Your success in Microsoft 70-342 is our sole target and we develop all our 70-342 braindumps in a way that facilitates the attainment of this target. Not only is our 70-342 study material the best you can find, it is also the most detailed and the most updated. 70-342 Practice Exams for Microsoft MCSE 70-342 are written to the highest standards of technical accuracy.
Q91. HOTSPOT - (Topic 6)
You company has two offices. The offices are located in Los Angeles and New York.
You manage an Exchange Server 2013 organization.
A database availability group (DAG) named DAG1 contains servers from the Los Angeles office and servers from the New York office. There are copies of all the databases on all of the servers. The New York office is the primary data center and hosts all of the active database copies. As well as the witness server.
You run the Get-DatabaseAvailabilityGroup command and you receive the following output.
Select the correct option of below answer area now.
Answer:
Q92. HOTSPOT - (Topic 4)
You need to recommend a solution that meets the auditing requirements.
Which command should you include in the recommendation? (To answer, select the appropriate options in the answer area.)
Answer:
Q93. DRAG DROP - (Topic 6)
You have a server that has Exchange Server 2013 installed.
You plan to configure Unified Messaging (UM) to connect to an IP-PBX.
A telecommunications administrator configures the following numbers on the IP-PBX:
First extension number: 12100
Last extension number: 12499
Help extension number: 12500
Incoming pilot number: 12000
You need to configure UM to support the following requirements:
Users must be able to use Outlook Voice Access.
Users must be able to receive voice mail when callers connect to the users' extension.
Callers must be able to dial into an automated help system hosted by your company, which uses standard menus and speech-enabled menus.
Which numbers should you use for the UM configurations?
To answer, drag the appropriate number to the correct UM object in the answer area. Each number may be used once, more than once, or not at all. Additionally, you may need to drag the split bar between panes or scroll to view content.
Answer:
Q94. (Topic 6)
You have an Exchange Server 2013 organization.
You need to ensure that a user named User1 can prevent the deletion of every email message that contains a specific word from all of the mailboxes. The solution must minimize the number of permissions assigned to User1.
What should you do?
A. Add User1 to the Records Management management role group. Instruct User1 to run the New-ManagedContentSettings cmdlet.
B. Add User1 to the Records Management management role group. Instruct User1 to run the New-MailboxSearch cmdlet.
C. Add User1 to the Discovery Management management role group. Instruct User1 to run the New-ManagedContentSettings cmdlet.
D. Add User1 to the Discovery Management management role group. Instruct User1 to run the New-MailboxSearch cmdlet.
Answer: D
Explanation:
* If you want users to be able to use Microsoft Exchange Server 2013 In-Place eDiscovery, you must first authorize them by adding them to the Discovery Management role group. Members of the Discovery Management role group have Full Access mailbox permissions for the Discovery mailbox that's created by Exchange Setup.
* The New-MailboxSearch cmdlet creates an In-Place eDiscovery search or an In-Place Hold. Unless specified, mailboxes on all Exchange 2013 servers in an organization are searched. You can stop, start, modify, or remove the search.
Q95. DRAG DROP - (Topic 4)
You need to recommend a solution that supports the planned changes for the public folders.
Which four cmdlets should you recommend running in sequence? (To answer, move the appropriate four cmdlets from the list of cmdlets to the answer area and arrange them in the correct order.)
Answer:
Q96. (Topic 6)
You have an Exchange Server 2013 organization that contains the servers configured as shown in the following table.
All of the Exchange servers run Windows Server 2012 R2 and are members of a database availability group (DAG) named DAG1. Each server has a copy of all the mailbox databases. DAG1 is configured to have a cluster administrative access point. The file share witness is located in Site A.
EX5 fails and is taken offline permanently.
You need to identify the maximum number of Mailbox servers that can fail simultaneously without affecting the mailbox access of the users.
How many servers should you identify?
A. 2
B. 3
C. 4
D. 5
Answer: A
Q97. (Topic 2)
You need to recommend a solution for the memos. The solution must meet the compliance requirements.
What should you include in the recommendation?
A. Secure/Multipurpose Internet Mail Extensions (S/MIME)
B. Information Rights Management (IRM)
C. Domain Security
D. Data loss prevention (DLP) policies
Answer: B
Explanation:
* Scenario: Management occasionally sends the staff internal memos that contain confidential information, such as sales figures. The memos must be protected so that unauthorized users cannot read the memos and internal users cannot forward the memos to external recipients.
* With the IRM features in Exchange 2013, your organization and your users can control the rights recipients have for e-mail. IRM also helps allow or restrict recipient actions such as forwarding a message to other recipients, printing a message or attachment, or extracting message or attachment content by copying and pasting. IRM protection can be applied by users in Microsoft Outlook or Microsoft Office Outlook Web App, or it can be based on your organization's messaging policies and applied using transport protection rules or Outlook protection rules.
Reference: Information Rights Management
Q98. DRAG DROP - (Topic 6)
You have an Exchange Server 2010 organization that contains two servers named EX1 and EX2. EX1 and EX2 are members of a database availability group (DAG) named DAG1.
You plan to migrate the organization to Exchange Server 2013.
You install Exchange Server 2013 on two new servers named EX3 and EX4 and you import the required certificates.
You need to recommend which migration tasks must be performed to migrate the mailboxes and the public folders. The solution must meet the following requirements:
. Prevent any interruption to mailbox and public folder access during the migration.
. Ensure that all mailbox and public folder data remains highly available during the
migration.
Which five actions should you perform in sequence before decommissioning EX1 and EX2 from the network? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.
Answer:
Q99. HOTSPOT - (Topic 1)
You need to ensure that the HR1 group can perform the tasks required to meet the
technical requirements.
To which group should you add HR1?
To answer, select the appropriate group in the answer area.
Answer:
Q100. (Topic 6)
You have a server named Server1 that has Exchange Server 2013 installed.
Users access their mailbox by using Microsoft Outlook 2010 and Outlook Web App.
You enable auditing for all of the mailboxes.
You need to identify when a mailbox is accessed by someone other than the owner of the mailbox.
What are two possible ways to achieve this goal? (Each correct answer presents a complete solution. Choose two.)
A. Export the administrator audit log.
B. Run an administrator role group report.
C. Export the mailbox audit log.
D. Run a non-owner mailbox access report.
E. Review the security event log.
Answer: C,D
Explanation:
C: Use the Auditing tab to run reports or export entries from the mailbox audit log and the
administrator audit log.
/ The mailbox audit log records whenever a mailbox is accessed by someone other than
the person who owns the mailbox. This can help you determine who has accessed a
mailbox and what they have done.
/ The administrator audit log records any action, based on a Windows PowerShell cmdlet,
performed by an administrator. This can help you troubleshoot configuration issues or
identify the cause of security- or compliance-related problems.
D: Run a Non-Owner Mailbox Access Report
Use this report to find mailboxes that have been accessed by someone other than the
person who owns the mailbox.