Act now and download your Microsoft 70-342 test today! Do not waste time for the worthless Microsoft 70-342 tutorials. Download Rebirth Microsoft Advanced Solutions of Microsoft Exchange Server 2013 exam with real questions and answers and begin to learn Microsoft 70-342 with a classic professional.
Q31. DRAG DROP - (Topic 6)
You work for a financial services company that has an Exchange Server 2013 organization.
Mailbox audit logging is enabled for all mailboxes.
The company identifies the following requirements for the sales department:
. The manager of the sales department must be able to search for email messages that contain specific key words in the mailboxes of the users in the sales department.
. The manager of the human resources department must receive a report that contains a list of all the sales users' mailboxes that were searched by the sales manager.
You need to identify which tasks must be performed to meet the requirements.
Which tasks should you identify?
To answer, drag the appropriate task to the correct requirement in the answer area. Each task may be used once, more than once, or not at all. Additionally, you may need to drag the split bar between panes or scroll to view content.
Answer:
Q32. (Topic 6)
You have an Exchange Server organization that contains four servers. The servers are configured as shown in the following table.
You are deploying Unified Messaging (UM).
You create a dial plan named UMPlan1 and a UM mailbox policy named UMPlan Mailbox Policy.
You need to ensure that all voice mail sent to the existing extension of a user is delivered to the user's mailbox.
Which three actions should you perform? (Each correct answer presents part of the solution. Choose three.)
A. Create a UM hunt group
B. Create a UM IP gateway.
C. Configure the IP-PBX to route calls to EX3 and EX4
D. Configure the IP-PBX to route calls to EX I and EX2.
E. Assign EX I and EX2 to UMPlan1.
F. Assign EX3 and EX4 to UMPlan1.
Answer: A,B,C
Explanation:
* When you’re setting up Unified Messaging (UM), you must configure the IP PBXs on your
network to communicate with the Client Access servers running the Microsoft Exchange
Unified Messaging Call Router service and the Mailbox servers running the Microsoft
Exchange Unified Messaging service in your Exchange organization. You must also
configure the Client Access and Mailbox servers to communicate with the IP PBXs.
C: A Unified Messaging (UM) IP gateway represents a physical Voice over IP (VoIP)
gateway, IP Private Branch eXchange (PBX), or session border controller (SBC) hardware
device.
* Here are the basic steps for connecting VoIP gateways, IP PBXs, SIP-enabled PBXs, or
SBCs to Client Access and Mailbox servers:
Step 1: Install the Client Access and Mailbox servers in your organization.
Step 2: Create and configure a Telephone Extension, SIP URI, or E.164 UM dial plan.
Step 3: Create and configure a UM IP gateway. You must create and configure a UM IP
gateway for each VoIP gateway, IP PBX, SIP-enabled PBX, or SBC that will be accepting
incoming calls and sending outgoing calls.
Step 4: Create a new UM hunt group if needed. If you create a UM IP gateway and don’t
specify a UM dial plan, a UM hunt group will be automatically created.
Incorrect:
B, D: The question states, “You need to ensure that all voice mail sent to the existing extension of a user is delivered to the user's mailbox”. The dial plan is therefore a Telephone Extension dial plan. Client Access and Mailbox servers cannot be associated with Telephone Extension or E.164 dial plans.
Q33. DRAG DROP - (Topic 6)
You have an Exchange Server 2013 database availability group (DAG). Each member of the DAG has two network interfaces named Network1 and Network2. Network1 is used for client connections. Network2 is used for database replication.
Network2 fails.
You discover that replication traffic is sent over Network1.
You need to ensure that all of the database replication traffic is sent over Network2. The solution must minimize database replication downtime.
Which three actions should you perform?
To answer, move the three appropriate actions from the list of actions to the answer area and arrange them in the correct order.
Answer:
Q34. HOTSPOT - (Topic 6)
You have an Exchange Server 2013 organization named contoso.com.
Your company, which is named Contoso, Ltd., has a partnership with another company
named Fabrikam, Inc. Fabrikam has an Exchange Server 2013 organization.
Both organizations have a federation trust to the Microsoft Federation Gateway.
You need to ensure that the users at Fabrikam can see the free/busy information of the
users at Contoso, including the time, the location, and the subject of appointments.
Which command should you run? (To answer, select the appropriate options in the answer
area.)
Answer:
Q35. (Topic 3)
You implement the UM pilot.
You capture and analyze a network trace from the IP-PBX.
You discover that SIP/MTLS requests for TCP 5061 to EX1 are dropped.
You need to ensure that the IP-PBX can route calls successfully to the Exchange Server
2013 organization.
What should you do?
A. Modify the IP-PBX to route calls to EX5 and EX6.
B. Modify the port used on the IP-PBX.
C. Modify the SIP listening port on EX1.
D. Deploy a server that has Exchange Server 2010 and the Unified Messaging server role installed.
Answer: A
Q36. (Topic 6)
You have an Exchange Server 2013 organization that contains one office in Los Angeles and one office in New York.
All servers have the Mailbox server role and the Client Access server role installed and are members of a data availability group (DAG) named DAG1. The servers and databases are shown in the exhibit. (Click the Exhibit button.)
You need to ensure that if the active copy of NYDB01 fails, a server in the same site will attempt to activate a copy of the database before a server in another site does. The solution must not influence the activation of other database copies.
Which command should you run?
A. suspend-mailboxdatabasecopy -identity nydb01\ex3 -activationonly
B. set-mailboxserver -identity ex3 -autodatabasemountdial bestavailability
C. suspend-mailboxdatabasecopy -identity nydb01\ex4 -activationonly
D. set-mailboxserver -identity ex4 -autodatabasemountdial bestavailability.
Answer: C
Q37. (Topic 2)
You are creating a contingency plan to be implemented if the entire New York site fails after Exchange Server 2013 is deployed.
You need to recommend which tasks must be performed to ensure that all of the users can access Outlook Web App from the Chicago site if the New York fails.
Which three actions should you recommend? (Each correct answer presents part of the solution. Choose three.)
A. On the Client Access server in the Chicago site, set the ExternalURL of Outlook Web App to mail.adatum.com.
B. On the Mailbox server in the Chicago site, set the ExternalURL of Outlook Web App to mail.adatum.com.
C. Modify the host (A) record for mail.adatum.com to point to the Client Access server in the Chicago site.
D. On the Client Access server in the Chicago site, set the internal URL of Outlook Web App to mail.adatum.local.
E. Install the mail.adatum.com certificate and private key on the Client Access server in the Chicago site.
Answer: A,C,E
Explanation:
A: Example: To configure an external URL for Outlook Web App, run the following command in Exchange Management Shell. Set-OwaVirtualDirectory "<CAS2013>\OWA (Default Web Site)" -ExternalUrl https://mail.contoso.com/OWA
C: Need a new record in the DNS.
E: In Exchange 2013, you can use the Certificate Wizard to request a digital certificate from a certification authority. After you’ve requested a digital certificate, you’ll need to install it on the Client Access server.
Reference: Exchange 2013 Client Access server configuration
Q38. DRAG DROP - (Topic 6)
You have an Exchange Server 2010 organization that contains two servers named EX1 and EX2. EX1 and EX2 are members of a database availability group (DAG) named DAG1.
You plan to migrate the organization to Exchange Server 2013.
You install Exchange Server 2013 on two new servers named EX3 and EX4 and you import the required certificates.
You need to recommend which migration tasks must be performed to migrate the mailboxes and the public folders. The solution must meet the following requirements:
. Prevent any interruption to mailbox and public folder access during the migration.
. Ensure that all mailbox and public folder data remains highly available during the
migration.
Which five actions should you perform in sequence before decommissioning EX1 and EX2 from the network? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.
Answer:
Q39. (Topic 6)
You have an Exchange Server organization that contains Exchange Server 2010 servers and Exchange Server 2013 servers. You have a Microsoft Lync Server 2010 environment that is integrated with Unified Messaging (UM) services.
You have an Exchange Server 2010 server named EX1 that has the Unified Messaging server role installed.
You are migrating the UM services to Exchange Server 2013.
You need to prevent EX1 from providing call answering services during the migration.
What should you modify?
A. the UM mailbox policies
B. the UM auto attendants
C. the UM dial plans
D. the UM hunt groups
Answer: C
Q40. (Topic 6)
You are an administrator for an international finance company.
You plan to deploy an Exchange Server 2013 organization.
The company's compliance policy requires that all users be prevented from sending email messages that contain more than one bank account number to external recipients.
You need to meet the compliance policy requirement.
What should you create?
A. A data loss prevention (DLP) policy and a DLP policy rule
B. A retention policy, a retention tag, and a Policy Tip
C. A throttling policy and a throttling policy association
D. A transport rule and a moderated mailbox
Answer: A
Explanation:
Sensitive Information Types in DLP Policies
When you create DLP policies, you can include rules that include checks for sensitive information. The conditions that you establish within a policy, such as how many times something has to be found before an action is taken or exactly what that action is can be customized within your new custom policies in order to meet your business requirements. Sensitive information rules are integrated with the transport rules framework by introduction of a condition that you can customize: If the message contains…Sensitive Information. This condition can be configured with one or more sensitive information types that are contained within the messages.