|
Related Questions |
View Answer |
|
A mailbox has 40 KB of mailbox rules. You need to move the mailbox from your Exchange Server 2007 computer to an Exchange Server 2003 computer at a remote site. How should you achieve this goal? A. Use the Exchange Task wizard in Exchange Server 2003. B. Use the Move Mailbox wizard in Exchange Server 2007. C. Run the Move-Mailbox cmdlet with the IgnoreRuleLimitErrors parameter. D. Run the Move-Mailbox cmdlet with the IgnorePolicyMatch parameter.
|
View Answer
|
|
In your Exchange Server 2007 organization, a report of the Exchange server settings indicates that the storage limits for the mailbox stores are not all the same. You need to create an Exchange Management Shell script that will reconfigure all of the Exchange server mailbox stores to have identical storage limits. How should you create the script to accomplish this goal? A. Redirect the output of the Get-ExchangeServer cmdlet to the Set-Mailbox Database cmdlet with the appropriate parameters. B. Redirect the output of the Get-MailboxDatabase cmdlet to the Set-Mailbox cmdlet with the appropriate parameters. C. Redirect the output of the Get-MailboxDatabase cmdlet to the Set-MailboxDatabase cmdlet with the appropriate parameters. D. Redirect the output of the Get-Mailbox cmdlet to the Set-MailboxDatabase cmdlet with the appropriate parameters.
|
View Answer
|
|
Your company normally does not allow out-of-office messages to be sent to users outside of your Exchange 2007 organization. The company makes an exception for a business partner named Northwind Traders. The SMTP domain for Northwind Traders is northwindtraders.com. You need to configure your Exchange organization to allow out-of-office messages to be sent to e-mail addresses in the northwindtraders.com domain. What should you do? A. Add northwindtraders.com as a remote domain and set the appropriate options. B. Add northwindtraders.com as an accepted domain and set the appropriate options. C. Create a transport rule and set the appropriate options. D. Create a Send connector for northwindtraders.com and set the appropriate options.
|
View Answer
|
|
A new virus is discovered in your Exchange Server 2007 organization. The file extension is .ext for this virus. The current settings for attachment filtering are configured to delete specified attachments and allow the message to be delivered. However the virus files are not being filtered. You must stop the spread of this new virus. Neither the attachment nor the e-mail message should reach the e-mail recipient. The message that contains the virus should not generate a non-delivery report (NDR). You need to add a filter for the file extension of the virus. Which two cmdlets should you run? (Each correct answer presents part of the solution. Choose two.) A. Add- AttachmentFilterEntry -Name *.ext -type ContentType B. Add- AttachmentFilterEntry -Name *.ext -type FileName C. Set- AttachmentFilterListConfig -Action Reject - RejectMessage “None” D. Set- AttachmentFilterListConfig -Action SilentDelete
|
View Answer
|
|
Your native Exchange Server 2007 environment has the following server roles installed: Three Mailbox servers One Hub Transport server named ExchHub1 One Edge Transport server named ExchEdge1 The human resources (HR) department uses a Windows SMTP relay with an IP address of 192.168.10.25. E-mail from the HR department to all employees must be sent from this relay. You need to configure your Exchange environment to accept e-mail messages from the internal HR SMTP relay. Which cmdlet should you run? A. New- ReceiveConnector -Name ‘HR e-mail’ -Server ExchHub1 - RemoteIPRanges 192.168.10.25 - AuthMechanism BasicAuth -Usage Internal B. New- ReceiveConnector -Name ‘HR e-mail’ -Server ExchHub1 - RemoteIPRanges 192.168.10.25 - AuthMechanism BasicAuth -Usage Partner C. New- ReceiveConnector -Name ‘HR e-mail’ -Server ExchEdge1 - RemoteIPRanges 192.168.10.25 - AuthMechanism BasicAuth -Usage Partner D. New- ReceiveConnector -Name ‘HR e-mail’ -Server ExchEdge1 - RemoteIPRanges 192.168.10.25 - AuthMechanism BasicAuth -Usage External
|
View Answer
|
|
ou are preparing to configure Outlook Anywhere on your existing Exchange Server 2007 organization. A Mailbox server named ExchMb1 contains all of the mailboxes that will be accessed by users who use Outlook Anywhere. A Client Access server named ExchCas1 is available from the Internet. Users will access Outlook Anywhere with mail .contoso.com as the host (A) name. You need to configure the Exchange organization so that Outlook Anywhere can be used by Microsoft Office Outlook clients from the Internet. Which three actions should you perform? (Each correct answer presents part of the solution. Choose three.) A. Install RPC over HTTP Proxy on ExchCas1. B. Install a valid SSL certificate for ExchMb1 on the default Web site. C. Install a valid SSL certificate for ExchCas1 on the default Web site. D. Install RPC over HTTP Proxy on ExchMb1. E. Run the Enable-OutlookAnywherE.Server:ExchCas1 -ExternalHostName:mail.contoso.com – SSLOffLoading:$falsE.ExternalAuthenticationMethod:Basic cmdlet. F. Run the Enable-Outlook4nywherE.Server:ExchMb1 -ExternalHostName:mail.contoso.com – SSLOffLoading:$truE.ExternalAuthenticationMethod:Basic cmdlet.
|
View Answer
|
|
You create a new message classification named Customer Data. Messages that have this classification should not be sent outside the company. You need to redirect to the CustData mailbox all outbound e-mail messages that have the Customer Data classification. What should you do? A. Run the Set-MessageClassification -Identity ‘Customer Data’ -UserDisplayEnabled:$true cmdlet. B. Add read permissions to the Customer Data message classification by running the Set- MessageClassification cmdlet. C. Run the Set-MessageClassification -Identity ‘Customer Data’ RetainClassificationEnabled:$true cmdlet. D. Create a new transport rule to redirect to the CustData mailbox all messages that are sent from internal users to only users outside the company and that are marked with the Customer Data classification.
|
View Answer
|
|
ou need to configure a public folder to replicate on only Saturdays and Sundays. You also need to ensure that posts will be denied after the folders size reaches 500 MB. Which cmdlet should you run for the public folder? A. Set- PublicFolder - StorageQuota 500MB. ReplicationSchedule “Saturday.12:00 AM- Sunday.11:59 PM” B. Set- PublicFolder - PostStorageQuota 500MB. ReplicationSchedule “Saturday.12:00 AM- Sunday.1 1:59 PM” C. Set- PublicFolder - MaxltemSize 500MB. ReplicationSchedule “Saturday.12:00AM- Sunday.11:59 PM” D. Set- PublicFolder - PostStorageQuota 500MB. UseDatabaseRetentionDefaults : $true
|
View Answer
|
|
Your Exchange Server 2007 organization contains two load balanced Client Access servers. Outlook Anywhere users on the corporate network have access to availability information. You need to allow access to availability information for users outside the corporate network who connect by using Outlook Anywhere. What should you do? A. Run the Set-CASMailbox cmdlet with the appropriate parameters on each of the Client Access servers. B. Add a replica of the Exchange organizations Free/Busy public folder to at least one of the Mailbox servers in the same site as the Client Access servers. C. Add the Full Details read permission to each users calendar properties by using the Microsoft Office Outlook client. D. Set the external URL by running the Set-WebServicesVirtualDirectory cmdlet on each of the Client Access servers.
|
View Answer
|
|
You are preparing to configure e-mail retention on three managed custom folders for all mailboxes on an Exchange Server 2007 computer named Exch1. You perform the following actions. Create three managed custom folders. Create managed content settings for each folder, and configure the required retention settings. Create a new managed folder mailbox policy named MailRet. Add each managed custom folder to the MailRet policy. Configure the managed folder assistant for Exch1. You need to finish configuring the messaging records management (MRM) retention settings so that the three folders are available for the mailboxes on Exch1. What should you do? A. For each mailbox on Exch1, select the Enable retention hold for items in this mailbox check box. B. For each mailbox on Exch1, add the MailRet policy. C. Add managed content settings to the three managed custom folders. D. Create a new managed folder mailbox policy for each of the three managed custom folders.
|
View Answer
|
|
Your companies Microsoft ActiveSync policy is configured to require inactive users to provide their password every 10 minutes. A company executive requests that her mobile device be exempt from the inactivity timer. You need to exempt the executives mobile device from the timeout policy while maintaining the other corporate policy settings. What should you do? A. Remove the corporate ActiveSync policy from the executives mailbox. B. Create a new ActiveSync policy that has the required settings, and apply it to the executives mailbox. C. Change the password setting on the executives mobile device to override the ActiveSync policy. D. Reconfigure the executives mobile device for ActiveSync, and do not apply the corporate ActiveSync policy.
|
View Answer
|
|
Users report that legitimate e-mail messages are being delivered to their Microsoft Office Outlook Junk E-mail folders. You confirm that the e-mail addresses of the message senders were on the Outlook Safe Senders List. You need to allow user -defined Safe Senders Lists to be used during the Exchange Edge Transport server message delivery. What should you do? A. On the Mailbox server content filter configuration, enable Outlook E-mail Postmark validation. B. On the Edge Transport server content filter configuration, enable authenticated message bypass. C. Enable anti-spam updates on the Edge Transport server. D. Run the Update-SafeList cmdlet for each users mailbox on the Mailbox server.
|
View Answer
|
|
Which new Windows 2000 features lessen the need for rescue boot disks? [Check all correct answers]
A. Safe Boot B. System file protector C. Recovery mode console D. Kerberos
|
View Answer
|
|
Jachamji has two users in different departments who need to communicate securely. These users need their communications on the LAN to each other to be both mutually authenticated and encrypted. However, they both need to communicate in the clear with other users on the LAN. How should Jachamji proceed?
A. Use VPN features to create a PPTP tunnel between the users computers. B. Secure the shared resources on both users' computers with local groups and restrict access to the shared resources to the two users. C. Put the two users on an isolated subnet. Enable packet filtering at the switch. D. Define and implement an IPSec policy for both users computers.
|
View Answer
|
|
You have just received 50 PC's with Windows ME on them. They also have dual 3.0GHZ processors in them. You decide that you want to upgrade them all up to Windows 2000 Professional. After running set up on a machine, you realize that only one of the processors is being seen by the OS what do you do next.
A. Run sysprep.exe update the machines after deployment B. Run sysprep.exe with -pnp option C. Use device manager to update the system to recognize the second processor. Then run sysprep.exe. D. Run unattend.txt
|
View Answer
|
|
Windows NT 4.0 is currently installed on the system you are using on an NTFS partition. You want to install Windows 2000 Professional and dual boot NT 4.0 and 2000 professional. What do you need to do?
A. Install Windows 2000 on the same folder that Windows NT is installed in B. Install Windows 2000 on a separate partition from Windows NT 4.0 C. Upgrade Windows NT 4.0 to SP4 or later then install Windows 2000. D. This cannot be accomplished
|
View Answer
|
|
You have forgotten a "share name". You need to locate a file in that share. How can you quickly see a list of all shares on your system?
A. Browse to your system through Network Neighborhood and you will see all of the shares. B. Using the computer management tool in the Administrative tools group in Control Panel, you will find a tab to view shared folders under system tools. C. Using the computer management tool in the Administrative tools group in Control Panel, you will find a tab to view shared folders under Storage D. Using Windows Explorer, choose shared folders from the view menu.
|
View Answer
|
|
You need to test applications in both Windows 2000 and Windows NT 4.0. Currently you have Windows NT 4.0 Workstation installed on several computers. You will also be installing Windows 2000 Professional on a separate partition (D:) and dual-booting between the two operating systems. After installing Windows 2000 on D: and converting the partition to NTFS, what must be done to ensure that you can access data on the D: drive when booted into Windows NT Workstation?
A. You must upgrade the disk to a dynamic disk. In order to allow other operating systems access to volumes that have been formatted as NTFS under Windows 2000, the disk must first be converted to a dynamic disk. B. You must upgrade the installation of Windows NT Workstation to Service Pack 4 or greater. Compatability with the new version of NTFS used in Windows 2000 is provided to Windows NT 4.0 systems by Service Pack 4 and later Service Packs. C. You must add the special group Everyone to the Pre-Windows 2000 Compatible Access security group. In order to provide users running Windows NT 4.0 access to volumes that have been formatted as NTFS under Windows 2000, you must weaken permissions in this fashion. D. You cannot grant access to volumes that have been formatted as NTFS under Windows 2000 to users who are running Windows NT 4.0. If you wish to grant access to these users, you must convert the volume to either FAT or FAT32 from Disk Manager.
|
View Answer
|
|
Which of the following approaches to data gathering will produce the most usable performance baseline for a Windows NT network server? A. Using the Chart View in Performance Monitor, collect computer and network utilization statistics every 15 minutes for two working days. B. Using the Log View in Performance Monitor, collect processor, memory, logicaldisk, and network counters every 15 minutes for two working days. C. Using the Chart View in Performance Monitor, collect computer and network utilization statistics every hour for a week. D. Using the Log View in Performance Monitor, collect processor, memory, logicaldisk, and network counters every hour for a week.
|
View Answer
|