an exchange server 2010 organization. You are responsible for managing the exchange
Network for company.com. You are in the process of enabling journaling within the company.com
Organization. During the course of the day you receive an instruction from the cio to stop
Administrators from reading classified e-mail messages that is sent between senior management.
What should you do?
A -
Your best option would be to deploy an x.509 certificate from an enterprise certification Authority (ca) to all senior management. Then inform senior management to connect to the Exchange servers using smtp over tls.
B -
Your best option would be to deploy active directory rights management services (ad rms) Templates. Thereafter outlook protection rules should be created.
C -
Your best option would be to deploy an x.509 certificate from a trusted third-party certification Authority (ca) to all senior management. Thereafter you can inform senior management to Encrypt e- mail messages using security/multipurpose internet mail
D -
Your best option would be to deploy active directory rights management services (ad rms) Templates. Thereafter transport protection rules should be created.
9-
The company.com network
Contains an exchange server 2010 organization. Company.com has its headquarters in chicago
And a branch office in dallas. During the course ofthe day you receive an instruction from the cio
To ensure that confidential data is not forwarded on the internet. What should you do?
A -
Your best option would be to include transport protection rules in your plan.
B -
Your best option would be to include a custom send connector in your plan.
C -
Your best option would be to include custom mailtips in your plan.
D -
Your best option would be to include role based access control (rbac) role entries in your plan.
10-
The company.com network
Contains an exchange server 2010 organization. The active directory rights management services
(ad rms) is installed within the organization. You receive an instruction from the cio to recommend
A messaging security solution that will make sure that a disclaimer is applied to all e-mail
Messages and that all e-mail messages from the finance department is unable to be printed. What
should you do?
A -
You should recommend that secure/multipurposeinternet mail extensions (s/mime) be included In the system.
B -
You should recommend that transport protection rules be included in the system.
C -
You should recommend that retention policies be included in the system.
D -
You should recommend that journal report decryption be included in the system.