Sponsored Links

Interview Questions



INTERVIEW QUESTIONS CERTIFICATION EXAMS MICROSOFT CERTIFICATION EXAMS DETAILS

Question: You want to trigger an alert when the number of messages in the mailbox store's receive queue
on an Exchange Server 2007 server reaches a defined value. What counter do you select when
configuring the alert? (The question uses the notation <performance object>:<counter name>.)
A. MSExchangeIS:Messages Queued For Submission
B. MSExchangeIS:Receive Queue Size
C. MSExchangeIS Mailbox:Messages Queued For Submission
D. MSExchangeIS Mailbox:Receive Queue Size

Answer: D. MSExchangeIS Mailbox:Receive Queue Size

Category Microsoft Certification Exams Interview Questions & Answers - Exam Mode / Learning Mode
Rating (0.2) By 8991 users
Added on 7/30/2015
Views 69049
Rate it!

Question: You want to trigger an alert when the number of messages in the mailbox store's receive queue
on an Exchange Server 2007 server reaches a defined value. What counter do you select when
configuring the alert? (The question uses the notation <performance object>:<counter name>.)
A. MSExchangeIS:Messages Queued For Submission
B. MSExchangeIS:Receive Queue Size
C. MSExchangeIS Mailbox:Messages Queued For Submission
D. MSExchangeIS Mailbox:Receive Queue Size


Answer:

D. MSExchangeIS Mailbox:Receive Queue Size Source: CoolInterview.com



If you have the better answer, then send it to us. We will display your answer after the approval.
Rules to Post Answers in CoolInterview.com:-
  • There should not be any Spelling Mistakes.
  • There should not be any Gramatical Errors.
  • Answers must not contain any bad words.
  • Answers should not be the repeat of same answer, already approved.
  • Answer should be complete in itself.
Name :*
Email Id :*
Answer :*
Verification Code Code Image - Please contact webmaster if you have problems seeing this image code Not readable? Load New Code
Process Verification Enter the above shown code: *
Inform me about updated answers to this question

Related Questions
View Answer
Alex works as a network technician. He would configure the conference room resource mailboxes
in his company??s Exchange Server 2007 organization to remove attached files from meeting
requests. Which cmdlet does he need to run?
A. Get-Mailbox - RecipientTypeDetails RoomMailbox ; Set-MailboxCalendarSettings -
DeleteNonCalendarItems : $true
B. Get-Mailbox - RecipientTypeDetails RoomMailbox | Set- MailboxCalendarSettings -
DeleteAttachments:
$true
C. Get-Mailbox - RecipientTypeDetails RoomMailbox ; Set-MailboxCalendarSettings -
DeleteAttachments :
$true
D. Get-Mailbox - RecipientTypeDetails RoomMailbox | Set- MailboxCalendarSettings
-DeleteNonCalendarItems: $true
View Answer
The Company??s Exchange Server 2007 organization has a mail-enabled public folder named
Monitoring which is configured to receive automated alerts from this company??s external
monitoring system. Each corporate user is able to send e-mail to this public folder. Mail from the
monitoring system is being returned with a non-delivery report (NDR). How to make sure that the
monitoring alerts are to be received in the Monitoring public folder?
A. Use Microsoft Office Outlook to assign anonymous users the permission to create items in the
Monitoring public folder.
B. Perform the Add-PublicFolderClientPermission -AccessRights: EditOwnedItems cmdlet for
anonymous users for the Monitoring public folder.
C. Use Microsoft Office Outlook to assign default users the permission to create items in the
Monitoring public folder.
D. Perform the Set-MailPublicFolder -RequireSenderAuthenticationEnabled: $true cmdlet for the
Monitoring public folder.
View Answer
A former employee is sending e-mails to people in your organization attempting to recruit them to
a new start-up company that he has created. E-mails are transmitted from an Internet service
provider's SMTP server that is also used by several of your organization's clients.
Management has asked you to block all e-mails sent from the new company's e-mail domain.
Which of the following technologies should you implement?
A. Attachment filtering
B. Connection filtering
C. Sender filtering
D. Recipient filtering
View Answer
Which of the following Receive connector usage types uses Exchange Server authentication as
its default authentication mechanism?
A. Client
B. Internal
C. Internet
D. Partner
View Answer
A senior manager at your company is under suspicion of forwarding sensitive information to a
competitor. The chief executive officer (CEO) wants to be provided with a copy of all messages
that the senior manager sends but does not want the senior manager to be aware that he is
under surveillance. Which of the following actions would you configure when setting up a
transport rule to screen the senior manager's messages?
A. Blind carbon copy (Bcc) the message to addresses
B. Add a recipient in the To field addresses
C. Redirect the message To addresses
D. Silently drop the message
View Answer
You have configured attachment filtering on your organization's edge transport servers. Because
some senders are transmitting files that are not harmful, you want to allow hem to be informed
that the message containing the attachment has been rejected by your organization.
Which of the following configuration settings should you make?
A. Configure the attachment filtering behavior action to Strip
B. Configure the attachment filtering behavior action to SilentDelete
C. Configure the attachment filtering behavior action to Reject
D. Configure a ConnectorException
View Answer
What does the following Exchange Management Shell command do?
New-DistributionGroup -Name "Manufacturing" -OrganizationalUnit Users –SAMAccountName
Manufacturing -Type Security
A. Creates a mail-enabled local security group called Manufacturing
B. Creates a mail-enabled universal security group called Manufacturing
C. Creates a universal distribution group called Manufacturing
D. Creates a dynamic distribution group called Manufacturing
View Answer
n Microsoft Exchange Server 2007,the Hub Transport server role was referred to as the
Bridgehead server role. Deployed inside your Active Directory directory service forest, the Hub
Transport server role handles all mail flow inside the organization, applies transport rules, applies
journaling policies, and delivers messages to a recipient's mailbox. Messages that are sent to the
Internet are relayed by the Hub Transport server to the Edge Transport server role that is
deployed in the perimeter network. Messages that are received from the Internet are processed
by the Edge Transport server before they are relayed to the Hub Transport server. Company has
5 Active Directory sites that are configured as shown in the exhibit. Each site has an Exchange
Server 2007 Mailbox server and Hub Transport server. Currently all outbound e-mail traffic goes
through the New York site.
Mike is required to reconfigure the mail flow so that all outbound e-mail messages that are sent
from users in the Seattle office are sent out of your Exchange organization through ExchHub5 in
the Chicago office.
What should Mike run?
A. Set- AdsiteLink -Id DNVR-CHI - ADCost 10
B. Set- SendConnector -Identity 'Seattle' - AddressSpaces:'smtp :*;1' -
DNSRoutingEnabled:$false
-SourceTransportServers:'ExchHub1'
C. New- SendConnector -Name 'Chicago' - AddressSpaces:'smtp :*;1' -
DNSRoutingEnabled:$true
-SourceTransportServers:'ExchHub5'
D. Set- AdSitE.Identity Chicago - HubSiteEnabled:$true
View Answer
You are writing a PowerShell script that takes the identity of a mailbox as a parameter, moves the
mailbox to the database First Glasgow Mailbox Database in the storage group
First Storage Group, and removes the mailbox from its original location. What should be the
contents of the PowerShell script file?
A. Param(
[string] $Identity
)
Move-Mailbox -Identity $IdentityDTargetDatabase OFirst Storage GroupFirst
Glasgow Mailbox DatabaseO -SourceMailboxCleanupOptions DeleteSourceMailbox
B. Move-Mailbox -Identity $Identity DTargetDatabase OFirst Storage Group First
Glasgow Mailbox DatabaseO -SourceMailboxCleanupOptions DeleteSourceMailbox
Param(
[string] $Identity
)
C. Move-Mailbox -Identity $Identity DTargetDatabase OFirst Storage Group First
Glasgow Mailbox DatabaseO -SourceMailboxCleanupOptions DeleteSourceMailbox
D. Param(
[string] $Identity
)
Move-Mailbox -Identity $Identity DTargetDatabase OFirst Storage Group First
Glasgow Mailbox DatabaseO
View Answer
ActiveSync is a data synchronization program developed by Microsoft for use with its Microsoft
Windows line of operating systems. Originally released under the name "Handheld PC Explorer"
in 1996, it provides users of Microsoft Windows a way to transport documents, calendars, contact
lists and email between their desktop computer and a mobile device, such as a Handheld PC,
mobile phone, or any other portable devices that support the ActiveSync protocol. Company’s MS
ActiveSync policy requires inactive users to provide their password each 15 minutes. Mr. Moore
is the CEO of Company Ltd., his mobile device should be exempted from the inactivity timer. Now
you have to exempt Moore'S mobile device from the timeout policy while maintaining the other
corporate policy settings. What should you do?
A. Remove the corporate ActiveSync policy from Mr. Moore's mailbox.
B. Create a new ActiveSync policy that has the required settings, and apply it to the executives
mailbox.
C. Reset Mr. Moore's mobile device and refuse the corporate ActiveSync policy.
D. Change the password setting on Mr. Moore's mobile device to take precedence of the
ActiveSync policy.
View Answer
Consumers found that their licit message were sened to the Junk folders of the MS-Office
Outlook client application. You can make sure that the sender's email address were on the
Outlook Safe-Senders List. Now you are asked to solve this problem, at first you have to make
the consumer-defined Safe-senders List to be used while the email was delivered on the
Exchange Edge Transport server.
How to achieve it?
A. Enable anti-spam updates on the Edge Transport server.
B. On the Edge Transport server content filter configuration, enable authenticated message
bypass.
C. Run the mailbox server content filter configuration and enable the Outlook E-mail Postmark
validation.
D. Run the Update-SafeList cmdlet for each users mailbox on the Mailbox server.
View Answer
You are using Exchange Management Console to move selected mailboxes to another database.
You select the mailboxes and step through the pages of the wizard. On the Move
Schedule page, you specify that the mailboxes should be moved at 11:30 PM that day, and you
click Next. On the Move Mailbox page, you click Move. What then happens?
A. You click Finish, and a single command to move the mailboxes is sent to Exchange
Management Shell. Exchange Management Shell uses the scheduling facilities of the OS to
delay the execution of the command until the appropriate time.
B. You click Finish, and multiple commands to move each mailbox individually are sent to
Exchange Management Shell. Exchange Management Shell uses the scheduling facilities of
the OS to delay the execution of the commands until the appropriate time.
C. The Finish control is grayed out, and you cannot close the Move Mailbox Wizard. At 11:30 PM,
a single command is sent to Exchange Management Shell to implement all the mailbox
moves. After the mailboxes have been moved, you can click Finish to close the wizard.
D. The Finish control is grayed out, and you cannot close the Move Mailbox Wizard. At 11:30 PM,
multiple commands are sent to Exchange Management Shell, each of which implements a
mailbox move. After the mailboxes have been moved, you can click Finish to close the wizard.
View Answer
What does the following command do?
Set-PublicFolder OHuman ResourcesO -ReplicationSchedule "Saturday.12:00 AM -
Monday.12:00
AMO
A. Specifies that the Human Resources public folder replicates only on Saturday and Sunday.
B. Specifies that the Human Resources public folder replicates only on Saturday, Sunday, and
Monday.
C. Specifies that the Human Resources public folder replicates only on Sunday.
D. Specifies that the Human Resources public folder always uses the default replication schedule
of the public folder database.
View Answer
You are an Exchange administrator at Contoso, Ltd. A group of consultants from Trey Research
works closely with Contoso, and members of the group have mailenabled accounts in Contoso's
Active Directory domain. The group membership changes frequently, and you create and remove
mail-enabled Trey Research users on a regular basis. You want to ensure that group e-mails sent
to the Trey Research Consultants group go to all consultants who currently have mailenabled
accounts at Contoso. You also want to ensure that these e-mails are not sent to consultants who
no longer have user accounts at Contoso because this results in nondelivery returns. How best
can you achieve this?
A. Create a mail-enabled universal security group
B. Create a dynamic distribution group
C. Create a universal distribution group
D. Create a universal security group but disable its mailbox
View Answer
You want to allow OWA clients in your organization the ability to access the SharePoint site
hosted on server sharepoint.tailspintoys.internal. You do not want them to access the SharePoint
site hosted on server secureshare.tailspintoys. internal. Which of the following steps do you need
to take to allow this to occur?
A. Add the site sharepoint.tailspintoys.internal to the block list on the Remote File Servers tab of
the OWA Web site properties
B. Add the site sharepoint.tailspintoys.internal to the allow list on the Remote File Servers tab of
the OWA Web site properties
C. Add the site secureshare.tailspintoys.internal to the block list on the Remote File Servers tab
of the OWA Web site properties
D. Add the domain suffix tailspintoys.internal to the list of domain suffixes that should be treated
as internal
E. Add the site secure.tailspintoys.internal to the allow list on the Remote File Servers tab of the
OWA Web site properties
View Answer
You have an automatically generated CSV file with a list of your companys newly hired
employees. The CSV file contains all of the information that is required to create the mailboxes
for the new employees. You need to create new user accounts and mailboxes directly from the
CSV file. What should you do?
A. Redirect the output of the Import-CSV cmdlet to the New-Mailbox cmdlet with the appropriate
parameters.
B. Redirect the output of the Export-CSV cmdlet to the New-Mailbox cmdlet with the appropriate
parameters.
C. Redirect the output of the Import-Alias cmdlet to the New-Mailbox cmdlet with the appropriate
parameters.
D. Redirect the output of the Import-CSV cmdlet to the Enable-Mailbox cmdlet with the
appropriate parameters.

View Answer
Your Exchange Server 2007 organization contains two Exchange servers named Exch1 and
Exch2. Exch1 fails and cannot be restored to service. You need to move all mailboxes from
Exch1 to Exch2. Which cmdlet should you run?
A. Get-Mailbox -Server Exch1 | Move-Mailbox - IgnorePolicyMatch - TargetDatabase
“Exch2First Storage GroupMailbox Database”
B. Get-Mailbox -Server Exch1 | Move-Mailbox - IgnoreRuleLimitErrors - TargetDatabase
“Exch2First Storage GroupMailbox Database”
C. Get-Mailbox -Server Exch1 | Move-Mailbox - ValidateOnly - TargetDatabase “Exch2First
Storage GroupMailbox Database”
D. Get-Mailbox -Server Exch1 | Move-Mailbox - ConfigurationOnly - TargetDatabase
“Exch2First Storage GroupMailbox Database”
View Answer
Your company uses both a distribution group and a security group for each department. Both
groups contain the same members. All new users are added to both groups in their departments.
You need to decrease the amount of time that is required to manage groups. You must achieve
this goal while minimizing disruption to mail capabilities and to previously assigned access
permissions. Which two actions should you perform? (Each correct answer presents part of the
solution. Choose two.)
A. Delete the departmental distribution groups.
B. Delete the departmental security groups.
C. Convert the departmental distribution groups to global security groups.
D. Mail-enable the departmental security groups.
E. Mail-enable the converted global security groups.
View Answer
A mail-enabled public folder named Monitoring receives automated alerts from your companys
monitoring system. Some users send e-mail messages to the folder by selecting it from the global
address list (GAL) in Microsoft Office Outlook. You need to prevent users from selecting the
Monitoring folder from the GAL, and you need to ensure that the monitoring alerts will still be
received. What should you do?
A. Run the Set-MailPublicFolder cmdlet and set the DisplayName parameter to $false.
B. Run the Set-MailPublicFolder cmdlet and set the HiddenFromAddressListsEnabled parameter
to $true.
C. Run the Set-AddressList “Public Folders” -RecipientFilter “DisplayNamE.is ‘Monitoring’”
cmdlet.
D. Use the Outlook client to remove the Folder visible attribute for the Default name on the
Monitoring public folder.
View Answer
All users can receive e-mail that is sent directly to them from the Internet. A distribution group
named WebResponse is configured to accept e-mail from all users. All corporate users can send
messages to the WebResponse distribution group by using Microsoft Office Outlook. AII
messages that are sent to the distribution group from the Internet are rejected. You need to allow
e-mail from internal and Internet users to be sent to the SMTP address of the WebResponse
distribution group. What should you do?
A. Modify the properties of the WebResponse distribution group so that the Everyone group has
the Send As permission.
B. Modify the properties of the WebResponse distribution group so that the group no longer
requires all senders to be authenticated.
C. Modify the SMTP Receive connectors on each Hub Transport server to allow anonymous
users.
D. Modify the properties of the WebResponse distribution group so that the group is no longer
hidden from the Outlook global address list (GAL).
View Answer

Please Note: We keep on updating better answers to this site. In case you are looking for Jobs, Pls Click Here Vyoms.com - Best Freshers & Experienced Jobs Website.

View All Microsoft Certification Exams Interview Questions & Answers - Exam Mode / Learning Mode



User Options
India News Network

Latest 20 Questions
Payment of time- barred debt is: (a) Valid (b) Void (c) Illegal (d) Voidable
Consideration is defined in the Indian Contract Act,1872 in: (a) Section 2(f) (b) Section 2(e) (c) Section 2(g) (d) Section 2(d)
Which of the following is not an exception to the rule, "No consideration, No contract": (a) Natural love and affection (b) Compensation for involuntary services (c) Completed gift (d) Agency
Consideration must move at the desire of: (a) The promisor (b) The promisee (c) The promisor or any other party (d) Both the promisor and the promisee
An offer which is open for acceptance over a period of time is: (a) Cross Offer (b) Counter Offer (c) Standing Offer (d) Implied Offer
Specific offer can be communicated to__________ (a) All the parties of contract (b) General public in universe (c) Specific person (d) None of the above
_________ amounts to rejection of the original offer. (a) Cross offer (b) Special offer (c) Standing offer (d) Counter offer
A advertises to sell his old car by advertising in a newspaper. This offer is caleed: (a) General Offer (b) Special Offer (c) Continuing Offer (d) None of the above
In case a counter offer is made, the original offer stands: (a) Rejected (b) Accepted automatically (c) Accepted subject to certain modifications and variations (d) None of the above
In case of unenforceable contract having some technical defect, parties (a) Can sue upon it (b) Cannot sue upon it (c) Should consider it to be illegal (d) None of the above
If entire specified goods is perished before entering into contract of sale, the contract is (a) Valid (b) Void (c) Voidable (d) Cancelled
______________ contracts are also caled contracts with executed consideration. (a) Unilateral (b) Completed (c) Bilateral (d) Executory
A offers B to supply books @ Rs 100 each but B accepts the same with condition of 10% discount. This is a case of (a) Counter Offer (b) Cross Offer (c) Specific Offer (d) General Offer
_____________ is a game of chance. (a) Conditional Contract (b) Contingent Contract (c) Wagering Contract (d) Quasi Contract
There is no binding contract in case of _______ as one's offer cannot be constructed as acceptance (a) Cross Offer (b) Standing Offer (c) Counter Offer (d) Special Offer
An offer is made with an intention to have negotiation from other party. This type of offer is: (a) Invitation to offer (b) Valid offer (c) Voidable (d) None of the above
When an offer is made to the world at large, it is ____________ offer. (a) Counter (b) Special (c) General (d) None of the above
Implied contract even if not in writing or express words is perfectly _______________ if all the conditions are satisfied:- (a) Void (b) Voidable (c) Valid (d) Illegal
A specific offer can be accepted by ___________. (a) Any person (b) Any friend to offeror (c) The person to whom it is made (d) Any friend of offeree
An agreement toput a fire on a person's car is a ______: (a) Legal (b) Voidable (c) Valid (d) Illegal



Fresher Jobs | Experienced Jobs | Government Jobs | Walkin Jobs | Company Profiles | Interview Questions | Placement Papers | Companies In India | Consultants In India | Colleges In India | Exams In India | Latest Results | Notifications In India | Call Centers In India | Training Institutes In India | Job Communities In India | Courses In India | Jobs by Keyskills | Jobs by Functional Areas

Testing Articles | Testing Books | Testing Certifications | Testing FAQs | Testing Downloads | Testing Interview Questions | Testing Jobs | Testing Training Institutes

Gate Articles | Gate Books | Gate Colleges | Gate Downloads | Gate Faqs | Gate Jobs | Gate News | Gate Sample Papers | Gate Training Institutes

MBA Articles | MBA Books | MBA Case Studies | MBA Business Schools | MBA Current Affairs | MBA Downloads | MBA Events | MBA Notifications | MBA FAQs | MBA Jobs
MBA Job Consultants | MBA News | MBA Results | MBA Courses | MBA Sample Papers | MBA Interview Questions | MBA Training Institutes

GRE Articles | GRE Books | GRE Colleges | GRE Downloads | GRE Events | GRE FAQs | GRE News | GRE Training Institutes | GRE Sample Papers

IAS Articles | IAS Books | IAS Current Affairs | IAS Downloads | IAS Events | IAS FAQs | IAS News | IAS Notifications | IAS UPSC Jobs | IAS Previous Question Papers
IAS Results | IAS Sample Papers | IAS Interview Questions | IAS Training Institutes | IAS Toppers Interview

SAP Articles | SAP Books | SAP Certifications | SAP Companies | SAP Study Materials | SAP Events | SAP FAQs | SAP Jobs | SAP Job Consultants
SAP Links | SAP News | SAP Sample Papers | SAP Interview Questions | SAP Training Institutes |




Copyright ©2003-2024 CoolInterview.com, All Rights Reserved.
Privacy Policy | Terms and Conditions