16 tips on How to 70-342 Test Like a Badass [113 to 128]

Question No. 113

 (Topic 5) 

You are evaluating the deployment of two additional Client Access servers and a hardware load balancer in the London office. 

You need to recommend changes to the Client Access namespace design to meet the site resiliency requirements. 

Which three actions should you recommend? (Each correct answer presents part of the solution. Choose three.) 

A. In the London office, set mail.proseware.com as the external host name for Outlook Anywhere. In the New York office, set mail.proseware.com as the external host name for Outlook Anywhere. 

B. In the London office, set lonmail.proseware.com as the internal host name for Outlook Anywhere. In the New York office, set nycmail.proseware.com as the internal host name for Outlook Anywhere. 

C. Use DNS round robin for the external host name for Outlook Anywhere. 

D. Use DNS round robin for the internal host name for Outlook Anywhere. 

E. In the London office, set nycmail.proseware.com as the external host name for Outlook Anywhere. In the New York office, set lonmail.proseware.com as the external host name for Outlook Anywhere. 

F. In the London office, set mail.proseware.com as the internal host name for Outlook Anywhere. In the New York office, set mail.proseware.com as the internal host name for Outlook Anywhere. 

Answer: A,B,C 

Explanation: 

A: Use mail.proseware.com as the external host name for Outlook Anywhere at both locations. 

B: Use internal names (lonmail.proseware.com and nycmail.proseware.com) as the internal 

host name for Outlook Anywhere in London and New York respectively. 

C: To meet the resiliency requirement use the external host name (mail.proseware.com) for 

DNS round robin for Outlook anywhere. 

* From scenario: 

/ Users connect to mail.proseware.com for Microsoft Outlook and Outlook Web App 

services. Mail.proseware.com resolves to an IP address on a hardware load balancer. 

/ All Outlook Anywhere users are enabled for Cached Exchange Mode. 

/ Proseware has two main offices located in New York and London. 

/ Site Resiliency Requirements 

-All mailboxes must be available if a single site becomes unavailable. The solution must not require administrator intervention. 

-User traffic on the WAN links must be minimized. 

* Split DNS for Exchange Server 2013 Split DNS allows your internal clients to receive a different answer to their DNS lookups than an external client would receive. In effect you have your Exchange namespace hosted on your internal DNS server, with records configured to point to internal IP addresses. 


Question No. 114

 (Topic 6) 

Your company acquires a new internet domain name. 

You need to ensure that all users can receive email messages sent to the new domain name. 

Which two actions should you perform? (Each correct answer presents part of the solution. Choose two). 

A. Modify the email address policy. 

B. Create an Authoritative accepted domain. 

C. Create an External Relay accepted domain. 

D. Modify the properties of the default Receive connector. 

E. Generate a new Exchange certificate that contains the new domain name. 

Answer: A,B 


Question No. 115

HOTSPOT - (Topic 5) 

You need to recommend a solution to audit the issue of User1. 

Which command should you recommend? (To answer, select the appropriate options in the answer area.) 



Answer: 



Question No. 116

 (Topic 2) 

You are creating a contingency plan to be implemented if the entire New York site fails after Exchange Server 2013 is deployed. 

You need to recommend which tasks must be performed to ensure that all of the users can access Outlook Web App from the Chicago site if the New York fails. 

Which three actions should you recommend? (Each correct answer presents part of the solution. Choose three.) 

A. On the Client Access server in the Chicago site, set the ExternalURL of Outlook Web App to mail.adatum.com. 

B. On the Mailbox server in the Chicago site, set the ExternalURL of Outlook Web App to mail.adatum.com. 

C. Modify the host (A) record for mail.adatum.com to point to the Client Access server in the Chicago site. 

D. On the Client Access server in the Chicago site, set the internal URL of Outlook Web App to mail.adatum.local. 

E. Install the mail.adatum.com certificate and private key on the Client Access server in the Chicago site. 

Answer: A,C,E 

Explanation: 

A: Example: To configure an external URL for Outlook Web App, run the following command in Exchange Management Shell. Set-OwaVirtualDirectory "<CAS2013>\OWA (Default Web Site)" -ExternalUrl https://mail.contoso.com/OWA 

C: Need a new record in the DNS. 

E: In Exchange 2013, you can use the Certificate Wizard to request a digital certificate from a certification authority. After you’ve requested a digital certificate, you’ll need to install it on the Client Access server. 

Reference: Exchange 2013 Client Access server configuration 


Question No. 117

 (Topic 6) 

You have an Exchange Server 2013 organization. 

You plan to use document fingerprinting. 

You need to identify which file type cannot be used as a template for document fingerprinting. 

Which document type should you identify? 

A. .pptx 

B. .doc 

C. .txt 

D. .dotx 

Answer:

Explanation: 

Document Fingerprinting supports the same file types that are supported in transport rules. One quick note about file types: neither transport rules nor Document Fingerprinting supports the .dotx file type, which can be confusing because that’s a template file in Word. When you see the word “template” in this and other Document Fingerprinting topics, it refers to a document that you have established as a standard form, not the template file type. 

Reference: Document Fingerprinting 

https://technet.microsoft.com/en-us/library/dn635176(v=exchg.150).aspx 


Question No. 118

HOTSPOT - (Topic 6) 

You have an Exchange Server 2013 organization named contoso.com. 

Contoso.com has a federated trust to another Exchange Server 2013 organization named 

fabrikam.com. 

You need to ensure that users from fabrikam.com can view the availability of users in contoso.com. 

What command should you run? To answer, select the appropriate options in the answer area. 


Answer: 



Question No. 119

 (Topic 6) 

You have an Exchange Server 2013 organization that contains one office in Los Angeles and one office in New York. 

All servers have the Mailbox server role and the Client Access server role installed and are members of a data availability group (DAG) named DAG1. The servers and databases are shown in the exhibit. (Click the Exhibit button.) 


You need to ensure that if the active copy of NYDB01 fails, a server in the same site will attempt to activate a copy of the database before a server in another site does. The solution must not influence the activation of other database copies. 

Which command should you run? 

A. suspend-mailboxdatabasecopy -identity nydb01\ex3 -activationonly 

B. set-mailboxserver -identity ex3 -autodatabasemountdial bestavailability 

C. suspend-mailboxdatabasecopy -identity nydb01\ex4 -activationonly 

D. set-mailboxserver -identity ex4 -autodatabasemountdial bestavailability. 

Answer:


Question No. 120

 (Topic 3) 

You implement the UM pilot. 

You capture and analyze a network trace from the IP-PBX. 

You discover that SIP/MTLS requests for TCP 5061 to EX1 are dropped. 

You need to ensure that the IP-PBX can route calls successfully to the Exchange Server 

2013 organization. 

What should you do? 

A. Modify the IP-PBX to route calls to EX5 and EX6. 

B. Modify the port used on the IP-PBX. 

C. Modify the SIP listening port on EX1. 

D. Deploy a server that has Exchange Server 2010 and the Unified Messaging server role installed. 

Answer:


Question No. 121

 (Topic 6) 

You have an Exchange Server 2013 organization. 

A user named User1 has a mailbox that is enabled for Unified Messaging (UM). User1 has nine call answering rules. When User1 attempts to create a new call answering rule, the user receives an error 

message. 

You need to identify what prevents User1 from creating a call answering rule. 

What should you identify? 

A. The mailbox of User1 has the CallAnsweringRulesEnabled parameter set to $false 

B. The UM mailbox policy of User1 has the AllowCallAnsweringRules parameter set to $false. 

C. User1 exceeds the Inbox rules storage quota. 

D. User1 has the maximum number of call answering rules allowed. 

Answer:

Explanation: 

A total of nine call answering rules can be set up for each UM-enabled mailbox. 


Question No. 122

 (Topic 5) 

You discover that the Large Audience MailTip is not displayed when users compose an email message to the 20 new distribution groups. 

You need to ensure that the Large Audience MailTip is displayed for the new distribution groups immediately. 

Which cmdlet should you use? 

A. Set-DistributionGroup 

B. Set-MailboxServer 

C. Set-ClientAccessServer 

D. Start-ManagedFolderAssistant 

Answer:

Explanation: 

We need to use the Set-MailboxServer cmdlet with the ForceGroupMetricsGeneration parameter to force a count of the number of members of the distribution groups. 

The ForceGroupMetricsGeneration parameter specifies that group metrics information must be generated on the Mailbox server regardless of whether that server generates an offline address book (OAB). By default, group metrics are generated only on servers that generate OABs. Group metrics information is used by MailTips to inform senders about how many recipients their messages will be sent to. You need to use this parameter if your organization doesn't generate OABs and you want the group metrics data to be available. 


Question No. 123

 (Topic 2) 

You need to recommend a solution for the voice mail traffic. The solution must meet the technical requirements. 

Which two configurations should you include in the recommendation? (Each correct answer presents part of the solution. Choose two.) 

A. A dial plan. 

B. A server certificate 

C. A transport rule 

D. A data loss prevention (DLP) policy 

E. A call answering rule 

Answer: A,B Explanation: 

* Scenario: Voice mail traffic between the telephone system and the Exchange Server environment must be encrypted. 

A: Use the EAC to configure Protected Voice Mail from authenticated callers . In the EAC, navigate to Unified Messaging > UM dial plans. In the list view, select the UM dial plan you want to modify, and then click Edit. . On the UM Dial Plan page, under UM Mailbox Policies, select the UM mailbox policy you want to manage, and then click Edit. . On the UM Mailbox Policy page > Protected voice mail, under Protect voice 

message from authenticated callers, select one of the following options: . Click Save. 

B: 

* In on-premises and hybrid deployments, you can configure a Client Access and Mailbox server to use mutual Transport Layer Security (mutual TLS) to encrypt the SIP and RTP traffic sent and received from other devices and servers. When you configure the dial plan to use SIP secured mode, only the SIP signaling traffic will be encrypted, and the RTP media channels will still use TCP, which isn’t encrypted. However, when you configure the dial plan to use Secured mode, both the SIP signaling traffic and the RTP media channels are encrypted. An encrypted signaling media channel that uses Secure Realtime Transport Protocol (SRTP) also uses mutual TLS to encrypt the VoIP data. 

* When you’re deploying Transport Layer Security (TLS) with UM, the certificates that are used on the Client Access server and the Mailbox server both must contain the local computer's fully qualified domain name (FQDN) in the certificate’s Subject Name. To work around this issue, use a public certificate and import the certificate on all Client Access and Mailbox servers, any VoIP gateways, IP PBXs, and all the Lync servers. 


Question No. 124

HOTSPOT - (Topic 5) 

You need to recommend which technology can be used to meet each email security requirement. 

What should you recommend? (To answer, select the appropriate technology for each 

requirement in the answer area.) 



Answer: 



Question No. 125

HOTSPOT - (Topic 6) 

Your network contains two Active Directory sites named Site1 and Site2. Both sites contain an equal number of users. Each site contains two Exchange Server 2013 Mailbox servers. 

You need to recommend a high-availability solution that meets the following requirements: 

. If a single Mailbox server fails, the active mailbox database copies on that server must fail over to a Mailbox server in the same site. 

. If both Mailbox servers in the same site fail, the active mailbox databases copies must be switched over to the other site manually. 

. If a WAN link fails, multiple copies of the same mailbox database must not be activated in both sites simultaneously. 

How should you configure the database availability groups (DAGs)? (To answer, configure the appropriate options in the answer area.) 



Answer: 



Question No. 126

 (Topic 6) 

You have an Exchange Server organization that contains five servers. The servers are configured as shown in the following table. 


You need to create a Lync Server SIP Unified Messaging (UM) dial plan to enable voice integration between Lync Server and Exchange Server. 

Which three Exchange servers should you associate to the UM dial plans? (Each correct answer presents part of the solution. Choose three.) 

A. EX1 

B. EX2 

C. EX3 

D. EX4 

E. EX5 

Answer: C,D,E 

Explanation: 

C: You can enable Unified Messaging (UM) in Microsoft Exchange Server 2010. You must enable the Exchange computer running the Unified Messaging server role before the Unified Messaging server can process calls for UM-enabled Exchange 2010 recipients in your Exchange organization. However, the Unified Messaging server also must be added to a UM dial plan before it can process calls for Unified Messaging. 

D, E: 

* Requirements and Recommendations Client Access and Mailbox. In Microsoft Exchange Server 2013, Exchange UM runs as a service on these servers. 

* Deploy the Exchange Mailbox server roles in each Exchange Unified Messaging (UM) forest where you want to enable users for Exchange UM. 

Reference: Configuring Unified Messaging on Microsoft Exchange Server to Work with Lync Server 2013 


Question No. 127

 (Topic 6) 

You plan to deploy 20 Client Access servers that will have Exchange Server 2013 installed. 

You need to prepare the certificate required for the planned deployment. The solution must ensure that the same certificate can be used on all of the Client Access servers. 

What should you do first? 

A. On one of the Client Access servers, run the New-ExchangeCertificate cmdlet and specify the PrivateKeyExportable parameter. 

B. On all of the Client Access servers, run the Get-ExchangeServer cmdlet. 

C. On one of the Client Access servers, run the New-ExchangeServer cmdlet and specify the BinaryEncoding parameter. 

D. On one of the Client Access servers, start the Certificates console and run the certificate import wizard. 

Answer:


Question No. 128

 (Topic 6) 

You are an administrator for a company named Contoso, Ltd. 

Contoso has an Exchange Server 2013 organization. 

Contoso has a partnership agreement with a company named A. Datum Corporation. A. 

Datum has an Exchange server 2013 organization. 

Both organizations have a federation trust to the Microsoft Federation Gateway. Users at 

Contoso plan to share their free/busy information with users at A. Datum. 

You need to recommend which tasks must be performed to ensure that the A. Datum users 

can see the free/busy information of the Contoso users. 

Which two actions should you recommend? (Each correct answer presents part of the 

solution. Choose two.) 

A. In the Exchange Server organization of Contoso, configure directory synchronization. 

B. In the Exchange Server organization of A. Datum, create a sharing policy. 

C. In the Exchange Server organization of A. Datum, configure directory synchronization. 

D. In the Exchange Server organization of Contoso, create an organization relationship. 

E. In the Exchange Server organization of Contoso, create a sharing policy. 

F. In the Exchange Server organization of A. Datum, create an organization relationship. 

Answer: D,E 

Explanation: 

Business-to-business calendar sharing is set up by creating organization relationships. User-to-user calendar sharing is set up by applying sharing policies. 

There is no requirement for Contoso users to view the free/busy information of the A.Datum users. Therefore, we don’t need to create an organization relationship in A.Datum. 

Configure Federated Sharing Step 1: Create and configure a federation trust (this has already been done here) Step 2 (D): Create an organization relationship An organization relationship enables users in your Exchange organization to share calendar free/busy information as part of federated sharing with other federated Exchange organizations. 

Step 3 (E): Create a sharing policy Sharing policies enable user-established, people-to-people sharing of both calendar and contact information with different types of external users. They support the sharing of calendar and contact information with external federated organizations, external non-federated organizations, and individuals with Internet access. If you don’t need to configure people-to-people or contact sharing (organization-level sharing only), you don’t need to configure a sharing policy. Step 4: Configure an Autodiscover public DNS record 

Note: With federated sharing, users in your on-premises Exchange organization can share free/busy calendar information with recipients in other Exchange organizations that are also configured for federated sharing. Free/busy sharing can be enabled between two organizations running Exchange 2013 and also between organizations with a mixed Exchange deployment.