|
Related Questions |
View Answer |
|
You have configured attachment filtering on your organization's edge transport servers. Because some senders are transmitting files that are not harmful, you want to allow hem to be informed that the message containing the attachment has been rejected by your organization. Which of the following configuration settings should you make? A. Configure the attachment filtering behavior action to Strip B. Configure the attachment filtering behavior action to SilentDelete C. Configure the attachment filtering behavior action to Reject D. Configure a ConnectorException
|
View Answer
|
|
What does the following Exchange Management Shell command do? New-DistributionGroup -Name "Manufacturing" -OrganizationalUnit Users –SAMAccountName Manufacturing -Type Security A. Creates a mail-enabled local security group called Manufacturing B. Creates a mail-enabled universal security group called Manufacturing C. Creates a universal distribution group called Manufacturing D. Creates a dynamic distribution group called Manufacturing
|
View Answer
|
|
In Microsoft Exchange Server 2007,the Hub Transport server role was referred to as the Bridgehead server role. Deployed inside your Active Directory directory service forest, the Hub Transport server role handles all mail flow inside the organization, applies transport rules, applies journaling policies, and delivers messages to a recipient's mailbox. Messages that are sent to the Internet are relayed by the Hub Transport server to the Edge Transport server role that is deployed in the perimeter network. Messages that are received from the Internet are processed by the Edge Transport server before they are relayed to the Hub Transport server. Company has 5 Active Directory sites that are configured as shown in the exhibit. Each site has an Exchange Server 2007 Mailbox server and Hub Transport server. Currently all outbound e-mail traffic goes through the New York site. Mike is required to reconfigure the mail flow so that all outbound e-mail messages that are sent from users in the Seattle office are sent out of your Exchange organization through ExchHub5 in the Chicago office. What should Mike run? A. Set- AdsiteLink -Id DNVR-CHI - ADCost 10 B. Set- SendConnector -Identity 'Seattle' - AddressSpaces:'smtp :*;1' - DNSRoutingEnabled:$false -SourceTransportServers:'ExchHub1' C. New- SendConnector -Name 'Chicago' - AddressSpaces:'smtp :*;1' - DNSRoutingEnabled:$true -SourceTransportServers:'ExchHub5' D. Set- AdSitE.Identity Chicago - HubSiteEnabled:$true
|
View Answer
|
|
You are writing a PowerShell script that takes the identity of a mailbox as a parameter, moves the mailbox to the database First Glasgow Mailbox Database in the storage group First Storage Group, and removes the mailbox from its original location. What should be the contents of the PowerShell script file? A. Param( [string] $Identity ) Move-Mailbox -Identity $IdentityDTargetDatabase OFirst Storage GroupFirst Glasgow Mailbox DatabaseO -SourceMailboxCleanupOptions DeleteSourceMailbox B. Move-Mailbox -Identity $Identity DTargetDatabase OFirst Storage Group First Glasgow Mailbox DatabaseO -SourceMailboxCleanupOptions DeleteSourceMailbox Param( [string] $Identity ) C. Move-Mailbox -Identity $Identity DTargetDatabase OFirst Storage Group First Glasgow Mailbox DatabaseO -SourceMailboxCleanupOptions DeleteSourceMailbox D. Param( [string] $Identity ) Move-Mailbox -Identity $Identity DTargetDatabase OFirst Storage Group First Glasgow Mailbox DatabaseO
|
View Answer
|
|
ActiveSync is a data synchronization program developed by Microsoft for use with its Microsoft Windows line of operating systems. Originally released under the name "Handheld PC Explorer" in 1996, it provides users of Microsoft Windows a way to transport documents, calendars, contact lists and email between their desktop computer and a mobile device, such as a Handheld PC, mobile phone, or any other portable devices that support the ActiveSync protocol. Company’s MS ActiveSync policy requires inactive users to provide their password each 15 minutes. Mr. Moore is the CEO of Company Ltd., his mobile device should be exempted from the inactivity timer. Now you have to exempt Moore'S mobile device from the timeout policy while maintaining the other corporate policy settings. What should you do? A. Remove the corporate ActiveSync policy from Mr. Moore's mailbox. B. Create a new ActiveSync policy that has the required settings, and apply it to the executives mailbox. C. Reset Mr. Moore's mobile device and refuse the corporate ActiveSync policy. D. Change the password setting on Mr. Moore's mobile device to take precedence of the ActiveSync policy.
|
View Answer
|
|
Consumers found that their licit message were sened to the Junk folders of the MS-Office Outlook client application. You can make sure that the sender's email address were on the Outlook Safe-Senders List. Now you are asked to solve this problem, at first you have to make the consumer-defined Safe-senders List to be used while the email was delivered on the Exchange Edge Transport server. How to achieve it? A. Enable anti-spam updates on the Edge Transport server. B. On the Edge Transport server content filter configuration, enable authenticated message bypass. C. Run the mailbox server content filter configuration and enable the Outlook E-mail Postmark validation. D. Run the Update-SafeList cmdlet for each users mailbox on the Mailbox server.
|
View Answer
|
|
You are using Exchange Management Console to move selected mailboxes to another database. You select the mailboxes and step through the pages of the wizard. On the Move Schedule page, you specify that the mailboxes should be moved at 11:30 PM that day, and you click Next. On the Move Mailbox page, you click Move. What then happens? A. You click Finish, and a single command to move the mailboxes is sent to Exchange Management Shell. Exchange Management Shell uses the scheduling facilities of the OS to delay the execution of the command until the appropriate time. B. You click Finish, and multiple commands to move each mailbox individually are sent to Exchange Management Shell. Exchange Management Shell uses the scheduling facilities of the OS to delay the execution of the commands until the appropriate time. C. The Finish control is grayed out, and you cannot close the Move Mailbox Wizard. At 11:30 PM, a single command is sent to Exchange Management Shell to implement all the mailbox moves. After the mailboxes have been moved, you can click Finish to close the wizard. D. The Finish control is grayed out, and you cannot close the Move Mailbox Wizard. At 11:30 PM, multiple commands are sent to Exchange Management Shell, each of which implements a mailbox move. After the mailboxes have been moved, you can click Finish to close the wizard.
|
View Answer
|
|
What does the following command do? Set-PublicFolder OHuman ResourcesO -ReplicationSchedule "Saturday.12:00 AM - Monday.12:00 AMO A. Specifies that the Human Resources public folder replicates only on Saturday and Sunday. B. Specifies that the Human Resources public folder replicates only on Saturday, Sunday, and Monday. C. Specifies that the Human Resources public folder replicates only on Sunday. D. Specifies that the Human Resources public folder always uses the default replication schedule of the public folder database.
|
View Answer
|
|
Your company management has decided that e-mail should no longer be sent to a universal distribution group in your organization called Golfers. You know that a new chief executive officer will soon be joining the organization, and you also know he is a keen golfer. You suspect that it will not be long before you are asked to restore the group. What should you do? A. Do not remove or disable the group. Instead, remove all members from the group. B. Remove the group. C. Change the group type from universal distribution group to dynamic distribution group. D. Disable the group.
|
View Answer
|
|
You are an Exchange administrator at Contoso, Ltd. A group of consultants from Trey Research works closely with Contoso, and members of the group have mailenabled accounts in Contoso's Active Directory domain. The group membership changes frequently, and you create and remove mail-enabled Trey Research users on a regular basis. You want to ensure that group e-mails sent to the Trey Research Consultants group go to all consultants who currently have mailenabled accounts at Contoso. You also want to ensure that these e-mails are not sent to consultants who no longer have user accounts at Contoso because this results in nondelivery returns. How best can you achieve this? A. Create a mail-enabled universal security group B. Create a dynamic distribution group C. Create a universal distribution group D. Create a universal security group but disable its mailbox
|
View Answer
|
|
You want to allow OWA clients in your organization the ability to access the SharePoint site hosted on server sharepoint.tailspintoys.internal. You do not want them to access the SharePoint site hosted on server secureshare.tailspintoys. internal. Which of the following steps do you need to take to allow this to occur? A. Add the site sharepoint.tailspintoys.internal to the block list on the Remote File Servers tab of the OWA Web site properties B. Add the site sharepoint.tailspintoys.internal to the allow list on the Remote File Servers tab of the OWA Web site properties C. Add the site secureshare.tailspintoys.internal to the block list on the Remote File Servers tab of the OWA Web site properties D. Add the domain suffix tailspintoys.internal to the list of domain suffixes that should be treated as internal E. Add the site secure.tailspintoys.internal to the allow list on the Remote File Servers tab of the OWA Web site properties
|
View Answer
|
|
Five Windows Server 2003 R2 computers are located at a remote site in your organization. The servers have the following roles: Server A: Domain controller and global catalog server Server B: File and print server Server C: SQL Server 2005 database server Server D: Exchange Server 2007 server Server E: Intranet Server Server A fails completely and needs to be replaced. It will be several days before you can install a replacement. Although users can currently log on over the WAN, you would like to temporarily promote one of the other servers at the site to act as a domain controller. Which of the following servers can you promote? (Choose all that apply.) A. Server A B. Server B C. Server C D. Server D E. Server E
|
View Answer
|
|
You have an automatically generated CSV file with a list of your companys newly hired employees. The CSV file contains all of the information that is required to create the mailboxes for the new employees. You need to create new user accounts and mailboxes directly from the CSV file. What should you do? A. Redirect the output of the Import-CSV cmdlet to the New-Mailbox cmdlet with the appropriate parameters. B. Redirect the output of the Export-CSV cmdlet to the New-Mailbox cmdlet with the appropriate parameters. C. Redirect the output of the Import-Alias cmdlet to the New-Mailbox cmdlet with the appropriate parameters. D. Redirect the output of the Import-CSV cmdlet to the Enable-Mailbox cmdlet with the appropriate parameters.
|
View Answer
|
|
Your Exchange Server 2007 organization contains two Exchange servers named Exch1 and Exch2. Exch1 fails and cannot be restored to service. You need to move all mailboxes from Exch1 to Exch2. Which cmdlet should you run? A. Get-Mailbox -Server Exch1 | Move-Mailbox - IgnorePolicyMatch - TargetDatabase “Exch2First Storage GroupMailbox Database” B. Get-Mailbox -Server Exch1 | Move-Mailbox - IgnoreRuleLimitErrors - TargetDatabase “Exch2First Storage GroupMailbox Database” C. Get-Mailbox -Server Exch1 | Move-Mailbox - ValidateOnly - TargetDatabase “Exch2First Storage GroupMailbox Database” D. Get-Mailbox -Server Exch1 | Move-Mailbox - ConfigurationOnly - TargetDatabase “Exch2First Storage GroupMailbox Database”
|
View Answer
|
|
Your company uses both a distribution group and a security group for each department. Both groups contain the same members. All new users are added to both groups in their departments. You need to decrease the amount of time that is required to manage groups. You must achieve this goal while minimizing disruption to mail capabilities and to previously assigned access permissions. Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.) A. Delete the departmental distribution groups. B. Delete the departmental security groups. C. Convert the departmental distribution groups to global security groups. D. Mail-enable the departmental security groups. E. Mail-enable the converted global security groups.
|
View Answer
|
|
A mail-enabled public folder named Monitoring receives automated alerts from your companys monitoring system. Some users send e-mail messages to the folder by selecting it from the global address list (GAL) in Microsoft Office Outlook. You need to prevent users from selecting the Monitoring folder from the GAL, and you need to ensure that the monitoring alerts will still be received. What should you do? A. Run the Set-MailPublicFolder cmdlet and set the DisplayName parameter to $false. B. Run the Set-MailPublicFolder cmdlet and set the HiddenFromAddressListsEnabled parameter to $true. C. Run the Set-AddressList “Public Folders” -RecipientFilter “DisplayNamE.is ‘Monitoring’” cmdlet. D. Use the Outlook client to remove the Folder visible attribute for the Default name on the Monitoring public folder.
|
View Answer
|
|
All users can receive e-mail that is sent directly to them from the Internet. A distribution group named WebResponse is configured to accept e-mail from all users. All corporate users can send messages to the WebResponse distribution group by using Microsoft Office Outlook. AII messages that are sent to the distribution group from the Internet are rejected. You need to allow e-mail from internal and Internet users to be sent to the SMTP address of the WebResponse distribution group. What should you do? A. Modify the properties of the WebResponse distribution group so that the Everyone group has the Send As permission. B. Modify the properties of the WebResponse distribution group so that the group no longer requires all senders to be authenticated. C. Modify the SMTP Receive connectors on each Hub Transport server to allow anonymous users. D. Modify the properties of the WebResponse distribution group so that the group is no longer hidden from the Outlook global address list (GAL).
|
View Answer
|
|
Your company is closing its Denver office. The employees in the Denver office have mailbox- enabled user accounts that use the value Denver in the City attribute. You disable the user accounts of the Denver employees. You need to disconnect their mailboxes. What are two possible ways to achieve the goal? (Each correct answer presents a complete solution. Choose two.) A. Run the Remove-Mailbox Denver cmdlet. B. Run the Get-User -Filter “City -like ‘Denver’” | Remove-Mailbox cmdlet. C. Run the Get-User -Filter “City -like ‘Denver’” | Disable-Mailbox cmdlet. D. From the Exchange Management Console, apply a filter to the City attribute to contain Denver. Highlight all of the filtered users and select Disable. E. From the Exchange Management Console, apply a filter to the City attribute to contain Denver. Highlight all of the filtered users and select Remove.
|
View Answer
|
|
Your Exchange Server 2007 organization has two servers named Exch1 and Exch2. You need to move all of the Exch1 mailboxes to Exch2 next Saturday at 11:00 P.M. You will be out of the office at that time. What should you do? A. Run the Set-Mailbox -server Exch1 | Move-mailbox -TargetDatabase “Exch2First Storage GroupMailbox Database” cmdlet with the StartDate parameter set for next Saturday at 11 P.M. B. Run the Set-Mailbox | Move-mailbox -TargetDatabase “Exch2First Storage GroupMailbox Database” cmdlet with the StartDate parameter set for next Saturday at 11 P.M. C. Use Microsoft Windows scheduler to run the Set-Mailbox | Move-mailbox -TargetDatabase “Exch2First Storage GroupMailbox Database” cmdlet from the Exchange Management Shell next Saturday at 11 P.M. D. Use Microsoft Windows scheduler to run the Set-Mailbox -server Exch1 | Move-mailbox – TargetDatabase “Exch2First Storage GroupMailbox Database” cmdlet from the Exchange Management Shell next Saturday at 11 P.M.
|
View Answer
|
|
Marc is Marias assistant. Marc needs to be able to view all of the folders and subfolders in Marias mailbox and to open and respond to Marias e-mail. You need to assign Marc the appropriate permissions. What should you do? A. Run the Add-ADPermission -Identity Maria ?User Marc ?AccessRights Self ?ExtendedRights Send-As cmdlet. B. Run the Add-MailboxPermission ?Identity Maria ?User Marc ?AccessRights ExternalAccount cmdlet C. Run the Add-MailboxPermission ?Identity Maria ?User Marc ?AccessRights FullAccess cmdlet. D. In the Active Directory Users and Computers management console, assign Marc the Allow- Full Control permission for Marias user account.
|
View Answer
|