Top Tips Of 70-342 preparation

Our pass rate is high to 98.9% and the similarity percentage between our 70-342 study guide and real exam is 90% based on our seven-year educating experience. Do you want achievements in the Microsoft 70-342 exam in just one try? I am currently studying for the Microsoft 70-342 exam. Latest Microsoft 70-342 Test exam practice questions and answers, Try Microsoft 70-342 Brain Dumps First.


♥♥ 2021 NEW RECOMMEND ♥♥

Free VCE & PDF File for Microsoft 70-342 Real Exam (Full Version!)

★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions

Free Instant Download NEW 70-342 Exam Dumps (PDF & VCE):
Available on: http://www.surepassexam.com/70-342-exam-dumps.html

Q41.  (Topic 3) 

You need to identify which technologies must be deployed to meet the Office 365 coexistence requirements. 

Which two technologies should you identify? (Each correct answer presents part of the solution. Choose two.) 

A. the Microsoft Online Services Directory Synchronization tool 

B. Active Directory Federation Services (AD FS) 2.0 

C. Active Directory Rights Management Services (AD RMS) 

D. an internal root CA 

E. Active Directory Lightweight Directory Services (AD LDS) 

Answer: A,B 

Explanation: 

* Scenario: Contoso identifies the following Office 365 coexistence requirements: 

/ Office 365 users must be able to access their mailbox by using their Active Directory user 

account in Contoso. 

/ On-premises users must be able to share free/busy information and calendar information with the Office 365 users. 

A: When you create an Office 365 mailbox in Exchange Online in a hybrid deployment, the mail user is created in Active Directory on-premises. Directory synchronization, if it's configured, automatically synchronizes this new user object to Office 365, where it’s converted to a cloud mailbox in Exchange Online. You can create Office 365 mailboxes as regular user mailboxes, resource mailboxes for meeting rooms and equipment, and shared mailboxes. 

B: Step-By-Step: Setting up AD FS and Enabling Single Sign-On to Office 365 


Q42. HOTSPOT - (Topic 6) 

You have an Exchange Server 2013 organization that has mailbox audit logging enabled for all users. 

You deploy two third-party applications named App1 and App2. Both applications access a mailbox named Mailbox1. 

App1 uses a mail-enabled user account named App1_user. App2 uses a mailbox-enabled user account named App2_user. 

You need to prevent the audit logs from containing entries that relate to App2. 

Which command should you run? (To answer, select the appropriate options in the answer area.) 

Answer: 


Q43.  (Topic 1) 

You need to recommend a solution for the HR voice mail. The solution must meet the 

security requirements. 

What should you recommend? 

A. Create a UM mailbox policy and associate the policy to UM1. Configure the voice mail protection settings of the UM mailbox policy. Create an auto attendant and link the auto attendant to UM1. 

B. Create a UM mailbox policy and associate the policy to a new dial plan. Configure the voice mail protection settings of the UM mailbox policy. Create an auto attendant and link the auto attendant to the new dial plan. 

C. Create a UM mailbox policy and associate the policy to a new dial plan. Configure the voice mail protection settings of the UM mailbox policy. Assign the UM mailbox policy to the mailbox of the HR department. 

D. Create a UM mailbox policy and associate the policy to UM1. Configure the voice mail protection settings of the UM mailbox policy. Assign the UM1 mailbox policy to the mailbox of the HR department. 

Answer:

Explanation: 

* Scenario: 

/ Use Information Rights Management (IRM) to protect all of the voice mails left for the 

telephone number of the human resource (HR) department. 

/ There is a UM dial plan named UM1. 

* The Protected Voice Mail feature is available with Exchange 2010 and later versions of 

Unified Messaging (UM). It can be configured on a UM mailbox policy. 

* By default, a single UM mailbox policy is created every time you create a UM dial plan. 

The new UM mailbox policy is automatically associated with the UM dial plan, and part of 

the dial plan name is included in the display name of the UM mailbox policy. You can edit 

this default UM mailbox policy. You can create additional UM mailbox policies to apply a 

common set of settings for groups of users. 


Q44.  (Topic 6) 

You have an Exchange Server 2013 organization that contains one Client Access server named EX1 and one Mailbox server named EX2. 

You have a perimeter network and an internal network. The perimeter network contains an Edge Transport server named EX3 that has Exchange Server 2010 installed. 

You need to ensure that all of the email messages sent to and received from the Internet are routed through the EX3. Which three actions should you perform? (Each correct answer presents part of the solution. Choose three.) 

A. Allow SMTP traffic between EX3 and EX2. 

B. Create an Edge Subscription. 

C. Allow traffic over TCP 50636 from EX1 to EX3. 

D. Allow SMTP traffic between EX3 and EX1. 

E. Allow traffic over TCP 50636 from EX2 to EX3. 

F. Modify the default Receive connector on EX2. 

Answer: A,B,E 

Explanation: 

To establish Internet mail through an Edge Transport server, subscribe the Edge Transport server to an Active Directory site. This automatically creates the two Send connectors required for Internet mail flow: 

. A Send connector configured to send outbound email to all Internet domains. 

. A Send connector configured to send inbound email from the Edge Transport 

server to an Exchange 2013 Mailbox server. 

SMTP traffic and ports TCP 50636 must be allowed between the mailbox server (routing service) and the Edge server. 


Q45. DRAG DROP - (Topic 6) 

You have an Exchange Server 2013 organization. 

Your company identifies the following security requirements: 

. Users must be able to send encrypted email messages that can only be decrypted by the intended recipient. 

. All email messages sent by a user named User1 to an external recipient must be protected by using TLS. 

. All SMTP sessions to a remote SMTP host named SMTP1 must be encrypted. 

You need to recommend which technology must be used to meet each requirement. 

Which technologies should you recommend? (To answer, drag the appropriate 

technologies to the requirements in the answer area. Each technology may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.) 

Answer: 


Q46. HOTSPOT - (Topic 6) 

You manage an Exchange Server 2013 organization for an investment company at which brokers are restricted from communicating with market researchers. You need to prevent members of a group named AllBrokers from using email to share confidential information with members of a group named AllResearchers. The solution must ensure that when an email message is rejected, the sender receives a custom notification of “Communication Not Permitted of Compliance Reasons”. 

What command should you use? To answer, select the appropriate options in the answer area. 

Hot Area 

Answer: 


Q47. DRAG DROP - (Topic 5) 

You need to recommend a solution to support the planned changes for the integration of the Exchange Server organizations of Contoso and Proseware. 

What should you configure in each organization? (To answer, drag the appropriate objects to the correct forests. Each object may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.) 

Answer: 


Q48.  (Topic 6) 

You plan to deploy 20 Client Access servers that will have Exchange Server 2013 installed. 

You need to prepare the certificate required for the planned deployment. The solution must ensure that the same certificate can be used on all of the Client Access servers. 

What should you do first? 

A. On one of the Client Access servers, run the New-ExchangeCertificate cmdlet and specify the PrivateKeyExportable parameter. 

B. On all of the Client Access servers, run the Get-ExchangeCertificate cmdlet. 

C. On one of the Client Access servers, run the New-ExchangeCertificate cmdlet and specify the BinaryEncoding parameter. 

D. On one of the Client Access servers, start the Certificates console and run the Certificate Import Wizard. 

Answer:

Explanation: 

We need to create a new certificate. We make it exportable. 

Note: 

Use the New-ExchangeCertificate cmdlet to create a self-signed certificate, renew an 

existing self-signed certificate, or generate a new certificate request for obtaining a 

certificate from a certification authority (CA). 


Q49.  (Topic 6) 

You have an Exchange Server 2013 organization that is integrated with Information Rights Management (IRM). 

A user is unable to create and read IRM-protected messages from a mobile device. The user can open IRM- protected messages *missing text*. 

You need to identify the most likely cause of the issue. 

What should you identify? 

A. the value of DevicePasswordEnabled of a mobile device policy 

B. the value of AllowNonProvisionableDevices of a mobile device policy 

C. the Exchange ActiveSync protocol version 

D. the value of RequireDeviceEncryption of a mobile device policy 

Answer:

Explanation: 

Mobile IRM protection in Exchange 2013 When you set the RequireDeviceEncryption parameter to $true, mobile devices that don't support device encryption will be unable to connect. 

Note: Using IRM in Exchange ActiveSync, mobile device users can: 

* Create IRM-protected messages. 

* Read IRM-protected messages. 

* Reply to and forward IRM-protected messages. 

Reference: Information Rights Management in Exchange ActiveSync 

https://technet.microsoft.com/en-us/library/ff657743(v=exchg.150).aspx 


Q50.  (Topic 6) 

You have an Exchange Server organization. The organization contains servers that have either Exchange Server 2010 or Exchange Server 2013 installed. 

You hire a junior administrator named Admin5. Admin5 is a member of the Recipient Management management role group. 

You discover that Admin5 created two new mailbox-enabled users by using the New-Mailbox command. 

You need to identify which management role provides Admin5 with the permissions to create new mailbox-enabled users. 

Which cmdlets should you run? 

A. Get-ManagementRoleEntry and Get-RoleAssignmentPolicy 

B. Get-Rolegroup and Get-ManagementRoleAssignment 

C. Get-ManagementRoleEntry and Get-ManagementRoleAssignment 

D. Get-RolegroupMember and Get-ManagementRoleAssignment 

Answer:

Explanation: 

* Use the Get-ManagementRoleEntry cmdlet to retrieve management role entries that have been configured on management roles. 

* Use the Get-ManagementRoleAssignment cmdlet to retrieve management role assignments.