getcertified4sure.com

Top Tips Of 70-342 courses




Exam Code: 70-342 (Practice Exam Latest Test Questions VCE PDF)
Exam Name: Advanced Solutions of Microsoft Exchange Server 2013
Certification Provider: Microsoft
Free Today! Guaranteed Training- Pass 70-342 Exam.

Q1. DRAG DROP - (Topic 4) 

You need to identify which technologies must be used to meet the security requirements. 

Which technologies should you identify? (To answer, drag the appropriate technologies to the correct requirements. Each technology may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.) 

Answer: 


Q2.  (Topic 6) 

Your company has an Exchange Server 2010 organization. 

The network contains an internal root certification authority (CA). 

You plan to add a disclaimer to all email messages sent by users in the company. 

You need to ensure that the disclaimer can be added to encrypted email messages. 

What should you do? 

A. Instruct users to encrypt email messages by using IRM only. 

B. Instruct users to encrypt email messages by using S/'MIME only. 

C. Enable the Content Filter agent on all of the Hub Transport servers. 

D. Modify the priority of the Transport Rule agent on all of the Hub Transport servers. 

Answer:


Q3.  (Topic 6) 

Your company has offices in Tokyo, Bangkok, and Shanghai. 

All connections to the Internet are routed through an Internet connection in the Tokyo office. All of the offices connect to each other by using a WAN link. 

The network contains 10 servers that have Exchange Server 2010 installed. The servers are configured as shown in the following table. 

You plan to deploy 10 servers that will have Exchange Server 2013 installed. The servers will be configured as shown in the following table. 

Each site has an IP-PBX that provides telephony services for the mailboxes in that site by using unsecured SIP over TCP 5070. The IP-PBX uses the same port to connect to multiple SIP peers. 

You need to recommend which tasks must be performed to ensure that the Unified Messaging (UM) features are available to the mailboxes if a single server fails. 

Which three actions should you include in the recommendation? (Each correct answer presents part of the solution. Choose three.) 

A. Configure the Exchange Server 2013 Mailbox servers to listen to unsecured SIP on TCP 5070. 

B. Configure the Exchange Server 2013 Client Access servers to listen to unsecured SIP on TCP 5070. 

C. Install the Client Access server role on the Exchange Server 2013 servers in the Shanghai and Bangkok offices. 

D. Configure the Exchange Server 2013 Mailbox servers as additional SIP peers that contain new pilot identifiers. 

E. Configure the Exchange Server 2013 Client Access servers as additional SIP peers that contain new pilot identifiers. 

Answer: B,C,E 

Explanation: 

Note: 

* Exchange 2013 Unified Messaging offers administrators: / A complete voice mail system Unified Messaging offers a complete voice mail solution using a single store, transport, and directory infrastructure. The store is provided by a Mailbox server and forwarding of incoming calls from a VoIP gateway or IP PBX is handled by a Client Access server. All email and voice mail messages can be managed from a single management point, using a single administration interface and tool set. / An Exchange security model The Microsoft Exchange Unified Messaging service on a Mailbox server and the Microsoft Exchange Unified Messaging Call Router service on a Client Access server run as a single Exchange server account. Consolidation 

* The client access server (CAS) is a server role that handles all client connections to Exchange Server 2010 and Exchange 2013. The CAS supports all client connections to Exchange Server from Microsoft Outlook and Outlook Web App, as well as ActiveSync applications. The CAS also provides access to free/busy data in Exchange calendars. 

The CAS is one of five server roles in Exchange Server 2007 and Exchange 2010, and one of two server roles in Exchange Server 2013. It must be installed in every Exchange Server organization and on every Active Directory (AD) site that has the Exchange mailbox server role installed. 


Q4.  (Topic 6) 

You have a hybrid deployment of Exchange Server 2013. 

All of the users in the Seattle office have mailboxes that are hosted on-premises. All of the users in the Paris office have mailboxes that are hosted in Microsoft Office 365. Azure Rights Management (Azure RMS) is implemented for the Paris office users. 

Five of the Seattle office users occasionally receive protected messages from the Paris user. The Seattle office users report that they cannot view the protected content. 

You need to recommend a solution to provide the five Seattle office users with the ability to read the protected messages. The solution must minimize costs. 

What is the best recommendation to achieve the goal? More than one answer choice may achieve the goal. Select the BEST answer. 

A. RMS for Individuals 

B. Azure RMS 

C. Active Directory Rights Management Services (AD RMS) 

D. Information Rights Management (IRM) 

Answer:

Explanation: 

RMS for individuals is a free self-service subscription for users in an organization who have been sent sensitive files that have been protected by Azure Rights Management (Azure RMS), but their IT department has not implemented Azure Rights Management (Azure RMS), or Active Directory Rights Management Services (AD RMS). 

Reference: RMS for Individuals and Azure Rights Management 

https://technet.microsoft.com/en-us/library/dn592127.aspx 


Q5.  (Topic 6) 

You are an administrator for an international finance company. 

You plan to deploy an Exchange Server 2013 organization. 

The company's compliance policy requires that all users be prevented from sending email messages that contain more than one bank account number to external recipients. 

You need to meet the compliance policy requirement. 

What should you create? 

A. A data loss prevention (DLP) policy and a DLP policy rule 

B. A retention policy, a retention tag, and a Policy Tip 

C. A throttling policy and a throttling policy association 

D. A transport rule and a moderated mailbox 

Answer:

Explanation: 

Sensitive Information Types in DLP Policies 

When you create DLP policies, you can include rules that include checks for sensitive information. The conditions that you establish within a policy, such as how many times something has to be found before an action is taken or exactly what that action is can be customized within your new custom policies in order to meet your business requirements. Sensitive information rules are integrated with the transport rules framework by introduction of a condition that you can customize: If the message contains…Sensitive Information. This condition can be configured with one or more sensitive information types that are contained within the messages. 


Q6.  (Topic 3) 

You are evaluating the implementation of the organization relationship. 

You need to recommend which tasks must be performed to ensure that the Contoso users can view the Out of Office message of the Tailspin Toys users before the Contoso users send a message to the Tailspin Toys users. 

What should you recommend doing before implementing the organization relationship? 

A. Create a Policy Tip. 

B. Upgrade all of the client computers to Outlook 2010. 

C. Create a MailTip. 

D. Publish the Autodiscover service of Tailspin Toys. 

E. Create a remote domain. 

Answer:

Explanation: * Scenario: Implement an organization relationship between Contoso and Tailspin Toys. 


Q7. DRAG DROP - (Topic 6) 

You have an Exchange Server 2013 organization that has a hybrid deployment with Microsoft Office 365. 

You use Microsoft Azure Active Directory Sync (Azure AD Sync) for password synchronization. 

You need to configure Azure AD Sync to meet the following requirements: 

. Azure AD Sync must be forced to replicate every hour. . Only objects in an organizational unit (OU) named Sales must be synced with Office 365. . The Office 365 user account in Azure AD Sync must be updated to user1@fabrikam.onmicrosoft.com. 

Which solution should you include for each requirement? To answer, drag the appropriate solution to the correct requirement. Each solution may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content. 

Answer: 


Q8.  (Topic 6) 

You have an Exchange Server 2013 organization that contains multiple Hub Transport servers. You need to recommend a message hygiene solution to| meet the following requirements: 

-Block servers that are known to send spam 

-Minimize administrative effort 

What should you recommend? 

A. an IP Block list 

B. IP Block list providers 

C. recipient filtering 

D. sender filtering 

Answer:


Q9.  (Topic 6) 

You have an Exchange Server 2013 organization. 

The human resources (HR) department has a custom form used to enter the personal information of employees. The form uses the Microsoft Word format. 

You need to prevent users in the HR department from sending any completed forms to users outside of the organization. 

Which two of the following should you create? Each correct answer presents part of the solution. 

A. A transport rule 

B. A DLP policy template 

C. A Send connector of the Partner type 

D. A document fingerprint 

E. A Policy Tip 

Answer: A,D 

Explanation: 

First create a document fingerprint then create a Transport Rule to take action on the fingerprinted document. 

Note: Information workers in your organization handle many kinds of sensitive information during a typical day. Document Fingerprinting makes it easier for you to protect this information by identifying standard forms that are used throughout your organization. Document Fingerprinting is a Data Loss Prevention (DLP) feature that converts a standard form into a sensitive information type, which you can use to define transport rules and DLP policies. 

Reference: Protect Your IP Using Document Fingerprints 

http://blogs.technet.com/b/lystavlen/archive/2014/03/04/protect-your-ip-using-document-fingerprints.aspx 


Q10.  (Topic 6) 

You have an Exchange Server 2013 organization. 

You successfully migrate the public folders from a previous version of Exchange Server. 

You discover that one of the public folder mailboxes almost reached its quota size. 

You need to move some of the public folders in the public folder mailbox to another public folder mailbox. 

What should you run? 

A. Merge PublicFolderMailbox.ps1 

B. Set-MailPublicFolder 

C. New-PublicFolderMigrationRequest 

D. New-PublicFolderMoveRequest 

Answer:

Explanation: 

* If the content of a public folder mailbox begins to exceed your mailbox quotas, you may need to move public folders to a different public folder mailbox. There are a couple ways to do this. To move one or more public folders that don’t contain subfolders, you can use the PublicFolderMoveRequest cmdlets. 

* Use the New-PublicFolderMoveRequest cmdlet to begin the process of moving public folder contents between public folder mailboxes. Moving public folders only moves the physical contents of the public folder; it doesn't change the logical hierarchy. When the move request is completed, you must run the Remove-PublicFolderMoveRequest cmdlet to remove the request or wait until the time specified in the CompletedRequestAgeLimit parameter has passed. The request must be removed before you can run another move request.