Ensurepass

QUESTION 31

DRAG DROP

You have a server that has Exchange Server 2013 installed. You plan to deploy Unified Messaging

(UM) to all users. You have two UM IP gateways named GW1 and GW2. You create, and then

associate a new UM dial plan for each IP gateway. The IP gateways are configured as shown in the

following table.

 

clip_image001

 

You need to recommend a solution that meets the following security requirements:

 

Ÿ   All voice traffic received by GW1 must be encrypted.

Ÿ   All voice traffic received by GW2 must be unencrypted.

Ÿ   All signaling traffic to GW1 and GW2 must be encrypted.

 

Which security settings should you recommend configuring for each dial plan?

 

To answer, drag the appropriate security setting to the correct UM dial plan in the answer area.

Each security setting may be used once, more than once, or not at all. Additionally, you may need

to drag the split bar between panes or scroll to view content.

 

Select and Place:

clip_image002

 

Correct Answer:

clip_image003

 

QUESTION 32

Your company has three offices. Each office has 1,000 users and is configured as an Active

Directory site. Each site connects directly to the Internet. The network contains six servers that

have Exchange Server 2013 installed. The servers are configured as shown in the following table.

 

clip_image004

 

An administrator performs a datacenter switchover by changing the DNS record for

webl.adatum.com to point to the IP address of web2.adatum.com. Users from Main1 report that

when they connect to Outlook Web App, they receive a certificate warning message. You need to

recommend a solution to ensure that the users do not receive a certificate warning message

when a datacenter switchover is performed. What should you include in the recommendation?

 

A.      Three host headers for the Default Web Site on each Client Access server.

B.      One certificate that contains all of the external names as subject alternative names.

C.      Three certificates that each contains one of the external names.

D.      An external URL for each Client Access server set to $null.

 

Correct Answer: B

 

 

QUESTION 33

You have an Exchange Server 2010 organization named adatum.com. All public folders are stored

on a server named EX5. You deploy a new server named EX6. EX6 has Exchange Server 2013

installed. You move all mailboxes to EX6. You need to move the public folders to EX6. The solution

must ensure that users can access the public folders after EX5 is decommissioned. Which two

actions should you perform? (Each correct answer presents part of the solution. Choose two.)

 

A.      On EX6, run the MoveAllReplicas.psl script.

B.      On EX5, assign the FolderOwner permission to the Public Folder Management management

role group for all of the public folders.

C.      On EX6, run the New-SiteMailboxProvisioningPolicy cmdlet.

D.      On EX6, create a public folder mailbox.

E.       On EX5, modify the replication partners for all of the public folders.

F.       On EX6, run the New-PublicFolderMigrationRequest cmdlet.

 

Correct Answer: AB

 

 

QUESTION 34

You have an Exchange Server 2013 organization that contains a database available group (DAG)

named DAG1. DAG1 contains three Mailbox servers named Server1, Server2, and Server3. DAG1

contains a mailbox database copy named DB1. You implement a lagged copy of DB1 on Server3.

The copy lag time is seven days. You need to ensure that copies of successfully processed email

messages are stored on Server1 and Server2 for seven days. What should you modify?

 

A.      The Shadow Redundancy settings.

B.      The Safety Net settings.

C.      The settings of DAG1.

D.      The settings of DB1.

 

Correct Answer: B

 

 

QUESTION 35

You have an Exchange Server 2013 organization. All users are issued certificates from an internal

certification authority (CA). Users who have a laptop can access their mailbox from the Internet

by using Outlook Anywhere. When the users attempt to view or to create digitally signed email

messages while they are connected to the Internet, the users receive a warning message. When

the users use their laptop on the internal network, the users do not receive a warning message.

You need to ensure that the users can send and receive digitally signed email messages without

receiving a warning message. What should you do?

 

A.      Publish the root certificate of the CA to a server that is accessible from the Internet.

B.      Publish the certificate revocation list (CRL) to a server that is accessible from the Internet.

C.      Install a trusted root CA certificate on all Client Access servers.

D.      Install a trusted root CA certificate on all of the laptops.

 

Correct Answer: B

 

 

QUESTION 36

You need to meet the compliance policy requirement. What should you create?

 

A.      A data loss prevention (DLP) policy and a DLP policy rule.

B.      A retention policy, a retention tag, and a Policy Tip.

C.      A throttling policy and a throttling policy association.

D.      A transport rule and a moderated mailbox.< /span>

 

Correct Answer: A

QUESTION 37

HOTSPOT

Your network contains two Active Directory sites named Site1 and Site2. You have an Exchange

Server 2013 organization that contains six servers. The servers are configured as shown in the

following table.

 

clip_image005

 

All of the mailbox databases replicate to all of the servers. Users in Site1 connect to sitelmail.

contoso.com to access their mailbox. Users in 5ite2 connect to site2-mail.contoso.com to access

their mailbox. All of the users use Microsoft Outlook 2013. You need to identify which DNS

modification must be made to fail over the email services from Site1 to Site2. Which DNS

modification should you identify?

 

To answer, select the appropriate record to modify and the new data for the record in the answer

area.

 

Hot Area:

clip_image006

 

Correct Answer:

clip_image007

 

 

QUESTION 38

DRAG DROP

You have an Exchange Server 2013 organization and a Microsoft Lync Server 2013 infrastructure.

You plan to implement voice mail for all users. You need to prepare the environment for the

planned implementation. Which tool should you run in each environment?

 

To answer, drag the appropriate tool to the correct environment or environments. Each tool may

be used once, more than once, or not at all. You may need to drag the split bar between panes or

scroll to view content.

 

Select and Place:

clip_image009

 

Correct Answer:

clip_image010

 

QUESTION 39

HOTSPOT

You have an Exchange Server 2013 organization that has mailbox audit logging enabled for all

users. You deploy two third-party applications named App1 and App2. Both applications access a

mailbox named Mailbox1. App1 uses a mail-enabled user account named App1_user. App2 uses a

mailbox enabled user account named App2_user. You need to prevent the audit logs from

containing entries that relate to App2. Which command should you run?

 

To answer, select the appropriate options in the answer area.

 

Hot Area:

clip_image012

 

Correct Answer:

clip_image014

 

 

QUESTION 40

You have an Exchange Server 2013 organization that has Unified Messaging (UM) enabled for all

mailboxes. The organization is configured to use an IP gateway to connect to a legacy PBX. An

administrator recently performed some configuration changes. After the changes, users report

that their voice mail is no longer being delivered to their Exchange Server mailbox. The users do

not report any other problem. You need to identify which configuration change causes the issue.

Which cmdlet should you run?

 

A.      Test-UMConnectivity

B.      Test-CsExUMConnectivity

C.      Test-ExchangeUMCallFlow

D.      Test-CsExUMVoiceMail

 

Correct Answer: A

Comments are closed.