Valid 70-342 Dumps shared by PassLeader for Helping Passing 70-342 Exam! PassLeader now offer the newest 70-342 VCE dumps and 70-342 PDF dumps, the PassLeader 70-342 exam questions have been updated and ANSWERS have been corrected, get the newest PassLeader 70-342 dumps with VCE and PDF here: http://www.passleader.com/70-342.html (233 Q&As Dumps)
BTW, DOWNLOAD part of PassLeader 70-342 dumps from Cloud Storage: https://drive.google.com/open?id=0B-ob6L_QjGLpfnExREVzWWtnTGZYZDhiVm1ESjV2dkgwU09EOExRMloxUE95aUdnWC1lUU0
Your network contains two Active Directory sites named Sitel and Site2. Both sites contain an equal number of users. Each site contains two Exchange Server 2013 Mailbox servers. You need to recommend a high-availability solution that meets the following requirements:
– If a single Mailbox server fails, the active mailbox database copies on that server must fail over to a Mailbox server in the same site.
– If both Mailbox servers in the same site fail, the active mailbox databases copies must be switched over to the other site manually.
– If a WAN link fails, multiple copies of the same mailbox database must not be activated in both sites simultaneously.
How should you configure the database availability groups (DAGs)? (To answer, configure the appropriate options in the answer area.)
Drag and Drop Question
Contoso, Ltd., is a bank that has offices in North America and Europe. The company must comply with different regulations for North America and Europe. The company uses Information Right Management (IRM) to protect sensitive documents, such as internal financial reports. You need to recommend a compliance solution to meet the following requirements:
– Prevent users from disclosing customers’ personal information in email messages.
– Prevent users from disclosing internal financial data to people outside of the company.
– Prevent the permanent deletion of email messages of users who are under investigation.
– Allow compliance officers to search the mailbox of users who are under investigation without being able to alter the data in the mailbox.
Which technology should you recommend for each requirement? To answer, drag the appropriate technology to the correct requirement in the answer area. Each technology may be used once, more than once, or not at all. Additionally, you may need to drag the split bar between panes or scroll to view content.
You have an Exchange Server 2013 organization. You need to create a single transport rule that prevents users in a group named Group1 from exchanging messages with users in a group named Group2. Which two options should you use? To answer, select the two appropriate options in the answer area.
Drag and Drop Question
You have an Exchange Server organization. The organization contains servers that have Exchange Server 2010 and Exchange Server 2013 installed. A new compliance policy requires that all email messages remain stored for two years. You create two retention tags named Tag1 and Tag2. Tag1 moves the email messages to an Archive mailbox after one year. Tag2 permanently deletes the email messages after two years. You need to meet the compliance policy requirements. The solution must ensure that all email messages that are older than two years are removed as quickly as possible. Which three actions should you perform? To answer, move the three appropriate actions from the list of actions to the answer area and arrange them in the correct order.
You have an Exchange Server 2013 organization. You need to ensure that a user named User1 can prevent the deletion of every email message that contains a specific word from all of the mailboxes. The solution must minimize the number of permissions assigned to User1. What should you do?
A. Add User1 to the Records Management management role group.
Instruct User1 to run the New-ManagedContentSettings cmdlet.
B. Add User1 to the Records Management management role group.
Instruct User1 to run the New-MailboxSearch cmdlet.
C. Add User1 to the Discovery Management management role group.
Instruct User1 to run the New-ManagedContentSettings cmdlet.
D. Add User1 to the Discovery Management management role group.
Instruct User1 to run the New-MailboxSearch cmdlet.
* If you want users to be able to use Microsoft Exchange Server 2013 In-Place eDiscovery, you must first authorize them by adding them to the Discovery Management role group. Members of the Discovery Management role group have Full Access mailbox permissions for the Discovery mailbox that’s created by Exchange Setup.
* The New-MailboxSearch cmdlet creates an In-Place eDiscovery search or an In-Place Hold. Unless specified, mailboxes on all Exchange 2013 servers in an organization are searched. You can stop, start, modify, or remove the search.
Your company has an Exchange Server 2013 organization named Contoso. A partner company has an Exchange Server 2013 organization named Fabrikam. Neither company has any trusts between their forests. Users from both organizations access their mailbox from the Internet by using Outlook Anywhere. You need to ensure that the users from both organizations can share free/busy information. Which two cmdlets should you run? (Each correct answer presents part of the solution. Choose two.)
Use the Add-AvailabilityAddressSpace cmdlet to define the access method and associated credentials used to exchange free/busy data across forests.
Use the New-SharingPolicy cmdlet to create a sharing policy to regulate how users inside your organization can share calendar and contact information with users outside the organization. Users can only share this information after federation has been configured in Exchange.
A company named Contoso, Ltd., has an Exchange Server 2013 organization. The primary SMTP suffix for all users is contoso.com. A company named Fabrikam, Inc., has an Exchange Server 2010 organization. The primary SMTP suffix for all users is fabrikam.com. The users in both organizations access their email by using Microsoft Outlook 2010 and Outlook Anywhere. All of the users work from domain-joined client computers that connect to the internal network.
Contoso acquires Fabrikam.
You establish a cross-forest trust between the Contoso forest and the Fabrikam forest. In fabrikam.com, you create a user named User1. In contoso.com, you create a linked mailbox for User1 and you set the primary SMTP address to User1@fabrikam.com. User1 reports that Outlook 2010 fails to configure his mail profile automatically. User1 can manually configure his profile and connect to his mailbox. You need to ensure that users in fabrikam.com can find their mailboxes automatically. What should you do in contoso.com?
A. Create a DNS record named autodiscover.fabrikam.com.
Point the record to the virtual IP address of the Client Access servers.
B. Modify the ExternalURL of the Autodiscover virtual directory on the Exchange Servers 2013 servers.
C. Modify the Autodiscover Service Connection Point (SCP).
D. Run the Export-AutoDiscoverConfig cmdlet on an Exchange Server 2013 server.
You can configure Microsoft Exchange services, such as the Availability service, for the Autodiscover service on a Microsoft Exchange Server 2010 Client Access server. When you enable Outlook Anywhere, you must also configure external client access to Microsoft Exchange services for the Autodiscover service. Other external URLS you must configure include the URLs for the Availability service, Exchange Web Services, Unified Messaging (UM), and the offline address book.
You have an Exchange Server 2013 organization that contains 10 servers. You have a federation trust to the Microsoft Federation Gateway. The certificate in the trust relationship expires soon. You need to replace the certificate. The solution must minimize downtime. You purchase a new certificate. What should you do next?
A. On all of the Exchange servers, import the certificate, and then run the New- FederationTrust cmdlet.
B. On all of the Exchange servers, import the certificate, and then run the Set- OrganizationRelationship cmdlet.
C. On one of the Exchange servers, import the certificate, and then run the Set- FederationTmst cmdlet.
D. On one of the Exchange servers, import the certificate, and then run the Set- FederatedOrganizationldentifier cmdlet.
You can use the Set-FederationTrust cmdlet to manage the certificates used for the federation trust. You can also use the Set-FederationTrust cmdlet to refresh the metadata document from the Microsoft Federation Gateway and download its certificate.
Drag and Drop Question
You work for a financial services company that has an Exchange Server 2013 organization. Mailbox audit logging is enabled for all mailboxes. The company identifies the following requirements for the sales department:
– The manager of the sales department must be able to search for email messages that contain specific key words in the mailboxes of the users in the sales department.
– The manager of the human resources department must receive a report that contains a list of all the sales users’ mailboxes that were searched by the sales manager.
You need to identify which tasks must be performed to meet the requirements. Which tasks should you identify? To answer, drag the appropriate task to the correct requirement in the answer area. Each task may be used once, more than once, or not at all. Additionally, you may need to drag the split bar between panes or scroll to view content.
You have an Exchange Server 2013 organization that contains one office in Los Angeles and one office in New York. All servers have the Mailbox server role and the Client Access server role installed and are members of a data availability group (DAG) named DAG1. The servers and databases are shown in the exhibit. (Click the Exhibit button.)
You need to ensure that if the active copy of LADB01 fails, a server in the same site will attempt to activate a copy of the database before a server in another site does. The solution must not influence the activation of other database copies. Which command should you run?
A. Set-databaseavailabilitygroupserver -identity dagl-alternatewitnessserverfs2
B. Set-mailboxserver-identity ex6 autodatabasemountdial bestavailability
C. Suspend-mailboxdatabasecopy-identity Iadb01\ex6 -activationonly
D. Set-mailboxdatabasecopy -identity Iadb01\ex2-activationpreferencel
Use the Set-MailboxDatabaseCopy cmdlet to configure the properties of a database copy. With this cmdlet, you can configure the replay lag time, truncation lag time, and activation preference value for a mailbox database copy.
– Activationpreference. The ActivationPreference parameter value is used as part of Active Manager’s best copy selection process and to redistribute active mailbox databases throughout the database availability group (DAG) when using the RedistributeActiveDatabases.ps1 script. The value for the ActivationPreference parameter is a number equal to or greater than 1, where 1 is at the top of the preference order. The position number can’t be larger than the number of database copies of the mailbox database.
Not C: Use the Suspend-MailboxDatabaseCopy cmdlet to block replication and replay activities (log copying and replay) or activation for a database configured with two or more database copies.
– Identity. The Identity parameter specifies the name of the database copy being suspended.
– ActivationOnly. The ActivationOnly switch specifies whether to suspend only activation for the mailbox database copy.
Your company has offices in Montreal, New York, and Toronto. Each office is configured as an Active Directory site. The Montreal office has a site link to the New York office. The New York office has a site link to the Toronto office. You have an Exchange Server 2013 organization that contains five Mailbox servers. The organization is configured as shown in the exhibit. (Click the Exhibit button.)
The servers in the Montreal and Toronto offices are members of a database availability group (DAG) named DAG01. DAG01 contains two databases name TOMBX and MTLMBX. MTLMBX is active on EX1 and contains all of the mailboxes of the users in the Montreal office. TOMBX is active on EX3 and contains all of the mailboxes of the users in the Toronto office. You need to ensure that all email messages transmitted between the Montreal users and the Toronto users are routed through EX5. Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)
A. Run the Set-MailboxTransportService cmdlet on EX5.
B. Make EX5 the source server for all of the Send connectors.
C. Create a separate DAG for each of the Montreal and Toronto offices.
D. Add EXS to DAG01.
E. Configure the New York office as a hub site.
As the respective location’s mailboxes are on the primary mailboxserver in each location, you can make a DAG just for that location. Other location’s users don’t need to be able to reach the other location in order to ‘see’ their mailboxes. Configuring a hub-site routes all messages through this site.
You are a network administrator for a company named Contoso, Ltd. You install the Active Directory Rights Management Services server role on a server. The Active Directory Rights Management Services (AD RMS) server uses an internal certification authority (CA) for all certificates. You plan to provide users with the ability to use AD RMS to protect all of the email messages sent to a partner company named A.Datum Corporation. A.Datum does not have AD RMS deployed. You need to identify which components from the Contoso network must be accessible to A.Datum to ensure that the users at A.Datum can open protected messages. Which two components should you identify? (Each correct answer presents part of the solution. Choose two.)
A. The Active Directory domain controllers
B. The Client Access servers
C. The certificate revocation list (CRL)
D. The Mailbox servers
A: Active Directory Rights Management Services (AD RMS) requires at least one Active Directory domain controller.
C: As a local CA is used we need access to the CRL.
You hire a junior administrator named Admin5. Admin5 is a member of the Recipient Management management role group. You discover that Admin5 created two new mailbox-enabled users by using the New-Mailbox command. You need to identify which management role provides Admin5 with the permissions to create new mailbox-enabled users. Which cmdlets should you run?
A. Get-ManagementRoleEntry and Get-RoleAssignmentPolicy
B. Get-Rolegroup and Get-ManagementRoleAssignment
C. Get-ManagementRoleEntry a-d Get-ManagementRoleAssignment
D. Get-RolegroupMember and Get-ManagementRoleAssignment
* Use the Get-ManagementRoleEntry cmdlet to retrieve management role entries that have been configured on management roles.
* Use the Get-ManagementRoleAssignment cmdlet to retrieve management role assignments.
You have an Exchange Server 2013 organization that contains one Client Access server named EX1 and one Mailbox server named EX2. You have a perimeter network and an internal network. The perimeter network contains an Edge Transport server named EX3 that has Exchange Server 2010 installed. You need to ensure that all of the email messages sent to and received from the Internet are routed through the EX3. Which three actions should you perform? (Each correct answer presents part of the solution. Choose three.)
A. Allow SMTP traffic between EX3 and EX2.
B. Create an Edge Subscription.
C. Allow traffic over TCP 50636 from EX1 to EX3.
D. Allow SMTP traffic between EX3 and EX1.
E. Allow traffic over TCP 50636 from EX2 to EX3.
F. Modify the default Receive connector on EX2.
To establish Internet mail through an Edge Transport server, subscribe the Edge Transport server to an Active Directory site. This automatically creates the two Send connectors required for Internet mail flow: A Send connector configured to send outbound email to all Internet domains. A Send connector configured to send inbound email from the Edge Transport server to an Exchange 2013 Mailbox server. SMTP traffic and ports TCP 50636 must be allowed between the mailbox server (routing service) and the Edge server.
You are an administrator for a company named Contoso, Ltd. Contoso has an Exchange Server 2013 organization. Contoso has a partnership agreement with a company named A.Datum Corporation. A.Datum has an Exchange server 2013 organization. Both organizations have a federation trust to the Microsoft Federation Gateway. Users at Contoso plan to share their free/busy information with users at A.Datum. You need to recommend which tasks must be performed to ensure that the A.Datum users can see the free/busy information of the Contoso users. Which two actions should you recommend? (Each correct answer presents part of the solution. Choose two.)
A. In the Exchange Server organization of Contoso, configure directory synchronization.
B. In the Exchange Server organization of A. Datum, create a sharing policy.
C. In the Exchange Server organization of A. Datum, configure directory synchronization.
D. In the Exchange Server organization of Contoso, create an organization relationship.
E. In the Exchange Server organization of Contoso, create a sharing policy.
F. In the Exchange Server organization of A. Datum, create an organization relationship.
Configure Federated Sharing.
Step 1: Create and configure a federation trust (this has already been done here).
Step 2 (D): Create an organization relationship. An organization relationship enables users in your Exchange organization to share calendar free/busy information as part of federated sharing with other federated Exchange organizations.
Step 3 (E): Create a sharing policy. Sharing policies enable user-established, people-to-people sharing of both calendar and contact information with different types of external users. They support the sharing of calendar and contact information with external federated organizations, external non- federated organizations, and individuals with Internet access. If you don’t need to configure people-to-people or contact sharing (organization-level sharing only), you don’t need to configure a sharing policy.
Step 4: Configure an Autodiscover public DNS record.
With federated sharing, users in your on-premises Exchange organization can share free/busy calendar information with recipients in other Exchange organizations that are also configured for federated sharing. Free/busy sharing can be enabled between two organizations running Exchange 2013 and also between organizations with a mixed Exchange deployment.
Drag and Drop Question
You have a server that has Exchange Server 2013 installed. You plan to deploy Unified Messaging (UM) to all users. You have two UM IP gateways named GW1 and GW2. You create, and then associate a new UM dial plan for each IP gateway. The IP gateways are configured as shown in the following table.
You need to recommend a solution that meets the following security requirements:
– All voice traffic received by GW1 must be encrypted.
– All voice traffic received by GW2 must be unencrypted.
– All signaling traffic to GW1 and GW2 must be encrypted.
Which security settings should you recommend configuring for each dial plan? To answer, drag the appropriate security setting to the correct UM dial plan in the answer area. Each security setting may be used once, more than once, or not at all. Additionally, you may need to drag the split bar between panes or scroll to view content.
You have an Exchange Server 2013 organization that contains multiple Hub Transport servers. You need to recommend a message hygiene solution to meet the following requirements:
– Block servers that are known to send spam.
– Minimize administrative effort.
What should you recommend?
A. an IP Block list
B. IP Block list providers
C. recipient filtering
D. sender filtering
You have an Exchange Server 2010 organization named adatum.com. All public folders are stored on a server named EX5. You deploy a new server named EX6. EX6 has Exchange Server 2013 installed. You move all mailboxes to EX6. You need to move the public folders to EX6. The solution must ensure that users can access the public folders after EX5 is decommissioned. Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)
A. On EX6, create a public folder mailbox.
B. On EX6, run the New-PublicFolderMigrationRequest cmdlet.
C. On EX5, modify the replication partners for all of the public folders.
D. On EX6, run the New-SiteMailboxProvisioningPolicy cmdlet.
E. On EX5, assign the FolderOwner permission to the Public Folder Management management role group for all of the public folders.
F. On EX6, run the MoveAllReplicas.ps1 script.
B: Use the New-PublicFolderMigrationRequest cmdlet to begin the process of migrating public folders from Microsoft Exchange Server 2007 or Exchange Server 2010 to Exchange Server 2013.
Note: See step 4 and 5 below:
Step 1: Download the migration scripts
Step 2: Prepare for the migration
Step 3: Generate the .csv files
Step 4: Create the public folder mailboxes on the Exchange 2013 server
Step 5: Start the migration request
New-PublicFolderMigrationRequest -SourceDatabase (Get-PublicFolderDatabase –Server <Source server name>) -CSVData (Get-Content <Folder to mailbox map path> -Encoding
Byte) -BadItemLimit $BadItemLimitCount
Step 6: Lock down the public folders on the legacy Exchange server for final migration (downtime required)
Step 7: Finalize the public folder migration (downtime required)
Step 8: Test and unlock the public folder migration
Your company has a main office and a branch office. An Active Directory site exits for each office. The offices are connected by a WAN link. You plan to deploy Exchange Server 2013 in each site. You need to identify the number of Exchange servers required to meet the following requirements:
– Maintain user access to mailboxes if a single server fails
– Use the minimize account of Exchange servers in each site
How many servers should you deploy in each site?
You have an Exchange Server 2010 organization. A user named User1 connects to his mailbox using Microsoft Office Outlook. User1 reports that he is unable to send encrypted email messages to an external recipient named User2. You verify that User1 and User2 have email encryption certificates. You need to ensure that User1 can send encrypted email messages to User2. What should you do first?
A. Instruct User2 to add a delegate.
B. Instruct User2 to send a signed email message to User1.
C. Instruct User1 to send a signed email message to User2.
D. Instruct User1 to modify the sensitivity settings of the email message.
Get the newest PassLeader 70-342 VCE dumps here: http://www.passleader.com/70-342.html (233 Q&As Dumps)
And, DOWNLOAD the newest PassLeader 70-342 PDF dumps from Cloud Storage for free: https://drive.google.com/open?id=0B-ob6L_QjGLpfnExREVzWWtnTGZYZDhiVm1ESjV2dkgwU09EOExRMloxUE95aUdnWC1lUU0