What Does 70-342 free download Mean?

It is more faster and easier to pass the Microsoft 70-342 exam by using Precise Microsoft Advanced Solutions of Microsoft Exchange Server 2013 questuins and answers. Immediate access to the Improved 70-342 Exam and find the same core area 70-342 questions with professionally verified answers, then PASS your exam with a high score now.


♥♥ 2021 NEW RECOMMEND ♥♥

Free VCE & PDF File for Microsoft 70-342 Real Exam (Full Version!)

★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions

Free Instant Download NEW 70-342 Exam Dumps (PDF & VCE):
Available on: http://www.surepassexam.com/70-342-exam-dumps.html

Q11.  (Topic 6) 

You need to ensure that users in the organization are notified before they send email messages to external recipients. 

Which cmdlet should you run? 

A. Set-Mailbox. 

B. Set-OrganizationConfig. 

C. Set-TransportAgent. 

D. Set-TransportConfig. 

Answer:


Q12. DRAG DROP - (Topic 6) 

You have an Exchange server organization that contains Exchange Server 2010 servers and Exchange Server 2013 servers. 

You have a Microsoft Lync Server 2010 environment that is integrated with Exchange Server 2010 to provide Unified Messaging (UM) services. All UM dial plans are SIP secured. 

You plan to move the UM services to Exchange Server 2013. 

You need to ensure that the Exchange Server 2013 UM services can be integrated with Lync Server 2010. 

Which three cmdlets should you run in sequence? To answer, move the appropriate cmdlets from the list of cmdlets to the answer area and arrange them in the correct order. 

Answer: 


Q13. HOTSPOT - (Topic 6) 

You have an Exchange Server 2013 organization. 

All users access their mailbox by using Outlook Web Access. Users can view .xml files 

from Outlook Web Access. 

You need to meet the following compliance requirements: 

Audit the mailbox for a specific user. 

Email the mailbox audit log to a compliance officer. 

Which cmdlet should you use? To answer, select the appropriate options in the answer area. 

Answer: 


Q14. DRAG DROP - (Topic 6) 

You have an Exchange Server 2013 organization that has a hybrid deployment with Microsoft Office 365. 

You use Microsoft Azure Active Directory Sync (Azure AD Sync) for password synchronization. 

You need to configure Azure AD Sync to meet the following requirements: 

. Azure AD Sync must be forced to replicate every hour. . Only objects in an organizational unit (OU) named Sales must be synced with Office 365. . The Office 365 user account in Azure AD Sync must be updated to user1@fabrikam.onmicrosoft.com. 

Which solution should you include for each requirement? To answer, drag the appropriate solution to the correct requirement. Each solution may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content. 

Answer: 


Q15.  (Topic 6) 

You have an Exchange Server 2013 organization that contains the servers configured as shown in the following table. 

All of the Exchange servers run Windows Server 2012 R2 and are members of a database availability group (DAG) named DAG1. Each server has a copy of all the mailbox databases. DAG1 is configured to have a cluster administrative access point. The file share witness is located in Site A. 

EX5 fails and is taken offline permanently. 

You need to identify the maximum number of Mailbox servers that can fail simultaneously without affecting the mailbox access of the users. 

How many servers should you identify? 

A. 2 

B. 3 

C. 4 

D. 5 

Answer:


Q16. DRAG DROP - (Topic 3) 

You need to implement a solution to meet the security requirement for the temporary employees. 

You deploy an Active Directory Rights Management Services (AD RMS) cluster, and then you run the Set-IRMConfiguration cmdlet. 

Which three actions should you perform? 

To answer, move the three appropriate actions from the list of actions to the answer area and arrange them in the correct order. 

Answer: 


Q17.  (Topic 6) 

You have an Exchange Server 2013 organization. 

A distribution group named Sales_Reports is used to distribute confidential information to all of the senior managers in your company. 

You need to recommend a solution to ensure that all unencrypted messages sent to the Sales_Reports group are encrypted on the server automatically before they are stored in the mailboxes of the managers. 

Which two technologies should you include in the recommendation? Each correct answer presents part of the solution. 

A. A transport rule 

B. S/MIME 

C. Active Directory Certificate Services (AD CS) 

D. Active Directory Rights Management Services (AD RMS) 

E. TLS 

Answer: A,B 

Explanation: 

A: As an administrator, you can create transport rules to enable Microsoft Office 365 Message Encryption. This service lets you encrypt outgoing email messages and remove encryption from incoming encrypted replies to those messages, depending on conditions defined in the rule. 

B: Encrypted e-mail messages Messages that are encrypted using S/MIME. Transport rules can access envelope headers contained in encrypted messages and process messages based on predicates that inspect them. Rules with predicates that require inspection of message content, or actions that modify content, can't be processed. 

Reference: Understanding How Transport Rules Are Applied 

https://technet.microsoft.com/en-us/library/bb124703%28v=exchg.141%29.aspx 


Q18. DRAG DROP - (Topic 6) 

Contoso, Ltd., is a bank that has offices in North America and Europe. 

The company must comply with different regulations for North America and Europe. 

The company uses Information Right Management (IRM) to protect sensitive documents, such as internal financial reports. 

You need to recommend a compliance solution to meet the following requirements: 

. Prevent users from disclosing customers' personal information in email messages. 

. Prevent users from disclosing internal financial data to people outside of the company. 

. Prevent the permanent deletion of email messages of users who are under investigation. 

. Allow compliance officers to search the mailbox of users who are under investigation without being able to alter the data in the mailbox. 

Which technology should you recommend for each requirement? 

To answer, drag the appropriate technology to the correct requirement in the answer area. Each technology may be used once, more than once, or not at all. Additionally, you may need to drag the split bar between panes or scroll to view content. 

Answer: 


Q19.  (Topic 6) 

You have a server named Server1 that has Exchange Server 2013 installed. 

Users access their mailbox by using Microsoft Outlook 2010 and Outlook Web App. 

You enable auditing for all of the mailboxes. 

You need to identify when a mailbox is accessed by someone other than the owner of the mailbox. 

What are two possible ways to achieve this goal? (Each correct answer presents a complete solution. Choose two.) 

A. Export the administrator audit log. 

B. Run an administrator role group report. 

C. Export the mailbox audit log. 

D. Run a non-owner mailbox access report. 

E. Review the security event log. 

Answer: C,D 

Explanation: 

C: Use the Auditing tab to run reports or export entries from the mailbox audit log and the 

administrator audit log. 

/ The mailbox audit log records whenever a mailbox is accessed by someone other than 

the person who owns the mailbox. This can help you determine who has accessed a 

mailbox and what they have done. 

/ The administrator audit log records any action, based on a Windows PowerShell cmdlet, 

performed by an administrator. This can help you troubleshoot configuration issues or 

identify the cause of security- or compliance-related problems. 

D: Run a Non-Owner Mailbox Access Report 

Use this report to find mailboxes that have been accessed by someone other than the 

person who owns the mailbox. 


Q20.  (Topic 6) 

You have an Exchange Server 2010 organization that contains three servers. The servers are configured as shown in the following table. 

Microsoft Outlook is configured to connect to an FQDN of mail.adatum.com. Mail.adatum.com resolves to the IP address of a Layer 7 hardware load balancer. The hardware load balancer is configured to send traffic to EX2 and EX3. 

You deploy an Exchange Server 2013 Mailbox server named EX4 and an Exchange Server 2013 Client Access server named EX5. 

You plan to migrate all mailboxes to Exchange Server 2013. 

You need to recommend a solution to ensure that users can access their mailbox on EX1 or EX4 during the migration. 

What should you do? 

A. Create a Client Access server array that contains EX1 and EX5. 

B. Modify the autodiscover.contoso.com resource record to point to EX5. 

C. Modify the properties of the hardware load balancer to point to EX5. 

D. Create a DNS record named legacy.contoso.com in the internal DNS zone. 

Answer:

Explanation: 

Note: So what is the Client Access server in Exchange 2013? The Client Access server role is comprised of three components, client protocols, SMTP, and a UM Call Router. The CAS role is a thin, protocol session stateless server that is organized into a load balanced configuration. Unlike previous versions, session affinity is not required at the load balancer (but you still want a load balancer to handle connection management policies and health checking). This is because logic now exists in CAS to authenticate the request, and then route the request to the Mailbox server that hosts the active copy of the mailbox database. 

The Mailbox server role now hosts all the components and/or protocols that process, render and store the data. No clients will ever connect directly to the Mailbox server role; all client connections are handled by the Client Access server role. 

Reference: Exchange 2013 Server Role Architecture