You have an Exchange Server 2013 organization. Your company identifies the following security
Users must be able to send encrypted email messages that can only be decrypted by the
All email messages sent by a user named User1 to an external recipient must be protected
by using TLS.
All SMTP sessions to a remote SMTP host named SMTP1 must be encrypted.
You need to recommend which technology must be used to meet each requirement. Which
technologies should you recommend?
To answer, drag the appropriate technologies to the requirements in the answer area. Each
technology may be used once, more than once, or not at all. You may need to drag the split bar
between panes or scroll to view content.
Select and Place:
Your company has a main office and a disaster recovery site. An Active Directory site named
MainSite exists for the main office. An Active Directory site named DRSite exists for the disaster
recovery site. The two sites connect to each other by using a WAN link. All users work in the main
office. You have an Exchange Server 2013 organization. The organization contains six servers. The
servers are configured as shown in the following table.
All of the Mailbox servers are members of a database availability group (DAG) named DAG1. After
a WAN link failure, you discover that all of the active mailbox database copies are located on
MBX3, even though MBX1 and MBX2 are still running. You need to prevent an automatic failover
of DAG1 if the WAN link between the two sites fails but the servers in both sites are still running.
The solution must prevent two active copies of the same database. What should you do?
To answer, select the appropriate options in the answer area.
You have an Exchange Server 2010 organization that contains three s
ervers. The servers are
configured as shown in the following table.
Microsoft Outlook is configured to connect to an FQDN of mail.adatum.com. Mail.adatum.com
resolves to the IP address of a Layer 7 hardware load balancer. The hardware load balancer is
configured to send traffic to EX2 and EX3. You deploy an Exchange Server 2013 Mailbox server
and an Exchange Server 2013 Client Access server. You plan to migrate all mailboxes to Exchange
Server 2013. You need to recommend a solution to ensure that users can access their mailbox on
EX1 or EX4 during the migration. What should you do?
A. Create a Client Access server array that contains EX1 and EX5.
B. Modify the autodiscover.contoso.com resource record to point to EX5.
C. Modify the properties of the hardware load balancer to point to EX5.
D. Create a DNS record named legacy.contoso.com in the internal DNS zone.
Correct Answer: C
You have an Exchange Server 2013 organization. You create a data loss prevention (DLP) policy.
The mode of the DLP policy is set to Enforce. You need to ensure that email messages containing
social security numbers from the United States are blocked. Which two possible rules achieve this
goal? (Each correct answer presents a complete solution. Choose two.)
A. U.S. State Breach: Scan email sent outside – high count
B. U.S. State Breach: Scan text limit exceeded
C. U.S. State Breach: Scan email sent outside – low count
D. U.S. State Breach: Attachment not supported
E. U.S. State Breach: Allow Override
Correct Answer: BC
Your company has three data centers. The data centers are located in Montreal, New York, and
Seattle. You have an Exchange Server 2013 organization that contains six servers. The servers are
configured as shown in the following table.
The organization is configured as shown in the following exhibit.
The file share witness for DAG1 is located on EX3. You plan to implement site resiliency and use a
single name space named mail.contoso.com. You need to recommend a solution to minimize the
amount of time that the Exchange Server services are unavailable if either the data center in
Montreal or the data center in Seattle fails. Which two tasks should you recommend performing?
(Each correct answer presents part of solution. Choose two.)
A. Deploy a hardware load balancer to EX3 and EX6.
B. Create two DNS host (A) records for mail.contoso.com.
C. Configure EX6 as an alternate file share witness.
D. Move the file share witness to Server1.
Correct Answer: AD
You have an Exchange Server 2013 organization. You purchase a Microsoft Office 365 subscription
and configure a hybrid deployment. The network contains an SMTP relay server named
smarthost.contoso.com. The server is configured to use a certificate that has a subject name of
smarthost.contoso.com. All users have Microsoft Outlook 2013 installed on their client computer.
Outlook 2013 is configured to connect to mail.contoso.com. All Exchange servers have a
certificate that has a subject name of mail.contoso.com. You discover that email messages sent
from onpremises users are not delivered to Office 365 recipients. You discover that the Send
connector for Office 365 uses a smart host of smarthost.contoso.com. You need to ensure that
the on-premises users can send email messages to the Office 365 recipients. Which two actions
should you perform? (Each correct answer presents part of the solution. Choose two.)
A. Run the Hybrid Configuration Wizard again.
B. Configure the Microsoft Exchange Online Protection (EOP) Send connector to use
C. Configure the centralized mail transport option.
D. Remove the smart host from the Send connector.
E. Assign a certificate that has a subject name of smarthost.contoso.com to the Send connector.
Correct Answer: BD
You have a server named Server1 that has Exchange Server 2013 installed. Users access their
mailbox by using Microsoft Outlook 2010 and Outlook Web App. You enable auditing for all of the
mailboxes. You need to identify when a mailbox is accessed by someone other than the owner of
the mailbox. What are two possible ways to achieve this goal? (Each correct answer presents a
complete solution. Choose two.)
A. Run a non-owner mailbox access report.
B. Export the administrator audit log.
C. Run an administrator role group report.
D. Review the security event log.
E. Export the mailbox audit log.
Correct Answer: CD
Your company implements Exchange Server 2013 Unified Messaging (UM). The company uses an
auto attendant. You need to ensure that when calls are routed to the auto attendant, callers can
press 0 to reach a receptionist. Which option should you configure from the UM Auto Attendant
To answer, select the appropriate option in the answer area.
You have an Exchange Server organization that contains four servers. The servers are configured
as shown in the following table.
SiteA contains an IP gateway that uses a dial plan named Dialplan1. SiteB contains a Lync Server
2013 server that uses a dial plan named Dialplan2. You plan to migrate all Unified Messaging (UM) functionalities to Exchange Server 2013. You need to identify which tasks must be performed to
complete the migration. Which tasks should you identify?
To answer, select the tasks that are required and not required in the answer area.
You have an Exchange Server 2013 organization. All users are enabled for Unified Messaging (UM) and access their voice mail by using Microsoft Lync 2010. Callers report that when they press a
key to dial an external telephone number, they hear a message indicating that the intended
destination cannot be reached. You need to ensure that the callers can reach the external
number successfully. What should you modify?
To answer, select the appropriate object in the answer area.