15 tips on How to 70-238 Test Like a Badass [16 to 30]

Tested of 70-238 test engine materials and testing engine for Microsoft certification for candidates, Real Success Guaranteed with Updated 70-238 pdf dumps vce Materials. 100% PASS Today!

2016 Mar 70-238 Study Guide Questions:

Q16. You are a messaging professional. Your company has a Microsoft Exchange Server 2003 organization that includes Exchange Server 2007 computers, Client Access Servers, and Hub Transport servers.

The company hosts user mailboxes on Exchange Server 2003 back-end servers. The company decommissions all Exchange Server 2003 front-end servers.

The company wants to add the most secure POP3 access for employees who access their mailboxes from home.

The company has the following requirements:

POP3 traffic that traverses the Internet must be as secure as possible. Traffic between the Exchange Server 2003 back-end servers and the computers that support POP3 access must be secure as possible.

You need to meet the outlined requirements.

Which two actions should you perform? (Each correct answer presents part of the solution Choose two.)

A.

B.

C.

D.


Answer: AC


Q20. You are a messaging professional. Your company runs a Microsoft Exchange Server 2007 messaging system.

You have implemented a managed folder mailbox policy that deletes messages that are more than a year old in the Inbox folder for all users.

The company executives must be exempted from this policy.

You need to ensure that all messages in the Inbox folder of the executives are deleted after three years.

What should you do?

A.

B.

C.

D. Configure new MX and A resource records in the private namespace Domain Name System (DNS) zone.

Configure a new A resource record in the public namespace Domain Name System (DNS) zone.

E. Configure new MX and A resource records in the public namespace Domain Name System (DNS) zone.

Configure a new A resource record in the private namespace Domain Name System (DNS) zone.

Answer: BE


Q25. You are a messaging professional. Your company uses a Microsoft Exchange Server 2007 messaging system. The company has eight Microsoft Active Directory sites in two regions, East and West.

You plan to implement a new e-mail application on your Exchange Server 2007 Hub Transport servers in each site. The new application queries a database on a remote Microsoft Windows Server 2003 server by using Lightweight Directory Access Protocol (LDAP).

The company security policy has the following requirements on the usage of Public Key Infrastructure (PKI):

PKI-based encryption must be used for all application data transmissions in the West region. PKI-based encryption must not be used in the East region due to conflicts with mission critical applications.

You need to ensure that maximum confidentiality is provided to all data that is transmitted by the application.

Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)

A. Configure Identity Based Encryption (IBE) as a hosted service in the West region.

B. Allow TCP and UDP ports 3389 through the firewalls in the West region.

C. Allow TCP port 1701 through the firewalls in the West region.

D. Configure Identity Based Encryption (IBE) as a hosted service in the East region.

E. Allow TCP and UDP ports 443 through the firewalls in the East region.

F. Allow TCP port 1701 through the firewalls in the East region.

Answer: CD


70-238 free draindumps

Vivid 70-238 test questions:

Q26. You are a messaging professional. Your company uses a Microsoft Exchange Server 2003 messaging system. The company has a main office and two branch offices. A Microsoft Active Directory site and an Exchange routing group are configured for each office.

The three offices have the following Exchange Server 2003 computers:

2 Back-end servers that are non-clustered

1 dedicated routing group connector bridgehead server

The main office also has a dedicated bridgehead server for routing e-mail to and from the Internet. All Exchange Server computers are x86-based and run Microsoft Windows Server 2003 Release 2.

The company plans to upgrade to a Microsoft Exchange Server 2007 messaging system. The company plans to implement high availability for Mailbox servers and message routing. The following Exchange Server 2007 computers will be deployed in each site:

2 Cluster Continuous Replication (CCR) Mailbox servers

2 Hub Transport server and Client Access Server computers

The company requires that you maintain an adequate test environment for pre-production testing of all changes and modifications to the Exchange messaging system.

The company has the following requirements for the test lab:

All production services must be adequately mirrored in the test environment. Connectivity across WAN links must be mirrored, although replicating each location is not necessary. The test environment must use the same code base as the production environment. The test environment domain controllers and global catalog servers must not run Exchange Server 2007. The test environment design must require the purchase of the fewest number of servers possible, without violating the other requirements.

The test environment will not be implemented until the deployment of Exchange Server 2007 computers is complete. You plan to use two of the decommissioned Exchange Server 2003 computers as domain controllers and global catalog servers in the test environment.

You need to create a plan for the implementation of the test environment.

Which action should you include in the plan?

A. Purchase a new x64-based computer that has adequate memory and storage. Use Virtual Server 2005 Release 2 virtual computers to mirror the Exchange Server 2007 computers in the main office and one branch office.

B. Reset Instructions CalculatorReuse the remaining decommissioned Exchange 2003 computers to create a test environment that mirrors the main office and one branch office..

C. Purchase six new x64 computers to build a test environment that mirrors the main office and one branch office. Use four computers as Hub Transport servers and Client Access Servers. Use two computers as Mailbox servers. Configure Local Continuous Replication (LCR) on the Mailbox servers.

D. Purchase eight new x64 computers to build a test environment that mirrors the main office and one branch office. Use four computers as Hub Transport servers and Client Access Servers. Use four computers as two Cluster Continuous Replication (CCR) Mailbox servers.

Answer: D


Q27. You are a messaging professional. Your company uses a Microsoft Exchange Server 2007 messaging system.

Users access the Client Access Servers by using Microsoft Office Outlook Anywhere. The Outlook Anywhere URL is https://mail.adatum.com.

The company policy states that failed Exchange Server 2007 computers must be repaired and reused.

You need to create a plan to recover Client Access Servers that experience a complete hard disk failure. Which two actions should you include in the plan? (Each correct answer presents part of the solution.

Choose two.)

A. Deploy a new Exchange Server 2007 computer and install the Client Access Server role on the computer.

B. Repair the Exchange Server 2007 computer, restore the System State data, and then install Exchange Server 2007 by using an unattended installation of the Client Access Server role.

C. Repair the Exchange Server 2007 computer, recover the operating system, and then install Exchange Server 2007 by using the recover server option.

D. Request a certificate by using the name of the new Exchange Server 2007 computer.

E. Restore the server certificate from the failed Exchange Server 2007 computer.

Answer: CE


Q28. You are a messaging professional. Your company uses a Microsoft Exchange Server 2007 messaging system.

The company deploys an Edge Transport server. All messages sent to and from the Internet are routed through the Edge Transport server.

The security policy of the company has the following requirements:

The e-mail messages that contain confidential information must not be sent to the Internet. The confidential information includes client account number.

The users must be able to send these e-mail messages to other users inside the company.

You need to meet the outlined requirements. You also need to ensure that your solution allows auditors in the company to monitor the users' compliance with the security policy.

What should you do?

A. Create a Transport rule on the Hub Transport server. Configure the rule to drop all e-mail messages that contain the client account numbers.

B. Create a Transport rule on the Hub Transport server. Configure the rule to assign a confidential message classification to all e-mail messages that contain the client account number and to redirect these e-mail messages to a mailbox that auditors can access.

C. Create a Transport rule for the Edge Transport server role. Configure the rule to copy e-mail messages that contain the client account numbers to a mailbox that auditors can access.

D. Create a Transport rule for the Edge Transport server role. Configure the rule to redirect e-mail messages that contain the client account numbers to a mailbox that auditors can access.

Answer: D


Q29. You are a messaging professional. Your company uses a Microsoft Exchange Server 2007 messaging system.

All Mailbox servers use a Storage Area Network (SAN) to store transaction logs and databases.

The storage group layout plan includes five storage groups for each Mailbox server. You plan to implement a Volume Shadow Copy Service (VSS) backup solution.

You need to ensure that the storage configuration supports the following requirements:

Restoration of an individual database without affecting other mailbox databases Optimization of disk I/O

Fewest logical unit numbers (LUNs) without compromising the other requirements

What should you do?

A. Request that the storage administrators provide a separate LUN for the transaction logs for each storage group and each database.

B. Request that the storage administrators provide a LUN for both the transaction logs and the database for each storage group.

C. Request that the storage administrators provide a LUN for each database and a LUN for all transaction logs.

D. Request that the storage administrators provide a LUN for each set of transaction logs and a LUN for all databases.

Answer: A


Q30. You are a messaging professional. Your company plans to upgrade from a Microsoft Exchange Server 2003 messaging system to a Microsoft Exchange Server 2007 messaging system. The company has a Storage Area Network (SAN) solution.

The Exchange organization includes an Exchange Server 2003 cluster that hosts four storage groups and 20 databases.

The company plans to replace the Exchange Server 2003 cluster with an Exchange Server 2007 Cluster Continuous Replication (CCR) cluster.

Your company also plans to use an Exchange-aware Volume Shadow Copy Service (VSS) solution for full storage group recovery.

You need to plan a storage group layout for the new Exchange Server 2007 CCR cluster.

Which set of actions should you include in the plan?

A. Request 20 logical unit numbers (LUNs) for transaction logs and 20 LUNs for databases. Create 20 storage groups. Create one database for each storage group.

B. Request 10 logical unit numbers (LUNs) for transaction logs and 20 LUNs for databases. Create 10 storage groups. Create two databases for each storage group.

C. Request four logical unit numbers (LUNs) for transaction logs and 20 LUNs for databases. Create 20 storage groups. Create one database for each storage group.

D. Request four logical unit numbers (LUNs) for transaction logs and 20 LUNs for databases. Create four storage groups. Create five databases for each storage group.

Answer: A