70-342 Exam - Advanced Solutions of Microsoft Exchange Server 2013

certleader.com

Q1. HOTSPOT - (Topic 6) 

You have an Exchange Server 2013 organization and a Microsoft SharePoint Server 2013 server farm. 

You plan to use a SharePoint eDiscovery Center. 

You need to recommend which component must be deployed before you can use the SharePoint eDiscovery Center for In-Place eDiscovery. 

What should you recommend? To answer, select the appropriate options in the answer area. 

Answer:  

Q2.  (Topic 6) 

You have an Exchange Server 2013 organization that contains multiple Hub Transport servers. You need to recommend a message hygiene solution to| meet the following requirements: 

-Block servers that are known to send spam 

-Minimize administrative effort 

What should you recommend? 

A. an IP Block list 

B. IP Block list providers 

C. recipient filtering 

D. sender filtering 

Answer:

Q3.  (Topic 2) 

You need to recommend a solution for the voice mail traffic. The solution must meet the technical requirements. 

Which two configurations should you include in the recommendation? (Each correct answer presents part of the solution. Choose two.) 

A. A dial plan. 

B. A server certificate 

C. A transport rule 

D. A data loss prevention (DLP) policy 

E. A call answering rule 

Answer: A,B Explanation: 

* Scenario: Voice mail traffic between the telephone system and the Exchange Server environment must be encrypted. 

A: Use the EAC to configure Protected Voice Mail from authenticated callers . In the EAC, navigate to Unified Messaging > UM dial plans. In the list view, select the UM dial plan you want to modify, and then click Edit. . On the UM Dial Plan page, under UM Mailbox Policies, select the UM mailbox policy you want to manage, and then click Edit. . On the UM Mailbox Policy page > Protected voice mail, under Protect voice 

message from authenticated callers, select one of the following options: . Click Save. 

B: 

* In on-premises and hybrid deployments, you can configure a Client Access and Mailbox server to use mutual Transport Layer Security (mutual TLS) to encrypt the SIP and RTP traffic sent and received from other devices and servers. When you configure the dial plan to use SIP secured mode, only the SIP signaling traffic will be encrypted, and the RTP media channels will still use TCP, which isn’t encrypted. However, when you configure the dial plan to use Secured mode, both the SIP signaling traffic and the RTP media channels are encrypted. An encrypted signaling media channel that uses Secure Realtime Transport Protocol (SRTP) also uses mutual TLS to encrypt the VoIP data. 

* When you’re deploying Transport Layer Security (TLS) with UM, the certificates that are used on the Client Access server and the Mailbox server both must contain the local computer's fully qualified domain name (FQDN) in the certificate’s Subject Name. To work around this issue, use a public certificate and import the certificate on all Client Access and Mailbox servers, any VoIP gateways, IP PBXs, and all the Lync servers. 

Q4. HOTSPOT - (Topic 6) 

You have an Exchange Server 2013 organization. 

You need to create a single transport rule that applies to messages sent from users in the organization to users that are outside of the organization. Which two options should you use? To answer, select the two appropriate options in the answer area. 

Answer:  

Q5.  (Topic 2) 

You need to recommend a solution for the memos. The solution must meet the compliance requirements. 

What should you include in the recommendation? 

A. Secure/Multipurpose Internet Mail Extensions (S/MIME) 

B. Information Rights Management (IRM) 

C. Domain Security 

D. Data loss prevention (DLP) policies 

Answer:

Explanation: 

* Scenario: Management occasionally sends the staff internal memos that contain confidential information, such as sales figures. The memos must be protected so that unauthorized users cannot read the memos and internal users cannot forward the memos to external recipients. 

* With the IRM features in Exchange 2013, your organization and your users can control the rights recipients have for e-mail. IRM also helps allow or restrict recipient actions such as forwarding a message to other recipients, printing a message or attachment, or extracting message or attachment content by copying and pasting. IRM protection can be applied by users in Microsoft Outlook or Microsoft Office Outlook Web App, or it can be based on your organization's messaging policies and applied using transport protection rules or Outlook protection rules. 

Reference: Information Rights Management 

Q6. DRAG DROP - (Topic 3) 

You need to recommend which tasks must be performed to meet the compliance requirement for the marketing department. 

Which three actions should recommend? 

To answer, move the three appropriate actions from the list of actions to the answer area and arrange them in the correct order. 

Answer:  

Q7.  (Topic 6) 

You have an Exchange Server 2013 organization. 

You successfully migrate the public folders from a previous version of Exchange Server. 

You discover that one of the public folder mailboxes almost reached its quota size. 

You need to move some of the public folders in the public folder mailbox to another public 

folder mailbox. 

What should you run? 

A. Merge-PublicFolderMailbox.ps1 

B. Split-PublicFolderMailbox.ps1 

C. Set-MailPublicFolder 

D. Set-PublicFolder 

Answer:

Explanation: 

Split-PublicFolderMailbox.ps1 Splits the given public folder mailbox based on the size of the folder 

Note: If the content of a public folder mailbox begins to exceed your mailbox quotas, you 

may need to move public folders to a different public folder mailbox. There are a couple 

ways to do this. To move one or more public folders that don’t contain subfolders, you can 

use the PublicFolderMoveRequest cmdlets. 

Move a single public folder 

This example starts the move request for the public folder \CustomerEnagagements from 

the public folder mailbox DeveloperReports to DeveloperReports01 

New-PublicFolderMoveRequest -Folders \DeveloperReports\CustomerEngagements -

TargetMailbox DeveloperReports01 

Incorrect: 

Not A: Merge-PublicFolderMailbox.ps1 

Merges the contents of the given public folder mailbox with the targetpublic folder mailbox. 

Not C: Use the Set-MailPublicFolder cmdlet to configure the mail-related settings of mail-

enabled public folders. 

Not D: Use the Set-PublicFolder cmdlet to set the attributes of public folders. 

Reference: https://justaucguy.wordpress.com/2012/10/18/exchange-server-2013-preview-scripts/ 

Reference: Move a public folder to a different public folder mailbox 

https://technet.microsoft.com/en-us/library/jj906435(v=exchg.150).aspx 

Q8.  (Topic 5) 

You are evaluating the deployment of two additional Client Access servers and a hardware load balancer in the London office. 

You need to recommend changes to the Client Access namespace design to meet the site resiliency requirements. 

Which three actions should you recommend? (Each correct answer presents part of the solution. Choose three.) 

A. In the London office, set mail.proseware.com as the external host name for Outlook Anywhere. In the New York office, set mail.proseware.com as the external host name for Outlook Anywhere. 

B. In the London office, set lonmail.proseware.com as the internal host name for Outlook Anywhere. In the New York office, set nycmail.proseware.com as the internal host name for Outlook Anywhere. 

C. Use DNS round robin for the external host name for Outlook Anywhere. 

D. Use DNS round robin for the internal host name for Outlook Anywhere. 

E. In the London office, set nycmail.proseware.com as the external host name for Outlook Anywhere. In the New York office, set lonmail.proseware.com as the external host name for Outlook Anywhere. 

F. In the London office, set mail.proseware.com as the internal host name for Outlook Anywhere. In the New York office, set mail.proseware.com as the internal host name for Outlook Anywhere. 

Answer: A,B,C 

Explanation: 

A: Use mail.proseware.com as the external host name for Outlook Anywhere at both locations. 

B: Use internal names (lonmail.proseware.com and nycmail.proseware.com) as the internal 

host name for Outlook Anywhere in London and New York respectively. 

C: To meet the resiliency requirement use the external host name (mail.proseware.com) for 

DNS round robin for Outlook anywhere. 

* From scenario: 

/ Users connect to mail.proseware.com for Microsoft Outlook and Outlook Web App 

services. Mail.proseware.com resolves to an IP address on a hardware load balancer. 

/ All Outlook Anywhere users are enabled for Cached Exchange Mode. 

/ Proseware has two main offices located in New York and London. 

/ Site Resiliency Requirements 

-All mailboxes must be available if a single site becomes unavailable. The solution must not require administrator intervention. 

-User traffic on the WAN links must be minimized. 

* Split DNS for Exchange Server 2013 Split DNS allows your internal clients to receive a different answer to their DNS lookups than an external client would receive. In effect you have your Exchange namespace hosted on your internal DNS server, with records configured to point to internal IP addresses. 

Q9.  (Topic 6) 

You are an administrator for a company named Contoso, Ltd. 

Contoso has an Exchange Server 2013 organization. 

Contoso has a partnership agreement with a company named A. Datum Corporation. A. 

Datum has an Exchange server 2013 organization. 

Both organizations have a federation trust to the Microsoft Federation Gateway. Users at 

Contoso plan to share their free/busy information with users at A. Datum. 

You need to recommend which tasks must be performed to ensure that the A. Datum users 

can see the free/busy information of the Contoso users. 

Which two actions should you recommend? (Each correct answer presents part of the 

solution. Choose two.) 

A. In the Exchange Server organization of Contoso, configure directory synchronization. 

B. In the Exchange Server organization of A. Datum, create a sharing policy. 

C. In the Exchange Server organization of A. Datum, configure directory synchronization. 

D. In the Exchange Server organization of Contoso, create an organization relationship. 

E. In the Exchange Server organization of Contoso, create a sharing policy. 

F. In the Exchange Server organization of A. Datum, create an organization relationship. 

Answer: D,E 

Explanation: 

Business-to-business calendar sharing is set up by creating organization relationships. User-to-user calendar sharing is set up by applying sharing policies. 

There is no requirement for Contoso users to view the free/busy information of the A.Datum users. Therefore, we don’t need to create an organization relationship in A.Datum. 

Configure Federated Sharing Step 1: Create and configure a federation trust (this has already been done here) Step 2 (D): Create an organization relationship An organization relationship enables users in your Exchange organization to share calendar free/busy information as part of federated sharing with other federated Exchange organizations. 

Step 3 (E): Create a sharing policy Sharing policies enable user-established, people-to-people sharing of both calendar and contact information with different types of external users. They support the sharing of calendar and contact information with external federated organizations, external non-federated organizations, and individuals with Internet access. If you don’t need to configure people-to-people or contact sharing (organization-level sharing only), you don’t need to configure a sharing policy. Step 4: Configure an Autodiscover public DNS record 

Note: With federated sharing, users in your on-premises Exchange organization can share free/busy calendar information with recipients in other Exchange organizations that are also configured for federated sharing. Free/busy sharing can be enabled between two organizations running Exchange 2013 and also between organizations with a mixed Exchange deployment. 

Q10.  (Topic 6) 

You have an Exchange Server 2013 organization that contains 10 servers. 

You have a federation trust to the Microsoft Federation Gateway. The certificate in the trust relationship expires soon. 

You need to replace the certificate. The solution must minimize downtime. 

You purchase a new certificate. 

What should you do next? 

A. On all of the Exchange servers, import the certificate, and then run the New-FederationTrust cmdlet. 

B. On all of the Exchange servers, import the certificate, and then run the Set-OrganizationRelationship cmdlet. 

C. On one of the Exchange servers, import the certificate, and then run the Set-FederationTrust cmdlet. 

D. On one of the Exchange servers, import the certificate, and then run the Set-FederatedOrganizationldentifier cmdlet. 

Answer:

Explanation: 

You can use the Set-FederationTrust cmdlet to manage the certificates used for the federation trust. You can also use the Set-FederationTrust cmdlet to refresh the metadata document from the Microsoft Federation Gateway and download its certificate. 

Example: This example configures the federation trust Microsoft Federation Gateway to use the certificate with the thumbprint AC00F35CBA8359953F4126E0984B5CCAFA2F4F17 as the next certificate. Set-FederationTrust -Identity "Microsoft Federation Gateway" -Thumbprint AC00F35CBA8359953F4126E0984B5CCAFA2F4F17