getcertified4sure.com

What Improved 70-342 Is?




Proper study guides for Update Microsoft Advanced Solutions of Microsoft Exchange Server 2013 certified begins with Microsoft 70-342 preparation products which designed to deliver the Pinpoint 70-342 questions by making you pass the 70-342 test at your first time. Try the free 70-342 demo right now.

Q51.  (Topic 2) 

You need to recommend a solution to ensure that during the planned migrations, all Autodiscover requests are processed by the Exchange Server 2013 Client Access servers. 

What should you recommend? 

A. On the Exchange Server 2007 Client Access servers, modify the AutodiscoverServiceInternalURI. 

B. On the Exchange Server 2007 Client Access servers, modify the ExternalURL value of the Autodiscover virtual directory. 

C. On the Exchange Server 2013 Client Access servers, modify the ExternalURL value of the Autodiscover virtual directory. 

D. On the Exchange Server 2013 Client Access servers, modify the AutodiscoverServiceInternalURI. 

Answer:

Explanation: 

The Exchange Server 2007 Client Access servers must be configured to use the Exchange Server 2013 Client Access server. We do this by setting the AutodiscoverServiceInternalURI property. 


Q52.  (Topic 6) 

You have an Exchange Server 2010 organization that contains three servers. The servers are configured as shown in the following table. 

Microsoft Outlook is configured to connect to an FQDN of mail.adatum.com. Mail.adatum.com resolves to the IP address of a Layer 7 hardware load balancer. The hardware load balancer is configured to send traffic to EX2 and EX3. 

You deploy an Exchange Server 2013 Mailbox server named EX4 and an Exchange Server 2013 Client Access server named EX5. 

You plan to migrate all mailboxes to Exchange Server 2013. 

You need to recommend a solution to ensure that users can access their mailbox on EX1 or EX4 during the migration. 

What should you do? 

A. Create a Client Access server array that contains EX1 and EX5. 

B. Modify the autodiscover.contoso.com resource record to point to EX5. 

C. Modify the properties of the hardware load balancer to point to EX5. 

D. Create a DNS record named legacy.contoso.com in the internal DNS zone. 

Answer:

Explanation: 

Note: So what is the Client Access server in Exchange 2013? The Client Access server role is comprised of three components, client protocols, SMTP, and a UM Call Router. The CAS role is a thin, protocol session stateless server that is organized into a load balanced configuration. Unlike previous versions, session affinity is not required at the load balancer (but you still want a load balancer to handle connection management policies and health checking). This is because logic now exists in CAS to authenticate the request, and then route the request to the Mailbox server that hosts the active copy of the mailbox database. 

The Mailbox server role now hosts all the components and/or protocols that process, render and store the data. No clients will ever connect directly to the Mailbox server role; all client connections are handled by the Client Access server role. 

Reference: Exchange 2013 Server Role Architecture 


Q53. HOTSPOT - (Topic 5) 

You need to recommend which technology can be used to meet each email security requirement. 

What should you recommend? (To answer, select the appropriate technology for each 

requirement in the answer area.) 

Answer: 


Q54.  (Topic 6) 

You plan to deploy 20 Client Access servers that will have Exchange Server 2013 installed. 

You need to prepare the certificate required for the planned deployment. The solution must ensure that the same certificate can be used on all of the Client Access servers. 

What should you do first? 

A. From the Exchange Admin Center, create a new certificate request. 

B. On each Client Access server, start the Certificates console and run the Certificate Import Wizard. 

C. On all of the Client Access servers, delete the default self-signed certificates. 

D. On one of the Client Access servers, run the Remove-ExchangeCertificate cmdlet. 

Answer:

Explanation: 

You can use the EAC to generate certificate requests that work with most certificate 

issuers. 

Note: 

To prevent clients from receiving errors regarding untrusted certificates, the certificate 

that's used by your Exchange server must be issued by someone that the client trusts. 

Although most clients can be configured to trust any certificate or certificate issuer, it's 

simpler to use a trusted third-party certificate on your Exchange server. This is because most clients already trust their root certificates. There are several third-party certificate issuers that offer certificates configured specifically for Exchange. 


Q55.  (Topic 6) 

You have an Exchange Server 2013 organization named adatum.com. The organization contains five Mailbox servers. 

You need to prevent a user named User8 from permanently deleting an email message in his mailbox. 

What should you do on the mailbox of User8? 

A. Configure an in-place hold. 

B. Create an Archive mailbox. 

C. Configure a retention hold. 

D. Create a Retention tag. 

Answer:

Explanation: 

In Exchange 2013, you can use In-Place Hold to accomplish the following goals: Place user mailboxes on hold and preserve mailbox items immutably Preserve mailbox items deleted by users or automatic deletion processes such as MRM Use query-based In-Place Hold to search for and retain items matching specified criteria Preserve items indefinitely or for a specific duration Place a user on multiple holds for different cases or investigations Keep In-Place Hold transparent from the user by not having to suspend MRM Enable In-Place eDiscovery searches of items placed on hold 

Note: When a reasonable expectation of litigation exists, organizations are required to preserve electronically stored information (ESI), including email that's relevant to the case. This expectation often exists before the specifics of the case are known, and preservation is often broad. Organizations may need to preserve all email related to a specific topic or all email for certain individuals. 

Failure to preserve email can expose an organization to legal and financial risks such as scrutiny of the organization's records retention and discovery processes, adverse legal judgments, sanctions, or fines. 


Q56.  (Topic 6) 

You have a hybrid deployment of Exchange Server 2013. 

All of the users in the Seattle office have mailboxes that are hosted on-premises. All of the users in the Paris office have mailboxes that are hosted in Microsoft Office 365. Azure Rights Management (Azure RMS) is implemented for the Paris office users. 

Five of the Seattle office users occasionally receive protected messages from the Paris user. The Seattle office users report that they cannot view the protected content. 

You need to recommend a solution to provide the five Seattle office users with the ability to read the protected messages. The solution must minimize costs. 

What is the best recommendation to achieve the goal? More than one answer choice may achieve the goal. Select the BEST answer. 

A. RMS for Individuals 

B. Azure RMS 

C. Active Directory Rights Management Services (AD RMS) 

D. Information Rights Management (IRM) 

Answer:

Explanation: 

RMS for individuals is a free self-service subscription for users in an organization who have been sent sensitive files that have been protected by Azure Rights Management (Azure RMS), but their IT department has not implemented Azure Rights Management (Azure RMS), or Active Directory Rights Management Services (AD RMS). 

Reference: RMS for Individuals and Azure Rights Management 

https://technet.microsoft.com/en-us/library/dn592127.aspx 


Q57. DRAG DROP - (Topic 5) 

You need to resolve the network traffic issue for MapiNet. 

You suspend database replication. 

Which three cmdlets should you run next in sequence? (To answer, move the appropriate three cmdlets from the list of actions to the answer area and arrange them in the correct order.) 

Answer: 


Q58.  (Topic 3) 

You are evaluating the implementation of the organization relationship. 

You need to recommend which tasks must be performed to ensure that the Contoso users can view the Out of Office message of the Tailspin Toys users before the Contoso users send a message to the Tailspin Toys users. 

What should you recommend doing before implementing the organization relationship? 

A. Create a Policy Tip. 

B. Upgrade all of the client computers to Outlook 2010. 

C. Create a MailTip. 

D. Publish the Autodiscover service of Tailspin Toys. 

E. Create a remote domain. 

Answer:

Explanation: * Scenario: Implement an organization relationship between Contoso and Tailspin Toys. 


Q59. HOTSPOT - (Topic 2) 

You need to recommend a database availability group (DAG) design that meets the 

technical requirements. 

Which DAG design should you recommend? 

To answer, select the appropriate design in the answer area. 

Answer: 


Q60.  (Topic 6) 

You have an Exchange Server 2013 organization that is integrated with Information Rights Management (IRM). 

A user is unable to create and read IRM-protected messages from a mobile device. The user can open IRM- protected messages *missing text*. 

You need to identify the most likely cause of the issue. 

What should you identify? 

A. the value of DevicePasswordEnabled of a mobile device policy 

B. the value of AllowNonProvisionableDevices of a mobile device policy 

C. the Exchange ActiveSync protocol version 

D. the value of RequireDeviceEncryption of a mobile device policy 

Answer:

Explanation: 

Mobile IRM protection in Exchange 2013 When you set the RequireDeviceEncryption parameter to $true, mobile devices that don't support device encryption will be unable to connect. 

Note: Using IRM in Exchange ActiveSync, mobile device users can: 

* Create IRM-protected messages. 

* Read IRM-protected messages. 

* Reply to and forward IRM-protected messages. 

Reference: Information Rights Management in Exchange ActiveSync 

https://technet.microsoft.com/en-us/library/ff657743(v=exchg.150).aspx