|
Related Questions |
View Answer |
|
Exchange Server 2007 makes it easier for IT to deliver new capabilities to their organizations by making the messaging environment easier to manage and more cost efficient. In your Exchange Server 2007 organization, Microsoft ActiveSync is configured on the Exchange servers but is now disabled for users. A user in the Exchange organization has a new mobile device. He would like his device to synchronize with the Exchange servers over a wireless network. You are asked to enable the ActiveSync feature for only this user. Which two ways are possible to accomplish this objective? (Each correct answer presents a complete solution. Choose two.) A. Run the Set-ActiveSyncMailboxPolicy cmdlet. B. Run the Set-CASMailbox cmdlet. C. Use the Active Directory Users and Computers console to enable the ActiveSync feature for the user. D. Use the Exchange Management Console to enable the ActiveSync feature for the user.
|
View Answer
|
|
Exchange Server 2007 offers built-in protective technologies to keep your business moving, reduce spam and viruses, enable confidential communications, and help your company to be compliant. You should allow the owner of each distribution group in your Exchange Server 2007 organization to modify membership for the group. You needn??t to allow the owner to make any other changes. Which action will you take? A. On the Managed By tab of each distribution group, add the owner, and select the Manager can update membership list check box. B. Add the user accounts of the distribution group owners to the Exchange Recipient Administrator role. C. Modify each distribution group by assigning the Send As permission to the owners user account. D. Modify each distribution group by assigning the Write permission to the owners user account.
|
View Answer
|
|
One of your colleagues has read that the value in the % Processor Time counter should not exceed 85 percent. She has therefore configured an alert to trigger when the counter reaches or exceeds that value. The alert triggers frequently. What conclusion should you draw? A. Your colleague has not understood processor usage. B. Your colleague has not set up the counter correctly. C. You need to install a faster processor. D. You need to install another processor to enable multiprocessing.
|
View Answer
|
|
Exchange 2003 Server delivers significant improvements in functionality over Microsoft Exchange 5.5 in key areas affecting accessibility, ease of management, protection, stability, capacity, and performance. Exchange Server 2007 makes it easier for IT to deliver new capabilities to their organizations by making the messaging environment easier to manage and more cost efficient .You are tasked to move a conference room mailbox named Company1 from an Exchange Server 2003 computer to an Exchange Server 2007 computer. In order to convert the Company1 mailbox to an Exchange 2007 resource mailbox, you must make sure that the mailbox is able to be scheduled as a resource. Which two cmdlets will you run? (Each correct answer presents part of the solution. Choose two.) A. Set-Mailbox -Identity " Company1 " -Type Room B. Set- MailboxCalendarSettings -Identity " Company1 " - AutomateProcessing Auto Update C. Set- MailboxCalendarSettings -Identity " Company1 " - AutomateProcessing AutoAccept D. Set-Mailbox -Identity " Company1 " -Type Regular
|
View Answer
|
|
Microsoft Exchange Server 2007 provides built-in protection technologies to help keep the e-mail system up and running and better protected from outside threats while allowing employees to work from wherever they are using a variety of clients including Microsoft Outlook, Outlook Web Access, and mobile devices. You are a network technician for Company Ltd. How to configure your Exchange Server 2007 computer so that a specific distribution group will allow out-of-office responses from the mailboxes of members of the distribution group? A. On the distribution group properties, enable out-of-office responses to be sent to message senders. B. Re-create the distribution group as a security group. C. On the distribution group properties, enable delivery reports to be sent to message senders. D. On the default remote domain policy, enable out-of-office responses.
|
View Answer
|
|
You want to trigger an alert when the number of messages in the mailbox store's receive queue on an Exchange Server 2007 server reaches a defined value. What counter do you select when configuring the alert? (The question uses the notation <performance object>:<counter name>.) A. MSExchangeIS:Messages Queued For Submission B. MSExchangeIS:Receive Queue Size C. MSExchangeIS Mailbox:Messages Queued For Submission D. MSExchangeIS Mailbox:Receive Queue Size
|
View Answer
|
|
Alex works as a network technician. He would configure the conference room resource mailboxes in his company??s Exchange Server 2007 organization to remove attached files from meeting requests. Which cmdlet does he need to run? A. Get-Mailbox - RecipientTypeDetails RoomMailbox ; Set-MailboxCalendarSettings - DeleteNonCalendarItems : $true B. Get-Mailbox - RecipientTypeDetails RoomMailbox | Set- MailboxCalendarSettings - DeleteAttachments: $true C. Get-Mailbox - RecipientTypeDetails RoomMailbox ; Set-MailboxCalendarSettings - DeleteAttachments : $true D. Get-Mailbox - RecipientTypeDetails RoomMailbox | Set- MailboxCalendarSettings -DeleteNonCalendarItems: $true
|
View Answer
|
|
The Company??s Exchange Server 2007 organization has a mail-enabled public folder named Monitoring which is configured to receive automated alerts from this company??s external monitoring system. Each corporate user is able to send e-mail to this public folder. Mail from the monitoring system is being returned with a non-delivery report (NDR). How to make sure that the monitoring alerts are to be received in the Monitoring public folder? A. Use Microsoft Office Outlook to assign anonymous users the permission to create items in the Monitoring public folder. B. Perform the Add-PublicFolderClientPermission -AccessRights: EditOwnedItems cmdlet for anonymous users for the Monitoring public folder. C. Use Microsoft Office Outlook to assign default users the permission to create items in the Monitoring public folder. D. Perform the Set-MailPublicFolder -RequireSenderAuthenticationEnabled: $true cmdlet for the Monitoring public folder.
|
View Answer
|
|
You want to create a performance counter log that records the total number of recipients that have received a message since start-up, the total number of messages delivered to all recipients since start-up, the rate that recipients receive messages, the rate that messages are delivered to all recipients, the total number of messages sent to transport since start-up, and the rate that messages are sent to the transport. What MSExhangeIS Mailbox counters do you add to the log? (Choose all that apply.) A. Local Deliveries B. Local Delivery Rate C. Message Recipients Delivered D. Message Recipients Delivered/Sec E. Messages Delivered F. Messages Delivered/Sec G. Logon Operations/Sec H. Messages Sent I. Messages Sent/Sec
|
View Answer
|
|
Exchange Server 2007 provides a collaboration environment that delivers secure messaging capabilities to recipients inside and outside an organization. In your Exchange Server 2007 organization, a report of the Exchange server settings shows that the storage limits for the mailbox stores are not all the same. You should create an Exchange Management Shell script that will reconfigure all the Exchange server mailbox stores to have identical storage limits. In order to achieve this objective, how will you create the script? A. Redirect the output of the Get-Mailbox cmdlet to the Set-MailboxDatabase cmdlet with the proper parameters. B. Redirect the output of the Get-ExchangeServer cmdlet to the Set-Mailbox Database cmdlet with the proper parameters. C. Redirect the output of the Get-MailboxDatabase cmdlet to the Set-MailboxDatabase cmdlet with the appropriate parameters. D. Redirect the output of the Get-MailboxDatabase cmdlet to the Set-Mailbox cmdlet with the proper parameters.
|
View Answer
|
|
A former employee is sending e-mails to people in your organization attempting to recruit them to a new start-up company that he has created. E-mails are transmitted from an Internet service provider's SMTP server that is also used by several of your organization's clients. Management has asked you to block all e-mails sent from the new company's e-mail domain. Which of the following technologies should you implement? A. Attachment filtering B. Connection filtering C. Sender filtering D. Recipient filtering
|
View Answer
|
|
Which of the following Receive connector usage types uses Exchange Server authentication as its default authentication mechanism? A. Client B. Internal C. Internet D. Partner
|
View Answer
|
|
A senior manager at your company is under suspicion of forwarding sensitive information to a competitor. The chief executive officer (CEO) wants to be provided with a copy of all messages that the senior manager sends but does not want the senior manager to be aware that he is under surveillance. Which of the following actions would you configure when setting up a transport rule to screen the senior manager's messages? A. Blind carbon copy (Bcc) the message to addresses B. Add a recipient in the To field addresses C. Redirect the message To addresses D. Silently drop the message
|
View Answer
|
|
You are asked to set a public folder to replicate on weekend, for both Saturday and Sunday. By the way, make sure that posts will be denied when the folder's size reaches to 500 MB. Which option should you run for the public folder? A. Set- PublicFolder - PostStorageQuota 500MB. UseDatabaseRetentionDefaults : $true B. Set- PublicFolder - PostStorageQuota 500MB. ReplicationSchedule "Saturday.12:00 AM Sunday.11:59 PM" C. Set- PublicFolder - MaxItemSize 500MB. ReplicationSchedule "Saturday.12:00 AM- Sunday.11:55 PM" D. Set- PublicFolder - StorageQuota 500MB. ReplicationSchedule "Saturday.12:00 AM- Sunday.11:59 PM"
|
View Answer
|
|
You have configured attachment filtering on your organization's edge transport servers. Because some senders are transmitting files that are not harmful, you want to allow hem to be informed that the message containing the attachment has been rejected by your organization. Which of the following configuration settings should you make? A. Configure the attachment filtering behavior action to Strip B. Configure the attachment filtering behavior action to SilentDelete C. Configure the attachment filtering behavior action to Reject D. Configure a ConnectorException
|
View Answer
|
|
What does the following Exchange Management Shell command do? New-DistributionGroup -Name "Manufacturing" -OrganizationalUnit Users –SAMAccountName Manufacturing -Type Security A. Creates a mail-enabled local security group called Manufacturing B. Creates a mail-enabled universal security group called Manufacturing C. Creates a universal distribution group called Manufacturing D. Creates a dynamic distribution group called Manufacturing
|
View Answer
|
|
In Microsoft Exchange Server 2007,the Hub Transport server role was referred to as the Bridgehead server role. Deployed inside your Active Directory directory service forest, the Hub Transport server role handles all mail flow inside the organization, applies transport rules, applies journaling policies, and delivers messages to a recipient's mailbox. Messages that are sent to the Internet are relayed by the Hub Transport server to the Edge Transport server role that is deployed in the perimeter network. Messages that are received from the Internet are processed by the Edge Transport server before they are relayed to the Hub Transport server. Company has 5 Active Directory sites that are configured as shown in the exhibit. Each site has an Exchange Server 2007 Mailbox server and Hub Transport server. Currently all outbound e-mail traffic goes through the New York site. Mike is required to reconfigure the mail flow so that all outbound e-mail messages that are sent from users in the Seattle office are sent out of your Exchange organization through ExchHub5 in the Chicago office. What should Mike run? A. Set- AdsiteLink -Id DNVR-CHI - ADCost 10 B. Set- SendConnector -Identity 'Seattle' - AddressSpaces:'smtp :*;1' - DNSRoutingEnabled:$false -SourceTransportServers:'ExchHub1' C. New- SendConnector -Name 'Chicago' - AddressSpaces:'smtp :*;1' - DNSRoutingEnabled:$true -SourceTransportServers:'ExchHub5' D. Set- AdSitE.Identity Chicago - HubSiteEnabled:$true
|
View Answer
|
|
You are writing a PowerShell script that takes the identity of a mailbox as a parameter, moves the mailbox to the database First Glasgow Mailbox Database in the storage group First Storage Group, and removes the mailbox from its original location. What should be the contents of the PowerShell script file? A. Param( [string] $Identity ) Move-Mailbox -Identity $IdentityDTargetDatabase OFirst Storage GroupFirst Glasgow Mailbox DatabaseO -SourceMailboxCleanupOptions DeleteSourceMailbox B. Move-Mailbox -Identity $Identity DTargetDatabase OFirst Storage Group First Glasgow Mailbox DatabaseO -SourceMailboxCleanupOptions DeleteSourceMailbox Param( [string] $Identity ) C. Move-Mailbox -Identity $Identity DTargetDatabase OFirst Storage Group First Glasgow Mailbox DatabaseO -SourceMailboxCleanupOptions DeleteSourceMailbox D. Param( [string] $Identity ) Move-Mailbox -Identity $Identity DTargetDatabase OFirst Storage Group First Glasgow Mailbox DatabaseO
|
View Answer
|
|
ActiveSync is a data synchronization program developed by Microsoft for use with its Microsoft Windows line of operating systems. Originally released under the name "Handheld PC Explorer" in 1996, it provides users of Microsoft Windows a way to transport documents, calendars, contact lists and email between their desktop computer and a mobile device, such as a Handheld PC, mobile phone, or any other portable devices that support the ActiveSync protocol. Company’s MS ActiveSync policy requires inactive users to provide their password each 15 minutes. Mr. Moore is the CEO of Company Ltd., his mobile device should be exempted from the inactivity timer. Now you have to exempt Moore'S mobile device from the timeout policy while maintaining the other corporate policy settings. What should you do? A. Remove the corporate ActiveSync policy from Mr. Moore's mailbox. B. Create a new ActiveSync policy that has the required settings, and apply it to the executives mailbox. C. Reset Mr. Moore's mobile device and refuse the corporate ActiveSync policy. D. Change the password setting on Mr. Moore's mobile device to take precedence of the ActiveSync policy.
|
View Answer
|
|
Consumers found that their licit message were sened to the Junk folders of the MS-Office Outlook client application. You can make sure that the sender's email address were on the Outlook Safe-Senders List. Now you are asked to solve this problem, at first you have to make the consumer-defined Safe-senders List to be used while the email was delivered on the Exchange Edge Transport server. How to achieve it? A. Enable anti-spam updates on the Edge Transport server. B. On the Edge Transport server content filter configuration, enable authenticated message bypass. C. Run the mailbox server content filter configuration and enable the Outlook E-mail Postmark validation. D. Run the Update-SafeList cmdlet for each users mailbox on the Mailbox server.
|
View Answer
|