Q1. (Topic 6)
Your company has an Exchange Server 2013 organization named adatum.com.
You purchase an Office 365 subscription and configure a hybrid deployment.
All recipients have an email address that contains a SMTP suffix of adatum.com.
You discover that all of the email messages sent to the Internet from users who have Office 365 mailboxes are routed through the on-premises Exchange servers.
You need to ensure that all of the email messages are sent directly to the Internet.
What should you do?
A. Modify the Send connector.
B. Run the Hybrid Configuration wizard.
C. Create a new Sharing policy.
D. Modify an organization relationship.
Answer: B
Explanation:
Creating and configuring a hybrid deployment with the Hybrid Configuration wizard is now a single process in Microsoft Exchange Server 2013.
Note: A hybrid deployment offers organizations the ability to extend the feature-rich experience and administrative control they have with their existing on-premises Microsoft Exchange organization to the cloud. A hybrid deployment provides the seamless look and feel of a single Exchange organization between an on-premises Exchange Server 2013 organization and Exchange Online in Microsoft Office 365. In addition, a hybrid deployment can serve as an intermediate step to moving completely to an Exchange Online organization.
Q2. (Topic 1)
You need to recommend an Outlook protection rule solution to meet the technical requirements.
What should you recommend?
A. Create an Outlook protection rule and filter the rule based on the FromDepartment property. Apply the Do Not Forward protection template to the rule and enable the UserCanOverride setting.
B. Create an Outlook protection rule and filter the rule based on the FromDepartment property. Apply the Do Not Forward protection template to the rule and disable the UserCanOverride setting.
C. Create an Outlook protection rule and filter the rule based on the SentTo property. Apply the Do Not Forward protection template to the rule and disable the UserCanOverride setting.
D. Create an Outlook protection rule and filter the rule based on the SentTo property. Apply the Do Not Forward protection template to the rule and enable the UserCanOverride setting.
Answer: B
Explanation:
* Scenario:
Prevent the forwarding of email messages sent by users who have a value of Legal in their
Department field.
* Use FromDepartment property and do not allow the user to override.
Q3. DRAG DROP - (Topic 3)
You need to implement a solution to meet the security requirement for the temporary employees.
You deploy an Active Directory Rights Management Services (AD RMS) cluster, and then you run the Set-IRMConfiguration cmdlet.
Which three actions should you perform?
To answer, move the three appropriate actions from the list of actions to the answer area and arrange them in the correct order.
Answer:
Q4. HOTSPOT - (Topic 6)
Your network contains two Active Directory sites named Site1 and Site2. Both sites contain an equal number of users. Each site contains two Exchange Server 2013 Mailbox servers.
You need to recommend a high-availability solution that meets the following requirements:
. If a single Mailbox server fails, the active mailbox database copies on that server must fail over to a Mailbox server in the same site.
. If both Mailbox servers in the same site fail, the active mailbox databases copies must be switched over to the other site manually.
. If a WAN link fails, multiple copies of the same mailbox database must not be activated in both sites simultaneously.
How should you configure the database availability groups (DAGs)? (To answer, configure the appropriate options in the answer area.)
Answer:
Q5. HOTSPOT - (Topic 6)
You have an Exchange Server 2013 organization that contains the servers configured as
shown in the following table.
All of the Exchange servers run Windows Server 2012 R2 and are members of a database availability group (DAG) named DAG1.
A mailbox database named DB1 replicates between EX1, EX2, EX3, and EX7. The mailbox database copy of DB1 on EX7 is a lagged database.
You need to ensure that if the number of healthy database copies of DB1 is less than three during a 24-hour period, the logs in the lagged database replay automatically.
What command should you run? To answer, select the appropriate options in the answer area.
Answer:
Q6. (Topic 6)
You plan to deploy 20 Client Access servers that will have Exchange Server 2013 installed.
You need to prepare the certificate required for the planned deployment. The solution must ensure that the same certificate can be used on all of the Client Access servers.
What should you do first?
A. On one of the Client Access servers, run the New-ExchangeCertificate cmdlet and specify the PrivateKeyExportable parameter.
B. On all of the Client Access servers, run the Get-ExchangeServer cmdlet.
C. On one of the Client Access servers, run the New-ExchangeServer cmdlet and specify the BinaryEncoding parameter.
D. On one of the Client Access servers, start the Certificates console and run the certificate import wizard.
Answer: C
Q7. (Topic 6)
You have an Exchange Server 2013 organization.
A user is involved in a possible litigation matter.
You need to protect all of the messages in a mailbox from permanent deletion.
Which cmdlet should you use?
A. Enable-InboxRule
B. Add-MailboxPermisssion
C. Set-Mailbox
D. Set-Retention Policy
Answer: C
Explanation:
This example configures April Stewart's mailbox to retain deleted items for 30 days.
Set-Mailbox -Identity - "April Stewart" -RetainDeletedItemsFor 30
Note: When a user deletes items from the Deleted Items default folder by using the Delete,
Shift+Delete, or Empty Deleted Items Folder actions, the items are moved to the
Recoverable Items\Deletions folder. The duration that deleted items remain in this folder is
based on the deleted item retention settings configured for the mailbox database or the
mailbox.
Incorrect:
Not D: The Set-Retention Policy is used in a cloud environment only.
Reference: Configure Deleted Item retention and Recoverable Items quotas
https://technet.microsoft.com/en-us/library/ee364752%28v=exchg.150%29.aspx
Q8. DRAG DROP - (Topic 6)
You have an Exchange Server 2013 organization.
Your company identifies the following security requirements:
. Users must be able to send encrypted email messages that can only be decrypted by the intended recipient.
. All email messages sent by a user named User1 to an external recipient must be protected by using TLS.
. All SMTP sessions to a remote SMTP host named SMTP1 must be encrypted.
You need to recommend which technology must be used to meet each requirement.
Which technologies should you recommend? (To answer, drag the appropriate
technologies to the requirements in the answer area. Each technology may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.)
Answer:
Q9. HOTSPOT - (Topic 4)
You need to recommend a solution that meets the auditing requirements.
Which command should you include in the recommendation? (To answer, select the appropriate options in the answer area.)
Answer:
Q10. (Topic 6)
You have an Exchange Server 2013 organization.
You need to ensure that a user named User1 can prevent the deletion of every email message that contains a specific word from all of the mailboxes. The solution must minimize the number of permissions assigned to User1.
What should you do?
A. Add User1 to the Records Management management role group. Instruct User1 to run the New-ManagedContentSettings cmdlet.
B. Add User1 to the Records Management management role group. Instruct User1 to run the New-MailboxSearch cmdlet.
C. Add User1 to the Discovery Management management role group. Instruct User1 to run the New-ManagedContentSettings cmdlet.
D. Add User1 to the Discovery Management management role group. Instruct User1 to run the New-MailboxSearch cmdlet.
Answer: D
Explanation:
* If you want users to be able to use Microsoft Exchange Server 2013 In-Place eDiscovery, you must first authorize them by adding them to the Discovery Management role group. Members of the Discovery Management role group have Full Access mailbox permissions for the Discovery mailbox that's created by Exchange Setup.
* The New-MailboxSearch cmdlet creates an In-Place eDiscovery search or an In-Place Hold. Unless specified, mailboxes on all Exchange 2013 servers in an organization are searched. You can stop, start, modify, or remove the search.