Q1. DRAG DROP - (Topic 6)
You have an Exchange Server organization. The organization contains servers that have Exchange Server 2010 and Exchange Server 2013 installed.
A new compliance policy requires that all email messages remain stored for two years.
You create two retention tags named Tag1 and Tag2. Tag1 moves the email messages to an Archive mailbox after one year. Tag2 permanently deletes the email messages after two years.
You need to meet the compliance policy requirements. The solution must ensure that all email messages that are older than two years are removed as quickly as possible.
Which three actions should you perform?
To answer, move the three appropriate actions from the list of actions to the answer area and arrange them in the correct order.
Answer:
Q2. HOTSPOT - (Topic 1)
You plan to create two retention tags named Tag1 and Tag2. Tag1 will be used to move email messages to the Archive mailbox. Tag2 will be used to delete the email messages.
You need to identify which settings must be configured in the retention tags to meet the technical requirements.
How should you configure each retention tag?
To answer, configure the appropriate options for each retention tag setting in the answer area.
Answer:
Q3. HOTSPOT - (Topic 6)
Your network contains two Active Directory sites named Site1 and Site2.
You have an Exchange Server 2013 organization that contains six servers. The servers are configured as shown in the following table.
All of the mailbox databases replicate to all of the servers.
Users in Site1 connect to sitel-mail.contoso.com to access their mailbox. Users in Site2 connect to site2-mail.contoso.com to access their mailbox. All of the users use Microsoft Outlook 2013.
You need to identify which DNS modification must be made to fail over the email services from Site1 to Site2.
Which DNS modification should you identify? (To answer, select the appropriate record to modify and the new data for the record in the answer area.)
Answer:
Q4. HOTSPOT - (Topic 6)
You have an Exchange Server 2013 organization.
You run Get-OutlookAnywhere -Server EX1 | fl and you receive the following output.
Use the drop-down menus to select the answer choice that completes each statement.
Answer:
Q5. (Topic 6)
You have an Exchange Server organization. The organization contains servers that have either Exchange Server 2010 or Exchange Server 2013 installed.
You hire a new helpdesk technician named helpdesk1. Helpdesk1 is a member of the Recipient Management management role group.
You discover that helpdesk1 created nine new mailbox-enabled users by using the New-Mailbox command.
You need to identify which management role provides helpdesk1 with the permissions to create new mailbox-enabled users.
Which cmdlets should you run?
A. Get-ManagementRoleEntry and Get-ManagementRoleAssignment
B. Get-RolegroupMember and Get-ManagementRoleAssignment
C. Get-ManagementRoleEntry and Get-RoleGroup
D. Get-Rolegroup and Get-RoleGroupMember
Answer: A
Explanation:
* Use the Get-ManagementRoleEntry cmdlet to retrieve management role entries that have been configured on management roles.
* Use the Get-ManagementRoleAssignment cmdlet to retrieve management role assignments.
Q6. HOTSPOT - (Topic 6)
You have an Exchange Server 2013 organization.
You run Get-OutlookAnywhere -Server EX1 | fl and you receive the following output.
Use the drop-down menus to select the answer choice that completes each statement.
Answer:
Q7. DRAG DROP - (Topic 5)
You need to resolve the network traffic issue for MapiNet.
You suspend database replication.
Which three cmdlets should you run next in sequence? (To answer, move the appropriate three cmdlets from the list of actions to the answer area and arrange them in the correct order.)
Answer:
Q8. (Topic 6)
You are a network administrator for a company named Humongous Insurance. Humongous Insurance has an Active Directory forest that contains two domains.
You install the Active Directory Rights Management Services server role on a server named ADRMS1. The Active Directory Rights Management Services (AD RMS) server uses an internal certification authority (CA) for all certificates.
You plan to provide users with the ability to use AD RMS to protect all of the email messages sent to a partner company named Contoso, Ltd.
Contoso does not have AD RMS deployed.
You need to identify which components from the Humongous Insurance network must be accessible to Contoso to ensure that the users at Contoso can open protected messages.
Which two components should you identify? (Each correct answer presents part of the solution. Choose two.)
A. the AD RMS cluster
B. the certificate revocation list (CRL)
C. the Active Directory domain controllers
D. the Client Access servers
E. the Mailbox servers
F. the Global Catalog servers
Answer: B,C
Explanation:
B: The CRL is exactly what its name implies: a list of subscribers paired with digital
certificate status. The list enumerates revoked certificates along with the reason(s) for
revocation. The dates of certificate issue, and the entities that issued them, are also
included. In addition, each list contains a proposed date for the next release. When a
potential user attempts to access a server, the server allows or denies access based on the
CRL entry for that particular user.
C: If federation cannot be implemented and the external organization cannot implement
their own AD RMS infrastructure, hosting the user accounts can be the best option.
However, the cost of managing such accounts (for both the IT department and each user)
must be considered.
In this case, the users will need to be authenticated by a domain controller.
Q9. (Topic 4)
You need to implement a solution that meets the compliance requirements for the members of the legal department.
Which two cmdlets should you use? (Each correct answer presents part of the solution. Choose two.)
A. New-RoleAssignmentPolicy
B. Add-ManagementRoleEntry
C. New-ManagementRoleAssignment
D. New-ManagementRole
E. New-ManagementScope
Answer: C,D
Explanation:
* From scenario:
/ Only the users in the legal department must be able to use eDiscovery to view the
contents of email messages sent by the finance department users.
/ Users in the legal department use a shared mailbox named Legal. Legal is enabled for In-
Place Hold. Legal is the only mailbox on DB2.
We need to assign the role to the legal department users using the New-
ManagementRoleAssignment cmdlet.
To restrict the eDiscovery access to the finance users emails, we need to create a scope
using the New-ManagementScope cmdlet.
Q10. DRAG DROP - (Topic 4)
You need to identify which technologies must be used to meet the security requirements.
Which technologies should you identify? (To answer, drag the appropriate technologies to the correct requirements. Each technology may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.)
Answer: