Valid 70-342 Dumps shared by PassLeader for Helping Passing 70-342 Exam! PassLeader now offer the newest 70-342 VCE dumps and 70-342 PDF dumps, the PassLeader 70-342 exam questions have been updated and ANSWERS have been corrected, get the newest PassLeader 70-342 dumps with VCE and PDF here: http://www.passleader.com/70-342.html (233 Q&As Dumps)
BTW, DOWNLOAD part of PassLeader 70-342 dumps from Cloud Storage: https://drive.google.com/open?id=0B-ob6L_QjGLpfnExREVzWWtnTGZYZDhiVm1ESjV2dkgwU09EOExRMloxUE95aUdnWC1lUU0
QUESTION 21
Drag and Drop Question
You need to recommend which tasks must be performed to meet the compliance requirement for the marketing department. Which three actions should recommend? To answer, move the three appropriate actions from the list of actions to the answer area and arrange them in the correct order.
Answer:
Explanation:
Note:
From scenario:
Compliance Requirements All of the email messages in the Sent Items Folder of each user in the Marketing Department of Contoso must be deleted automatically after 365 days. You can use retention policies to group one or more Retention Tags and apply them to Mailboxes to enforce Message Retention settings. A Mailbox can’t have more than one Retention Policy. Messages are expired based on settings defined in the Retention Tags linked to the Policy. These settings include actions such moving messages to the archive or permanently deleting them. Before applying a Retention Policy to one or more mailboxes, we recommended that you test the policy and inspect each Retention Tag associated with it. After you create Retention Tags, add them to a Retention Policy, and apply the policy to a mailbox user, the next time the MRM Mailbox Assistant Processes the mailbox, messages are moved or deleted based on settings you configured in the Retention Tags.
Reference:
– Exchange 2013, Apply a Retention Policy to Mailboxes.
– Create a Retention Policy.
QUESTION 22
Drag and Drop Question
You need to create a federation trust for the planned organization relationship. Which three actions should you perform? To answer, move the three appropriate actions from the list of actions to the answer area and arrange them in the correct order.
Answer:
Explanation:
http://technet.microsoft.com/en-us/library/jj657462%28v=exchg.150%29.aspx
QUESTION 23
You need to identify which technologies must be deployed to meet the Office 365 coexistence requirements. Which two technologies should you identify? (Each correct answer presents part of the solution. Choose two.)
A. The Microsoft Online Services Directory Synchronization tool
B. Active Directory Federation Services (AD FS) 2.0
C. Active Directory Rights Management Services (AD RMS)
D. An internal root CA
E. Active Directory Lightweight Directory Services (AD LDS)
Answer: AB
Explanation:
* Scenario: Contoso identifies the following Office 365 coexistence requirements:
– Office 365 users must be able to access their mailbox by using their Active Directory user account in Contoso.
– On-premises users must be able to share free/busy information and calendar information with the Office 365 users.
A:
When you create an Office 365 mailbox in Exchange Online in a hybrid deployment, the mail user is created in Active Directory on-premises. Directory synchronization, if it’s configured, automatically synchronizes this new user object to Office 365, where it’s converted to a cloud mailbox in Exchange Online. You can create Office 365 mailboxes as regular user mailboxes, resource mailboxes for meeting rooms and equipment, and shared mailboxes.
B:
Step-By-Step: Setting up AD FS and Enabling Single Sign-On to Office 365.
QUESTION 24
You implement the UM pilot. You capture and analyze a network trace from the IP-PBX. You discover that SIP/MTLS requests for TCP 5061 to EX1 are dropped. You need to ensure that the IP-PBX can route calls successfully to the Exchange Server 2013 organization. What should you do?
A. Modify the IP-PBX to route calls to EX5 and EX6.
B. Modify the port used on the IP-PBX.
C. Deploy a server that has Exchange Server 2010 and the Unified Messaging server role installed.
D. Modify the SIP listening port on EX1.
Answer: A
Explanation:
CAS not MBX listen 5061 TCP port:
http://technet.microsoft.com/en-us/library/aa998872%28v=exchg.150%29.aspx
QUESTION 25
Drag and Drop Question
The Montreal data center experiences a power failure. You need to ensure that all the users can access their mailbox. Which three actions should you perform? To answer, move the three appropriate actions from the list of actions to the answer area and arrange them in the correct order.
QUESTION 26
You need to recommend which tasks must be performed to meet the security requirements for Tailspin Toys. Which two tasks should you recommend? (Each correct answer presents part of the solution. Choose two.)
A. Run the set-transportserver -transportsyncenabled $true command.
B. Run the set-transportconfig -tsreceivedomainsecurelist tailspintoys.com command.
C. Run the set-transportservice -transportsyncenabled $true command.
D. Create a new Receive connector.
E. Create a new Send connector.
Answer: BD
Explanation:
* Scenario: Secure all of the email messages from the users at Tailspin Toys to the Contoso users.
Ensure that all of the messages can be secured if the certificates at Tailspin Toys are issued by a trusted third-party certification authority (CA).
* Configuring Domain Security on Exchange Server 2013.
http://dizdarevic.ba/ddamirblog/?p=78
QUESTION 27
Drag and Drop Question
You need to implement a solution to meet the security requirement for the temporary employees. You deploy an Active Directory Rights Management Services (AD RMS) cluster, and then you run the Set-IRMConfiguration cmdlet. Which three actions should you perform? To answer, move the three appropriate actions from the list of actions to the answer area and arrange them in the correct order.
Answer:
Explanation:
Box 1: Create an Active Directory group that contains the temporary employees.
Box 2: Create and configure an AD RMS template.
Box 3: Run the New-OutlookProtectionRule cmdlet.
Note:
* From scenario: Prevent temporary employees from executing a Reply All or a Forward of any email messages they receive.
* IRM provides persistent online and offline protection of email messages and attachments by applying the information protection technology AD RMS. IRM protection is configured by applying an AD RMS rights policy template. You can use policy templates to control permissions that recipients have on a message.
* Using Microsoft Outlook protection rules, you can protect messages with Information Rights Management (IRM) by applying an Active Directory Rights Management Services (AD RMS) template in Outlook 2010 before the messages are sent.
Reference:
– Create an Outlook Protection Rule.
– Exchange Server 2010: Implementing Compliance (part 1) – Configuring IRM.
Case Study 3: Trey Research (QUESTION 28 ~ QUESTION 37)
Overview General
Overview
Trey Research is a brokerage firm that has 5,000 users. Trey Research has a finance department, a human resources department, an investment department, and a legal department. Trey Research is acquiring a partner company named Fabrikam, Inc.
Physical Locations
Trey Research has four main offices located in Boston, Chicago, New York, and Atlanta. The offices connect to each other by using a WAN link. The Chicago office connects directly to the Internet.
Existing Environment
Network Environment
Trey Research has an Active Directory forest named treyresearch.com. The forest contains a single domain. All domain controllers run Windows Server 2012. Each office is configured as an Active Directory site. All user accounts are in an organizational unit (OU) based on their department. All users are in a universal security group based on their department. Trey Research has a Lync Server 2013 infrastructure. The infrastructure is configured to required encryption for voice traffic.
Exchange Server Organization
Trey Research has an Exchange Server organization that contains five servers. The servers are configured as shown in the following table.
The mailbox databases are mounted on the Exchange servers shown in the following table.
All of the mailboxes of the users in the executives department are mounted on DB3. A public folder database named PF1 is mounted on EX5. The Exchange Server organization has the following configurations:
– Users in the legal department use a shared mailbox named Legal. Legal is enabled for In-Place Hold. Legal is the only mailbox on DB2.
– All inbound and outbound email messages to and from the Internet are routed through EX1.
– Email messages sent and received by Fabrikam are secured by using Mutual TLS.
– All public folders are stored in PF1.
All users connect to their mailbox by using Microsoft Outlook 2013 and Outlook Web App. Fabrikam has an Exchange Server 2013 organization.
Problem Statements
Trey Research identifies the following issues:
– After a change to a certificate, users report that email messages sent to Fabrikam are not delivered.
– The storage for DB3 fails. The storage will be offline for the next two days.
Requirements
Planned Changes
Trey Research plans to implement the following changes:
– Move all public folders to an Exchange Server 2013 server. The solution must ensure that all users cannot modify the public folders stored on EX5 after the planned move.
– Integrate Unified Messaging (UM) services with the Lync Server 2013 infrastructure.
Collaboration Requirements
Custom recipient MailTips created in the Exchange Server organization of Trey Research must be visible to the users at Fabrikam. The solution must ensure that administrators can define a subset of users who can share their MailTips.
Auditing Requirements
The following actions must be audited for actions in the Legal mailbox only:
– Delegate – Purge mailbox content.
– Delegate – Transfer file between folders.
– Administrator – Messages sent by administrator.
– Administrator – Open any content within the mailbox.
Security Requirements
Trey Research identifies the following security requirements:
– Ensure that the users in the finance department can protect email messages from being altered in transit, regardless of the recipient.
– Prevent the email messages sent to the users in the human resources department from being forwarded to external recipients.
– Prevent the audio files in voice mail message marked as Private from being extracted from email messages.
– Redirect email messages that contain social security information to the legal department.
Compliance Requirements
Trey Research identifies the following compliance requirements:
– All users must be notified before they send an email message that contains any five bank account numbers to an external recipient. The users must be able to override the requirement if they have a valid business reason to send the email message.
– Users must use a custom message classification when they send email messages that contain information about the planned acquisition of Fabrikam.
– Only the users in the legal department must be able to use eDiscovery to view the contents of email messages sent by the finance department users.
QUESTION 28
Hotspot Question
You need to recommend a solution that meets the auditing requirements. Which command should you include in the recommendation? (To answer, select the appropriate options in the answer area.)
QUESTION 29
Hotspot Question
You need to recommend a solution that meets the compliance requirements for emailing bank account numbers. Which command should you include in the recommendation? (To answer, select the appropriate options in the answer area.)
QUESTION 30
Drag and Drop Question
You need to identify which technologies must be used to meet the security requirements. Which technologies should you identify? (To answer, drag the appropriate technologies to the correct requirements. Each technology may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.)
Answer:
QUESTION 31
Drag and Drop Question
You need to recommend a solution that supports the planned changes for the public folders. Which four cmdlets should you recommend running in sequence? (To answer, move the appropriate four cmdlets from the list of cmdlets to the answer area and arrange them in the correct order.)
QUESTION 32
You need to recommend a solution that meets the compliance requirements for email messages that contain information about the Fabrikam acquisition. Which three actions should you recommend? (Each correct answer presents part of the solution. Choose three.)
A. Create an Outlook protection rule.
B. Create a new custom message classification.
C. Modify the registry on all client computers.
D. Modify the Content Filtering settings.
E. Export the Message Classification configuration to an .xml file.
Answer: BCE
Explanation:
B:
Use the New-MessageClassification cmdlet to create a message classification instance in your organization.
E:
After you create a new message classification, you can specify the message classification as a transport rule predicate. Before Microsoft Outlook and Outlook Web App users can apply the message classification to messages, you must update the end-user systems with the message classification XML file created by the Export- OutlookClassification.ps1 script file. The Export-OutlookClassification.ps1 script file is located in the %ExchangeInstallPath%Scripts directory.
C:
Microsoft Office Outlook requires a local file (Classifications.xml) that contains definitions of the message classifications that Microsoft Exchange Server supports before Outlook users can apply message classifications to their messages. You must also create a registry key that enables message classification and references the Classifications.xml file on the Outlook user’s computer.
* From scenario: Compliance Requirements include:
Users must use a custom message classification when they send email messages that contain information about the planned acquisition of Fabrikam.
http://social.technet.microsoft.com/Forums/office/en-US/cc2ec491-38ed-445d-a04d-70b2e6246ae1/outlook-2013-with-custom-message-classifications?forum=outlook
http://technet.microsoft.com/en-us/library/bb124400%28v=exchg.150%29.aspx
QUESTION 33
You need to implement a solution that meets the collaboration requirements. What should you do?
A. Run the Set-CASMailbox cmdlet.
B. Create an organization relationship.
C. Create a new sharing policy.
D. Modify the organization configuration.
Answer: B
Explanation:
* Scenario: Custom recipient MailTips created in the Exchange Server organization of Trey Research must be visible to the users at Fabrikam. The solution must ensure that administrators can define a subset of users who can share their MailTips.
* MailTips Over Organization Relationships. You may want to restrict certain types of MailTips. You can either allow all MailTips to be returned or allow only a limited set that would prevent NDRs. You can configure this setting with the MailTipsAccessLevel parameter on the Set-OrganizationRelationship cmdlet.
QUESTION 34
Hotspot Question
You need to configure the Exchange Server UM dial plan for the planned integration of UM and Lync Server. How should you configure the UM dial plan? (To answer, select the appropriate dial plan type and VoIP security mode in the answer area.)
Answer:
Explanation:
http://technet.microsoft.com/en-us/library/gg398193.aspx
QUESTION 35
Hotspot Question
You are attempting to resolve the email delivery issue for Fabrikam. You need to identify which certificate is being used by the servers in the Exchange Server organization of Fabrikam. In which directory on EX1 should you review the log files? (To answer, select the appropriate directory in the answer area.)
Answer:
Explanation:
http://technet.microsoft.com/en-us/library/aa997624%28v=exchg.150%29.aspx
http://exchangeserverpro.com/exchange-server-protocol-logging/
QUESTION 36
Drag and Drop Question
You restore the files of DB3 to EX3. You need to mount DB3 on EX3. The solution must ensure that email messages sent to the users of DB3 while the database was offline are delivered once DB3 is mounted. Which three actions should you perform in sequence? (To answer, move the appropriate three actions from the list of actions to the answer area and arrange them in the correct order.)
Answer:
Explanation:
http://technet.microsoft.com/en-us/library/dd876926%28v=exchg.150%29.aspx
QUESTION 37
You need to implement a solution that meets the compliance requirements for the members of the legal department. Which two cmdlets should you use? (Each correct answer presents part of the solution. Choose two.)
A. New-RoleAssignmentPolicy
B. Add-ManagementRoleEntry
C. New-ManagementRole Assignment
D. New-ManagementRole
E. New-ManagementScope
Answer: CE
Explanation:
* From scenario:
– Only the users in the legal department must be able to use eDiscovery to view the contents of email messages sent by the finance department users.
– Users in the legal department use a shared mailbox named Legal.
Legal is enabled for In- Place Hold. Legal is the only mailbox on DB2. We need to assign the role to the legal department users using the New- ManagementRoleAssignment cmdlet. To restrict the eDiscovery access to the finance users emails, we need to create a scope using the New-ManagementScope cmdlet.
Case Study 4: Proseware, Inc. (QUESTION 38 ~ QUESTION 48)
Overview
General Overview
Proseware, Inc., is an international manufacturing company that has 1,000 users. Proseware has a sales department, a marketing department, a research department, and a human resources department. Proseware purchases another company named Contoso, Ltd. Contoso has 500 users.
Physical Locations
Proseware has two main offices located in New York and London. The offices connect to each other by using a WAN link. Each office connects directly to the Internet. Contoso has a single office in Dallas.
Existing Environment
Active Directory Environment
The Proseware network contains an Active Directory forest named proseware.com. The forest contains a single domain. All domain controllers run Windows Server 2012. Each office contains three domain controllers. Each office is configured as an Active Directory site. The Contoso network contains an Active Directory forest named contoso.com. The forest contains a single domain. All domain controllers run Windows Server 2012.
Exchange Server Organization
Proseware has an Exchange Server 2013 organization that contains four servers. The servers are configured as shown in the following table.
EX3 and EX4 are the members of a database availability group (DAG) named DAG1. DAG1 has two DAG networks. The networks are configured as shown in the following table.
Users connect to mail.proseware.com for Microsoft Outlook and Outlook Web App services. Mail.proseware.com resolves to an IP address on a hardware load balancer. All Outlook Anywhere users are enabled for Cached Exchange Mode. Proseware pilots a hybrid deployment of Exchange Server 2013 and Microsoft Office 365. The mailbox of each pilot user is moved to Office 365. For the pilot mailboxes, all inbound email messages from the Internet are delivered to the Exchange Server organization, and then forwarded to Office 365. Contoso has an Exchange Server 2010 organization.
Problem Statements
Proseware identifies the following issues:
– MapiNet is saturated with network traffic caused by the database replication between the members of DAG1 over MapiNet.
– The pilot users report that entries added to their Safe Senders list and their Blocked Senders list fail to work.
– A recent power outage in the New York office prevents all users from accessing their mailbox.
– A user named User1 reports that email messages are being sent from her mailbox without her consent.
Requirements
Planned Changes
Proseware plans to implement the following changes:
– Several users at Contoso will use a mailbox at Proseware as their primary mailbox. The Contoso users will use Autodiscover to configure their client settings and will use single sign-on.
– For a special project, an IT administrator will create 20 distribution groups that will each contain 200 members.
– Certain users in both companies will have a ©contoso.com SMTP suffix as their primary email address.
Technical Requirements
Proseware identifies the following technical requirements for the Exchange Server organization:
– Internal email messages must be rejected if the messages cannot be protected by using Shadow Redundancy.
– All database replication between DAG1 members must occur over the Rep1Net network.
Site Resiliency Requirements
Proseware identifies the following site resiliency requirements for the Exchange Server organization:
– All mailboxes must be available if a single site becomes unavailable. The solution must not require administrator intervention.
– User traffic on the WAN links must be minimized.
Email Security Requirements
Proseware identifies the following requirements for securing email messages:
– Email recipients must be able to identify whether an email message was modified during delivery.
– All email messages stored in the mailbox databases must be protected from theft.
– Users must be able to encrypt email messages from Outlook Web App.
Retention Requirements
Proseware plans to reduce mailbox server storage usage and to limit company liability. Proseware identifies the following requirements:
– Email messages in the Deleted Items folder must be retained for only 30 days.
– Email messages in a mailbox folder named Projects must be retained for 540 days, unless the messages contain contractual information.
– Email messages in the Projects folder that contain contractual information must be retained indefinitely.
– All other email messages must be removed after one year.
QUESTION 38
Drag and Drop Question
You need to resolve the network traffic issue for MapiNet. You suspend database replication. Which three cmdlets should you run next in sequence? (To answer, move the appropriate three cmdlets from the list of actions to the answer area and arrange them in the correct order.)
Answer:
Explanation:
http://technet.microsoft.com/en-us/library/dd638104%28v=exchg.150%29.aspx
QUESTION 39
Drag and Drop Question
You are preparing the environment for the planned retention solution. You need to identify which policy tags must be created to meet the retention requirements. Which policy tag types should you identify? (To answer, drag the appropriate policy tag types to the correct message types. Each policy tag tag may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.)
Answer:
Explanation:
Contractual email messages – Personal retention policy tags apply to individual items such as email messages.
Deleted items – Retention Policy Tags are created for default folders such as Inbox, Deleted items, etc.
Mailbox – Default Policy Tags apply to all items if they are not tagged.
Projects – Personal retention policy tags apply settings to custom folders.
http://technet.microsoft.com/en-us/library/dd297955(v=exchg.150).aspx
QUESTION 40
Drag and Drop Question
You need to implement UM for the sales department users. Which four commands should you run in sequence? (To answer, move the appropriate four commands from the list of commands to the answer area and arrange them in the correct order.)
Answer:
Explanation:
http://technet.microsoft.com/en-us/library/jj673564(v=exchg.150).aspx
Get the newest PassLeader 70-342 VCE dumps here: http://www.passleader.com/70-342.html (233 Q&As Dumps)
And, DOWNLOAD the newest PassLeader 70-342 PDF dumps from Cloud Storage for free: https://drive.google.com/open?id=0B-ob6L_QjGLpfnExREVzWWtnTGZYZDhiVm1ESjV2dkgwU09EOExRMloxUE95aUdnWC1lUU0