Sponsored Links

Interview Questions



INTERVIEW QUESTIONS CERTIFICATION EXAMS MICROSOFT CERTIFICATION EXAMS DETAILS

Question: You need to configure your Exchange Server 2007 computer so that a specific distribution group
will allow out-of-office responses from the mailboxes of members of the distribution group. What
should you do?
A. On the distribution group properties, enable out-of-office responses to be sent to message
senders.
B. On the distribution group properties, enable delivery reports to be sent to message senders.
C. On the default remote domain policy, enable out-of-office responses.
D. Re-create the distribution group as a security group.

Answer: A. On the distribution group properties, enable out-of-office responses to be sent to message
senders.

Category Microsoft Certification Exams Interview Questions & Answers - Exam Mode / Learning Mode
Rating (0.2) By 9644 users
Added on 7/30/2015
Views 69310
Rate it!

Question: You need to configure your Exchange Server 2007 computer so that a specific distribution group
will allow out-of-office responses from the mailboxes of members of the distribution group. What
should you do?
A. On the distribution group properties, enable out-of-office responses to be sent to message
senders.
B. On the distribution group properties, enable delivery reports to be sent to message senders.
C. On the default remote domain policy, enable out-of-office responses.
D. Re-create the distribution group as a security group.


Answer:

A. On the distribution group properties, enable out-of-office responses to be sent to message
senders. Source: CoolInterview.com



If you have the better answer, then send it to us. We will display your answer after the approval.
Rules to Post Answers in CoolInterview.com:-
  • There should not be any Spelling Mistakes.
  • There should not be any Gramatical Errors.
  • Answers must not contain any bad words.
  • Answers should not be the repeat of same answer, already approved.
  • Answer should be complete in itself.
Name :*
Email Id :*
Answer :*
Verification Code Code Image - Please contact webmaster if you have problems seeing this image code Not readable? Load New Code
Process Verification Enter the above shown code: *
Inform me about updated answers to this question

Related Questions
View Answer
You need to configure the conference room resource mailboxes in your Exchange Server 2007
organization to remove attached files from meeting requests. Which cmdlet should you run?
A. Get-Mailbox - RecipientTypeDetails RoomMailbox; Set-MailboxCalendarSettings –
DeleteAttachments : $true
B. Get-Mailbox - RecipientTypeDetails RoomMailbox I Set- MailboxCalendarSettings –
DeleteAttachments: $true
C. Get-Mailbox - RecipientTypeDetails RoomMailbox I Set- MailboxCalendarSettings –
DeleteNonCalendarltems: $true
D. Get-Mailbox - RecipientTypeDetails RoomMailbox; Set-MailboxCalendarSettings –
DeleteNonCalendarltems : $true
View Answer
Your company’s Exchange Server 2007 organization has a mail-enabled public folder named
Monitoring. The folder is configured to receive automated alerts from the companys external
monitoring system. All corporate users can send e-mail to this public folder. Mail from the
monitoring system is being returned with a non-delivery report (NDR). You need to ensure that
the monitoring alerts will be received in the Monitoring public folder. What should you do?
A. Use Microsoft Office Outlook to assign anonymous users the permission to create items in the
Monitoring public folder.
B. Use Microsoft Office Outlook to assign default users the permission to create items in the
Monitoring public folder.
C. Run the Set-MailPublicFolder -RequireSenderAuthenticationEnabled: $true cmdlet for the
Monitoring public folder.
D. Run the Add-PublicFolderClientPermission -AccessRights: EditOwnedItems cmdlet for
anonymous users for the Monitoring public folder.
View Answer
A mailbox has 40 KB of mailbox rules. You need to move the mailbox from your Exchange Server
2007 computer to an Exchange Server 2003 computer at a remote site. How should you achieve
this goal?
A. Use the Exchange Task wizard in Exchange Server 2003.
B. Use the Move Mailbox wizard in Exchange Server 2007.
C. Run the Move-Mailbox cmdlet with the IgnoreRuleLimitErrors parameter.
D. Run the Move-Mailbox cmdlet with the IgnorePolicyMatch parameter.
View Answer
In your Exchange Server 2007 organization, a report of the Exchange server settings indicates
that the storage limits for the mailbox stores are not all the same. You need to create an
Exchange Management Shell script that will reconfigure all of the Exchange server mailbox stores
to have identical storage limits. How should you create the script to accomplish this goal?
A. Redirect the output of the Get-ExchangeServer cmdlet to the Set-Mailbox Database cmdlet
with the appropriate parameters.
B. Redirect the output of the Get-MailboxDatabase cmdlet to the Set-Mailbox cmdlet with the
appropriate parameters.
C. Redirect the output of the Get-MailboxDatabase cmdlet to the Set-MailboxDatabase cmdlet
with the appropriate parameters.
D. Redirect the output of the Get-Mailbox cmdlet to the Set-MailboxDatabase cmdlet with the
appropriate parameters.
View Answer
Your company normally does not allow out-of-office messages to be sent to users outside of your
Exchange 2007 organization. The company makes an exception for a business partner named
Northwind Traders. The SMTP domain for Northwind Traders is northwindtraders.com. You need
to configure your Exchange organization to allow out-of-office messages to be sent to e-mail
addresses in the northwindtraders.com domain. What should you do?
A. Add northwindtraders.com as a remote domain and set the appropriate options.
B. Add northwindtraders.com as an accepted domain and set the appropriate options.
C. Create a transport rule and set the appropriate options.
D. Create a Send connector for northwindtraders.com and set the appropriate options.
View Answer
A new virus is discovered in your Exchange Server 2007 organization. The file extension is .ext
for this virus. The current settings for attachment filtering are configured to delete specified
attachments and allow the message to be delivered. However the virus files are not being filtered.
You must stop the spread of this new virus. Neither the attachment nor the e-mail message
should reach the e-mail recipient. The message that contains the virus should not generate a
non-delivery report (NDR). You need to add a filter for the file extension of the virus. Which two
cmdlets should you run? (Each correct answer presents part of the solution. Choose two.)
A. Add- AttachmentFilterEntry -Name *.ext -type ContentType
B. Add- AttachmentFilterEntry -Name *.ext -type FileName
C. Set- AttachmentFilterListConfig -Action Reject - RejectMessage “None”
D. Set- AttachmentFilterListConfig -Action SilentDelete
View Answer
Your native Exchange Server 2007 environment has the following server roles installed:
Three Mailbox servers
One Hub Transport server named ExchHub1
One Edge Transport server named ExchEdge1
The human resources (HR) department uses a Windows SMTP relay with an IP address of
192.168.10.25. E-mail from the HR department to all employees must be sent from this relay.
You need to configure your Exchange environment to accept e-mail messages from the internal
HR SMTP relay.
Which cmdlet should you run?
A. New- ReceiveConnector -Name ‘HR e-mail’ -Server ExchHub1 - RemoteIPRanges
192.168.10.25 - AuthMechanism BasicAuth -Usage Internal
B. New- ReceiveConnector -Name ‘HR e-mail’ -Server ExchHub1 - RemoteIPRanges
192.168.10.25 - AuthMechanism BasicAuth -Usage Partner
C. New- ReceiveConnector -Name ‘HR e-mail’ -Server ExchEdge1 - RemoteIPRanges
192.168.10.25 - AuthMechanism BasicAuth -Usage Partner
D. New- ReceiveConnector -Name ‘HR e-mail’ -Server ExchEdge1 - RemoteIPRanges
192.168.10.25 - AuthMechanism BasicAuth -Usage External
View Answer
ou are preparing to configure Outlook Anywhere on your existing Exchange Server 2007
organization. A Mailbox server named ExchMb1 contains all of the mailboxes that will be
accessed by users who use Outlook Anywhere. A Client Access server named ExchCas1 is
available from the Internet. Users will access Outlook Anywhere with mail .contoso.com as the
host (A) name. You need to configure the Exchange organization so that Outlook Anywhere can
be used by Microsoft Office Outlook clients from the Internet. Which three actions should you
perform? (Each correct answer presents part of the solution. Choose three.)
A. Install RPC over HTTP Proxy on ExchCas1.
B. Install a valid SSL certificate for ExchMb1 on the default Web site.
C. Install a valid SSL certificate for ExchCas1 on the default Web site.
D. Install RPC over HTTP Proxy on ExchMb1.
E. Run the Enable-OutlookAnywherE.Server:ExchCas1 -ExternalHostName:mail.contoso.com –
SSLOffLoading:$falsE.ExternalAuthenticationMethod:Basic cmdlet.
F. Run the Enable-Outlook4nywherE.Server:ExchMb1 -ExternalHostName:mail.contoso.com –
SSLOffLoading:$truE.ExternalAuthenticationMethod:Basic cmdlet.
View Answer
You create a new message classification named Customer Data. Messages that have this
classification should not be sent outside the company. You need to redirect to the CustData
mailbox all outbound e-mail messages that have the Customer Data classification. What should
you do?
A. Run the Set-MessageClassification -Identity ‘Customer Data’ -UserDisplayEnabled:$true
cmdlet.
B. Add read permissions to the Customer Data message classification by running the Set-
MessageClassification cmdlet.
C. Run the Set-MessageClassification -Identity ‘Customer Data’
RetainClassificationEnabled:$true cmdlet.
D. Create a new transport rule to redirect to the CustData mailbox all messages that are sent
from internal users to only users outside the company and that are marked with the Customer
Data classification.

View Answer
ou need to configure a public folder to replicate on only Saturdays and Sundays. You also need
to ensure that posts will be denied after the folders size reaches 500 MB. Which cmdlet should
you run for the public folder?
A. Set- PublicFolder - StorageQuota 500MB. ReplicationSchedule “Saturday.12:00 AM-
Sunday.11:59 PM”
B. Set- PublicFolder - PostStorageQuota 500MB. ReplicationSchedule “Saturday.12:00 AM-
Sunday.1 1:59 PM”
C. Set- PublicFolder - MaxltemSize 500MB. ReplicationSchedule “Saturday.12:00AM-
Sunday.11:59 PM”
D. Set- PublicFolder - PostStorageQuota 500MB. UseDatabaseRetentionDefaults : $true
View Answer
Your Exchange Server 2007 organization contains two load balanced Client Access servers.
Outlook Anywhere users on the corporate network have access to availability information. You
need to allow access to availability information for users outside the corporate network who
connect by using Outlook Anywhere. What should you do?
A. Run the Set-CASMailbox cmdlet with the appropriate parameters on each of the Client
Access servers.
B. Add a replica of the Exchange organizations Free/Busy public folder to at least one of the
Mailbox servers in the same site as the Client Access servers.
C. Add the Full Details read permission to each users calendar properties by using the Microsoft
Office Outlook client.
D. Set the external URL by running the Set-WebServicesVirtualDirectory cmdlet on each of the
Client Access servers.
View Answer
You are preparing to configure e-mail retention on three managed custom folders for all
mailboxes on an Exchange Server 2007 computer named Exch1.
You perform the following actions.
Create three managed custom folders.
Create managed content settings for each folder, and configure the required retention settings.
Create a new managed folder mailbox policy named MailRet.
Add each managed custom folder to the MailRet policy.
Configure the managed folder assistant for Exch1.
You need to finish configuring the messaging records management (MRM) retention settings so
that the three folders are available for the mailboxes on Exch1.
What should you do?
A. For each mailbox on Exch1, select the Enable retention hold for items in this mailbox check
box.
B. For each mailbox on Exch1, add the MailRet policy.
C. Add managed content settings to the three managed custom folders.
D. Create a new managed folder mailbox policy for each of the three managed custom folders.
View Answer
Your companies Microsoft ActiveSync policy is configured to require inactive users to provide
their password every 10 minutes. A company executive requests that her mobile device be
exempt from the inactivity timer. You need to exempt the executives mobile device from the
timeout policy while maintaining the other corporate policy settings. What should you do?
A. Remove the corporate ActiveSync policy from the executives mailbox.
B. Create a new ActiveSync policy that has the required settings, and apply it to the executives
mailbox.
C. Change the password setting on the executives mobile device to override the ActiveSync
policy.
D. Reconfigure the executives mobile device for ActiveSync, and do not apply the corporate
ActiveSync policy.
View Answer
Users report that legitimate e-mail messages are being delivered to their Microsoft Office Outlook
Junk E-mail folders.
You confirm that the e-mail addresses of the message senders were on the Outlook Safe
Senders List.
You need to allow user -defined Safe Senders Lists to be used during the Exchange Edge
Transport server message delivery.
What should you do?
A. On the Mailbox server content filter configuration, enable Outlook E-mail Postmark validation.
B. On the Edge Transport server content filter configuration, enable authenticated message
bypass.
C. Enable anti-spam updates on the Edge Transport server.
D. Run the Update-SafeList cmdlet for each users mailbox on the Mailbox server.
View Answer
Which new Windows 2000 features lessen the need for rescue boot disks? [Check all correct answers]

A. Safe Boot
B. System file protector
C. Recovery mode console
D. Kerberos
View Answer
Jachamji has two users in different departments who need to communicate securely. These users need their communications on the LAN to each other to be both mutually authenticated and encrypted. However, they both need to communicate in the clear with other users on the LAN. How should Jachamji proceed?

A. Use VPN features to create a PPTP tunnel between the users computers.
B. Secure the shared resources on both users' computers with local groups and restrict access to the shared resources to the two users.
C. Put the two users on an isolated subnet. Enable packet filtering at the switch.
D. Define and implement an IPSec policy for both users computers.

View Answer
You have just received 50 PC's with Windows ME on them. They also have dual 3.0GHZ processors in them. You decide that you want to upgrade them all up to Windows 2000 Professional. After running set up on a machine, you realize that only one of the processors is being seen by the OS what do you do next.

A. Run sysprep.exe update the machines after deployment
B. Run sysprep.exe with -pnp option
C. Use device manager to update the system to recognize the second processor. Then run sysprep.exe.
D. Run unattend.txt

View Answer
Windows NT 4.0 is currently installed on the system you are using on an NTFS partition. You want to install Windows 2000 Professional and dual boot NT 4.0 and 2000 professional. What do you need to do?

A. Install Windows 2000 on the same folder that Windows NT is installed in
B. Install Windows 2000 on a separate partition from Windows NT 4.0
C. Upgrade Windows NT 4.0 to SP4 or later then install Windows 2000.
D. This cannot be accomplished

View Answer
You have forgotten a "share name". You need to locate a file in that share. How can you quickly see a list of all shares on your system?

A. Browse to your system through Network Neighborhood and you will see all of the shares.
B. Using the computer management tool in the Administrative tools group in Control Panel, you will find a tab to view shared folders under system tools.
C. Using the computer management tool in the Administrative tools group in Control Panel, you will find a tab to view shared folders under Storage
D. Using Windows Explorer, choose shared folders from the view menu.

View Answer
You need to test applications in both Windows 2000 and Windows NT 4.0. Currently you have Windows NT 4.0 Workstation installed on several computers. You will also be installing Windows 2000 Professional on a separate partition (D:) and dual-booting between the two operating systems. After installing Windows 2000 on D: and converting the partition to NTFS, what must be done to ensure that you can access data on the D: drive when booted into Windows NT Workstation?

A. You must upgrade the disk to a dynamic disk. In order to allow other operating systems access to volumes that have been formatted as NTFS under Windows 2000, the disk must first be converted to a dynamic disk.
B. You must upgrade the installation of Windows NT Workstation to Service Pack 4 or greater. Compatability with the new version of NTFS used in Windows 2000 is provided to Windows NT 4.0 systems by Service Pack 4 and later Service Packs.
C. You must add the special group Everyone to the Pre-Windows 2000 Compatible Access security group. In order to provide users running Windows NT 4.0 access to volumes that have been formatted as NTFS under Windows 2000, you must weaken permissions in this fashion.
D. You cannot grant access to volumes that have been formatted as NTFS under Windows 2000 to users who are running Windows NT 4.0. If you wish to grant access to these users, you must convert the volume to either FAT or FAT32 from Disk Manager.

View Answer

Please Note: We keep on updating better answers to this site. In case you are looking for Jobs, Pls Click Here Vyoms.com - Best Freshers & Experienced Jobs Website.

View All Microsoft Certification Exams Interview Questions & Answers - Exam Mode / Learning Mode



User Options
India News Network

Latest 20 Questions
Payment of time- barred debt is: (a) Valid (b) Void (c) Illegal (d) Voidable
Consideration is defined in the Indian Contract Act,1872 in: (a) Section 2(f) (b) Section 2(e) (c) Section 2(g) (d) Section 2(d)
Which of the following is not an exception to the rule, "No consideration, No contract": (a) Natural love and affection (b) Compensation for involuntary services (c) Completed gift (d) Agency
Consideration must move at the desire of: (a) The promisor (b) The promisee (c) The promisor or any other party (d) Both the promisor and the promisee
An offer which is open for acceptance over a period of time is: (a) Cross Offer (b) Counter Offer (c) Standing Offer (d) Implied Offer
Specific offer can be communicated to__________ (a) All the parties of contract (b) General public in universe (c) Specific person (d) None of the above
_________ amounts to rejection of the original offer. (a) Cross offer (b) Special offer (c) Standing offer (d) Counter offer
A advertises to sell his old car by advertising in a newspaper. This offer is caleed: (a) General Offer (b) Special Offer (c) Continuing Offer (d) None of the above
In case a counter offer is made, the original offer stands: (a) Rejected (b) Accepted automatically (c) Accepted subject to certain modifications and variations (d) None of the above
In case of unenforceable contract having some technical defect, parties (a) Can sue upon it (b) Cannot sue upon it (c) Should consider it to be illegal (d) None of the above
If entire specified goods is perished before entering into contract of sale, the contract is (a) Valid (b) Void (c) Voidable (d) Cancelled
______________ contracts are also caled contracts with executed consideration. (a) Unilateral (b) Completed (c) Bilateral (d) Executory
A offers B to supply books @ Rs 100 each but B accepts the same with condition of 10% discount. This is a case of (a) Counter Offer (b) Cross Offer (c) Specific Offer (d) General Offer
_____________ is a game of chance. (a) Conditional Contract (b) Contingent Contract (c) Wagering Contract (d) Quasi Contract
There is no binding contract in case of _______ as one's offer cannot be constructed as acceptance (a) Cross Offer (b) Standing Offer (c) Counter Offer (d) Special Offer
An offer is made with an intention to have negotiation from other party. This type of offer is: (a) Invitation to offer (b) Valid offer (c) Voidable (d) None of the above
When an offer is made to the world at large, it is ____________ offer. (a) Counter (b) Special (c) General (d) None of the above
Implied contract even if not in writing or express words is perfectly _______________ if all the conditions are satisfied:- (a) Void (b) Voidable (c) Valid (d) Illegal
A specific offer can be accepted by ___________. (a) Any person (b) Any friend to offeror (c) The person to whom it is made (d) Any friend of offeree
An agreement toput a fire on a person's car is a ______: (a) Legal (b) Voidable (c) Valid (d) Illegal



Fresher Jobs | Experienced Jobs | Government Jobs | Walkin Jobs | Company Profiles | Interview Questions | Placement Papers | Companies In India | Consultants In India | Colleges In India | Exams In India | Latest Results | Notifications In India | Call Centers In India | Training Institutes In India | Job Communities In India | Courses In India | Jobs by Keyskills | Jobs by Functional Areas

Testing Articles | Testing Books | Testing Certifications | Testing FAQs | Testing Downloads | Testing Interview Questions | Testing Jobs | Testing Training Institutes

Gate Articles | Gate Books | Gate Colleges | Gate Downloads | Gate Faqs | Gate Jobs | Gate News | Gate Sample Papers | Gate Training Institutes

MBA Articles | MBA Books | MBA Case Studies | MBA Business Schools | MBA Current Affairs | MBA Downloads | MBA Events | MBA Notifications | MBA FAQs | MBA Jobs
MBA Job Consultants | MBA News | MBA Results | MBA Courses | MBA Sample Papers | MBA Interview Questions | MBA Training Institutes

GRE Articles | GRE Books | GRE Colleges | GRE Downloads | GRE Events | GRE FAQs | GRE News | GRE Training Institutes | GRE Sample Papers

IAS Articles | IAS Books | IAS Current Affairs | IAS Downloads | IAS Events | IAS FAQs | IAS News | IAS Notifications | IAS UPSC Jobs | IAS Previous Question Papers
IAS Results | IAS Sample Papers | IAS Interview Questions | IAS Training Institutes | IAS Toppers Interview

SAP Articles | SAP Books | SAP Certifications | SAP Companies | SAP Study Materials | SAP Events | SAP FAQs | SAP Jobs | SAP Job Consultants
SAP Links | SAP News | SAP Sample Papers | SAP Interview Questions | SAP Training Institutes |




Copyright ©2003-2024 CoolInterview.com, All Rights Reserved.
Privacy Policy | Terms and Conditions