70-342 Exam - Advanced Solutions of Microsoft Exchange Server 2013

certleader.com

Q1.  (Topic 6) 

You have an Exchange Server 2013 organization. 

You successfully migrate the public folders from a previous version of Exchange Server. 

You discover that one of the public folder mailboxes almost reached its quota size. 

You need to move some of the public folders in the public folder mailbox to another public folder mailbox. 

What should you run? 

A. Merge PublicFolderMailbox.ps1 

B. Set-MailPublicFolder 

C. New-PublicFolderMigrationRequest 

D. New-PublicFolderMoveRequest 

Answer:

Explanation: 

* If the content of a public folder mailbox begins to exceed your mailbox quotas, you may need to move public folders to a different public folder mailbox. There are a couple ways to do this. To move one or more public folders that don’t contain subfolders, you can use the PublicFolderMoveRequest cmdlets. 

* Use the New-PublicFolderMoveRequest cmdlet to begin the process of moving public folder contents between public folder mailboxes. Moving public folders only moves the physical contents of the public folder; it doesn't change the logical hierarchy. When the move request is completed, you must run the Remove-PublicFolderMoveRequest cmdlet to remove the request or wait until the time specified in the CompletedRequestAgeLimit parameter has passed. The request must be removed before you can run another move request. 

Q2. HOTSPOT - (Topic 1) 

You need to configure transport rules to meet the technical requirements for the PII data and the financial data. 

How should you configure the rules? 

To answer, disable the appropriate rule or rules in the answer area. 

Answer:  

Q3.  (Topic 3) 

You need to identify which technologies must be deployed to meet the Office 365 coexistence requirements. 

Which two technologies should you identify? (Each correct answer presents part of the solution. Choose two.) 

A. the Microsoft Online Services Directory Synchronization tool 

B. Active Directory Federation Services (AD FS) 2.0 

C. Active Directory Rights Management Services (AD RMS) 

D. an internal root CA 

E. Active Directory Lightweight Directory Services (AD LDS) 

Answer: A,B 

Explanation: 

* Scenario: Contoso identifies the following Office 365 coexistence requirements: 

/ Office 365 users must be able to access their mailbox by using their Active Directory user 

account in Contoso. 

/ On-premises users must be able to share free/busy information and calendar information with the Office 365 users. 

A: When you create an Office 365 mailbox in Exchange Online in a hybrid deployment, the mail user is created in Active Directory on-premises. Directory synchronization, if it's configured, automatically synchronizes this new user object to Office 365, where it’s converted to a cloud mailbox in Exchange Online. You can create Office 365 mailboxes as regular user mailboxes, resource mailboxes for meeting rooms and equipment, and shared mailboxes. 

B: Step-By-Step: Setting up AD FS and Enabling Single Sign-On to Office 365 

Q4. DRAG DROP - (Topic 3) 

The Montreal data center experiences a power failure. 

You need to ensure that all the users can access their mailbox. 

Which three actions should you perform? 

To answer, move the three appropriate actions from the list of actions to the answer area and arrange them in the correct order. 

Answer:  

Q5.  (Topic 6) 

You have an Exchange Server 2013 organization named contoso.com. A partner company has an Exchange Server 2010 Service Pack 2 (SP2) organization named fabrikam.com. Both organizations have a federated trust. 

In contoso.com, you run Get-FederationInformation –DomainName contoso.com and you discover that the TokenIssueURIs property has a value of <uri:federation:MicrosoftOnline>. 

In fabrikam.com, you run Get-FederationInformation –DomainName fabrikam.com and you discover that the TokenIssueURIs property has a value of <uri:WindowsLiveID>. 

You need to ensure that the federated sharing can be implemented between the organizations. 

What should you do? 

A. In contoso.com, install the Exchange Web Service (EWS) Managed API. 

B. In the contoso.com, run the Set-OrganizationConfig cmdlet. 

C. In fabrikam.com, run the New-FedereationTrust cmdlet. 

D. In contoso.com, run the New-FederationTrust cmdlet. 

Answer:

Q6.  (Topic 6) 

You have an Exchange Server 2013 organization that has a hybrid deployment with Microsoft Office 365. The hybrid deployment use Active Directory Federation Services (AD FS) 3.0. 

You need to ensure that only Exchange ActiveSync devices are allowed to access Office 365 services from outside of the organization. 

Which two actions should you perform? Each correct answer presents part of the solution. 

A. Create a Mobile Device Mailbox Policy. 

B. Update the Office 365 Identify Platform relying party trust. 

C. Add claims rules to the Active Directory claims provider trust. 

D. Update the Office mobile device policy. 

E. Add an Active Directory Identify Platform relying party trust. 

Answer:

Explanation: 

C: Step 1: Add claim rules to the Active Directory Claims Provider trust Block all external access to Office 365 except Exchange ActiveSync 

The following example allows access to all Office 365 applications, including Exchange Online, from internal clients including Outlook. It blocks access from clients residing outside the corporate network, as indicated by the client IP address, except for Exchange ActiveSync clients such as smart phones. The rule set builds on the default Issuance Authorization rule titled Permit Access to All Users. Use the following steps to add an Issuance Authorization rule to the Office 365 relying party trust using the Claim Rule Wizard: (steps omitted). 

B: Step 2: Update the Microsoft Office 365 Identity Platform relying party trust 

Reference: Limiting Access to Office 365 Services Based on the Location of the Client 

https://technet.microsoft.com/en-us/library/hh526961(v=ws.10).aspx 

Q7.  (Topic 1) 

You need to recommend a solution for the HR voice mail. The solution must meet the 

security requirements. 

What should you recommend? 

A. Create a UM mailbox policy and associate the policy to UM1. Configure the voice mail protection settings of the UM mailbox policy. Create an auto attendant and link the auto attendant to UM1. 

B. Create a UM mailbox policy and associate the policy to a new dial plan. Configure the voice mail protection settings of the UM mailbox policy. Create an auto attendant and link the auto attendant to the new dial plan. 

C. Create a UM mailbox policy and associate the policy to a new dial plan. Configure the voice mail protection settings of the UM mailbox policy. Assign the UM mailbox policy to the mailbox of the HR department. 

D. Create a UM mailbox policy and associate the policy to UM1. Configure the voice mail protection settings of the UM mailbox policy. Assign the UM1 mailbox policy to the mailbox of the HR department. 

Answer:

Explanation: 

* Scenario: 

/ Use Information Rights Management (IRM) to protect all of the voice mails left for the 

telephone number of the human resource (HR) department. 

/ There is a UM dial plan named UM1. 

* The Protected Voice Mail feature is available with Exchange 2010 and later versions of 

Unified Messaging (UM). It can be configured on a UM mailbox policy. 

* By default, a single UM mailbox policy is created every time you create a UM dial plan. 

The new UM mailbox policy is automatically associated with the UM dial plan, and part of 

the dial plan name is included in the display name of the UM mailbox policy. You can edit 

this default UM mailbox policy. You can create additional UM mailbox policies to apply a 

common set of settings for groups of users. 

Q8.  (Topic 6) 

You have a database availability group (DAG). The DAG is configured as shown in the following table. 

You need to prevent a split-brain condition if a restore operation of the DAG occurs. 

What should you do? 

A. Deploy an alternate witness server to each site. 

B. Modify the Datacenter Activation Coordination (DAC) mode. 

C. Set the quorum model of the cluster to Node and Disk Majority. 

D. Deploy another Mailbox server to Site2. 

Answer:

Explanation: 

Datacenter Activation Coordination (DAC) mode is a property setting for a database availability group (DAG). DAC mode is disabled by default and should be enabled for all DAGs with two or more members that use continuous replication. 

If a catastrophic failure occurs that affects the DAG (for example, a complete failure of one of the datacenters), DAC mode is used to control the startup database mount behavior of a DAG. When DAC mode isn't enabled and a failure occurs that affects multiple servers in the DAG, and then when a majority of the DAG members are restored after the failure, the DAG will restart and attempt to mount databases. In a multi-datacenter configuration, this behavior could cause split brain syndrome, a condition that occurs when all networks fail, and DAG members can't receive heartbeat signals from each other. Split brain syndrome can also occur when network connectivity is severed between datacenters. Split brain syndrome is prevented by always requiring a majority of the DAG members (and in the case of DAGs with an even number of members, the DAG's witness server) to be available and interacting for the DAG to be operational. When a majority of the members are communicating, the DAG is said to have quorum. 

Q9. DRAG DROP - (Topic 6) 

You have an Exchange Server 2013 organization that has Information Rights Management 

 (IRM) configured. 

Users report that they cannot apply IRM protection to email messages from Outlook Web 

App. 

You verify that the users can protect the messages by using IRM from Microsoft Outlook. 

You need to recommend a solution to ensure that the users can protect email messages by 

using IRM from Outlook Web App. 

Which four actions should you recommend? 

To answer, move the four appropriate actions from the list of actions to the answer area 

and arrange them in the correct order. 

Answer:  

Q10.  (Topic 6) 

You plan to deploy 20 Client Access servers that will have Exchange Server 2013 installed. 

You need to prepare the certificate required for the planned deployment. The solution must ensure that the same certificate can be used on all of the Client Access servers. 

What should you do first? 

A. On one of the Client Access servers, run the New-ExchangeCertificate cmdlet and specify the PrivateKeyExportable parameter. 

B. On all of the Client Access servers, run the Get-ExchangeCertificate cmdlet. 

C. On one of the Client Access servers, run the New-ExchangeCertificate cmdlet and specify the BinaryEncoding parameter. 

D. On one of the Client Access servers, start the Certificates console and run the Certificate Import Wizard. 

Answer:

Explanation: 

We need to create a new certificate. We make it exportable. 

Note: 

Use the New-ExchangeCertificate cmdlet to create a self-signed certificate, renew an 

existing self-signed certificate, or generate a new certificate request for obtaining a 

certificate from a certification authority (CA).