Sponsored Links

Interview Questions



INTERVIEW QUESTIONS MICROSOFT SHARE POINT SERVER DETAILS

Question: While monitoring your network, you find that the number of RPC operations per second is higher
than expected. What tool can you use to analyze this problem?
A. Mail Flow Troubleshooter
B. Performance Troubleshooter
C. Best Practices Analyzer
D. Database Recovery Management

Answer: B. Performance Troubleshooter

Category Share Point Server Interview Questions & Answers - Exam Mode / Learning Mode
Rating (0.2) By 8520 users
Added on 7/21/2015
Views 70730
Rate it!

Question: While monitoring your network, you find that the number of RPC operations per second is higher
than expected. What tool can you use to analyze this problem?
A. Mail Flow Troubleshooter
B. Performance Troubleshooter
C. Best Practices Analyzer
D. Database Recovery Management


Answer:

B. Performance Troubleshooter Source: CoolInterview.com



If you have the better answer, then send it to us. We will display your answer after the approval.
Rules to Post Answers in CoolInterview.com:-
  • There should not be any Spelling Mistakes.
  • There should not be any Gramatical Errors.
  • Answers must not contain any bad words.
  • Answers should not be the repeat of same answer, already approved.
  • Answer should be complete in itself.
Name :*
Email Id :*
Answer :*
Verification Code Code Image - Please contact webmaster if you have problems seeing this image code Not readable? Load New Code
Process Verification Enter the above shown code: *
Inform me about updated answers to this question

Related Questions
View Answer
Exchange Server 2007 makes it easier for IT to deliver new capabilities to their organizations by
making the messaging environment easier to manage and more cost efficient. In your Exchange
Server 2007 organization, Microsoft ActiveSync is configured on the Exchange servers but is now
disabled for users. A user in the Exchange organization has a new mobile device. He would like
his device to synchronize with the Exchange servers over a wireless network. You are asked to
enable the ActiveSync feature for only this user. Which two ways are possible to accomplish this
objective?
(Each correct answer presents a complete solution. Choose two.)
A. Run the Set-ActiveSyncMailboxPolicy cmdlet.
B. Run the Set-CASMailbox cmdlet.
C. Use the Active Directory Users and Computers console to enable the ActiveSync feature for
the user.
D. Use the Exchange Management Console to enable the ActiveSync feature for the user.
View Answer
Exchange Server 2007 offers built-in protective technologies to keep your business moving,
reduce spam and viruses, enable confidential communications, and help your company to be
compliant. You should allow the owner of each distribution group in your Exchange Server 2007
organization to modify membership for the group. You needn??t to allow the owner to make any
other changes. Which action will you take?
A. On the Managed By tab of each distribution group, add the owner, and select the Manager can
update membership list check box.
B. Add the user accounts of the distribution group owners to the Exchange Recipient
Administrator role.
C. Modify each distribution group by assigning the Send As permission to the owners user
account.
D. Modify each distribution group by assigning the Write permission to the owners user account.
View Answer
One of your colleagues has read that the value in the % Processor Time counter should not
exceed 85 percent. She has therefore configured an alert to trigger when the counter reaches or
exceeds that value. The alert triggers frequently. What conclusion should you draw?
A. Your colleague has not understood processor usage.
B. Your colleague has not set up the counter correctly.
C. You need to install a faster processor.
D. You need to install another processor to enable multiprocessing.
View Answer
Exchange 2003 Server delivers significant improvements in functionality over Microsoft Exchange
5.5 in key areas affecting accessibility, ease of management, protection, stability, capacity, and
performance. Exchange Server 2007 makes it easier for IT to deliver new capabilities to their
organizations by making the messaging environment easier to manage and more cost efficient
.You are tasked to move a conference room mailbox named Company1 from an Exchange
Server 2003 computer to an Exchange Server 2007 computer. In order to convert the Company1
mailbox to an Exchange 2007 resource mailbox, you must make sure that the mailbox is able to
be scheduled as a resource. Which two cmdlets will you run? (Each correct answer presents part
of the solution. Choose two.)
A. Set-Mailbox -Identity " Company1 " -Type Room
B. Set- MailboxCalendarSettings -Identity " Company1 " - AutomateProcessing Auto Update
C. Set- MailboxCalendarSettings -Identity " Company1 " - AutomateProcessing AutoAccept
D. Set-Mailbox -Identity " Company1 " -Type Regular
View Answer
Microsoft Exchange Server 2007 provides built-in protection technologies to help keep the e-mail
system up and running and better protected from outside threats while allowing employees to
work from wherever they are using a variety of clients including Microsoft Outlook, Outlook Web
Access, and mobile devices. You are a network technician for Company Ltd. How to configure
your Exchange Server 2007 computer so that a specific distribution group will allow out-of-office
responses from the mailboxes of members of the distribution group?
A. On the distribution group properties, enable out-of-office responses to be sent to message
senders.
B. Re-create the distribution group as a security group.
C. On the distribution group properties, enable delivery reports to be sent to message senders.
D. On the default remote domain policy, enable out-of-office responses.
View Answer
You want to trigger an alert when the number of messages in the mailbox store's receive queue
on an Exchange Server 2007 server reaches a defined value. What counter do you select when
configuring the alert? (The question uses the notation <performance object>:<counter name>.)
A. MSExchangeIS:Messages Queued For Submission
B. MSExchangeIS:Receive Queue Size
C. MSExchangeIS Mailbox:Messages Queued For Submission
D. MSExchangeIS Mailbox:Receive Queue Size
View Answer
Alex works as a network technician. He would configure the conference room resource mailboxes
in his company??s Exchange Server 2007 organization to remove attached files from meeting
requests. Which cmdlet does he need to run?
A. Get-Mailbox - RecipientTypeDetails RoomMailbox ; Set-MailboxCalendarSettings -
DeleteNonCalendarItems : $true
B. Get-Mailbox - RecipientTypeDetails RoomMailbox | Set- MailboxCalendarSettings -
DeleteAttachments:
$true
C. Get-Mailbox - RecipientTypeDetails RoomMailbox ; Set-MailboxCalendarSettings -
DeleteAttachments :
$true
D. Get-Mailbox - RecipientTypeDetails RoomMailbox | Set- MailboxCalendarSettings
-DeleteNonCalendarItems: $true
View Answer
The Company??s Exchange Server 2007 organization has a mail-enabled public folder named
Monitoring which is configured to receive automated alerts from this company??s external
monitoring system. Each corporate user is able to send e-mail to this public folder. Mail from the
monitoring system is being returned with a non-delivery report (NDR). How to make sure that the
monitoring alerts are to be received in the Monitoring public folder?
A. Use Microsoft Office Outlook to assign anonymous users the permission to create items in the
Monitoring public folder.
B. Perform the Add-PublicFolderClientPermission -AccessRights: EditOwnedItems cmdlet for
anonymous users for the Monitoring public folder.
C. Use Microsoft Office Outlook to assign default users the permission to create items in the
Monitoring public folder.
D. Perform the Set-MailPublicFolder -RequireSenderAuthenticationEnabled: $true cmdlet for the
Monitoring public folder.
View Answer
You want to create a performance counter log that records the total number of recipients that
have received a message since start-up, the total number of messages delivered to all recipients
since start-up, the rate that recipients receive messages, the rate that messages are delivered to
all recipients, the total number of messages sent to transport since start-up, and the rate that
messages are sent to the transport. What MSExhangeIS Mailbox counters do you add to the log?
(Choose all that apply.)
A. Local Deliveries
B. Local Delivery Rate
C. Message Recipients Delivered
D. Message Recipients Delivered/Sec
E. Messages Delivered
F. Messages Delivered/Sec
G. Logon Operations/Sec
H. Messages Sent
I. Messages Sent/Sec
View Answer
Exchange Server 2007 provides a collaboration environment that delivers secure messaging
capabilities to recipients inside and outside an organization. In your Exchange Server 2007
organization, a report of the Exchange server settings shows that the storage limits for the
mailbox stores are not all the same. You should create an Exchange Management Shell script
that will reconfigure all the Exchange server mailbox stores to have identical storage limits. In
order to achieve this objective, how will you create the script?
A. Redirect the output of the Get-Mailbox cmdlet to the Set-MailboxDatabase cmdlet with the
proper parameters.
B. Redirect the output of the Get-ExchangeServer cmdlet to the Set-Mailbox Database cmdlet
with the proper parameters.
C. Redirect the output of the Get-MailboxDatabase cmdlet to the Set-MailboxDatabase cmdlet
with the appropriate parameters.
D. Redirect the output of the Get-MailboxDatabase cmdlet to the Set-Mailbox cmdlet with the
proper parameters.
View Answer
A former employee is sending e-mails to people in your organization attempting to recruit them to
a new start-up company that he has created. E-mails are transmitted from an Internet service
provider's SMTP server that is also used by several of your organization's clients.
Management has asked you to block all e-mails sent from the new company's e-mail domain.
Which of the following technologies should you implement?
A. Attachment filtering
B. Connection filtering
C. Sender filtering
D. Recipient filtering
View Answer
Which of the following Receive connector usage types uses Exchange Server authentication as
its default authentication mechanism?
A. Client
B. Internal
C. Internet
D. Partner
View Answer
A senior manager at your company is under suspicion of forwarding sensitive information to a
competitor. The chief executive officer (CEO) wants to be provided with a copy of all messages
that the senior manager sends but does not want the senior manager to be aware that he is
under surveillance. Which of the following actions would you configure when setting up a
transport rule to screen the senior manager's messages?
A. Blind carbon copy (Bcc) the message to addresses
B. Add a recipient in the To field addresses
C. Redirect the message To addresses
D. Silently drop the message
View Answer
You are asked to set a public folder to replicate on weekend, for both Saturday and Sunday. By
the way, make sure that posts will be denied when the folder's size reaches to
500 MB. Which option should you run for the public folder?
A. Set- PublicFolder - PostStorageQuota 500MB. UseDatabaseRetentionDefaults : $true
B. Set- PublicFolder - PostStorageQuota 500MB. ReplicationSchedule "Saturday.12:00 AM
Sunday.11:59 PM"
C. Set- PublicFolder - MaxItemSize 500MB. ReplicationSchedule "Saturday.12:00 AM-
Sunday.11:55 PM"
D. Set- PublicFolder - StorageQuota 500MB. ReplicationSchedule "Saturday.12:00 AM-
Sunday.11:59 PM"
View Answer
You have configured attachment filtering on your organization's edge transport servers. Because
some senders are transmitting files that are not harmful, you want to allow hem to be informed
that the message containing the attachment has been rejected by your organization.
Which of the following configuration settings should you make?
A. Configure the attachment filtering behavior action to Strip
B. Configure the attachment filtering behavior action to SilentDelete
C. Configure the attachment filtering behavior action to Reject
D. Configure a ConnectorException
View Answer
What does the following Exchange Management Shell command do?
New-DistributionGroup -Name "Manufacturing" -OrganizationalUnit Users –SAMAccountName
Manufacturing -Type Security
A. Creates a mail-enabled local security group called Manufacturing
B. Creates a mail-enabled universal security group called Manufacturing
C. Creates a universal distribution group called Manufacturing
D. Creates a dynamic distribution group called Manufacturing
View Answer
In Microsoft Exchange Server 2007,the Hub Transport server role was referred to as the
Bridgehead server role. Deployed inside your Active Directory directory service forest, the Hub
Transport server role handles all mail flow inside the organization, applies transport rules, applies
journaling policies, and delivers messages to a recipient's mailbox. Messages that are sent to the
Internet are relayed by the Hub Transport server to the Edge Transport server role that is
deployed in the perimeter network. Messages that are received from the Internet are processed
by the Edge Transport server before they are relayed to the Hub Transport server. Company has
5 Active Directory sites that are configured as shown in the exhibit. Each site has an Exchange
Server 2007 Mailbox server and Hub Transport server. Currently all outbound e-mail traffic goes
through the New York site.
Mike is required to reconfigure the mail flow so that all outbound e-mail messages that are sent
from users in the Seattle office are sent out of your Exchange organization through ExchHub5 in
the Chicago office.
What should Mike run?
A. Set- AdsiteLink -Id DNVR-CHI - ADCost 10
B. Set- SendConnector -Identity 'Seattle' - AddressSpaces:'smtp :*;1' -
DNSRoutingEnabled:$false
-SourceTransportServers:'ExchHub1'
C. New- SendConnector -Name 'Chicago' - AddressSpaces:'smtp :*;1' -
DNSRoutingEnabled:$true
-SourceTransportServers:'ExchHub5'
D. Set- AdSitE.Identity Chicago - HubSiteEnabled:$true
View Answer
You are writing a PowerShell script that takes the identity of a mailbox as a parameter, moves the
mailbox to the database First Glasgow Mailbox Database in the storage group
First Storage Group, and removes the mailbox from its original location. What should be the
contents of the PowerShell script file?
A. Param(
[string] $Identity
)
Move-Mailbox -Identity $IdentityDTargetDatabase OFirst Storage GroupFirst
Glasgow Mailbox DatabaseO -SourceMailboxCleanupOptions DeleteSourceMailbox
B. Move-Mailbox -Identity $Identity DTargetDatabase OFirst Storage Group First
Glasgow Mailbox DatabaseO -SourceMailboxCleanupOptions DeleteSourceMailbox
Param(
[string] $Identity
)
C. Move-Mailbox -Identity $Identity DTargetDatabase OFirst Storage Group First
Glasgow Mailbox DatabaseO -SourceMailboxCleanupOptions DeleteSourceMailbox
D. Param(
[string] $Identity
)
Move-Mailbox -Identity $Identity DTargetDatabase OFirst Storage Group First
Glasgow Mailbox DatabaseO
View Answer
ActiveSync is a data synchronization program developed by Microsoft for use with its Microsoft
Windows line of operating systems. Originally released under the name "Handheld PC Explorer"
in 1996, it provides users of Microsoft Windows a way to transport documents, calendars, contact
lists and email between their desktop computer and a mobile device, such as a Handheld PC,
mobile phone, or any other portable devices that support the ActiveSync protocol. Company’s MS
ActiveSync policy requires inactive users to provide their password each 15 minutes. Mr. Moore
is the CEO of Company Ltd., his mobile device should be exempted from the inactivity timer. Now
you have to exempt Moore'S mobile device from the timeout policy while maintaining the other
corporate policy settings. What should you do?
A. Remove the corporate ActiveSync policy from Mr. Moore's mailbox.
B. Create a new ActiveSync policy that has the required settings, and apply it to the executives
mailbox.
C. Reset Mr. Moore's mobile device and refuse the corporate ActiveSync policy.
D. Change the password setting on Mr. Moore's mobile device to take precedence of the
ActiveSync policy.
View Answer
Consumers found that their licit message were sened to the Junk folders of the MS-Office
Outlook client application. You can make sure that the sender's email address were on the
Outlook Safe-Senders List. Now you are asked to solve this problem, at first you have to make
the consumer-defined Safe-senders List to be used while the email was delivered on the
Exchange Edge Transport server.
How to achieve it?
A. Enable anti-spam updates on the Edge Transport server.
B. On the Edge Transport server content filter configuration, enable authenticated message
bypass.
C. Run the mailbox server content filter configuration and enable the Outlook E-mail Postmark
validation.
D. Run the Update-SafeList cmdlet for each users mailbox on the Mailbox server.
View Answer

Please Note: We keep on updating better answers to this site. In case you are looking for Jobs, Pls Click Here Vyoms.com - Best Freshers & Experienced Jobs Website.

View All Share Point Server Interview Questions & Answers - Exam Mode / Learning Mode



User Options
India News Network

Latest 20 Questions
Payment of time- barred debt is: (a) Valid (b) Void (c) Illegal (d) Voidable
Consideration is defined in the Indian Contract Act,1872 in: (a) Section 2(f) (b) Section 2(e) (c) Section 2(g) (d) Section 2(d)
Which of the following is not an exception to the rule, "No consideration, No contract": (a) Natural love and affection (b) Compensation for involuntary services (c) Completed gift (d) Agency
Consideration must move at the desire of: (a) The promisor (b) The promisee (c) The promisor or any other party (d) Both the promisor and the promisee
An offer which is open for acceptance over a period of time is: (a) Cross Offer (b) Counter Offer (c) Standing Offer (d) Implied Offer
Specific offer can be communicated to__________ (a) All the parties of contract (b) General public in universe (c) Specific person (d) None of the above
_________ amounts to rejection of the original offer. (a) Cross offer (b) Special offer (c) Standing offer (d) Counter offer
A advertises to sell his old car by advertising in a newspaper. This offer is caleed: (a) General Offer (b) Special Offer (c) Continuing Offer (d) None of the above
In case a counter offer is made, the original offer stands: (a) Rejected (b) Accepted automatically (c) Accepted subject to certain modifications and variations (d) None of the above
In case of unenforceable contract having some technical defect, parties (a) Can sue upon it (b) Cannot sue upon it (c) Should consider it to be illegal (d) None of the above
If entire specified goods is perished before entering into contract of sale, the contract is (a) Valid (b) Void (c) Voidable (d) Cancelled
______________ contracts are also caled contracts with executed consideration. (a) Unilateral (b) Completed (c) Bilateral (d) Executory
A offers B to supply books @ Rs 100 each but B accepts the same with condition of 10% discount. This is a case of (a) Counter Offer (b) Cross Offer (c) Specific Offer (d) General Offer
_____________ is a game of chance. (a) Conditional Contract (b) Contingent Contract (c) Wagering Contract (d) Quasi Contract
There is no binding contract in case of _______ as one's offer cannot be constructed as acceptance (a) Cross Offer (b) Standing Offer (c) Counter Offer (d) Special Offer
An offer is made with an intention to have negotiation from other party. This type of offer is: (a) Invitation to offer (b) Valid offer (c) Voidable (d) None of the above
When an offer is made to the world at large, it is ____________ offer. (a) Counter (b) Special (c) General (d) None of the above
Implied contract even if not in writing or express words is perfectly _______________ if all the conditions are satisfied:- (a) Void (b) Voidable (c) Valid (d) Illegal
A specific offer can be accepted by ___________. (a) Any person (b) Any friend to offeror (c) The person to whom it is made (d) Any friend of offeree
An agreement toput a fire on a person's car is a ______: (a) Legal (b) Voidable (c) Valid (d) Illegal



Fresher Jobs | Experienced Jobs | Government Jobs | Walkin Jobs | Company Profiles | Interview Questions | Placement Papers | Companies In India | Consultants In India | Colleges In India | Exams In India | Latest Results | Notifications In India | Call Centers In India | Training Institutes In India | Job Communities In India | Courses In India | Jobs by Keyskills | Jobs by Functional Areas

Testing Articles | Testing Books | Testing Certifications | Testing FAQs | Testing Downloads | Testing Interview Questions | Testing Jobs | Testing Training Institutes

Gate Articles | Gate Books | Gate Colleges | Gate Downloads | Gate Faqs | Gate Jobs | Gate News | Gate Sample Papers | Gate Training Institutes

MBA Articles | MBA Books | MBA Case Studies | MBA Business Schools | MBA Current Affairs | MBA Downloads | MBA Events | MBA Notifications | MBA FAQs | MBA Jobs
MBA Job Consultants | MBA News | MBA Results | MBA Courses | MBA Sample Papers | MBA Interview Questions | MBA Training Institutes

GRE Articles | GRE Books | GRE Colleges | GRE Downloads | GRE Events | GRE FAQs | GRE News | GRE Training Institutes | GRE Sample Papers

IAS Articles | IAS Books | IAS Current Affairs | IAS Downloads | IAS Events | IAS FAQs | IAS News | IAS Notifications | IAS UPSC Jobs | IAS Previous Question Papers
IAS Results | IAS Sample Papers | IAS Interview Questions | IAS Training Institutes | IAS Toppers Interview

SAP Articles | SAP Books | SAP Certifications | SAP Companies | SAP Study Materials | SAP Events | SAP FAQs | SAP Jobs | SAP Job Consultants
SAP Links | SAP News | SAP Sample Papers | SAP Interview Questions | SAP Training Institutes |




Copyright ©2003-2024 CoolInterview.com, All Rights Reserved.
Privacy Policy | Terms and Conditions