Actualtests offers free demo for 70-342 exam. "Advanced Solutions of Microsoft Exchange Server 2013", also known as 70-342 exam, is a Microsoft Certification. This set of posts, Passing the Microsoft 70-342 exam, will help you answer those questions. The 70-342 Questions & Answers covers all the knowledge points of the real exam. 100% real Microsoft 70-342 exams and revised by experts!
Q41. (Topic 6)
You are a network administrator for a company named Humongous Insurance. Humongous Insurance has an Active Directory forest that contains two domains.
You install the Active Directory Rights Management Services server role on a server named ADRMS1. The Active Directory Rights Management Services (AD RMS) server uses an internal certification authority (CA) for all certificates.
You plan to provide users with the ability to use AD RMS to protect all of the email messages sent to a partner company named Contoso, Ltd.
Contoso does not have AD RMS deployed.
You need to identify which components from the Humongous Insurance network must be accessible to Contoso to ensure that the users at Contoso can open protected messages.
Which two components should you identify? (Each correct answer presents part of the solution. Choose two.)
A. the AD RMS cluster
B. the certificate revocation list (CRL)
C. the Active Directory domain controllers
D. the Client Access servers
E. the Mailbox servers
F. the Global Catalog servers
Answer: B,C
Explanation:
B: The CRL is exactly what its name implies: a list of subscribers paired with digital
certificate status. The list enumerates revoked certificates along with the reason(s) for
revocation. The dates of certificate issue, and the entities that issued them, are also
included. In addition, each list contains a proposed date for the next release. When a
potential user attempts to access a server, the server allows or denies access based on the
CRL entry for that particular user.
C: If federation cannot be implemented and the external organization cannot implement
their own AD RMS infrastructure, hosting the user accounts can be the best option.
However, the cost of managing such accounts (for both the IT department and each user)
must be considered.
In this case, the users will need to be authenticated by a domain controller.
Q42. (Topic 6)
You have an Exchange Server 2013 organization that contains multiple Hub Transport servers. You need to recommend a message hygiene solution to| meet the following requirements:
-Block servers that are known to send spam
-Minimize administrative effort
What should you recommend?
A. an IP Block list
B. IP Block list providers
C. recipient filtering
D. sender filtering
Answer: B
Q43. (Topic 6)
You have an Exchange Server organization that contains five servers. The servers are configured as shown in the following table.
You deploy Microsoft Lync Server 2010. You need to create a Lync Server SIP Unified
Messaging (UM) dial plan to enable voice integration between Lync Server and Exchange Server.
Which three Exchange servers should you associate to the UM dial plans? (Each correct answer presents part of the solution. Choose three.)
A. Server1
B. Server2
C. Server3
D. Server4
E. Server5
Answer: A,B,E
Explanation:
A: You can enable Unified Messaging (UM) in Microsoft Exchange Server 2010. You must enable the Exchange computer running the Unified Messaging server role before the Unified Messaging server can process calls for UM-enabled Exchange 2010 recipients in your Exchange organization. However, the Unified Messaging server also must be added to a UM dial plan before it can process calls for Unified Messaging.
B, E:
* Requirements and Recommendations Client Access and Mailbox. In Microsoft Exchange Server 2013, Exchange UM runs as a service on these servers.
* Deploy the Exchange Mailbox server roles in each Exchange Unified Messaging (UM) forest where you want to enable users for Exchange UM.
Reference: Configuring Unified Messaging on Microsoft Exchange Server to Work with Lync Server 2013
Q44. DRAG DROP - (Topic 5)
You need to implement UM for the sales department users.
Which four commands should you run in sequence? (To answer, move the appropriate four commands from the list of commands to the answer area and arrange them in the correct order.)
Answer:
Q45. (Topic 6)
Your company has an Exchange Server 2013 organization named adatum.com.
You purchase an Office 365 subscription and configure a hybrid deployment.
All recipients have an email address that contains a SMTP suffix of adatum.com.
You discover that all of the email messages sent to the Internet from users who have Office 365 mailboxes are routed through the on-premises Exchange servers.
You need to ensure that all of the email messages are sent directly to the Internet.
What should you do?
A. Modify the Send connector.
B. Run the Hybrid Configuration wizard.
C. Create a new Sharing policy.
D. Modify an organization relationship.
Answer: B
Explanation:
Creating and configuring a hybrid deployment with the Hybrid Configuration wizard is now a single process in Microsoft Exchange Server 2013.
Note: A hybrid deployment offers organizations the ability to extend the feature-rich experience and administrative control they have with their existing on-premises Microsoft Exchange organization to the cloud. A hybrid deployment provides the seamless look and feel of a single Exchange organization between an on-premises Exchange Server 2013 organization and Exchange Online in Microsoft Office 365. In addition, a hybrid deployment can serve as an intermediate step to moving completely to an Exchange Online organization.
Q46. (Topic 2)
You need to recommend an auditing solution that meets the compliance requirements. What should you recommend?
A. Export the mailbox audit log.
B. Run an administrator role group report.
C. Run a non-owner mailbox access report.
D. Export the administrator audit log.
Answer: D
Explanation:
* Scenario: All administrative changes made to the mailboxes must be tracked.
* You can use administrator audit logging in Microsoft Exchange Server 2013 to log when a user or administrator makes a change in your organization. By keeping a log of the changes, you can trace changes to the person who made the change, augment your change logs with detailed records of the change as it was implemented, comply with regulatory requirements and requests for discovery, and more.
Reference: Administrator audit logging
Q47. (Topic 2)
You need to recommend a solution for the voice mail traffic. The solution must meet the technical requirements.
Which two configurations should you include in the recommendation? (Each correct answer presents part of the solution. Choose two.)
A. A dial plan.
B. A server certificate
C. A transport rule
D. A data loss prevention (DLP) policy
E. A call answering rule
Answer: A,B Explanation:
* Scenario: Voice mail traffic between the telephone system and the Exchange Server environment must be encrypted.
A: Use the EAC to configure Protected Voice Mail from authenticated callers . In the EAC, navigate to Unified Messaging > UM dial plans. In the list view, select the UM dial plan you want to modify, and then click Edit. . On the UM Dial Plan page, under UM Mailbox Policies, select the UM mailbox policy you want to manage, and then click Edit. . On the UM Mailbox Policy page > Protected voice mail, under Protect voice
message from authenticated callers, select one of the following options: . Click Save.
B:
* In on-premises and hybrid deployments, you can configure a Client Access and Mailbox server to use mutual Transport Layer Security (mutual TLS) to encrypt the SIP and RTP traffic sent and received from other devices and servers. When you configure the dial plan to use SIP secured mode, only the SIP signaling traffic will be encrypted, and the RTP media channels will still use TCP, which isn’t encrypted. However, when you configure the dial plan to use Secured mode, both the SIP signaling traffic and the RTP media channels are encrypted. An encrypted signaling media channel that uses Secure Realtime Transport Protocol (SRTP) also uses mutual TLS to encrypt the VoIP data.
* When you’re deploying Transport Layer Security (TLS) with UM, the certificates that are used on the Client Access server and the Mailbox server both must contain the local computer's fully qualified domain name (FQDN) in the certificate’s Subject Name. To work around this issue, use a public certificate and import the certificate on all Client Access and Mailbox servers, any VoIP gateways, IP PBXs, and all the Lync servers.
Q48. (Topic 6)
You have an Exchange Server 2013 organization that is integrated with Microsoft Lync Server 2013. Users report that they fail to make Unified Messaging (UM) calls.
You download the Unified Message Troubleshooting tool.
You need to perform an end-to-end test of the UM components.
Which cmdlet should you use?
A. Test-ExchangeUMCallFlow
B. Test-CsPhoneBootstrap
C. Start-UMPhoneSession
D. Test-UMConnectivity
Answer: A
Explanation:
Use the Test-ExchangeUMCallFlow cmdlet (the UM Troubleshooting Tool) to test call flow between Client Access servers running the Microsoft Exchange Unified Messaging Call Router service, Mailbox servers running the Microsoft Exchange Unified Messaging service, VoIP gateways, IP PBXs, Session Initiation Protocol (SIP) servers and Microsoft Lync Server. The Test-ExchangeUMCallFlow cmdlet can be used to diagnose configuration errors found in telephony components, Exchange 2010 SP1 or later or Exchange 2013 Unified Messaging settings, and connectivity issues between on-premises and hybrid Unified Messaging deployments.
Reference: Test-ExchangeUMCallFlow
https://technet.microsoft.com/en-us/library/ff630913%28v=exchg.150%29.aspx
Q49. (Topic 6)
Your company has three offices. Each office has 1,000 users and is configured as an Active Directory site. Each site connects directly to the Internet.
The network contains six servers that have Exchange Server 2013 installed. The servers are configured as shown in the following table.
An administrator performs a datacenter switchover by changing the DNS record for webl.adatum.com to point to the IP address of web2.adatum.com.
Users from Main1 report that when they connect to Outlook Web App, they receive a certificate warning message.
You need to recommend a solution to ensure that the users do not receive a certificate warning message when a datacenter switchover is performed.
What should you include in the recommendation?
A. Three host headers for the Default Web Site on each Client Access server
B. One certificate that contains all of the external names as subject alternative names
C. Three certificates that each contains one of the external names
D. An external URL for each Client Access server set to $null
Answer: B
Explanation:
SAN Certificates (Subject Alternative Names) This type of certificate allows more than a single name in a single SSL certificate which makes total sense for the new Microsoft products (Lync and Exchange) because several services are using names and all of them are underneath the same IIS Web Site. In some Public CA these certificates are also known as UC Certificates.
Reference: Managing Certificates in Exchange Server 2013
Q50. (Topic 6)
Contoso, Ltd., and Fabrikam, Inc., are partner companies.
Each company has an Exchange Server 2013 organization in a data center that is connected to the Internet. All of the Exchange servers in both of the organizations have the Client Access server role and the Mailbox role installed.
The data centers connect to each other by using a redundant high-speed WAN link.
The following mail exchanger (MX) records are configured:
* Contoso.com MX 10 mail.contoso.com
* Fabrikam.com MX 10 mail.fabrikam.com
You need to recommend a solution for inbound mail flow.
The solution must meet the following requirements:
* Users in both companies must receive email from the Internet if either of the Internet links fails.
* Mail from the Internet to contoso.com must be received by mail.contoso.com if the Internet link at the Contoso data center is available.
* Mail from the Internet to fabrikam.com must be received by mail.fabrikam.com if the Internet link at the Fabrikam data center is available.
Which two actions should you recommend? (Each correct answer presents part of the solution. Choose two.)
A. Create the following DNS records:
* Contoso.com MX 20 mail.fabrikam.com
* Fabrikam.com MX 20 mail.contoso.com
B. Create the following DNS records:
* Contoso.com MX 10 mail.fabrikam.com
* Fabrikam.com MX 10 mail.contoso.com
C. For each organization, configure an internal relay domain and a Send connector.
D. For each organization, configure an external relay domain and a Receive connector.
E. Create the following DNS records:
* Contoso.com MX 5 mail.fabrikam.com
* Fabrikam.com MX 5 mail.contoso.com
Answer: A,C
Explanation:
A: Use a priority above 10.
D: “Each company has an Exchange Server 2013 organization”. We therefore need to configure an External relay. An Internal relay would be used if the two SMTP domains were in the same Exchange organization. We also need to configure a Receive connector in each organization to allow the organization to receive email destined for the other organization.