getcertified4sure.com

70 347 vce : Sep 2021 Edition




It is impossible to pass Microsoft office 365 exam 70 347 exam without any help in the short term. Come to Pass4sure soon and find the most advanced, correct and guaranteed Microsoft microsoft 70 347 practice questions. You will get a surprising result by our Abreast of the times Enabling Office 365 Services practice guides.

Q71. You administer Microsoft Exchange Online for Fabrikam, Inc. Fabrikam's Exchange Online tenant domain name is fabrikam.onmicrosoft.com. 

You verify the domain fabrikam.com in the Office 365 admin center and instruct other administrators to configure new Exchange Online users with fabrikam.com as the primary SMTP domain. The fabrikam.com domain is not federated. 

A user reports that his reply-to address is displayed to external email message recipients as User1@fabrikam.onmicrosoft.com. 

You need to configure the user's mailbox to meet the following requirements: 

. The user's reply-to address must be User1@fabrikam.com. 

. The email address User1@fabrikam.onmicrosoft.com must function as a secondary email address for the user. 

Which Windows PowerShell command should you run? 

A. Set MsolUser -UserPrincipalNameUser1@fabrikam.onmicrosoft.com -AlternateEmailAddresses user1@fabrikam.com 

B. Set-Mailbox -Identity user1@fabrikam.onmicrosoft.com -ForwardingAddress "User 1" 

C. Set-Mailbox -Identity user1@fabrikam.onmicrosoft.com -WindowsEmailAddressUser1@fabrikam.com 

D. Set-Mailbox -Identity user1@fabrikam.onmicrosoft.com -EmailAddresses user1@fabrikam.onmicrosoft.com, user1@fabrikam.com 

Answer:


Q72. Your company decides to migrate all users to Office 365. 

As part of the migration, Office 365 ProPlus will be installed on all client computers and the company will use Office Telemetry. 

You need to produce a report that contains the information collected by Office Telemetry. 

Which three types of information can you include in the report? Each correct answer presents part of the solution. 

A. Information about files that are not in the Most Recently Used list 

B. The names of add-ins and solutions that interact with Office 

C. The file names of Office files that are in the Most Recently Used list 

D. System information such as user name and computer name 

E. The contents of all files that are in the Most Recently Used list 

Answer: B,C,D 


Q73. Your company deploys Microsoft Lync Online. You deploy the Microsoft Lync 2010 client to all client computers. All users log on to the local domain. You need to prevent users from modifying the Advanced Connection Settings on the Lync 2010 client. What should you do? 

A. Deploy a Group Policy object (GPO) that uses the Communicator.adm administrative template. 

B. Deploy a Group Policy object (GPO) that removes all of the members of the local Administrators group. 

C. From the Lync Server Management Shell, run the Set-CsClientPolicy cmdlet. 

D. From the Lync Server Management Shell, run the Set-CsUserServicesConfiguration cmdlet. 

Answer:


Q74. Your company uses Microsoft Exchange Online and Microsoft Lync Online. 

You are planning the compliance strategy for electronic correspondence. 

You need to archive Lync communications for mailboxes that are placed on an in-place hold. 

Which two forms of Lync communications should you archive? Each correct answer presents part of the solution. 

A. Multiparty instant messages 

B. Peer-to-peer file transfers 

C. Audio and video for peer-to-peer conferences 

D. Whiteboards and polls shared during conferences 

E. Desktop sharing sessions 

Answer: A,C 


Q75. All employees at a company have Exchange Online mailboxes. 

You observe a surge in email messages that contain malware. You determine that all of the messages originate from a single IP address. 

You need to ensure that no email messages from the IP address are delivered to the users. 

What should you do? 

A. Create a malware filter. 

B. Create a connection filter. 

C. Create a content filter. 

D. Create a new transport rule. 

Answer:

Explanation: You can create an IP Allow list or IP Block list by editing the connection filter policy in the Exchange admin center (EAC). The connection filter policy settings are applied to inbound messages only. Reference: Configure the connection filter policy https://technet.microsoft.com/en-us/library/jj200718(v=exchg.150).aspx 


Q76. You are the Office 365 administrator for your company. The company uses Microsoft Exchange Online and Microsoft Lync Online. 

An employee named User1 has the user name, email address, and Lync address User1@contoso.com. 

The employee requests that you change only his Lync address to User1-Sales@contoso.com. 

You start a Windows PowerShell session and run the following commands, providing your admin account credentials when prompted: 

You need to complete the process of updating the employee's Lync address without affecting any other addresses. 

Which Windows PowerShell command should you run next? 

A. Set-MsolUser -UserPrincipalName $ID -ProxyAddresses@{add = "$NewAddress"; remove = "$OldAddress"> 

B. Set-Mailbox -Identity $ID -EmailAddresses@{add = "$NewAddress"; remove = "$Old Address"} 

C. Set-Mailbox -Identity $ID -WindowsEmailAddress $NewAddress 

D. Set-CsUser -Identity $ID -ProxyAddresses@{add = M$NewAddress'' remove="$OldAddress"> 

Answer:


Q77. HOTSPOT 

You are the Office 365 administrator for your company. You manage an on-premises Microsoft Exchange Server 2003 environment that has 500 users and an externally-hosted Exchange environment that has 500 users. The hosted Exchange environment does not allow Outlook Anywhere connectivity. You do not have administrative access to all mailboxes in the hosted environment. 

You plan to migrate and consolidate both environments into Office 365. You have the following migration requirements: 

Migrate on-premises mailboxes in batches by department. 

Migrate email, calendar, and contact items from the on-premises environment. 

Migrate only email from the hosted environment. 

In the table below, identify the migration type that must be used for each environment. Make only one selection in each column. Each correct selection is worth one point. 

Answer: 


Q78. You are the Office 365 administrator for Contoso, Ltd. 

Some email messages sent from the trusted domain fabrikam.com are being rejected as spam. Some of these email messages originate inside the fabnkam.com network, and some of them originate from an application in the fabrikam.com co-located data center. 

The fabrikam.com systems administrators have asked you to add their domain and the IP addresses of the data center that hosts their external application to your list of safe senders. 

You need to configure Microsoft Exchange Online Protection. 

Which two actions should you perform? Each correct answer presents part of the solution. 

A. Configure a content filter to allow the fabrikam.com domain. 

B. Configure a mail flow rule to bypass spam filtering for the data center IP address range. 

C. Create a connection filter to allow the data center IP address range. 

D. Add the fabrikam.com domain as an accepted domain. 

E. Create an inbound connector for the fabrikam.com domain. 

F. Configure a mail flow rule to bypass spam filtering for the fabrikam.com domain. 

Answer: C,F 

Explanation: 

References: http://blogs.msdn.com/b/tzink/archive/2013/07/02/how-to-use-safe-senders-in-eop-and-fope.aspx http://www.msexchange.org/kbase/ExchangeServerTips/MicrosoftOffice365/ExchangeOnline/safe-andblocked-senders-list-owa-2013-and-office-365.html http://technet.microsoft.com/en-GB/library/dn198251(v=exchg.150).aspx 

Connection Filters 

http://technet.microsoft.com/en-us/library/jj200718(v=exchg.150).aspx