|
Related Questions |
View Answer |
|
Alex works as a network technician. He would configure the conference room resource mailboxes in his company??s Exchange Server 2007 organization to remove attached files from meeting requests. Which cmdlet does he need to run? A. Get-Mailbox - RecipientTypeDetails RoomMailbox ; Set-MailboxCalendarSettings - DeleteNonCalendarItems : $true B. Get-Mailbox - RecipientTypeDetails RoomMailbox | Set- MailboxCalendarSettings - DeleteAttachments: $true C. Get-Mailbox - RecipientTypeDetails RoomMailbox ; Set-MailboxCalendarSettings - DeleteAttachments : $true D. Get-Mailbox - RecipientTypeDetails RoomMailbox | Set- MailboxCalendarSettings -DeleteNonCalendarItems: $true
|
View Answer
|
|
The Company??s Exchange Server 2007 organization has a mail-enabled public folder named Monitoring which is configured to receive automated alerts from this company??s external monitoring system. Each corporate user is able to send e-mail to this public folder. Mail from the monitoring system is being returned with a non-delivery report (NDR). How to make sure that the monitoring alerts are to be received in the Monitoring public folder? A. Use Microsoft Office Outlook to assign anonymous users the permission to create items in the Monitoring public folder. B. Perform the Add-PublicFolderClientPermission -AccessRights: EditOwnedItems cmdlet for anonymous users for the Monitoring public folder. C. Use Microsoft Office Outlook to assign default users the permission to create items in the Monitoring public folder. D. Perform the Set-MailPublicFolder -RequireSenderAuthenticationEnabled: $true cmdlet for the Monitoring public folder.
|
View Answer
|
|
A former employee is sending e-mails to people in your organization attempting to recruit them to a new start-up company that he has created. E-mails are transmitted from an Internet service provider's SMTP server that is also used by several of your organization's clients. Management has asked you to block all e-mails sent from the new company's e-mail domain. Which of the following technologies should you implement? A. Attachment filtering B. Connection filtering C. Sender filtering D. Recipient filtering
|
View Answer
|
|
Which of the following Receive connector usage types uses Exchange Server authentication as its default authentication mechanism? A. Client B. Internal C. Internet D. Partner
|
View Answer
|
|
A senior manager at your company is under suspicion of forwarding sensitive information to a competitor. The chief executive officer (CEO) wants to be provided with a copy of all messages that the senior manager sends but does not want the senior manager to be aware that he is under surveillance. Which of the following actions would you configure when setting up a transport rule to screen the senior manager's messages? A. Blind carbon copy (Bcc) the message to addresses B. Add a recipient in the To field addresses C. Redirect the message To addresses D. Silently drop the message
|
View Answer
|
|
You have configured attachment filtering on your organization's edge transport servers. Because some senders are transmitting files that are not harmful, you want to allow hem to be informed that the message containing the attachment has been rejected by your organization. Which of the following configuration settings should you make? A. Configure the attachment filtering behavior action to Strip B. Configure the attachment filtering behavior action to SilentDelete C. Configure the attachment filtering behavior action to Reject D. Configure a ConnectorException
|
View Answer
|
|
What does the following Exchange Management Shell command do? New-DistributionGroup -Name "Manufacturing" -OrganizationalUnit Users –SAMAccountName Manufacturing -Type Security A. Creates a mail-enabled local security group called Manufacturing B. Creates a mail-enabled universal security group called Manufacturing C. Creates a universal distribution group called Manufacturing D. Creates a dynamic distribution group called Manufacturing
|
View Answer
|
|
n Microsoft Exchange Server 2007,the Hub Transport server role was referred to as the Bridgehead server role. Deployed inside your Active Directory directory service forest, the Hub Transport server role handles all mail flow inside the organization, applies transport rules, applies journaling policies, and delivers messages to a recipient's mailbox. Messages that are sent to the Internet are relayed by the Hub Transport server to the Edge Transport server role that is deployed in the perimeter network. Messages that are received from the Internet are processed by the Edge Transport server before they are relayed to the Hub Transport server. Company has 5 Active Directory sites that are configured as shown in the exhibit. Each site has an Exchange Server 2007 Mailbox server and Hub Transport server. Currently all outbound e-mail traffic goes through the New York site. Mike is required to reconfigure the mail flow so that all outbound e-mail messages that are sent from users in the Seattle office are sent out of your Exchange organization through ExchHub5 in the Chicago office. What should Mike run? A. Set- AdsiteLink -Id DNVR-CHI - ADCost 10 B. Set- SendConnector -Identity 'Seattle' - AddressSpaces:'smtp :*;1' - DNSRoutingEnabled:$false -SourceTransportServers:'ExchHub1' C. New- SendConnector -Name 'Chicago' - AddressSpaces:'smtp :*;1' - DNSRoutingEnabled:$true -SourceTransportServers:'ExchHub5' D. Set- AdSitE.Identity Chicago - HubSiteEnabled:$true
|
View Answer
|
|
You are writing a PowerShell script that takes the identity of a mailbox as a parameter, moves the mailbox to the database First Glasgow Mailbox Database in the storage group First Storage Group, and removes the mailbox from its original location. What should be the contents of the PowerShell script file? A. Param( [string] $Identity ) Move-Mailbox -Identity $IdentityDTargetDatabase OFirst Storage GroupFirst Glasgow Mailbox DatabaseO -SourceMailboxCleanupOptions DeleteSourceMailbox B. Move-Mailbox -Identity $Identity DTargetDatabase OFirst Storage Group First Glasgow Mailbox DatabaseO -SourceMailboxCleanupOptions DeleteSourceMailbox Param( [string] $Identity ) C. Move-Mailbox -Identity $Identity DTargetDatabase OFirst Storage Group First Glasgow Mailbox DatabaseO -SourceMailboxCleanupOptions DeleteSourceMailbox D. Param( [string] $Identity ) Move-Mailbox -Identity $Identity DTargetDatabase OFirst Storage Group First Glasgow Mailbox DatabaseO
|
View Answer
|
|
ActiveSync is a data synchronization program developed by Microsoft for use with its Microsoft Windows line of operating systems. Originally released under the name "Handheld PC Explorer" in 1996, it provides users of Microsoft Windows a way to transport documents, calendars, contact lists and email between their desktop computer and a mobile device, such as a Handheld PC, mobile phone, or any other portable devices that support the ActiveSync protocol. Company’s MS ActiveSync policy requires inactive users to provide their password each 15 minutes. Mr. Moore is the CEO of Company Ltd., his mobile device should be exempted from the inactivity timer. Now you have to exempt Moore'S mobile device from the timeout policy while maintaining the other corporate policy settings. What should you do? A. Remove the corporate ActiveSync policy from Mr. Moore's mailbox. B. Create a new ActiveSync policy that has the required settings, and apply it to the executives mailbox. C. Reset Mr. Moore's mobile device and refuse the corporate ActiveSync policy. D. Change the password setting on Mr. Moore's mobile device to take precedence of the ActiveSync policy.
|
View Answer
|
|
Consumers found that their licit message were sened to the Junk folders of the MS-Office Outlook client application. You can make sure that the sender's email address were on the Outlook Safe-Senders List. Now you are asked to solve this problem, at first you have to make the consumer-defined Safe-senders List to be used while the email was delivered on the Exchange Edge Transport server. How to achieve it? A. Enable anti-spam updates on the Edge Transport server. B. On the Edge Transport server content filter configuration, enable authenticated message bypass. C. Run the mailbox server content filter configuration and enable the Outlook E-mail Postmark validation. D. Run the Update-SafeList cmdlet for each users mailbox on the Mailbox server.
|
View Answer
|
|
You are using Exchange Management Console to move selected mailboxes to another database. You select the mailboxes and step through the pages of the wizard. On the Move Schedule page, you specify that the mailboxes should be moved at 11:30 PM that day, and you click Next. On the Move Mailbox page, you click Move. What then happens? A. You click Finish, and a single command to move the mailboxes is sent to Exchange Management Shell. Exchange Management Shell uses the scheduling facilities of the OS to delay the execution of the command until the appropriate time. B. You click Finish, and multiple commands to move each mailbox individually are sent to Exchange Management Shell. Exchange Management Shell uses the scheduling facilities of the OS to delay the execution of the commands until the appropriate time. C. The Finish control is grayed out, and you cannot close the Move Mailbox Wizard. At 11:30 PM, a single command is sent to Exchange Management Shell to implement all the mailbox moves. After the mailboxes have been moved, you can click Finish to close the wizard. D. The Finish control is grayed out, and you cannot close the Move Mailbox Wizard. At 11:30 PM, multiple commands are sent to Exchange Management Shell, each of which implements a mailbox move. After the mailboxes have been moved, you can click Finish to close the wizard.
|
View Answer
|
|
What does the following command do? Set-PublicFolder OHuman ResourcesO -ReplicationSchedule "Saturday.12:00 AM - Monday.12:00 AMO A. Specifies that the Human Resources public folder replicates only on Saturday and Sunday. B. Specifies that the Human Resources public folder replicates only on Saturday, Sunday, and Monday. C. Specifies that the Human Resources public folder replicates only on Sunday. D. Specifies that the Human Resources public folder always uses the default replication schedule of the public folder database.
|
View Answer
|
|
You are an Exchange administrator at Contoso, Ltd. A group of consultants from Trey Research works closely with Contoso, and members of the group have mailenabled accounts in Contoso's Active Directory domain. The group membership changes frequently, and you create and remove mail-enabled Trey Research users on a regular basis. You want to ensure that group e-mails sent to the Trey Research Consultants group go to all consultants who currently have mailenabled accounts at Contoso. You also want to ensure that these e-mails are not sent to consultants who no longer have user accounts at Contoso because this results in nondelivery returns. How best can you achieve this? A. Create a mail-enabled universal security group B. Create a dynamic distribution group C. Create a universal distribution group D. Create a universal security group but disable its mailbox
|
View Answer
|
|
You want to allow OWA clients in your organization the ability to access the SharePoint site hosted on server sharepoint.tailspintoys.internal. You do not want them to access the SharePoint site hosted on server secureshare.tailspintoys. internal. Which of the following steps do you need to take to allow this to occur? A. Add the site sharepoint.tailspintoys.internal to the block list on the Remote File Servers tab of the OWA Web site properties B. Add the site sharepoint.tailspintoys.internal to the allow list on the Remote File Servers tab of the OWA Web site properties C. Add the site secureshare.tailspintoys.internal to the block list on the Remote File Servers tab of the OWA Web site properties D. Add the domain suffix tailspintoys.internal to the list of domain suffixes that should be treated as internal E. Add the site secure.tailspintoys.internal to the allow list on the Remote File Servers tab of the OWA Web site properties
|
View Answer
|
|
You have an automatically generated CSV file with a list of your companys newly hired employees. The CSV file contains all of the information that is required to create the mailboxes for the new employees. You need to create new user accounts and mailboxes directly from the CSV file. What should you do? A. Redirect the output of the Import-CSV cmdlet to the New-Mailbox cmdlet with the appropriate parameters. B. Redirect the output of the Export-CSV cmdlet to the New-Mailbox cmdlet with the appropriate parameters. C. Redirect the output of the Import-Alias cmdlet to the New-Mailbox cmdlet with the appropriate parameters. D. Redirect the output of the Import-CSV cmdlet to the Enable-Mailbox cmdlet with the appropriate parameters.
|
View Answer
|
|
Your Exchange Server 2007 organization contains two Exchange servers named Exch1 and Exch2. Exch1 fails and cannot be restored to service. You need to move all mailboxes from Exch1 to Exch2. Which cmdlet should you run? A. Get-Mailbox -Server Exch1 | Move-Mailbox - IgnorePolicyMatch - TargetDatabase “Exch2First Storage GroupMailbox Database” B. Get-Mailbox -Server Exch1 | Move-Mailbox - IgnoreRuleLimitErrors - TargetDatabase “Exch2First Storage GroupMailbox Database” C. Get-Mailbox -Server Exch1 | Move-Mailbox - ValidateOnly - TargetDatabase “Exch2First Storage GroupMailbox Database” D. Get-Mailbox -Server Exch1 | Move-Mailbox - ConfigurationOnly - TargetDatabase “Exch2First Storage GroupMailbox Database”
|
View Answer
|
|
Your company uses both a distribution group and a security group for each department. Both groups contain the same members. All new users are added to both groups in their departments. You need to decrease the amount of time that is required to manage groups. You must achieve this goal while minimizing disruption to mail capabilities and to previously assigned access permissions. Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.) A. Delete the departmental distribution groups. B. Delete the departmental security groups. C. Convert the departmental distribution groups to global security groups. D. Mail-enable the departmental security groups. E. Mail-enable the converted global security groups.
|
View Answer
|
|
A mail-enabled public folder named Monitoring receives automated alerts from your companys monitoring system. Some users send e-mail messages to the folder by selecting it from the global address list (GAL) in Microsoft Office Outlook. You need to prevent users from selecting the Monitoring folder from the GAL, and you need to ensure that the monitoring alerts will still be received. What should you do? A. Run the Set-MailPublicFolder cmdlet and set the DisplayName parameter to $false. B. Run the Set-MailPublicFolder cmdlet and set the HiddenFromAddressListsEnabled parameter to $true. C. Run the Set-AddressList “Public Folders” -RecipientFilter “DisplayNamE.is ‘Monitoring’” cmdlet. D. Use the Outlook client to remove the Folder visible attribute for the Default name on the Monitoring public folder.
|
View Answer
|
|
All users can receive e-mail that is sent directly to them from the Internet. A distribution group named WebResponse is configured to accept e-mail from all users. All corporate users can send messages to the WebResponse distribution group by using Microsoft Office Outlook. AII messages that are sent to the distribution group from the Internet are rejected. You need to allow e-mail from internal and Internet users to be sent to the SMTP address of the WebResponse distribution group. What should you do? A. Modify the properties of the WebResponse distribution group so that the Everyone group has the Send As permission. B. Modify the properties of the WebResponse distribution group so that the group no longer requires all senders to be authenticated. C. Modify the SMTP Receive connectors on each Hub Transport server to allow anonymous users. D. Modify the properties of the WebResponse distribution group so that the group is no longer hidden from the Outlook global address list (GAL).
|
View Answer
|