[Free] 2018(Aug) Dumps4cert Microsoft 70-385 Dumps with VCE and PDF Download 271-280

Dumps4cert.com : Latest Dumps with PDF and VCE Files
2018 Aug Microsoft Official New Released 70-385
100% Free Download! 100% Pass Guaranteed!

Recertification for MCSE: Messaging

Question No: 271 – (Topic 13)

You have an Exchange Server 2013 organization.

You purchase a Microsoft Office 365 subscription and configure a hybrid deployment.

The network contains an SMTP relay server named smarthost.contoso.com. The server is configured to use a certificate that has a subject name of smarthost.contoso.com.

All users have Microsoft Outlook 2013 installed on their client computer. Outlook 2013 is configured to connect to mail.contoso.com.

All Exchange servers have a certificate that has a subject name of mail.contoso.com.

You discover that email messages sent from on-premises users are not delivered to Office 365 recipients. You discover that the Send connector for Office 365 uses a smart host of smarthost.contoso.com.

You need to ensure that the on-premises users can send email messages to the Office 365 recipients.

Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)

  1. Run the Hybrid Configuration Wizard again.

  2. Configure the Microsoft Exchange Online Protection (EOP) Send connector to use smarthost.contoso.com

  3. Configure the centralized mail transport option.

  4. Remove the smart host from the Send connector.

  5. Assign a certificate that has a subject name of smarthost.contoso.com to the Send connector.

Answer: B,D Explanation:

A: Creating and configuring a hybrid deployment with the Hybrid Configuration wizard is now a single process in Microsoft Exchange Server 2013. First, the wizard creates the HybridConfiguration object in your on-premises Active Directory. This Active Directory object stores the hybrid configuration information for the hybrid deployment and is updated by the Hybrid Configuration wizard. Next, the wizard gathers existing on-premises Exchange and Active Directory topology configuration data, Office 365 tenant and Exchange Online configuration data, defines several organization parameters and then

runs an extensive sequence of configuration tasks in both the on-premises and Exchange Online organizations.

E:

Note:

  • By default, Microsoft Exchange Server 2013 doesn’t allow you to send mail outside of your domain. To send mail outside your domain, you need to create a Send connector.

  • Use the Set-SendConnector cmdlet to modify a Send connector.

    / Parameters include TlsCertificateName

    The TlsCertificateName parameter specifies the X.509 certificate to use with TLS sessions and secure mail. Valid input for this parameter is [I]Issuer[S]Subject. The Issuer value is found in the certificate#39;s Issuer field, and the Subject value is found in the certificate#39;s Subject field. You can find these values by running the Get-ExchangeCertificate cmdlet.

    Question No: 272 – (Topic 13)

    You have an Exchange Server 2013 organization that contains the servers configured as shown in the following table.

    Dumps4Cert 2018 PDF and VCE

    All of the Exchange servers run Windows Server 2012 R2 and are members of a database availability group (DAG) named DAG1. Each server has a copy of all the mailbox databases. DAG1 is configured to have a cluster administrative access point. The file share witness is located in Site A.

    EX5 fails and is taken offline permanently.

    You need to identify the maximum number of Mailbox servers that can fail simultaneously

    without affecting the mailbox access of the users. How many servers should you identify?

    1. 2

    2. 3

    3. 4

    4. 5

    Answer: A

    Question No: 273 – (Topic 13)

    You have an Exchange Server 2013 organization. You plan to use document fingerprinting.

    You need to identify which file type cannot be used as a template for document fingerprinting.

    Which document type should you identify?

    1. .pptx

    2. .doc

    3. .txt

    4. .dotx

    Answer: D Explanation:

    Document Fingerprinting supports the same file types that are supported in transport rules. One quick note about file types: neither transport rules nor Document Fingerprinting supports the .dotx file type, which can be confusing because that’s a template file in Word. When you see the word “template” in this and other Document Fingerprinting topics, it refers to a document that you have established as a standard form, not the template file type.

    Reference: Document Fingerprinting

    https://technet.microsoft.com/en-us/library/dn635176(v=exchg.150).aspx

    Question No: 274 – (Topic 13)

    You plan to deploy 20 Client Access servers that will have Exchange Server 2013 installed.

    You need to prepare the certificate required for the planned deployment. The solution must ensure that the same certificate can be used on all of the Client Access servers.

    What should you do first?

    1. On one of the Client Access servers, run the New-ExchangeCertificate cmdlet and specify the PrivateKeyExportable parameter.

    2. On all of the Client Access servers, run the Get-ExchangeCertificate cmdlet.

    3. On one of the Client Access servers, run the New-ExchangeCertificate cmdlet and specify the BinaryEncoding parameter.

    4. On one of the Client Access servers, start the Certificates console and run the Certificate Import Wizard.

    Answer: A Explanation:

    We need to create a new certificate. We make it exportable. Note:

    Use the New-ExchangeCertificate cmdlet to create a self-signed certificate, renew an existing self-signed certificate, or generate a new certificate request for obtaining a certificate from a certification authority (CA).

    Question No: 275 – (Topic 13)

    You have an Exchange Server 2013 organization.

    You successfully migrate the public folders from a previous version of Exchange Server. You discover that one of the public folder mailboxes almost reached its quota size.

    You need to move some of the public folders in the public folder mailbox to another public folder mailbox.

    What should you run?

    1. Split-PublicFolderMailbox.ps1

    2. Set-MailPublicFolder

    3. Update-PublicFolderMailbox

    4. Set-PublicFolderMailbox

    Answer: A Explanation:

  • Split-PublicFolderMailbox.ps1

    Splits the given public folder mailbox based on the size of the folders.

  • If the content of a public folder mailbox begins to exceed your mailbox quotas, you may need to move public folders to a different public folder mailbox. There are a couple ways to do this. To move one or more public folders that don’t contain subfolders, you can use the PublicFolderMoveRequest cmdlets.

Reference: Move a Public Folder to a Different Public Folder Mailbox

Question No: 276 – (Topic 13)

Your company has an Exchange Server 2010 organization.

The network contains an internal root certification authority (CA).

You plan to add a disclaimer to all email messages sent by users in the company. You need to ensure that the disclaimer can be added to encrypted email messages. What should you do?

  1. Instruct users to encrypt email messages by using IRM only.

  2. Instruct users to encrypt email messages by using S/#39;MIME only.

  3. Enable the Content Filter agent on all of the Hub Transport servers.

  4. Modify the priority of the Transport Rule agent on all of the Hub Transport servers.

Answer: A

Question No: 277 HOTSPOT – (Topic 13)

You have an Exchange Server 2013 organization.

You run Get-OutlookAnywhere -Server EX1 | fl and you receive the following output.

Dumps4Cert 2018 PDF and VCE

Use the drop-down menus to select the answer choice that completes each statement.

Dumps4Cert 2018 PDF and VCE

Answer:

Dumps4Cert 2018 PDF and VCE

Explanation:

Dumps4Cert 2018 PDF and VCE

Box 1: ExternalClientAuthenticationMethod: Basic ExternalClientRequiresSsl: True

Box 2: InternalClientAuthenticationMethod: Ntlm InternalClientRequiresSsl: False

Question No: 278 – (Topic 13)

You have an Exchange Server 2013 organization. A user is involved in a possible litigation matter.

You need to protect all of the messages in a mailbox from permanent deletion. Which cmdlet should you use?

  1. Enable-InboxRule

  2. Add-MailboxPermisssion

  3. Set-Mailbox

  4. Set-Retention Policy

Answer: C Explanation:

This example configures April Stewart#39;s mailbox to retain deleted items for 30 days. Set-Mailbox -Identity – quot;April Stewartquot; -RetainDeletedItemsFor 30

Note: When a user deletes items from the Deleted Items default folder by using the Delete, Shift Delete, or Empty Deleted Items Folder actions, the items are moved to the Recoverable Items\Deletions folder. The duration that deleted items remain in this folder is based on the deleted item retention settings configured for the mailbox database or the mailbox.

Incorrect:

Not D: The Set-Retention Policy is used in a cloud environment only. Reference: Configure Deleted Item retention and Recoverable Items quotas

https://technet.microsoft.com/en-us/library/ee364752(v=exchg.150).aspx

Question No: 279 HOTSPOT – (Topic 13)

You have an Exchange Server 2013 organization that contains four servers named EX1, EX2, EX3, and EX4. All of the servers run Windows Server 2012 R2 and are members of a database availability group (DAG) named DAG1. All of the mailbox databases replicate to all of the Mailbox servers.

From EX1, you run the Get-ClusterNode | fl cluster, state,*name*,*weight* command and you receive the following output.

Dumps4Cert 2018 PDF and VCE

Use the drop-down menus to select the answer choice that completes each statement.

Dumps4Cert 2018 PDF and VCE

Answer:

Dumps4Cert 2018 PDF and VCE

Dumps4Cert 2018 PDF and VCE

Explanation:

* up to one more node

Ex4 is already down. If Ex3 fails as well, then there would still be Ex1 and Ex2. The Dag1 would still be operational if either of these nodes fail.

Important:

The advantage of Dynamic Quorum, is that it is now possible for a cluster to run even if the number of nodes remaining in the cluster is less than 50%! By dynamically adjusting the quorum majority requirement, the cluster can sustain sequential node shutdowns down to a single node and still keep running.

  • A DynamicWeight value of 1 indicates the node has a vote, and a value of 0 indicates the node does not have a vote.

    Note: Windows Server 2012 introduced a new model called Failover Clustering Dynamic Quorum, which we can use with Exchange. When using Dynamic Quorum, the cluster dynamically manages the vote assignment to nodes based on the state of each node.

    When a node shuts down or crashes, it loses its quorum vote. When a node successfully re-joins the cluster, it regains its quorum vote. By dynamically adjusting the assignment of quorum votes, the cluster can increase or decrease the number of quorum votes that are required to keep it running. This enables the cluster to maintain availability during sequential node failures or shutdowns.

  • Both Ex1 and Ex2 go offline

The idea behind DQ (Dynamic Quorum) is that, by adjusting the assignment of quorum votes and dynamically increasing or decreasing the number of quorum votes required to keep running, the cluster can sustain sequential node shutdowns (or failures) all the way down to a single node (referred to as a “last man standing”).

Question No: 280 HOTSPOT – (Topic 13)

You have an Exchange Server 2013 organization.

All users access their mailbox by using Outlook Web Access. Users can view .xml files from Outlook Web Access.

You need to meet the following compliance requirements: Audit the mailbox for a specific user.

Email the mailbox audit log to a compliance officer.

Which cmdlet should you use? To answer, select the appropriate options in the answer area.

Dumps4Cert 2018 PDF and VCE

Answer:

Dumps4Cert 2018 PDF and VCE

Explanation:

Dumps4Cert 2018 PDF and VCE

* Set-Mailbox

Enabling and Configuring Mailbox Auditing

Mailbox auditing isn#39;t enabled by default, so the first thing you need to do is enable auditing for the mailboxes for which you need to collect data. You need to use the Set-Mailbox cmdlet. For example, this command enables auditing for the mailbox named CEO Mailbox:

Set-Mailbox -Identity #39;CEO Mailbox#39; -AuditEnabled $True

* New-MailboxAuditLogSearch

Getting Auditing Data for Heavily Loaded Servers

It#39;s easy to retrieve auditing data for lightly loaded servers, but it can be quite a different matter for heavily loaded servers, where auditing is enabled on many mailboxes. Exchange provides the New-MailboxAuditLogSearch cmdlet for this purpose.

Running New-MailboxAuditLogSearch forces Exchange to execute a background search and return the results in the form of an XML-formatted attachment that#39;s emailed to the specified recipients. Take, for example, the following command:

New-Mailbox-AuditLogSearch `

-Name quot;Check for Delegated Sendsquot; `

-LogonTypes Delegate `

-StartDate #39;1/1/2012#39; -EndDate #39;2/1/2012#39; `

-StatusMailRecipients Tony.Redmond@contoso.com

100% Dumps4cert Free Download!
70-385 PDF
100% Dumps4cert Pass Guaranteed!
70-385 Dumps

Dumps4cert ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.