|
Related Questions |
View Answer |
|
You deploy System Center Operations Manager 2007 at your company. The company has three Microsoft Exchange Server 2003 computers. You need to ensure that the Exchange administrators are able only to override the configuration of rules and monitors. What should you do? A. Create a user role that is based on the Author profile. Add the Exchange administrators to this new role. B. Create a user role that is based on the Advanced Operator profile. Add the Exchange administrators to this new role. C. Add the Exchange administrators to the Operations Manager Operators user role. D. Add the Exchange administrators to the Operations Manager Administrators user role.
|
View Answer
|
|
You have a System Center Operations Manager 2007 environment. You configure notification subscriptions to send e-mail alert notifications to separate Active Directory, Exchange Server, and SQL Server support teams when errors occur. You need to reduce the number of characters that are displayed in the e-mail notification for all alerts. What should you do? A. In the Notification settings, modify the default notification format for instant messages. B. In the Notification settings, enable Short Message Service (SMS) notifications. C. In the Notification settings, modify the default notification format for e-mail messages. D. In the notification subscription for the Active Directory support team, modify the default notification format for e-mail messages.
|
View Answer
|
|
Your company deploys System Center Operations Manager 2007 agents as part of a computer image. You join all computers in the company to the corporate Active Directory domain. You need to ensure that agents automatically obtain settings from the corporate Active Directory domain at startup. Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.) A. Use the MOMADAdmin utility to publish Management Group information to the corporate Active Directory domain. B. Run the Discovery Wizard. Perform automatic computer discovery to scan Active Directory for installed agents. C. Configure Auto Agent Assignment on the target Management Server to assign desired computers to the target Management Server. D. Configure an Active Directory Group Policy object (GPO) to publish Management Group information to computers in the corporate Active Directory domain.
|
View Answer
|
|
You install System Center Operations Manager 2007 on all your companies servers. You configure Operations Manager 2007 to monitor the health status of all applications. The technical support team reports that they are not receiving e-mail notification when an application fails. You need to ensure that the technical support team receives e-mail notification when an application fails. What should you do? A. Create a new user role that is based on the Advanced Operator profile. Filter a notification subscription to this new role. B. Create a new user role that is based on the Operator profile. Filter a notification subscription to this new role. C. Enable e-mail notification. Create a new notification subscription based on Alert Aging. D. Enable e-mail notification. Create a new notification recipient, and then create a new notification subscription.
|
View Answer
|
|
Your company has two Active Directory domains. One domain is located in the trusted network. The other domain is located in the perimeter network. No trust relationship exists between the two domains. You deploy System Center Operations Manager 2007 in the Active Directory domain on the trusted network. You manually install the agent on an application server that resides in the Active Directory domain in the perimeter network. The agent does not appear in the Operations Console. An error event indicates that the agent is unable to obtain configuration information from the Management Server. You need to configure Operations Manager 2007 to monitor the agent. What should you do? A. Disable mutual authentication in the Operations Console. B. Perform a push installation of the agent to the target server. C. Configure the agent on the application server to use certificate-based authentication. D. On the Management Server, configure Auto Agent Assignment settings. Use the MOMADAdmin utility to publish Management Group information to the Active Directory domain in the perimeter network.
|
View Answer
|
|
You deploy System Center Operations Manager 2007 in your companies Active Directory domain. You manually install an Operations Manager agent on an application server named Server1. Server1 is a member of the Active Directory domain. The agent does not appear in the Pending Management view in the Operations Console. An error message in the Operations Manager Event log on Server1 indicates that the agent is unable to obtain configuration information from the Management Server. You need to ensure that the agent appears in the Pending Management view in the Operations Console. What should you do? A. Select the Review new manual agent installations in pending management view option. B. Configure the agent on Server1 to use certificate-based authentication. C. Add the Management Server action account to the local Administrators group on Server1. Restart the Health Service on Server1. D. Disable mutual authentication in the Operations Console. Restart the Health Service on Server1.
|
View Answer
|
|
Your company has a System Center Operations Manager 2007 environment. The company has four branch offices, which are connected by a wide area network (WAN). The routers that connect the branch offices to the main office experience occasional failures. You need to configure Operations Manager 2007 to discover branch office routers and to monitor for device failure. What should you do? A. Perform automatic discovery by using the Computer and Device Management Wizard to add the branch office routers as monitored objects. B. Perform advanced discovery by using the Computer and Device Management Wizard to add the branch office routers as monitored objects. C. Run the New-CustomMonitoringObject Power Shell command let on the Management Server. Use the Set-Proxy Agent command let to set a proxy agent to remotely monitor branch office routers. D. Run the New-Object Power Shell command let on the Management Server. Use the Set-Proxy Agent command let to set a proxy agent to remotely monitor branch office routers.
|
View Answer
|
|
An improper message having the subject line of Exchange is sent to each user on the Exchange Server 2007 Mailbox server named ExchP4S1. You should clear this message from all mailboxes. Which action will you take? A. From the Exchange Management Console, create a new transport rule named Exchange delete. Set the condition to "when the Subject field contains Exchange". Set the action to "silently drop the message". B. On ExchP4S1, find the message ID of the original message and then run the Remove- Message –Identity <IDnumber> cmdlet. C. Create a new mailbox named TempMailbox that has a folder named Export. Run the Get- Mailbox –Server ExchP4S1 | Export-Mailbox -TargetMailbox TempMailbox -TargetFolder Export SubjectKeywords "Exchange" -DeleteContent cmdlet. D. On ExchP4S1, find the message ID of the original message and then run the Export-Message –Identity <IDnumber> c: emp cmdlet. Delete all of the messages in the directory.
|
View Answer
|
|
Microsoft Exchange Server 2007 provides built-in protection technologies to help keep the e-mail system up and running and better protected from outside threats while allowing employees to work from wherever they are using a variety of clients including Microsoft Outlook, Outlook Web Access, and mobile devices. Your Exchange Server 2007 organization has a resource mailbox named ExecConfRm . All users can schedule meetings for ExecConfRm . You are asked to modify the ExecConfRm settings to make sure that only two users named Lucy and Lily are able to schedule meetings for ExecConfRm. Which cmdlet will you run? A. Set- MailboxCalendarSettings -Identity " ExecConf Rm " - BookInPolicy Lily , Lucy - AllBookInPolicy$false B. Set- MailboxCalendarSettings -Identity " ExecConf Rm " - Request InPolicy Lily , Lucy C. Set- MailboxCalendarSettings -Identity " ExecConf Rm " - RequestOutof Policy Lily, Lucy - AllBookInPolicy $false D. Set- MailboxCalendarSettings -Identity " ExecConf Rm " - ResourceDelegates Lily, Lucy
|
View Answer
|
|
While monitoring your network, you find that the number of RPC operations per second is higher than expected. What tool can you use to analyze this problem? A. Mail Flow Troubleshooter B. Performance Troubleshooter C. Best Practices Analyzer D. Database Recovery Management
|
View Answer
|
|
Exchange Server 2007 makes it easier for IT to deliver new capabilities to their organizations by making the messaging environment easier to manage and more cost efficient. In your Exchange Server 2007 organization, Microsoft ActiveSync is configured on the Exchange servers but is now disabled for users. A user in the Exchange organization has a new mobile device. He would like his device to synchronize with the Exchange servers over a wireless network. You are asked to enable the ActiveSync feature for only this user. Which two ways are possible to accomplish this objective? (Each correct answer presents a complete solution. Choose two.) A. Run the Set-ActiveSyncMailboxPolicy cmdlet. B. Run the Set-CASMailbox cmdlet. C. Use the Active Directory Users and Computers console to enable the ActiveSync feature for the user. D. Use the Exchange Management Console to enable the ActiveSync feature for the user.
|
View Answer
|
|
Exchange Server 2007 offers built-in protective technologies to keep your business moving, reduce spam and viruses, enable confidential communications, and help your company to be compliant. You should allow the owner of each distribution group in your Exchange Server 2007 organization to modify membership for the group. You needn??t to allow the owner to make any other changes. Which action will you take? A. On the Managed By tab of each distribution group, add the owner, and select the Manager can update membership list check box. B. Add the user accounts of the distribution group owners to the Exchange Recipient Administrator role. C. Modify each distribution group by assigning the Send As permission to the owners user account. D. Modify each distribution group by assigning the Write permission to the owners user account.
|
View Answer
|
|
One of your colleagues has read that the value in the % Processor Time counter should not exceed 85 percent. She has therefore configured an alert to trigger when the counter reaches or exceeds that value. The alert triggers frequently. What conclusion should you draw? A. Your colleague has not understood processor usage. B. Your colleague has not set up the counter correctly. C. You need to install a faster processor. D. You need to install another processor to enable multiprocessing.
|
View Answer
|
|
Exchange 2003 Server delivers significant improvements in functionality over Microsoft Exchange 5.5 in key areas affecting accessibility, ease of management, protection, stability, capacity, and performance. Exchange Server 2007 makes it easier for IT to deliver new capabilities to their organizations by making the messaging environment easier to manage and more cost efficient .You are tasked to move a conference room mailbox named Company1 from an Exchange Server 2003 computer to an Exchange Server 2007 computer. In order to convert the Company1 mailbox to an Exchange 2007 resource mailbox, you must make sure that the mailbox is able to be scheduled as a resource. Which two cmdlets will you run? (Each correct answer presents part of the solution. Choose two.) A. Set-Mailbox -Identity " Company1 " -Type Room B. Set- MailboxCalendarSettings -Identity " Company1 " - AutomateProcessing Auto Update C. Set- MailboxCalendarSettings -Identity " Company1 " - AutomateProcessing AutoAccept D. Set-Mailbox -Identity " Company1 " -Type Regular
|
View Answer
|
|
Microsoft Exchange Server 2007 provides built-in protection technologies to help keep the e-mail system up and running and better protected from outside threats while allowing employees to work from wherever they are using a variety of clients including Microsoft Outlook, Outlook Web Access, and mobile devices. You are a network technician for Company Ltd. How to configure your Exchange Server 2007 computer so that a specific distribution group will allow out-of-office responses from the mailboxes of members of the distribution group? A. On the distribution group properties, enable out-of-office responses to be sent to message senders. B. Re-create the distribution group as a security group. C. On the distribution group properties, enable delivery reports to be sent to message senders. D. On the default remote domain policy, enable out-of-office responses.
|
View Answer
|
|
You want to trigger an alert when the number of messages in the mailbox store's receive queue on an Exchange Server 2007 server reaches a defined value. What counter do you select when configuring the alert? (The question uses the notation <performance object>:<counter name>.) A. MSExchangeIS:Messages Queued For Submission B. MSExchangeIS:Receive Queue Size C. MSExchangeIS Mailbox:Messages Queued For Submission D. MSExchangeIS Mailbox:Receive Queue Size
|
View Answer
|
|
Alex works as a network technician. He would configure the conference room resource mailboxes in his company??s Exchange Server 2007 organization to remove attached files from meeting requests. Which cmdlet does he need to run? A. Get-Mailbox - RecipientTypeDetails RoomMailbox ; Set-MailboxCalendarSettings - DeleteNonCalendarItems : $true B. Get-Mailbox - RecipientTypeDetails RoomMailbox | Set- MailboxCalendarSettings - DeleteAttachments: $true C. Get-Mailbox - RecipientTypeDetails RoomMailbox ; Set-MailboxCalendarSettings - DeleteAttachments : $true D. Get-Mailbox - RecipientTypeDetails RoomMailbox | Set- MailboxCalendarSettings -DeleteNonCalendarItems: $true
|
View Answer
|
|
The Company??s Exchange Server 2007 organization has a mail-enabled public folder named Monitoring which is configured to receive automated alerts from this company??s external monitoring system. Each corporate user is able to send e-mail to this public folder. Mail from the monitoring system is being returned with a non-delivery report (NDR). How to make sure that the monitoring alerts are to be received in the Monitoring public folder? A. Use Microsoft Office Outlook to assign anonymous users the permission to create items in the Monitoring public folder. B. Perform the Add-PublicFolderClientPermission -AccessRights: EditOwnedItems cmdlet for anonymous users for the Monitoring public folder. C. Use Microsoft Office Outlook to assign default users the permission to create items in the Monitoring public folder. D. Perform the Set-MailPublicFolder -RequireSenderAuthenticationEnabled: $true cmdlet for the Monitoring public folder.
|
View Answer
|
|
You want to create a performance counter log that records the total number of recipients that have received a message since start-up, the total number of messages delivered to all recipients since start-up, the rate that recipients receive messages, the rate that messages are delivered to all recipients, the total number of messages sent to transport since start-up, and the rate that messages are sent to the transport. What MSExhangeIS Mailbox counters do you add to the log? (Choose all that apply.) A. Local Deliveries B. Local Delivery Rate C. Message Recipients Delivered D. Message Recipients Delivered/Sec E. Messages Delivered F. Messages Delivered/Sec G. Logon Operations/Sec H. Messages Sent I. Messages Sent/Sec
|
View Answer
|
|
Exchange Server 2007 provides a collaboration environment that delivers secure messaging capabilities to recipients inside and outside an organization. In your Exchange Server 2007 organization, a report of the Exchange server settings shows that the storage limits for the mailbox stores are not all the same. You should create an Exchange Management Shell script that will reconfigure all the Exchange server mailbox stores to have identical storage limits. In order to achieve this objective, how will you create the script? A. Redirect the output of the Get-Mailbox cmdlet to the Set-MailboxDatabase cmdlet with the proper parameters. B. Redirect the output of the Get-ExchangeServer cmdlet to the Set-Mailbox Database cmdlet with the proper parameters. C. Redirect the output of the Get-MailboxDatabase cmdlet to the Set-MailboxDatabase cmdlet with the appropriate parameters. D. Redirect the output of the Get-MailboxDatabase cmdlet to the Set-Mailbox cmdlet with the proper parameters.
|
View Answer
|