Valid 70-341 Dumps shared by PassLeader for Helping Passing 70-341 Exam! PassLeader now offer the newest 70-341 VCE dumps and 70-341 PDF dumps, the PassLeader 70-341 exam questions have been updated and ANSWERS have been corrected, get the newest PassLeader 70-341 dumps with VCE and PDF here: http://www.passleader.com/70-341.html (261 Q&As Dumps)
BTW, DOWNLOAD part of PassLeader 70-341 dumps from Cloud Storage: https://drive.google.com/open?id=0B-ob6L_QjGLpfjZ2U1ZfVEZvU0ZreTJkNG1xdmxjS0xUYkdHWVMxWFNRVDhOYTlyRzBjOXM
You have an Exchange Server 2013 organization. Each user has an In-Place Archive. You discover that several items in a user’s In-Place Archive are corrupt. You need to ensure that the user can access the corrupt items. Which tool should you use?
A. The Repair-FileIntegrity cmdlet
B. The Isinteg command
C. The New-MailboxRepairRequest cmdlet
D. The Eseutil command
New-MailboxRepairRequest -Mailbox ayla -CorruptionType ProvisionedFolder,SearchFolder,AggregateCounts,Folderview -Archive
This cmdlet is available only in on-premises Exchange Server 2013. Use the New-MailboxRepairRequest cmdlet to detect and fix mailbox corruptions. You can run this command against a specific mailbox or against a database. While this task is running, mailbox access is disrupted only for the mailbox being repaired. If you’re running this command against a database, only the mailbox being repaired is disrupted. All other mailboxes on the database remain operational.
This example detects and repairs all folder views for the mailbox firstname.lastname@example.org.
New-MailboxRepairRequest -Mailbox email@example.com -CorruptionType FolderView
This example only detects and reports on ProvisionedFolder and SearchFolder corruption issues to Ayla Kol’s mailbox. This command doesn’t repair the mailbox.
New-MailboxRepairRequest -Mailbox ayla -CorruptionType
This example detects and repairs AggregateCounts for all mailboxes on mailbox database MBX-DB01.
New-MailboxRepairRequest -Database MBX-DB01 -CorruptionType AggregateCounts
This example detects and repairs all corruption types for Ayla Kol’s mailbox and archive.
New-MailboxRepairRequest -Mailbox ayla -CorruptionType ProvisionedFolder,SearchFolder,AggregateCounts,Folderview -Archive
This example creates a variable that identifies Ann Beebe’s mailbox and then uses the variable to specify the values for the Database and StoreMailbox parameters to create a request to detect and repair all corruption types.
$Mailbox = Get-MailboxStatistics annb
New-MailboxRepairRequest -Database $Mailbox.Database -StoreMailbox
$Mailbox.MailboxGuid -CorruptionType ProvisionedFolder,SearchFolder,AggregateCounts,Folderview
Drag and Drop Question
You have an Exchange Server 2013 organization that contains a database availability group (DAG) named DAG1. The organization contains three servers. The servers are configured as shown in the following table.
EX1 and EX2 are members of DAG1. EX1 has an active copy of a database named DB1 and a passive copy of a database named DB2. EX2 has a passive copy of DB1 and an active copy of DB2. You plan to create a public folder named Invoices. You need to ensure that users can access the Invoices public folder if one of the DAG members fails. The solution must ensure that the users can send email messages to the Invoices public folder. Which three actions should you perform in sequence? (To answer, move the appropriate three actions from the list of actions to the answer area and arrange them in the correct order.)
A school has 200 students and 10 classes. Each class has 20 students. Each class has one teacher. The school has five administrative staff members. You need to design an Exchange Server 2013 organization for the school. The design must meet the following requirements:
– Students must be able to view only the email addresses of the other students in their class, the teacher of their class, and the entire administrative staff.
– Teachers must be able to view only the email addresses of the students in their class, all of the other teachers, and the entire administrative staff.
– The administrative staff must be able to see the email addresses of everyone.
– Everyone will use Microsoft Outlook 2013 to view a list of all the users.
You need to identify the minimum number of address lists, global address lists, Offline Address Books (OABs), and address book policies required for the design. How many of each should you identify? (To answer, select the appropriate numbers in the answer area.)
You create a mailbox named ConfRoom1 as shown in the exhibit. (Click the Exhibit button.) Users report that when they schedule meetings and attempt to locate ConfRoom1 in the All Rooms address list, they do not see ConfRoom1 on the list. You need to ensure that the users can locate ConfRoom1 on the All Rooms address list. What should you do?
A. Modify the Sharing Policy that is associated to ConfRoom1.
B. Run the Update-AddressList command and specify the -Identity parameter.
C. Run the Set-Mailbox command and specify the -IsRootPublicFolderMailbox parameter.
D. Delete the ConfRoom1 mailbox, and create a new resource mailbox.
This example creates a user in Active Directory and a resource mailbox for a conference room. The resource mailbox is located in Mailbox Database 1. The password must be reset at the next logon. The Exchange Management Shell prompts for the value of the initial password because it’s not specified.
New-Mailbox -UserPrincipalName firstname.lastname@example.org -Alias confmbx -Name ConfRoomMailbox -Database “Mailbox Database 1” -OrganizationalUnit Users -Room -ResetPasswordOnNextLogon $true
You have an Exchange Server 2013 organization that contains two servers named EX1 and EX2. EX1 and EX2 are the members of a database availability group (DAG) named DAG1. DAG1 contains two mailbox databases named DB1 and DB2. DB1 is active on EX1. DB2 is active on EX2. A disk on EX2 fails. DB2 fails over to EX1. Users who have mailboxes in DB2 report that Microsoft Outlook can no longer connect to the Exchange Server organization. You discover that DB2 is dismounted on EX1. When you attempt to mount DB2 on EX1, the operation fails. You need to identify what prevents DB2 from mounting on EX1. What should you do?
A. Run the Resume-MailboxdatabaseCopy cmdlet.
B. Run the Update-MailboxdatabaseCopy cmdlet.
C. Run the eseutil.exe command and specify the A parameter.
D. Run the eseutil.exe command and specify the/mft parameter.
You have an Exchange Server 2013 organization. You are troubleshooting an email delivery problem. You need to disable temporarily the antimalware scanning on a server that has Exchange Server 2013 installed. The solution must ensure that the antimalware engine continues to download updates. What should you run?
A. The Set-TransportConfig cmdlet
B. The New-MalwareFilterPolicy cmdlet
C. The Disable-Antimalwarescanning.psl script
D. The Set-Malwarchi11cringServer cmdlet
Your company has two offices. Each office is configured as an Active Directory site. You have an Exchange Server 2013 organization that contains four servers. The servers are configured as shown in the following table. MBX1 and MBX2 are members of a database availability group (DAG) named DAG1. A mailbox database named DB1 has a copy on each Mailbox server. DB1 is active on MBX2. You are creating a disaster recovery plan for the organization. You need to identify how email messages will be received for the mailboxes on DB1 if the Exchange Server transport services fail on MBX2 because of messages in the poison message queue. What should you identify?
A. Email messages will be queued on MBX1, and then delivered directly to the mailboxes on MBX2.
B. The Exchange Server transport services will restart automatically, and then put all delivery queues in a Retry state.
C. The Exchange Server transport services will restart automatically, and then purge the poison messages.
D. Email messages will be queued on CAS1 or CAS2, and then delivered directly to the mailboxes on MBX2.
Queues: Exchange 2013 Help.
Message Retry, Resubmit, and Expiration Intervals: Exchange 2013 Help.
Your company has four offices. Each office is configured as an Active Directory site. You have an Exchange Server 2013 organization that contains nine servers. The servers are configured as shown in the following table. A user named User1 is in a distribution group named D_Sales. The mailbox of User1 is in a database that is active on MBX4 and is configured to use MBX5 as an expansion server. You need to ensure that email sent to D_Sales from the Internet is received by CAS1, and then routed from MBX1 to MBX4. What should you do?
A. Configure Site1 as a hub site.
B. Modify the expansion server setting of D_Sales.
C. Modify the SubmissionServerOverrideList list on MBX1.
D. Configure Site3 as a hub site.
As the messages are routed from sender Mailbox Server Transport Service to recipient Mailbox Server Transport Service, I would say that it makes sense for the Expansion Server settings for the DL to be amended to MBX4. This action would remove MBX5 from the equation, and as the expansion server setting serves as the routing destination when specified, this would also ensure the emails are routed from MBX1 to MBX4. Assuming that all external email is received by CAS1 in Site1, then MBX1 would be responsible for routing the email, via the transport service to the other mailbox servers at other sites. When a hub site is used, all email traffic from the sites configured to use the hub site is affected. The question states that email sent to D_Sales needs to be rerouted, not all traffic. There is no mention of the need for hub sites, AD site costs, or other sites with internet facing CAS servers.
Exchange 2013 Mail Flow.
You have an Exchange Server 2013 organization that contains four servers. All users access their email by using Microsoft Outlook 2010. An administrator deploys a shared mailbox named Project. You assign all of the users in the marketing department Full Access permissions to Project. You discover that Project automatically appears in Outlook to all of the marketing department users. You need to ensure that Project only appears in Outlook to the marketing department users who add the mailbox manually to their Outlook profile. Which two cmdlets should you run? (Each correct answer presents part of the solution. Choose two.)
You have an Exchange Server 2013 organization. The organization contains a Mailbox server that hosts several databases, including a database named ExecsDB. ExecsDB contains the mailboxes of the company executives. The hard disk that contains ExecsDB fails. You replace the hard disk with a new disk, and then you mount the database. You create a recovery database in an alternate location, and then you restore the database files for ExecsDB to the alternate location. You need to ensure that all data is consistent before merging the mailbox data into the dial-tone database. What should you do first?
A. Run the isinteg.exe command and specify the -fix parameter.
B. Run the Move-ActiveMailboxDatabase cmdlet.
C. Run the Update-MailboxDatabaseCopy cmdlet.
D. Run the eseutil.exe command and specify the/R parameter.
You have an Exchange Server 2013 organization. You enable single item recovery for all users. A user named User1 accidentally deletes important email messages sent from a user named User2. User1 reports that he cannot locate the email messages in his Deleted Items folder. You need to recover the items. What command should you run? (To answer, select the appropriate options in the answer area.)
Fabrikam, Ltd. has an Exchange Server organization that contains two servers. The servers are configured as shown in the following table. Recently, the internal and external namespaces named mail.fabrikam.com and autodiscover.fabrikam.com were changed to point to EX2. You configure all of the users on EX2 to access their mailbox by using Microsoft Outlook from the Internet. You enable Outlook Anywhere on EX1. You need to ensure that users who have mailboxes on EX1 can connect to their mailbox from the Internet. What should you do on EX1?
A. Set the ExternalHostName value to NULL.
B. Set the ExternalClientAuthenticationMethod value to Basic and NTLM.
C. Set the IISAuthenticationMethods value to Basic and NTLM.
D. Set the InternalHostName value to NULL
Your company has two main offices. One office is located in Atlanta and the other office is located in Washington. The offices connect to each other by using a dedicated WAN link. You have an Exchange Server 2013 organization that contains four servers. The servers are configured as shown in the following table.
The company opens a new office in New York. The New York office connects directly to the Washington office via a dedicated WAN link. You configure a separate Active Directory site for each office. You discover poor response times when scheduling meetings and configuring Microsoft Outlook profiles from the client computers in the New York office. You need to reduce the amount of time required to schedule meetings and to configure Outlook profiles from the computers in the New York office. What command should you run? (To answer, select the appropriate options in the answer area.)
Your company has a main office and four branch offices. You have an Exchange Server 2013 organization that contains 2,500 mailboxes. An administrator plans to deploy Microsoft Lync Server 2013. You need to enable the unified contact store in the Exchange Server 2013 organization. What should you run?
A. The New-CsPartnerApplication cmdlet
B. The Set-ClientAccessServer cmdlet
C. The Configure-EnterprisePartnerApplication.ps1 script
D. The Set-AuthConfig cmdlet
Your network contains an Active Directory forest. The forest contains a single domain. You have an Exchange Server 2013 organization named Contoso that contains a server named EX01. Split permissions are configured for the organization. You need to change the permission model to shared permissions. What command should you run? (To answer, select the appropriate options in the answer area.)
You have an Exchange Server 2013 organization that contains a database availability group (DAG) named DAG1. DAG1 has two members. You create a mailbox database copy for each database on each DAG member. You plan to implement a service level agreement (SLA) that meets the following requirements: All deleted mailboxes must be recoverable for up to six months after they are deleted. When a mailbox is recovered, the entire contents of the mailbox must be recovered. You need to recommend a solution that meets the requirements. What should you recommend?
A. Get-Mailbox | Set-Mailbox -RetainDeletedItemsFor 180.00:00:00
B. Get-MailboxDatabase | Set-MailboxDatabase -MailboxRetention 180.00:00:00
C. Get-MailboxDatabase | Set-MailboxDatabase -DeletedItemRetention 180.00:00:00
D. Get-Mailbox | Set-Mailbox -Audit Log Age Limit 180.00:00:00
Get-MailboxDatabase | Set-MailboxDatabase -MailboxRetention 180.00:00:00
The MailboxRetention parameter specifies the length of time to keep deleted mailboxes. To specify a value, enter it as a time span: dd.hh:mm:ss where d = days, h = hours, m = minutes, and s = seconds. For example, to specify a 15-hour interval, enter 15:00:00. The maximum length of time to retain mailboxes is 24,855 days. By default, deleted mailboxes are retained for 30 days. This attribute applies to all mailboxes in this mailbox database.
You have an Exchange Server 2013 organization that contains two Client Access servers and two Mailbox servers. You configure DNS round robin on the Client Access servers. All of the host (A) and alias (CNAME) records in the DNS zone are configured to have a TTL value of 10 minutes. You need to recommend a solution to fail over client connections to a Client Access server automatically if Internet Information Services (US) fails. The solution must minimize costs. What should you recommend?
A. Deploy a Client Access server array.
B. Reduce the TTL values on all of the A and CNAME records to one minute.
C. Deploy a hardware load balancing solution.
D. Deploy Network Load Balancing (NLB) on each Client Access server.
Your network contains an Active Directory forest named contoso.com. The forest contains one domain and two sites named Site1 and Site2. Site1 connects directly to the Internet. You have an Exchange Server 2010 organization. Users access their email remotely by using Outlook Web App and Outlook Anywhere by connecting to the name mail.contoso.com. You plan to migrate to Exchange Server 2013. Exchange Server 2010 and Exchange Server 2013 will co-exist for several months during the migration. During the co-existence phase, the organization will contain seven servers. The servers will be configured as shown in the following table.
You need to identify which host names must be associated to which servers. The solution must ensure that the users can access mailboxes on EX2, EX4, EX6, and EX7. What should you do? (To answer, select the appropriate target for each host name in the dialog box in the answer area.)
A company named Fabrikam, Ltd. has an Exchange Server 2013 organization that contains two servers. The servers are configured as shown in the following table.
You configure the internal and external namespaces named mail.fabrikam.com and autodiscover.fabrikam.com to point to EX2. You configure Outlook Anywhere on EX1 as shown in the following table.
You configure Outlook Anywhere on EX2 as shown in the following table.
You need to ensure that all of the users on EX1 can connect to their mailbox by using Microsoft Outlook from the Internet. What should you do?
A. Change the authentication settings of EX1.
B. Disable IPv6 on EX1.
C. Change the authentication settings of EX2.
D. Disable Outlook Anywhere on EX1.
You have an Exchange Server 2013 organization. You need to ensure that an administrator named Adminl receives a daily email message that contains a log of all the Exchange Server administrative actions. Which cmdlet should you use in a scheduled task?
After the New-AdminAuditLogSearch cmdlet is run, the report is delivered to the mailboxes you specify within 15 minutes. The log is included as an XML attachment on the report email message. The maximum size of the log that can be generated is 10 megabytes (MB). You need to be assigned permissions before you can run this cmdlet. Although all parameters for this cmdlet are listed in this topic, you may not have access to some parameters if they’re not included in the permissions assigned to you. To see what permissions you need, see the “View-only administrator audit logging” entry in the Exchange and Shell infrastructure permissions topic.
New-AdminAuditLogSearch -ExternalAccess $true -StartDate 07/25/2013 -EndDate 10/24/2013 -StatusMailRecipients email@example.com,firstname.lastname@example.org -Name “Datacenter admin audit log”
Get the newest PassLeader 70-341 VCE dumps here: http://www.passleader.com/70-341.html (261 Q&As Dumps)
And, DOWNLOAD the newest PassLeader 70-341 PDF dumps from Cloud Storage for free: https://drive.google.com/open?id=0B-ob6L_QjGLpfjZ2U1ZfVEZvU0ZreTJkNG1xdmxjS0xUYkdHWVMxWFNRVDhOYTlyRzBjOXM