Top 16 braindump 70-342 for consumer (81 to 96)

Exam Code: 70-342 (Practice Exam Latest Test Questions VCE PDF)
Exam Name: Advanced Solutions of Microsoft Exchange Server 2013
Certification Provider: Microsoft
Free Today! Guaranteed Training- Pass 70-342 Exam.

2016 Apr 70-342 Study Guide Questions:

Q81. DRAG DROP - (Topic 5) 

You need to resolve the network traffic issue for MapiNet. 

You suspend database replication. 

Which three cmdlets should you run next in sequence? (To answer, move the appropriate three cmdlets from the list of actions to the answer area and arrange them in the correct order.) 


Answer: 



Q82.  (Topic 6) 

A company named Contoso, Ltd., has an Exchange Server 2013 organization. The primary SMTP suffix for all users is contoso.com. 

A company named Fabrikam, Inc., has an Exchange Server 2010 organization. The primary SMTP suffix for all users is fabrikam.com. 

The users in both organizations access their email by using Microsoft Outlook 2010 and Outlook Anywhere. All of the users work from domain-joined client computers that connect to the internal network. 

Contoso acquires Fabrikam. 

You establish a cross-forest trust between the Contoso forest and the Fabrikam forest. 

In fabrikam.com, you create a user named User1. In contoso.com, you create a linked mailbox for User1 and you set the primary SMTP address to User1@fabrikam.com. 

User1 reports that Outlook 2010 fails to configure his mail profile automatically. User1 can manually configure his profile and connect to his mailbox. 

You need to ensure that users in fabrikam.com can find their mailboxes automatically. 

What should you do in contoso.com? 

A. Create a DNS record named autodiscover.fabrikam.com. Point the record to the virtual IP address of the Client Access servers. 

B. Modify the ExternalURL of the Autodiscover virtual directory on the Exchange Servers 2013 servers. 

C. Modify the Autodiscover Service Connection Point (SCP). 

D. Run the Export-AutoDiscoverConfig cmdlet on an Exchange Server 2013 server. 

Answer: D 

Explanation: 

You can configure Microsoft Exchange services, such as the Availability service, for the Autodiscover service on a Microsoft Exchange Server 2010 Client Access server. When you enable Outlook Anywhere, you must also configure external client access to Microsoft Exchange services for the Autodiscover service. Other external URLS you must configure include the URLs for the Availability service, Exchange Web Services, Unified Messaging (UM), and the offline address book. 


Q83. HOTSPOT - (Topic 6) 

You have an Exchange Server organization that contains four servers. The servers are configured as shown in the following table. 


SiteA contains an IP gateway that uses a dial plan named Dialplan1. SiteB contains a Lync 

Server 2013 server that uses a dial plan named Dialplan2. 

You plan to migrate all Unified Messaging (UM) functionalities to Exchange Server 2013. 

You need to identify which tasks must be performed to complete the migration. 

Which tasks should you identify? (To answer, select the tasks that are required and not 

required in the answer area.) 


Answer: 



Q84.  (Topic 2) 

You need to recommend a solution for the memos. The solution must meet the compliance requirements. 

What should you include in the recommendation? 

A. Secure/Multipurpose Internet Mail Extensions (S/MIME) 

B. Information Rights Management (IRM) 

C. Domain Security 

D. Data loss prevention (DLP) policies 

Answer: B 

Explanation: 

* Scenario: Management occasionally sends the staff internal memos that contain confidential information, such as sales figures. The memos must be protected so that unauthorized users cannot read the memos and internal users cannot forward the memos to external recipients. 

* With the IRM features in Exchange 2013, your organization and your users can control the rights recipients have for e-mail. IRM also helps allow or restrict recipient actions such as forwarding a message to other recipients, printing a message or attachment, or extracting message or attachment content by copying and pasting. IRM protection can be applied by users in Microsoft Outlook or Microsoft Office Outlook Web App, or it can be based on your organization's messaging policies and applied using transport protection rules or Outlook protection rules. 

Reference: Information Rights Management 


Q85. DRAG DROP - (Topic 6) 

You have an Exchange server organization that contains Exchange Server 2010 servers and Exchange Server 2013 servers. 

You have a Microsoft Lync Server 2010 environment that is integrated with Exchange Server 2010 to provide Unified Messaging (UM) services. All UM dial plans are SIP secured. 

You plan to move the UM services to Exchange Server 2013. 

You need to ensure that the Exchange Server 2013 UM services can be integrated with Lync Server 2010. 

Which three cmdlets should you run in sequence? To answer, move the appropriate cmdlets from the list of cmdlets to the answer area and arrange them in the correct order. 


Answer: 



70-342  simulations

Refresh 70-342 free practice questions:

Q86. HOTSPOT - (Topic 6) 

Your company implements Exchange Server 2013 Unified Messaging (UM). 

The company uses an auto attendant. 

You need to ensure that when calls are routed to the auto attendant, callers can press 0 to 

reach a receptionist. 

Which option should you configure from the UM Auto Attendant window? To answer, select 

the appropriate option in the answer area. 


Answer: 



Q87.  (Topic 6) 

Your company has an Exchange Server 2013 organization named Contoso. 

A partner company has an Exchange Server 2013 organization named Fabrikam. Neither company has any trusts between their forests. 

Users from both organizations access their mailbox from the Internet by using Outlook Anywhere. 

You need to ensure that the users from both organizations can share free/busy information. 

Which two cmdlets should you run? (Each correct answer presents part of the solution. Choose two.) 

A. New-AcceptedDomain 

B. Add-AvailabilityAddressSpace 

C. Set-AvailabilityConfig 

D. New-SharingPolicy 

E. Add-ADPermission 

Answer: B,D 

Explanation: 

B: Use the Add-AvailabilityAddressSpace cmdlet to define the access method and associated credentials used to exchange free/busy data across forests. 

D: Use the New-SharingPolicy cmdlet to create a sharing policy to regulate how users inside your organization can share calendar and contact information with users outside the organization. Users can only share this information after federation has been configured in Exchange. 


Q88. HOTSPOT - (Topic 4) 

You need to configure the Exchange Server UM dial plan for the planned integration of UM and Lync Server. 

How should you configure the UM dial plan? (To answer, select the appropriate dial plan type and VoIP security mode in the answer area.) 



Answer: 



Q89.  (Topic 6) 

You have an Exchange Server 2013 organization. 

The human resources (HR) department has a custom form used to enter the personal information of employees. The form uses the Microsoft Word format. 

You need to prevent users in the HR department from sending any completed forms to users outside of the organization. 

Which two of the following should you create? Each correct answer presents part of the solution. 

A. A transport rule 

B. A DLP policy template 

C. A Send connector of the Partner type 

D. A document fingerprint 

E. A Policy Tip 

Answer: A,D 

Explanation: 

First create a document fingerprint then create a Transport Rule to take action on the fingerprinted document. 

Note: Information workers in your organization handle many kinds of sensitive information during a typical day. Document Fingerprinting makes it easier for you to protect this information by identifying standard forms that are used throughout your organization. Document Fingerprinting is a Data Loss Prevention (DLP) feature that converts a standard form into a sensitive information type, which you can use to define transport rules and DLP policies. 

Reference: Protect Your IP Using Document Fingerprints 

http://blogs.technet.com/b/lystavlen/archive/2014/03/04/protect-your-ip-using-document-fingerprints.aspx 


Q90. DRAG DROP - (Topic 4) 

You need to identify which technologies must be used to meet the security requirements. 

Which technologies should you identify? (To answer, drag the appropriate technologies to the correct requirements. Each technology may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.) 


Answer: 



certleader.com

Simulation 70-342 training materials:

Q91.  (Topic 6) 

You have an Exchange Server 2013 organization. 

You successfully migrate the public folders from a previous version of Exchange Server. 

You discover that one of the public folder mailboxes almost reached its quota size. 

You need to move some of the public folders in the public folder mailbox to another public folder mailbox. 

What should you run? 

A. Update-PublicFolderMailbox 

B. New-PublicFolderMoveRequest 

C. New-PublicFolderMigrationRequest 

D. Set-PublicFolderMailbox 

Answer: B 

Explanation: 

* If the content of a public folder mailbox begins to exceed your mailbox quotas, you may need to move public folders to a different public folder mailbox. There are a couple ways to do this. To move one or more public folders that don’t contain subfolders, you can use the PublicFolderMoveRequest cmdlets. 

* Use the New-PublicFolderMoveRequest cmdlet to begin the process of moving public folder contents between public folder mailboxes. Moving public folders only moves the physical contents of the public folder; it doesn't change the logical hierarchy. When the move request is completed, you must run the Remove-PublicFolderMoveRequest cmdlet to remove the request or wait until the time specified in the CompletedRequestAgeLimit parameter has passed. The request must be removed before you can run another move request. 

Incorrect: 

Not A: Use the Update-PublicFolderMailbox cmdlet to update the hierarchy for public 

folders. 

Not C: Use the New-PublicFolderMigrationRequest cmdlet to begin the process of 

migrating public folders from Microsoft Exchange Server 2007 or Exchange Server 2010 to 

Exchange Server 2013. 

Reference: Move a Public Folder to a Different Public Folder Mailbox 


Q92.  (Topic 6) 

You have an Exchange Server 2010 organization named adatum.com. 

All public folders are stored on a server named EX5. 

You deploy a new server named EX6. EX6 has Exchange Server 2013 installed. 

You move all mailboxes to EX6. 

You need to move the public folders to EX6. The solution must ensure that users can access the public folders after EX5 is decommissioned. 

Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.) 

A. On EX6, create a public folder mailbox. 

B. On EX6, run the New-PublicFolderMigrationRequest cmdlet. 

C. On EX5, modify the replication partners for all of the public folders. 

D. On EX6, run the New-SiteMailboxProvisioningPolicy cmdlet. 

E. On EX5, assign the FolderOwner permission to the Public Folder Management management role group for all of the public folders. 

F. On EX6, run the MoveAllReplicas.ps1 script. 

Answer: A,B 

Explanation: 

B: Use the New-PublicFolderMigrationRequest cmdlet to begin the process of migrating public folders from Microsoft Exchange Server 2007 or Exchange Server 2010 to Exchange Server 2013. 

Note: See step 4 and 5 below. 

Step 1: Download the migration scripts Step 2: Prepare for the migration Step 3: Generate the .csv files Step 4: Create the public folder mailboxes on the Exchange 2013 server Step 5: Start the migration request Example: New-PublicFolderMigrationRequest -SourceDatabase (Get-PublicFolderDatabase -Server <Source server name>) -CSVData (Get-Content <Folder to mailbox map path> -Encoding Byte) -BadItemLimit $BadItemLimitCount 

Step 6: Lock down the public folders on the legacy Exchange server for final migration 

(downtime required) 

Step 7: Finalize the public folder migration (downtime required) 

Step 8: Test and unlock the public folder migration 


Q93. DRAG DROP - (Topic 6) 

Your company has two offices. Each office is configured as an Active Directory site. The sites are named Site1 and Site2. 

You have an Exchange Server 2013 organization that is configured as shown in the following exhibit. (Click the Exhibit button.) 


Datacenter Activation Coordination (DAC) mode is enabled on the database availability group (DAG) named DAG1. 

You are testing a site failover by shutting down all of the servers in Site1. 

You need to mount the databases in Site2. 

Which four commands should you run in sequence? (To answer, move the appropriate four commands from the list of commands to the answer area and arrange them in the correct order. More than one order of answer choices is correct. You will receive credit for any of the correct orders you select.) 


Answer: 



Q94. DRAG DROP - (Topic 3) 

You need to recommend which tasks must be performed to meet the compliance requirement for the marketing department. 

Which three actions should recommend? 

To answer, move the three appropriate actions from the list of actions to the answer area and arrange them in the correct order. 


Answer: 



Q95. HOTSPOT - (Topic 6) 

You have an Exchange Server 2013 organization that contains three servers named EX1, EX2, and EX3 in a single Active Directory site. All of the servers are members of a database availability group (DAG) named DAG1. Each server has a copy of all the mailbox databases. 

You discover that the copies of a database named DB1 are in a FailedAndSuspended state due to disk failures on EX2 and EX3. 

You replace the disks. 

You need to start seeding DB1 on EX2 from EX1. The solution must ensure that DB1 can be seeded on EX3 simultaneously. 

What command should you run? To answer, select the appropriate options in the answer area. 


Answer: 



Q96. DRAG DROP - (Topic 1) 

The security department implements a new firewall between the IP-PBX system and the servers in the Tampa office. 

You discover that SIP sessions cannot be established between the IP-PBX and EX1. 

You need to identify which ports must be opened between the IP-PBX and the Exchange Server 2013 servers. 

Which ports should you identify? 

To answer, drag the appropriate port or ports to the correct group of servers in the answer area. Each port or ports may be used once, more than once, or not at all. Additionally, you may need to drag the split bar between panes or scroll to view content. 


Answer: 




see more 70-342 dumps