|Exam Name||:||Advanced Solutions of Microsoft Exchange Server 2013|
|Questions and Answers||:||180 Q & A|
|Updated On||:||January 18, 2018|
|PDF Download Mirror||:||70-342 Dump|
|Get Full Version||:||Pass4sure 70-342 Full Version|
You have an Exchange Server 2010 organization. A user named User1 connects to his mailbox using Microsoft Office Outlook. User1 reports that he is unable to send encrypted email messages to an external recipient named User2. You verify that User1 and User2 have email encryption certificates. You need to ensure that User1 can send encrypted email messages to User2. What should you do first?
Instruct User2 to add a delegate.
Instruct User2 to send a signed email message to User1.
Instruct User1 to send a signed email message to User2.
Instruct User1 to modify the sensitivity settings of the email message.
You have an Exchange Server organization that contains five servers. The servers are configured as shown in the following table.
You deploy Microsoft Lync Server 2010. You need to create a Lync Server SIP Unified Messaging (UM) dial plan to enable voice integration between Lync Server and Exchange Server. Which three Exchange servers should you associate to the UM dial plans? (Each correct answer presents part of the solution. Choose three.)
A: You can enable Unified Messaging (UM) in Microsoft Exchange Server 2010.
You must enable the Exchange computer running the Unified Messaging server role before the Unified Messaging server can process calls for UM-enabled Exchange 2010 recipients in your Exchange organization. However, the Unified Messaging server also must be added to a UM dial plan before it can process calls for Unified Messaging.
Requirements and Recommendations
Client Access and Mailbox. In Microsoft Exchange Server 2013, Exchange UM runs as a service on these servers.
Deploy the Exchange Mailbox server roles in each Exchange Unified Messaging (UM) forest where you want to enable users for Exchange UM.
Configuring Unified Messaging on Microsoft Exchange Server to Work with Lync Server 2013
You have an Exchange Server 2013 organization. All user mailboxes have an In- Place Archive enabled. You need to identify which email message types can be archived by using a retention policy. Which message type or types should you identify? (Each correct answer presents part of the solution. Choose all that apply.)
Retention policy tags can be created for these Folders:
This default folder is used to store meetings and appointments.
This default folder is used to store messages delivered to a mailbox.
This folder contains notes created by users in Outlook. These notes are also visible in Outlook Web App.
This default folder is used to store tasks. Etc.
Retention tags and retention policies
You have an Exchange Server 2013 organization named adatum.com. The organization contains five Mailbox servers. You need to prevent a user named User8 from permanently deleting an email message in his mailbox. What should you do on the mailbox of User8?
Configure an in-place hold.
Create an Archive mailbox.
Configure a retention hold.
Create a Retention tag.
In Exchange 2013, you can use In-Place Hold to accomplish the following goals:
✑ Place user mailboxes on hold and preserve mailbox items immutably
✑ Preserve mailbox items deleted by users or automatic deletion processes such as MRM
✑ Use query-based In-Place Hold to search for and retain items matching specified criteria
✑ Preserve items indefinitely or for a specific duration
✑ Place a user on multiple holds for different cases or investigations
✑ Keep In-Place Hold transparent from the user by not having to suspend MRM
✑ Enable In-Place eDiscovery searches of items placed on hold Note:
When a reasonable expectation of litigation exists, organizations are required to
preserve electronically stored information (ESI), including email that's relevant to the case. This expectation often exists before the specifics of the case are known, and preservation is often broad. Organizations may need to preserve all email related to a specific topic or all email for certain individuals. Failure to preserve email can expose an organization to legal and financial risks such as scrutiny of the organization's records retention and discovery processes, adverse legal judgments, sanctions, or fines.
You have a hybrid deployment of Exchange Server 2013. All of the users in the Seattle office have mailboxes that are hosted on-premises. All of the users in the Paris office have mailboxes that are hosted in Microsoft Office 365. Azure Rights Management (Azure RMS) is implemented for the Paris office users. Five of the Seattle office users occasionally receive protected messages from the Paris user. The Seattle office users report that they cannot view the protected content. You need to recommend a solution to provide the five Seattle office users with the ability to read the protected messages. The solution must minimize costs. What is the best recommendation to achieve the goal? More than one answer choice may achieve the goal. Select the BEST answer.
RMS for Individuals
Active Directory Rights Management Services (AD RMS)
Information Rights Management (IRM)
RMS for individuals is a free self-service subscription for users in an organization who have been sent sensitive files that have been protected by Azure Rights Management (Azure RMS), but their IT department has not implemented Azure Rights Management (Azure RMS), or Active Directory Rights Management Services (AD RMS).
RMS for Individuals and Azure Rights Management https://technet.microsoft.com/en-us/library/dn592127.aspx
You have an Exchange Server 2013 organization that has a hybrid deployment with Microsoft Office 365. The hybrid deployment use Active Directory Federation Services (AD FS) 3.0. You need to ensure that only Exchange ActiveSync devices are allowed to access Office 365 services from outside of the organization. Which two actions should you perform? Each correct answer presents part of the solution.
Create a Mobile Device Mailbox Policy.
Update the Office 365 Identify Platform relying party trust.
Add claims rules to the Active Directory claims provider trust.
Update the Office mobile device policy.
Add an Active Directory Identify Platform relying party trust.
C: Step 1: Add claim rules to the Active Directory Claims Provider trust Block all external access to Office 365 except Exchange ActiveSync The following example allows access to all Office 365 applications, including Exchange Online, from internal clients including Outlook. It blocks access from clients residing outside the corporate network, as indicated by the client IP address, except for Exchange ActiveSync clients such as smart phones. The rule set builds on the default Issuance Authorization rule titled Permit Access to All Users. Use the following steps to add an Issuance Authorization rule to the Office 365 relying party trust using the Claim Rule Wizard: (steps omitted).
B: Step 2: Update the Microsoft Office 365 Identity Platform relying party trust
Limiting Access to Office 365 Services Based on the Location of the Client https://technet.microsoft.com/en-us/library/hh526961(v=ws.10).aspx
You are a network administrator for a company named Humongous Insurance. Humongous Insurance has an Active Directory forest that contains two domains. You install the Active Directory Rights Management Services server role on a server named ADRMS1. The Active Directory Rights Management Services (AD RMS) server uses an internal certification authority (CA) for all certificates. You plan to provide a user with the ability to use AD RMS to protect all of the email messages sent to a partner company named Contoso, Ltd. Contoso does not have AD RMS deployed. You need to identify which components from the Humongous Insurance network must be accessible to Contoso to ensure that the users at Contoso can open protected messages. Which two components should you identify? (Each correct answer presents part of the solution. Choose two.)
the AD RMS cluster
the certificate revocation list (CRL)
the Active Directory domain controllers
the Client Access servers
the Mailbox servers
the Global Catalog servers
B: The CRL is exactly what its name implies: a list of subscribers paired with digital certificate status. The list enumerates revoked certificates along with the reason(s) for revocation. The dates of certificate issue, and the entities that issued
them, are also included. In addition, each list contains a proposed date for the next release. When a potential user attempts to access a server, the server allows or denies access based on the CRL entry for that particular user.
C: If federation cannot be implemented and the external organization cannot implement their own AD RMS infrastructure, hosting the user accounts can be the best option. However, the cost of managing such accounts (for both the IT department and each user) must be considered.
In this case, the users will need to be authenticated by a domain controller.
Your company is investigating a user named User1. You need to prevent User1 from permanently deleting items from his mailbox. What should you run?
Set-Mailbox User1 LitigationHoldEnabled $true.
Set-Mailbox User1 ModerationEnabled $true.
Set-Mailbox User1 RetainDeletedltemsUntilBackup $true.
Set-Mailbox User1 RetentionHoldEnabled $true.
You have an Exchange Server 2013 organization that contains four servers named EX1, EX2, EX3, and EX4. All of the servers run Windows Server 2012 R2 and are members of a database availability group (DAG) named DAG1. All of the mailbox databases replicate to all of the Mailbox servers.
From EX1, you run the Get-ClusterNode | fl cluster, state,*name*,*weight* command and you receive the following output.
Use the drop-down menus to select the answer choice that completes each statement.