Proper study guides for Leading Microsoft Advanced Solutions of Microsoft Exchange Server 2013 certified begins with Microsoft 70-342 preparation products which designed to deliver the Approved 70-342 questions by making you pass the 70-342 test at your first time. Try the free 70-342 demo right now.
Q11. (Topic 1)
You need to recommend an Outlook protection rule solution to meet the technical requirements.
What should you recommend?
A. Create an Outlook protection rule and filter the rule based on the FromDepartment property. Apply the Do Not Forward protection template to the rule and enable the UserCanOverride setting.
B. Create an Outlook protection rule and filter the rule based on the FromDepartment property. Apply the Do Not Forward protection template to the rule and disable the UserCanOverride setting.
C. Create an Outlook protection rule and filter the rule based on the SentTo property. Apply the Do Not Forward protection template to the rule and disable the UserCanOverride setting.
D. Create an Outlook protection rule and filter the rule based on the SentTo property. Apply the Do Not Forward protection template to the rule and enable the UserCanOverride setting.
Answer: B
Explanation:
* Scenario:
Prevent the forwarding of email messages sent by users who have a value of Legal in their
Department field.
* Use FromDepartment property and do not allow the user to override.
Q12. (Topic 6)
You have a hybrid deployment of Exchange Server 2013 and Microsoft Office 365. The Exchange Server organization has a mailbox size limit of 2 GB.
You need to provide engineers with the ability to retain certain email messages indefinitely. The solution must meet the following requirements:
. Ensure that the engineers can access the retained email messages by using Outlook Web App.
. Ensure that the retained email messages do not apply to the mailbox size limit of the engineers.
. Minimize the storage requirements of the on-premises servers.
Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)
A. From Office 365, create Archive mailboxes.
B. Instruct the engineers to create a personal folder.
C. Create a retention policy.
D. From the on-premises Exchange Server 2013 organization, create Archive mailboxes.
E. Create a data loss prevention (DLP) policy.
Answer: A,C
Explanation:
C:
A:
In Exchange Server an archive mailbox is a second mailbox provisioned for a user that is
separate to their primary user mailbox.
Q13. HOTSPOT - (Topic 6)
You have an Exchange Server 2013 organization that contains four servers named EX1, EX2, EX3, and EX4. All of the servers run Windows Server 2012 R2 and are members of a database availability group (DAG) named DAG1. All of the mailbox databases replicate to all of the Mailbox servers.
From EX1, you run the Get-ClusterNode | fl cluster, state,*name*,*weight* command and you receive the following output.
Use the drop-down menus to select the answer choice that completes each statement.
Answer:
Q14. (Topic 6)
You are a network administrator for a company named Contoso, Ltd.
You install the Active Directory Rights Management Services server role on a server. The Active Directory Rights Management Services (AD RMS) server uses an internal certification authority (CA) for all certificates.
You plan to provide users with the ability to use AD RMS to protect all of the email messages sent to a partner company named A. Datum Corporation.
ADatum does not have AD RMS deployed.
You need to identify which components from the Contoso network must be accessible to A. Datum to ensure that the users at A. Datum can open protected messages.
Which two components should you identify? (Each correct answer presents part of the solution. Choose two.)
A. The Active Directory domain controllers
B. The Client Access servers
C. The certificate revocation list (CRL)
D. The Mailbox servers
E. The AD RMS cluster
Answer: A,C
Explanation:
A:
The users in Adatum will need an account on a domain controller in Contoso to open a protected message.
C. The certificate used to secure the message will need to be checked against a certificate
revocation list (CRL).
Q15. DRAG DROP - (Topic 4)
You need to identify which technologies must be used to meet the security requirements.
Which technologies should you identify? (To answer, drag the appropriate technologies to the correct requirements. Each technology may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.)
Answer:
Q16. HOTSPOT - (Topic 6)
You company has two offices. The offices are located in Los Angeles and New York.
You manage an Exchange Server 2013 organization.
A database availability group (DAG) named DAG1 contains servers from the Los Angeles office and servers from the New York office. There are copies of all the databases on all of the servers. The New York office is the primary data center and hosts all of the active database copies. As well as the witness server.
You run the Get-DatabaseAvailabilityGroup command and you receive the following output.
Select the correct option of below answer area now.
Answer:
Q17. HOTSPOT - (Topic 2)
You need to recommend a database availability group (DAG) design that meets the
technical requirements.
Which DAG design should you recommend?
To answer, select the appropriate design in the answer area.
Answer:
Q18. (Topic 6)
You have an Exchange Server 2013 organization that has a hybrid deployment with Microsoft Office 365. The hybrid deployment use Active Directory Federation Services (AD FS) 3.0.
You need to ensure that only Exchange ActiveSync devices are allowed to access Office 365 services from outside of the organization.
Which two actions should you perform? Each correct answer presents part of the solution.
A. Create a Mobile Device Mailbox Policy.
B. Update the Office 365 Identify Platform relying party trust.
C. Add claims rules to the Active Directory claims provider trust.
D. Update the Office mobile device policy.
E. Add an Active Directory Identify Platform relying party trust.
Answer: C
Explanation:
C: Step 1: Add claim rules to the Active Directory Claims Provider trust Block all external access to Office 365 except Exchange ActiveSync
The following example allows access to all Office 365 applications, including Exchange Online, from internal clients including Outlook. It blocks access from clients residing outside the corporate network, as indicated by the client IP address, except for Exchange ActiveSync clients such as smart phones. The rule set builds on the default Issuance Authorization rule titled Permit Access to All Users. Use the following steps to add an Issuance Authorization rule to the Office 365 relying party trust using the Claim Rule Wizard: (steps omitted).
B: Step 2: Update the Microsoft Office 365 Identity Platform relying party trust
Reference: Limiting Access to Office 365 Services Based on the Location of the Client
https://technet.microsoft.com/en-us/library/hh526961(v=ws.10).aspx
Q19. (Topic 5)
You need to resolve the content filtering issue for the Office 365 pilot users.
What should you do?
A. Run the Set-Mailbox cmdlet and specify the -MaxBlockedSenders and the -MicrosoftOnlineServicesID parameters.
B. Run the Microsoft Online Services Directory Synchronization Configuration Wizard and select Enable Exchange hybrid deployment.
C. Modify the default content filter policy from the Office 365 portal.
D. Run the Set-Mailbox cmdlet and specify the -MaxSafeSenders and the -MicrosoftOnlineServicesID parameters.
Answer: B
Explanation:
* Scenario:
/ The pilot users report that entries added to their Safe Senders list and their Blocked
Senders list fail to work.
/ For the pilot mailboxes, all inbound email messages from the Internet are delivered to the
Exchange Server organization, and then forwarded to Office 365.
* Hybrid Configuration wizard Exchange 2013 includes the Hybrid Configuration wizard which provides you with a streamlined process to configure a hybrid deployment between on-premises Exchange and Exchange Online organizations.
Reference: Exchange Server 2013 Hybrid Deployments
Q20. HOTSPOT - (Topic 6)
You have an Exchange Server 2013 organization that contains the servers configured as
shown in the following table.
All of the Exchange servers run Windows Server 2012 R2 and are members of a database availability group (DAG) named DAG1.
A mailbox database named DB1 replicates between EX1, EX2, EX3, and EX7. The mailbox database copy of DB1 on EX7 is a lagged database.
You need to ensure that if the number of healthy database copies of DB1 is less than three during a 24-hour period, the logs in the lagged database replay automatically.
What command should you run? To answer, select the appropriate options in the answer area.
Answer: