Exambible offers free demo for 70-342 exam. "Advanced Solutions of Microsoft Exchange Server 2013", also known as 70-342 exam, is a Microsoft Certification. This set of posts, Passing the Microsoft 70-342 exam, will help you answer those questions. The 70-342 Questions & Answers covers all the knowledge points of the real exam. 100% real Microsoft 70-342 exams and revised by experts!
Q21. DRAG DROP - (Topic 6)
Contoso, Ltd., is a bank that has offices in North America and Europe.
The company must comply with different regulations for North America and Europe.
The company uses Information Right Management (IRM) to protect sensitive documents, such as internal financial reports.
You need to recommend a compliance solution to meet the following requirements:
. Prevent users from disclosing customers' personal information in email messages.
. Prevent users from disclosing internal financial data to people outside of the company.
. Prevent the permanent deletion of email messages of users who are under investigation.
. Allow compliance officers to search the mailbox of users who are under investigation without being able to alter the data in the mailbox.
Which technology should you recommend for each requirement?
To answer, drag the appropriate technology to the correct requirement in the answer area. Each technology may be used once, more than once, or not at all. Additionally, you may need to drag the split bar between panes or scroll to view content.
Answer:
Q22. (Topic 6)
You have an Exchange Server 2013 organization that is integrated with Microsoft Lync Server 2013.
You need to get a list of all the calls received and placed by a user named User1 during the last 90 days.
Which cmdlet should you use?
A. Get-UMMailbox
B. Get-UMCallSummaryReport
C. Get-UMCallDataRecord
D. Get-UMPhoneSession
Answer: C
Explanation:
The Get-UMCallDataRecord cmdlet displays UM call data records for the last 90 days for a UM-enabled mailbox that you specify. Each UM call data record provides detailed information about all calls either placed to or received by the specified user.
This example displays the UM call data records for the UM-enabled user Tony. Get-UMCallDataRecord -Mailbox tony@contoso.com
Reference: Get-UMCallDataRecord
https://technet.microsoft.com/en-us/library/ff459248%28v=exchg.150%29.aspx
Q23. (Topic 3)
You need to identify which technologies must be deployed to meet the Office 365 coexistence requirements.
Which two technologies should you identify? (Each correct answer presents part of the solution. Choose two.)
A. the Microsoft Online Services Directory Synchronization tool
B. Active Directory Federation Services (AD FS) 2.0
C. Active Directory Rights Management Services (AD RMS)
D. an internal root CA
E. Active Directory Lightweight Directory Services (AD LDS)
Answer: A,B
Explanation:
* Scenario: Contoso identifies the following Office 365 coexistence requirements:
/ Office 365 users must be able to access their mailbox by using their Active Directory user
account in Contoso.
/ On-premises users must be able to share free/busy information and calendar information with the Office 365 users.
A: When you create an Office 365 mailbox in Exchange Online in a hybrid deployment, the mail user is created in Active Directory on-premises. Directory synchronization, if it's configured, automatically synchronizes this new user object to Office 365, where it’s converted to a cloud mailbox in Exchange Online. You can create Office 365 mailboxes as regular user mailboxes, resource mailboxes for meeting rooms and equipment, and shared mailboxes.
B: Step-By-Step: Setting up AD FS and Enabling Single Sign-On to Office 365
Q24. HOTSPOT - (Topic 6)
Your company has a main office and a disaster recovery site. An Active Directory site named MainSite exists for the main office. An Active Directory site named DRSite exists for the disaster recovery site. The two sites connect to each other by using a WAN link. All users work in the main office.
You have an Exchange Server 2013 organization. The organization contains six servers. The servers are configured as shown in the following table.
All of the Mailbox servers are members of a database availability group (DAG) named
DAG1.
After a WAN link failure, you discover that all of the active mailbox database copies are
located on MBX3, even though MBX1 and MBX2 are still running.
You need to prevent an automatic failover of DAG1 if the WAN link between the two sites
fails but the servers in both sites are still running.
The solution must prevent two active copies of the same database.
What should you do? (To answer, select the appropriate options in the answer area.)
Answer:
Q25. (Topic 6)
You have an Exchange Server 2013 organization.
The human resources (HR) department has a custom form used to enter the personal information of employees. The form uses the Microsoft Word format.
You need to prevent users in the HR department from sending any completed forms to users outside of the organization.
Which two of the following should you create? Each correct answer presents part of the solution.
A. A transport rule
B. A DLP policy template
C. A Send connector of the Partner type
D. A document fingerprint
E. A Policy Tip
Answer: A,D
Explanation:
First create a document fingerprint then create a Transport Rule to take action on the fingerprinted document.
Note: Information workers in your organization handle many kinds of sensitive information during a typical day. Document Fingerprinting makes it easier for you to protect this information by identifying standard forms that are used throughout your organization. Document Fingerprinting is a Data Loss Prevention (DLP) feature that converts a standard form into a sensitive information type, which you can use to define transport rules and DLP policies.
Reference: Protect Your IP Using Document Fingerprints
http://blogs.technet.com/b/lystavlen/archive/2014/03/04/protect-your-ip-using-document-fingerprints.aspx
Q26. DRAG DROP - (Topic 6)
Your company has two offices. The offices are located in New York and San Francisco.
You have an Exchange Server 2013 organization that contains two servers. The servers are configured as shown in the following table.
The organization contains four mailbox databases. The mailbox databases are configured as shown in the following table.
Recently, DB1 went offline because of a disk failure. The disk is restored and DB1 is mounted.
You discover that there are more than 10,000 email messages queued for delivery to DB1.
You need to preserve the messages and perform the following actions:
Export the messages queued for delivery to a different drive.
Clear the messages queued for delivery.
Ensure that the messages queued for delivery to DB1 are delivered while
preserving the original message header information.
Prevent duplicate messages.
Which four actions should you perform in sequence? (To answer, move the appropriate four actions from the list of actions to the answer area and arrange them in the correct order.)
Answer:
Q27. HOTSPOT - (Topic 1)
You need to ensure that the HR1 group can perform the tasks required to meet the
technical requirements.
To which group should you add HR1?
To answer, select the appropriate group in the answer area.
Answer:
Q28. (Topic 2)
You need to recommend a solution to ensure that the store managers meet the compliance requirements.
What should you include in the recommendation?
A. Retention tags and retention policies
B. Deleted item retention
C. An in-place hold
D. Personal archives
Answer: C
Explanation:
* Scenario: All store managers must be prevented from permanently deleting email messages from their Inbox.
* In Exchange 2013, you can use In-Place Hold to accomplish the following goals: Place user mailboxes on hold and preserve mailbox items immutably Preserve mailbox items deleted by users or automatic deletion processes such as MRM
* Preserve items indefinitely or for a specific duration Etc.
Reference: n-Place Hold and Litigation Hold
Q29. (Topic 6)
You have a server named Server1 that has Exchange Server 2013 installed.
Users access their mailbox by using Microsoft Outlook 2010 and Outlook Web App.
You enable auditing for all of the mailboxes.
You need to identify when a mailbox is accessed by someone other than the owner of the mailbox.
What are two possible ways to achieve this goal? (Each correct answer presents a complete solution. Choose two.)
A. Export the administrator audit log.
B. Run an administrator role group report.
C. Export the mailbox audit log.
D. Run a non-owner mailbox access report.
E. Review the security event log.
Answer: C,D
Explanation:
C: Use the Auditing tab to run reports or export entries from the mailbox audit log and the
administrator audit log.
/ The mailbox audit log records whenever a mailbox is accessed by someone other than
the person who owns the mailbox. This can help you determine who has accessed a
mailbox and what they have done.
/ The administrator audit log records any action, based on a Windows PowerShell cmdlet,
performed by an administrator. This can help you troubleshoot configuration issues or
identify the cause of security- or compliance-related problems.
D: Run a Non-Owner Mailbox Access Report
Use this report to find mailboxes that have been accessed by someone other than the
person who owns the mailbox.
Q30. (Topic 6)
You are a network administrator for a company named Contoso, Ltd.
You install the Active Directory Rights Management Services server role on a server. The Active Directory Rights Management Services (AD RMS) server uses an internal certification authority (CA) for all certificates.
You plan to provide users with the ability to use AD RMS to protect all of the email messages sent to a partner company named A. Datum Corporation.
ADatum does not have AD RMS deployed.
You need to identify which components from the Contoso network must be accessible to A. Datum to ensure that the users at A. Datum can open protected messages.
Which two components should you identify? (Each correct answer presents part of the solution. Choose two.)
A. The Active Directory domain controllers
B. The Client Access servers
C. The certificate revocation list (CRL)
D. The Mailbox servers
E. The AD RMS cluster
Answer: A,C
Explanation:
A:
The users in Adatum will need an account on a domain controller in Contoso to open a protected message.
C. The certificate used to secure the message will need to be checked against a certificate
revocation list (CRL).