[Free] 2017(Sep) EnsurePass Pass4sure Microsoft 70-385 Dumps with VCE and PDF 271-280

EnsurePass
2017 Sep Microsoft Official New Released 70-385
100% Free Download! 100% Pass Guaranteed!
http://www.EnsurePass.com/70-385.html

Recertification for MCSE: Messaging

Question No: 271 – (Topic 13)

You have an Exchange Server 2013 organization.

You purchase a Microsoft Office 365 subscription and configure a hybrid deployment.

The network contains an SMTP relay server named smarthost.contoso.com. The server is configured to use a certificate that has a subject name of smarthost.contoso.com.

All users have Microsoft Outlook 2013 installed on their client computer. Outlook 2013 is configured to connect to mail.contoso.com.

All Exchange servers have a certificate that has a subject name of mail.contoso.com.

You discover that email messages sent from on-premises users are not delivered to Office 365 recipients. You discover that the Send connector for Office 365 uses a smart host of smarthost.contoso.com.

You need to ensure that the on-premises users can send email messages to the Office 365 recipients.

Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)

  1. Run the Hybrid Configuration Wizard again.

  2. Configure the Microsoft Exchange Online Protection (EOP) Send connector to use smarthost.contoso.com

  3. Configure the centralized mail transport option.

  4. Remove the smart host from the Send connector.

  5. Assign a certificate that has a subject name of smarthost.contoso.com to the Send connector.

Answer: B,D Explanation:

A: Creating and configuring a hybrid deployment with the Hybrid Configuration wizard is now a single process in Microsoft Exchange Server 2013. First, the wizard creates the HybridConfiguration object in your on-premises Active Directory. This Active Directory object stores the hybrid configuration information for the hybrid deployment and is updated by the Hybrid Configuration wizard. Next, the wizard gathers existing on-premises Exchange and Active Directory topology configuration data, Office 365 tenant and Exchange Online configuration data, defines several organization parameters and then

runs an extensive sequence of configuration tasks in both the on-premises and Exchange Online organizations.

E:

Note:

  • By default, Microsoft Exchange Server 2013 doesn’t allow you to send mail outside of your domain. To send mail outside your domain, you need to create a Send connector.

  • Use the Set-SendConnector cmdlet to modify a Send connector.

    / Parameters include TlsCertificateName

    The TlsCertificateName parameter specifies the X.509 certificate to use with TLS sessions and secure mail. Valid input for this parameter is [I]Issuer[S]Subject. The Issuer value is found in the certificate#39;s Issuer field, and the Subject value is found in the certificate#39;s Subject field. You can find these values by running the Get-ExchangeCertificate cmdlet.

    Question No: 272 – (Topic 13)

    You have an Exchange Server 2013 organization that contains the servers configured as shown in the following table.

    Ensurepass 2017 PDF and VCE

    All of the Exchange servers run Windows Server 2012 R2 and are members of a database availability group (DAG) named DAG1. Each server has a copy of all the mailbox databases. DAG1 is configured to have a cluster administrative access point. The file share witness is located in Site A.

    EX5 fails and is taken offline permanently.

    You need to identify the maximum number of Mailbox servers that can fail simultaneously

    without affecting the mailbox access of the users. How many servers should you identify?

    1. 2

    2. 3

    3. 4

    4. 5

    Answer: A

    Question No: 273 – (Topic 13)

    You have an Exchange Server 2013 organization. You plan to use document fingerprinting.

    You need to identify which file type cannot be used as a template for document fingerprinting.

    Which document type should you identify?

    1. .pptx

    2. .doc

    3. .txt

    4. .dotx

    Answer: D Explanation:

    Document Fingerprinting supports the same file types that are supported in transport rules. One quick note about file types: neither transport rules nor Document Fingerprinting supports the .dotx file type, which can be confusing because that’s a template file in Word. When you see the word “template” in this and other Document Fingerprinting topics, it refers to a document that you have established as a standard form, not the template file type.

    Reference: Document Fingerprinting

    https://technet.microsoft.com/en-us/library/dn635176(v=exchg.150).aspx

    Question No: 274 – (Topic 13)

    You plan to deploy 20 Client Access servers that will have Exchange Server 2013 installed.

    You need to prepare the certificate required for the planned deployment. The solution must ensure that the same certificate can be used on all of the Client Access servers.

    What should you do first?

    1. On one of the Client Access servers, run the New-ExchangeCertificate cmdlet and specify the PrivateKeyExportable parameter.

    2. On all of the Client Access servers, run the Get-ExchangeCertificate cmdlet.

    3. On one of the Client Access servers, run the New-ExchangeCertificate cmdlet and specify the BinaryEncoding parameter.

    4. On one of the Client Access servers, start the Certificates console and run the Certificate Import Wizard.

    Answer: A Explanation:

    We need to create a new certificate. We make it exportable. Note:

    Use the New-ExchangeCertificate cmdlet to create a self-signed certificate, renew an existing self-signed certificate, or generate a new certificate request for obtaining a certificate from a certification authority (CA).

    Question No: 275 – (Topic 13)

    You have an Exchange Server 2013 organization.

    You successfully migrate the public folders from a previous version of Exchange Server. You discover that one of the public folder mailboxes almost reached its quota size.

    You need to move some of the public folders in the public folder mailbox to another public folder mailbox.

    What should you run?

    1. Split-PublicFolderMailbox.ps1

    2. Set-MailPublicFolder

    3. Update-PublicFolderMailbox

    4. Set-PublicFolderMailbox

    Answer: A Explanation:

  • Split-PublicFolderMailbox.ps1

    Splits the given public folder mailbox based on the size of the folders.

  • If the content of a public folder mailbox begins to exceed your mailbox quotas, you may need to move public folders to a different public folder mailbox. There are a couple ways to do this. To move one or more public folders that don’t contain subfolders, you can use the PublicFolderMoveRequest cmdlets.

Reference: Move a Public Folder to a Different Public Folder Mailbox

Question No: 276 – (Topic 13)

Your company has an Exchange Server 2010 organization.

The network contains an internal root certification authority (CA).

You plan to add a disclaimer to all email messages sent by users in the company. You need to ensure that the disclaimer can be added to encrypted email messages. What should you do?

  1. Instruct users to encrypt email messages by using IRM only.

  2. Instruct users to encrypt email messages by using S/#39;MIME only.

  3. Enable the Content Filter agent on all of the Hub Transport servers.

  4. Modify the priority of the Transport Rule agent on all of the Hub Transport servers.

Answer: A

Question No: 277 HOTSPOT – (Topic 13)

You have an Exchange Server 2013 organization.

You run Get-OutlookAnywhere -Server EX1 | fl and you receive the following output.

Ensurepass 2017 PDF and VCE

Use the drop-down menus to select the answer choice that completes each statement.

Ensurepass 2017 PDF and VCE

Answer:

Ensurepass 2017 PDF and VCE

Explanation:

Ensurepass 2017 PDF and VCE

Box 1: ExternalClientAuthenticationMethod: Basic ExternalClientRequiresSsl: True

Box 2: InternalClientAuthenticationMethod: Ntlm InternalClientRequiresSsl: False

Question No: 278 – (Topic 13)

You have an Exchange Server 2013 organization. A user is involved in a possible litigation matter.

You need to protect all of the messages in a mailbox from permanent deletion. Which cmdlet should you use?

  1. Enable-InboxRule

  2. Add-MailboxPermisssion

  3. Set-Mailbox

  4. Set-Retention Policy

Answer: C Explanation:

This example configures April Stewart#39;s mailbox to retain deleted items for 30 days. Set-Mailbox -Identity – quot;April Stewartquot; -RetainDeletedItemsFor 30

Note: When a user deletes items from the Deleted Items default folder by using the Delete, Shift Delete, or Empty Deleted Items Folder actions, the items are moved to the Recoverable Items\Deletions folder. The duration that deleted items remain in this folder is based on the deleted item retention settings configured for the mailbox database or the mailbox.

Incorrect:

Not D: The Set-Retention Policy is used in a cloud environment only. Reference: Configure Deleted Item retention and Recoverable Items quotas

https://technet.microsoft.com/en-us/library/ee364752(v=exchg.150).aspx

Question No: 279 HOTSPOT – (Topic 13)

You have an Exchange Server 2013 organization that contains four servers named EX1, EX2, EX3, and EX4. All of the servers run Windows Server 2012 R2 and are members of a database availability group (DAG) named DAG1. All of the mailbox databases replicate to all of the Mailbox servers.

From EX1, you run the Get-ClusterNode | fl cluster, state,*name*,*weight* command and you receive the following output.

Ensurepass 2017 PDF and VCE

Use the drop-down menus to select the answer choice that completes each statement.

Ensurepass 2017 PDF and VCE

Answer:

Ensurepass 2017 PDF and VCE

Ensurepass 2017 PDF and VCE

Explanation:

* up to one more node

Ex4 is already down. If Ex3 fails as well, then there would still be Ex1 and Ex2. The Dag1 would still be operational if either of these nodes fail.

Important:

The advantage of Dynamic Quorum, is that it is now possible for a cluster to run even if the number of nodes remaining in the cluster is less than 50%! By dynamically adjusting the quorum majority requirement, the cluster can sustain sequential node shutdowns down to a single node and still keep running.

  • A DynamicWeight value of 1 indicates the node has a vote, and a value of 0 indicates the node does not have a vote.

    Note: Windows Server 2012 introduced a new model called Failover Clustering Dynamic Quorum, which we can use with Exchange. When using Dynamic Quorum, the cluster dynamically manages the vote assignment to nodes based on the state of each node.

    When a node shuts down or crashes, it loses its quorum vote. When a node successfully re-joins the cluster, it regains its quorum vote. By dynamically adjusting the assignment of quorum votes, the cluster can increase or decrease the number of quorum votes that are required to keep it running. This enables the cluster to maintain availability during sequential node failures or shutdowns.

  • Both Ex1 and Ex2 go offline

The idea behind DQ (Dynamic Quorum) is that, by adjusting the assignment of quorum votes and dynamically increasing or decreasing the number of quorum votes required to keep running, the cluster can sustain sequential node shutdowns (or failures) all the way down to a single node (referred to as a “last man standing”).

Question No: 280 HOTSPOT – (Topic 13)

You have an Exchange Server 2013 organization.

All users access their mailbox by using Outlook Web Access. Users can view .xml files from Outlook Web Access.

You need to meet the following compliance requirements: Audit the mailbox for a specific user.

Email the mailbox audit log to a compliance officer.

Which cmdlet should you use? To answer, select the appropriate options in the answer area.

Ensurepass 2017 PDF and VCE

Answer:

Ensurepass 2017 PDF and VCE

Explanation:

Ensurepass 2017 PDF and VCE

* Set-Mailbox

Enabling and Configuring Mailbox Auditing

Mailbox auditing isn#39;t enabled by default, so the first thing you need to do is enable auditing for the mailboxes for which you need to collect data. You need to use the Set-Mailbox cmdlet. For example, this command enables auditing for the mailbox named CEO Mailbox:

Set-Mailbox -Identity #39;CEO Mailbox#39; -AuditEnabled $True

* New-MailboxAuditLogSearch

Getting Auditing Data for Heavily Loaded Servers

It#39;s easy to retrieve auditing data for lightly loaded servers, but it can be quite a different matter for heavily loaded servers, where auditing is enabled on many mailboxes. Exchange provides the New-MailboxAuditLogSearch cmdlet for this purpose.

Running New-MailboxAuditLogSearch forces Exchange to execute a background search and return the results in the form of an XML-formatted attachment that#39;s emailed to the specified recipients. Take, for example, the following command:

New-Mailbox-AuditLogSearch `

-Name quot;Check for Delegated Sendsquot; `

-LogonTypes Delegate `

-StartDate #39;1/1/2012#39; -EndDate #39;2/1/2012#39; `

-StatusMailRecipients Tony.Redmond@contoso.com

100% Free Download!
Download Free Demo:70-385 Demo PDF
100% Pass Guaranteed!
Download 2017 EnsurePass 70-385 Full Exam PDF and VCE

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 EnsurePass IT Certification PDF and VCE

[Free] 2017(Sep) EnsurePass Pass4sure Microsoft 70-385 Dumps with VCE and PDF 261-270

EnsurePass
2017 Sep Microsoft Official New Released 70-385
100% Free Download! 100% Pass Guaranteed!
http://www.EnsurePass.com/70-385.html

Recertification for MCSE: Messaging

Question No: 261 DRAG DROP – (Topic 13)

You have an Exchange Server 2013 organization and a Microsoft Lync Server 2013 infrastructure.

You plan to implement voice mail for all users.

You need to prepare the environment for the planned implementation.

Which tool should you run in each environment? (To answer, drag the appropriate tool to the correct environment or environments. Each tool may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.)

Ensurepass 2017 PDF and VCE

Answer:

Ensurepass 2017 PDF and VCE

Question No: 262 – (Topic 13)

Your company is investigating a user named User1.

You need to prevent User1 from permanently deleting items from his mailbox. What should you run?

  1. Set-Mailbox User1 LitigationHoldEnabled $true.

  2. Set-Mailbox User1 ModerationEnabled $true.

  3. Set-Mailbox User1 RetainDeletedltemsUntilBackup $true.

  4. Set-Mailbox User1 RetentionHoldEnabled $true.

Answer: A

Question No: 263 HOTSPOT – (Topic 13)

You have an Exchange Server organization that contains the servers configured as shown in the following table.

Ensurepass 2017 PDF and VCE

You need to configure the namespace to ensure that users can connect to Outlook Web Access from the Internet if a single site is unavailable.

What command should you run on EX1 and EX2? To answer, select the appropriate options in the answer area.

Ensurepass 2017 PDF and VCE

Answer:

Ensurepass 2017 PDF and VCE

Explanation:

Ensurepass 2017 PDF and VCE

Set-OWAVirtualDirectory -FailbackURL

Question No: 264 – (Topic 13)

Your company has two offices. The offices are located in New York and Tokyo. You have an Exchange Server 2013 organization.

You have the following Unified Messaging (UM) dial plans:

->Tokyo Dial Plan

->New York Dial Plan

A user named User 1 has a mailbox that is associated with the New York Dial Plan. User 1 frequently works from both the New York and the Tokyo offices.

You need to add an extension from the Tokyo office to the account of User1. Which cmdlet should you run?

  1. Set-Mailbox

  2. Set-UMMailbox

  3. Set-UMMailboxPolicy

  4. Set-UMDialPlan

Answer: D Explanation:

Use the Set-UMDialplan cmdlet to set various properties on a Unified Messaging (UM) dial

plan.

The Extension parameter specifies the extension number used by the Call Someone feature when a call is transferred.

Reference: Set-UMDialplan

https://technet.microsoft.com/en-us/library/bb124408(v=exchg.150).aspx

Question No: 265 – (Topic 13)

You plan to deploy 20 Client Access servers that will have Exchange Server 2013 installed.

You need to prepare the certificate required for the planned deployment. The solution must ensure that the same certificate can be used on all of the Client Access servers.

What should you do first?

  1. On one of the Client Access servers, run the New-ExchangeCertificate cmdlet and specify the

    PrivateKeyExportable parameter.

  2. On all of the Client Access servers, run the Get-ExchangeServer cmdlet.

  3. On one of the Client Access servers, run the New-ExchangeServer cmdlet and specify the BinaryEncoding parameter.

  4. On one of the Client Access servers, start the Certificates console and run the certificate import wizard.

Answer: C

Question No: 266 – (Topic 13)

You have an Exchange Server organization that contains five servers. The servers are configured as shown in the following table.

Ensurepass 2017 PDF and VCE

You deploy Microsoft Lync Server 2010. You need to create a Lync Server SIP Unified Messaging (UM) dial plan to enable voice integration between Lync Server and Exchange Server.

Which three Exchange servers should you associate to the UM dial plans? (Each correct answer presents part of the solution. Choose three.)

  1. Server1

  2. Server2

  3. Server3

  4. Server4

  5. Server5

Answer: A,B,E Explanation:

A: You can enable Unified Messaging (UM) in Microsoft Exchange Server 2010. You must enable the Exchange computer running the Unified Messaging server role before the Unified Messaging server can process calls for UM-enabled Exchange 2010 recipients in your Exchange organization. However, the Unified Messaging server also must be added to a UM dial plan before it can process calls for Unified Messaging.

B, E:

  • Requirements and Recommendations

    Client Access and Mailbox. In Microsoft Exchange Server 2013, Exchange UM runs as a service on these servers.

  • Deploy the Exchange Mailbox server roles in each Exchange Unified Messaging (UM) forest where you want to enable users for Exchange UM.

    Reference: Configuring Unified Messaging on Microsoft Exchange Server to Work with Lync Server 2013

    Question No: 267 DRAG DROP – (Topic 13)

    You company has offices in the United States and Germany.

    Each office contains several servers that have Exchange Server 2013 installed. The Exchange Server organization is configured for Unified Messaging (UM). Each office contains an IP-PBX device.

    You need to ensure that callers to the German office can navigate the voice mail system menu in German.

    In which sequence should you perform the actions? (To answer, move all of the actions from the list of actions to the answer area and arrange them in the correct order.)

    Ensurepass 2017 PDF and VCE

    Answer:

    Ensurepass 2017 PDF and VCE

    Question No: 268 – (Topic 13)

    Your company has two offices. The offices are located in Seattle and Paris. You have a hybrid deployment of Exchange Server 2013.

    All of the users in the Seattle office have mailboxes that are hosted on-premises. All of the users in the Paris office have mailboxes that are hosted in Microsoft Office 365. Azure Rights Management (Azure RMS) is implemented for the Paris office users.

    Five of the Seattle office users occasionally receive protected messages from the Paris user. The Seattle office users report that they cannot view the protected content.

    You need to recommend a solution to provide the five Seattle office users with the ability to read the protected messages. The solution must minimize costs.

    What is the best recommendation to achieve the goal? More than one answer choice may achieve the goal. Select the BEST answer.

    1. RMS for Individuals

    2. Active Directory Rights Management Services (AD RMS)

    3. Information Rights Management (IRM)

    4. Azure RMS

    Answer: D Explanation:

    You need to have an Office 365 tenant and turn on Windows Azure Rights Management. Once you have this done you need the following:

  • Get your Office 365 tenant up and running

  • Configure Directory Synchronization between on-premises Active Directory and Windows Azure Active Directory (the Office 365 DirSync tool)

  • It is also recommended (but not required) to enable ADFS for Office 365 to avoid having to login to Windows Azure Rights Management when creating or opening protected content.

  • Install the connector Etc.

Reference: http://www.c7solutions.com/2014/04/configuring-exchange-on-premises-to-use- azure-rights-management

Question No: 269 DRAG DROP – (Topic 13)

Your company has two offices. Each office is configured as an Active Directory site. The sites are named Site1 and Site2.

You have an Exchange Server 2013 organization that is configured as shown in the following exhibit. (Click the Exhibit button.)

Ensurepass 2017 PDF and VCE

Datacenter Activation Coordination (DAC) mode is enabled on the database availability group (DAG) named DAG1.

You are testing a site failover by shutting down all of the servers in Site1. You need to mount the databases in Site2.

Which three commands should you run in sequence? (To answer, move the appropriate three commands from the list of commands to the answer area and arrange them in the correct order.)

Ensurepass 2017 PDF and VCE

Answer:

Ensurepass 2017 PDF and VCE

Question No: 270 – (Topic 13)

A company named Contoso, Ltd., has an Exchange Server 2013 organization. The primary SMTP suffix for all users is contoso.com.

A company named Fabrikam, Inc., has an Exchange Server 2010 organization. The primary SMTP suffix for all users is fabrikam.com.

The users in both organizations access their email by using Microsoft Outlook 2010 and Outlook Anywhere. All of the users work from domain-joined client computers that connect to the internal network.

Contoso acquires Fabrikam.

You establish a cross-forest trust between the Contoso forest and the Fabrikam forest.

In fabrikam.com, you create a user named User1. In contoso.com, you create a linked mailbox for User1 and you set the primary SMTP address to User1@fabrikam.com.

User1 reports that Outlook 2010 fails to configure his mail profile automatically. User1 can manually configure his profile and connect to his mailbox.

You need to ensure that users in fabrikam.com can find their mailboxes automatically. What should you do in contoso.com?

  1. Create a DNS record named autodiscover.fabrikam.com. Point the record to the virtual IP address of the Client Access servers.

  2. Modify the ExternalURL of the Autodiscover virtual directory on the Exchange Servers 2013 servers.

  3. Modify the Autodiscover Service Connection Point (SCP).

  4. Run the Export-AutoDiscoverConfig cmdlet on an Exchange Server 2013 server.

Answer: D Explanation:

You can configure Microsoft Exchange services, such as the Availability service, for the Autodiscover service on a Microsoft Exchange Server 2010 Client Access server.

When you enable Outlook Anywhere, you must also configure external client access to Microsoft Exchange services for the Autodiscover service. Other external URLS you must configure include the URLs for the Availability service, Exchange Web Services, Unified Messaging (UM), and the offline address book.

100% Free Download!
Download Free Demo:70-385 Demo PDF
100% Pass Guaranteed!
Download 2017 EnsurePass 70-385 Full Exam PDF and VCE

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 EnsurePass IT Certification PDF and VCE

[Free] 2017(Sep) EnsurePass Pass4sure Microsoft 70-385 Dumps with VCE and PDF 251-260

EnsurePass
2017 Sep Microsoft Official New Released 70-385
100% Free Download! 100% Pass Guaranteed!
http://www.EnsurePass.com/70-385.html

Recertification for MCSE: Messaging

Question No: 251 – (Topic 12)

You need to resolve the content filtering issue for the Office 365 pilot users. What should you do?

  1. Run the Set-Mailbox cmdlet and specify the -MaxBlockedSenders and the – MicrosoftOnlineServicesID parameters.

  2. Run the Microsoft Online Services Directory Synchronization Configuration Wizard and select Enable Exchange hybrid deployment.

  3. Modify the default content filter policy from the Office 365 portal.

  4. Run the Set-Mailbox cmdlet and specify the -MaxSafeSenders and the –

    MicrosoftOnlineServicesID parameters.

    Answer: B Explanation:

  • Scenario:

    / The pilot users report that entries added to their Safe Senders list and their Blocked Senders list fail to work.

    / For the pilot mailboxes, all inbound email messages from the Internet are delivered to the Exchange Server organization, and then forwarded to Office 365.

  • Hybrid Configuration wizard Exchange 2013 includes the Hybrid Configuration wizard which provides you with a streamlined process to configure a hybrid deployment between on-premises Exchange and Exchange Online organizations.

  • Reference: Exchange Server 2013 Hybrid Deployments

    Question No: 252 DRAG DROP – (Topic 12)

    You need to resolve the network traffic issue for MapiNet. You suspend database replication.

    Which three cmdlets should you run next in sequence? (To answer, move the appropriate three cmdlets from the list of actions to the answer area and arrange them in the correct order.)

    Ensurepass 2017 PDF and VCE

    Answer:

    Ensurepass 2017 PDF and VCE

    Question No: 253 HOTSPOT – (Topic 12)

    You need to recommend which technology can be used to meet each email security requirement.

    What should you recommend? (To answer, select the appropriate technology for each requirement in the answer area.)

    Ensurepass 2017 PDF and VCE

    Ensurepass 2017 PDF and VCE

    Answer:

    Ensurepass 2017 PDF and VCE

    Question No: 254 DRAG DROP – (Topic 13)

    You have an Exchange Server 2013 organization that has Information Rights Management (IRM) configured.

    Users report that they cannot apply IRM protection to email messages from Outlook Web App.

    You verify that the users can protect the messages by using IRM from Microsoft Outlook.

    You need to recommend a solution to ensure that the users can protect email messages by using IRM from Outlook Web App.

    Which four actions should you recommend?

    To answer, move the four appropriate actions from the list of actions to the answer area and arrange them in the correct order.

    Ensurepass 2017 PDF and VCE

    Answer:

    Ensurepass 2017 PDF and VCE

    Question No: 255 DRAG DROP – (Topic 13)

    Your company has two offices. Each office is configured as an Active Directory site. The sites are named Site1 and Site2.

    You have an Exchange Server 2013 organization that is configured as shown in the following exhibit. (Click the Exhibit button.)

    Ensurepass 2017 PDF and VCE

    Datacenter Activation Coordination (DAC) mode is enabled on the database availability group (DAG) named DAG1.

    You are testing a site failover by shutting down all of the servers in Site1. You need to mount the databases in Site2.

    Which four commands should you run in sequence? (To answer, move the appropriate four commands from the list of commands to the answer area and arrange them in the correct order. More than one order of answer choices is correct. You will receive credit for any of the correct orders you select.)

    Ensurepass 2017 PDF and VCE

    Answer:

    Ensurepass 2017 PDF and VCE

    Explanation:

    Target 1:

    Ensurepass 2017 PDF and VCE

    Target 2:

    Target 3:

    Target 4:

    Ensurepass 2017 PDF and VCE

    Step 1: Terminating a Partially Failed Datacenter

    When the DAG is in DAC mode, the specific actions to terminate any surviving DAG members in the primary datacenter are as follows:

    The DAG members in the primary datacenter must be marked as stopped in the primary datacenter. Stopped is a state of Active Manager that prevents databases from mounting, and Active Manager on each server in the failed datacenter is put into this state by using the Stop-DatabaseAvailabilityGroup cmdlet.

    Step 2-4: Activating Mailbox Servers

    The steps needed to activate Mailbox servers during a datacenter switchover also depend on whether the DAG is in DAC mode. Before activating the DAG members in the second datacenter, we recommend that you validate that the infrastructure services in the second datacenter are ready for messaging service activation.

    When the DAG is in DAC mode, the steps to complete activation of the mailbox servers in the second datacenter are as follows:

      1. (step 2, step 3) The Cluster service must be stopped on each DAG member in the second datacenter. You can use the Stop-Service cmdlet to stop the service (for example, Stop-Service ClusSvc), or use net stop clussvc from an elevated command prompt.

      2. (step 4) The Mailbox servers in the standby datacenter are then activated by using the Restore-DatabaseAvailabilityGroup cmdlet. The Active Directory site of the standby datacenter is passed to the Restore-DatabaseAvailabilityGroup cmdlet to identify which servers to use to restore service and to configure the DAG to use an alternate witness server.

        Question No: 256 – (Topic 13)

        You have an Exchange Server 2013 organization that is integrated with Information Rights Management (IRM).

        A user is unable to create and read IRM-protected messages from a mobile device. The user can open IRM- protected messages *missing text*.

        You need to identify the most likely cause of the issue. What should you identify?

        1. the value of DevicePasswordEnabled of a mobile device policy

        2. the value of AllowNonProvisionableDevices of a mobile device policy

        3. the Exchange ActiveSync protocol version

        4. the value of RequireDeviceEncryption of a mobile device policy

    Answer: D Explanation:

    Mobile IRM protection in Exchange 2013

    When you set the RequireDeviceEncryption parameter to $true, mobile devices that don#39;t support device encryption will be unable to connect.

    Note: Using IRM in Exchange ActiveSync, mobile device users can:

    • Create IRM-protected messages.

    • Read IRM-protected messages.

    • Reply to and forward IRM-protected messages.

      Reference: Information Rights Management in Exchange ActiveSync https://technet.microsoft.com/en-us/library/ff657743(v=exchg.150).aspx

      Question No: 257 – (Topic 13)

      You have a hybrid deployment of Exchange Server 2013.

      All of the users in the Seattle office have mailboxes that are hosted on-premises. All of the users in the Paris office have mailboxes that are hosted in Microsoft Office 365. Azure Rights Management (Azure RMS) is implemented for the Paris office users.

      Five of the Seattle office users occasionally receive protected messages from the Paris user. The Seattle office users report that they cannot view the protected content.

      You need to recommend a solution to provide the five Seattle office users with the ability to read the protected messages. The solution must minimize costs.

      What is the best recommendation to achieve the goal? More than one answer choice may achieve the goal. Select the BEST answer.

      1. RMS for Individuals

      2. Azure RMS

      3. Active Directory Rights Management Services (AD RMS)

      4. Information Rights Management (IRM)

      Answer: A Explanation:

      RMS for individuals is a free self-service subscription for users in an organization who have been sent sensitive files that have been protected by Azure Rights Management (Azure RMS), but their IT department has not implemented Azure Rights Management (Azure RMS), or Active Directory Rights Management Services (AD RMS).

      Reference: RMS for Individuals and Azure Rights Management https://technet.microsoft.com/en-us/library/dn592127.aspx

      Question No: 258 – (Topic 13)

      You have a hybrid deployment of Exchange Server 2013 and Office 365.

      The mail flow between Office 365 and the on-premises Exchange Server environment is

      routed through an Exchange Server 2010 Edge Transport server. Your company is assigned a new set of public IP addresses.

      A network administrator updates the external firewall address and all of the associated DNS records.

      Office 365 users report that they cannot receive email messages from on-premises users.

      You discover that outgoing email messages to Office 365 are in the Office 365 SMTP queue on an Edge server.

      You need to ensure that the on-premises users can send email messages successfully to the Office 365 users.

      Which tool should you use?

      1. The Exchange Management Console

      2. The Exchange Control Panel in Office 365

      3. The Exchange Admin Center

      4. The Exchange Remote Connectivity Analyzer

      Answer: C Explanation: Note:

    • The section describes the user interface elements that are common across the EAC (Exchange Admin Center).

    Ensurepass 2017 PDF and VCE

    * Check the mail flow setting.

    Reference: Managing Directory Based Edge Blocking (DBEB) feature in Exchange Online Protection (EOP)

    Question No: 259 – (Topic 13)

    You have an Exchange Server organization that contains five servers. The servers are configured as shown in the following table.

    Ensurepass 2017 PDF and VCE

    You need to create a Lync Server SIP Unified Messaging (UM) dial plan to enable voice integration between Lync Server and Exchange Server.

    Which three Exchange servers should you associate to the UM dial plans? (Each correct answer presents part of the solution. Choose three.)

    1. EX1

    2. EX2

    3. EX3

    4. EX4

    5. EX5

    Answer: C,D,E Explanation:

    C: You can enable Unified Messaging (UM) in Microsoft Exchange Server 2010. You must enable the Exchange computer running the Unified Messaging server role before the Unified Messaging server can process calls for UM-enabled Exchange 2010 recipients in your Exchange organization. However, the Unified Messaging server also must be added to a UM dial plan before it can process calls for Unified Messaging.

    D, E:

    • Requirements and Recommendations

      Client Access and Mailbox. In Microsoft Exchange Server 2013, Exchange UM runs as a service on these servers.

    • Deploy the Exchange Mailbox server roles in each Exchange Unified Messaging (UM) forest where you want to enable users for Exchange UM.

    Reference: Configuring Unified Messaging on Microsoft Exchange Server to Work with Lync Server 2013

    Question No: 260 HOTSPOT – (Topic 13)

    You have an Exchange Server 2013 organization that contains two servers named EX1 and EX2. Both servers are in the same Active Directory site.

    You run Get-TransportConfig | fi “shadow” and you receive the following output.

    Ensurepass 2017 PDF and VCE

    Use the drop-down menus to select the answer choice that completes each statement.

    Ensurepass 2017 PDF and VCE

    Answer:

    Ensurepass 2017 PDF and VCE

    100% Free Download!
    Download Free Demo:70-385 Demo PDF
    100% Pass Guaranteed!
    Download 2017 EnsurePass 70-385 Full Exam PDF and VCE

    EnsurePass ExamCollection Testking
    Lowest Price Guarantee Yes No No
    Up-to-Dated Yes No No
    Real Questions Yes No No
    Explanation Yes No No
    PDF VCE Yes No No
    Free VCE Simulator Yes No No
    Instant Download Yes No No

    2017 EnsurePass IT Certification PDF and VCE

    [Free] 2017(Sep) EnsurePass Pass4sure Microsoft 70-385 Dumps with VCE and PDF 241-250

    EnsurePass
    2017 Sep Microsoft Official New Released 70-385
    100% Free Download! 100% Pass Guaranteed!
    http://www.EnsurePass.com/70-385.html

    Recertification for MCSE: Messaging

    Question No: 241 DRAG DROP – (Topic 11)

    You restore the files of DB3 to EX3.

    You need to mount DB3 on EX3. The solution must ensure that email messages sent to the users of DB3 while the database was offline are delivered once DB3 is mounted.

    Which three actions should you perform in sequence? (To answer, move the appropriate three actions from the list of actions to the answer area and arrange them in the correct order.)

    Ensurepass 2017 PDF and VCE

    Answer:

    Ensurepass 2017 PDF and VCE

    Explanation:

    Ensurepass 2017 PDF and VCE

    http://technet.microsoft.com/en-us/library/dd876926(v=exchg.150).aspx

    Question No: 242 HOTSPOT – (Topic 11)

    You need to configure the Exchange Server UM dial plan for the planned integration of UM and Lync Server.

    How should you configure the UM dial plan? (To answer, select the appropriate dial plan type and VoIP security mode in the answer area.)

    Ensurepass 2017 PDF and VCE

    Ensurepass 2017 PDF and VCE

    Answer:

    Ensurepass 2017 PDF and VCE

    Explanation:

    Ensurepass 2017 PDF and VCE

    • Scenario: Integrate Unified Messaging (UM) services with the Lync Server 2013 infrastructure.

    • If you want to integrate Exchange Unified Messaging (UM) with Lync Server 2013, you must perform the following tasks:

    / On the Exchange UM server, create a SIP dial plan based on your organization’s specific

    deployment requirements.

    / To encrypt Enterprise Voice traffic, configure the security settings on the Exchange UM SIP dial plan as SIP Secured or Secured.

    Etc.

    Note:

    * There are three formats or URI types that can be configured on UM dial plans:

    / Telephone Extension (TeleExtn)

    / SIP URI

    Session Initiation Protocol (SIP) is a standard protocol for initiating interactive user sessions that involve multimedia elements such as video, voice, chat, and gaming. SIP is a request-to-response based protocol that answers requests from clients and responses from servers.

    / E.164

    * When you configure the dial plan to use SIP secured mode, only the SIP signaling traffic will be encrypted, and the RTP media channels will still use TCP, which isn’t encrypted.

    However, when you configure the dial plan to use Secured mode, both the SIP signaling traffic and the RTP media channels are encrypted. An encrypted signaling media channel that uses Secure Realtime Transport Protocol (SRTP) also uses mutual TLS to encrypt the VoIP data.

    Question No: 243 HOTSPOT – (Topic 12)

    You need to recommend a solution to audit the issue of User1.

    Which command should you recommend? (To answer, select the appropriate options in the answer area.)

    Ensurepass 2017 PDF and VCE

    Ensurepass 2017 PDF and VCE

    Answer:

    Ensurepass 2017 PDF and VCE

    Explanation:

    Ensurepass 2017 PDF and VCE

    • Scenario: A user named User1 reports that email messages are being sent from her mailbox without her consent.

    • Set-Mailbox -AuditDelegate

    The AuditDelegate parameter specifies the operations to log for delegate users.

    Question No: 244 – (Topic 12)

    You discover that the Large Audience MailTip is not displayed when users compose an email message to the 20 new distribution groups.

    You need to ensure that the Large Audience MailTip is displayed for the new distribution groups immediately.

    Which cmdlet should you use?

    1. Set-DistributionGroup

    2. Set-MailboxServer

    3. Set-ClientAccessServer

    4. Start-ManagedFolderAssistant

    Answer: B Explanation:

    We need to use the Set-MailboxServer cmdlet with the ForceGroupMetricsGeneration parameter to force a count of the number of members of the distribution groups.

    The ForceGroupMetricsGeneration parameter specifies that group metrics information must be generated on the Mailbox server regardless of whether that server generates an offline address book (OAB). By default, group metrics are generated only on servers that generate OABs. Group metrics information is used by MailTips to inform senders about how many recipients their messages will be sent to. You need to use this parameter if your organization doesn#39;t generate OABs and you want the group metrics data to be available.

    Question No: 245 HOTSPOT – (Topic 12)

    You need to recommend a solution to audit the issue of User1.

    Which command should you recommend? (To answer, select the appropriate options in the answer area.)

    Ensurepass 2017 PDF and VCE

    Answer:

    Ensurepass 2017 PDF and VCE

    Explanation:

    Ensurepass 2017 PDF and VCE

    Scenario: A user named User1 reports that email messages are being sent from her mailbox without her consent.

    For mailboxes in your organization that you wish to enable audit logging on you can do so using the Set-Mailbox cmdlet.

    • The AuditDelegate parameter specifies the operations to log for delegate users. Valid values include:

      None Update Move MoveToDeletedItems SoftDelete HardDelete FolderBind SendAs SendOnBehalf

    • Send As

      This permission allows delegates to use the mailbox to send messages. After this permission is assigned to a delegate, any message that the delegate sends from the mailbox will appear to have been sent by the mailbox owner.

      Incorrect:

    • Send on Behalf

      This permission also allows a delegate to use the mailbox to send messages. After this permission is assigned to a delegate, the From address in any message sent by the delegate indicates that the message was sent by the delegate on behalf of the mailbox owner.

    • The AuditEnabled parameter specifies whether to enable or disable mailbox audit logging. If auditing is enabled, actions specified in the AuditAdmin, AuditDelegate, and AuditOwner

    parameters are logged. Valid values include:

    $true

    Mailbox audit logging is enabled.

    $false

    Mailbox audit logging is disabled. The default value is $false.

    Question No: 246 DRAG DROP – (Topic 12)

    You need to recommend a solution to support the planned changes for the integration of the Exchange Server organizations of Contoso and Proseware.

    What should you configure in each organization? (To answer, drag the appropriate objects to the correct forests. Each object may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.)

    Ensurepass 2017 PDF and VCE

    Answer:

    Ensurepass 2017 PDF and VCE

    Question No: 247 DRAG DROP – (Topic 12)

    You are preparing the environment for the planned retention solution.

    You need to identify which policy tags must be created to meet the retention requirements.

    Which policy tag types should you identify? (To answer, drag the appropriate policy tag types to the correct message types. Each policy tag may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.)

    Ensurepass 2017 PDF and VCE

    Answer:

    Ensurepass 2017 PDF and VCE

    Question No: 248 DRAG DROP – (Topic 12)

    You need to implement UM for the sales department users.

    Which four commands should you run in sequence? (To answer, move the appropriate four commands from the list of commands to the answer area and arrange them in the correct order.)

    Ensurepass 2017 PDF and VCE

    Answer:

    Ensurepass 2017 PDF and VCE

    Question No: 249 – (Topic 12)

    You need to recommend a solution to meet the technical requirements for redundancy during email delivery.

    Which cmdlet should you include in the recommendation?

    1. Set-FrontendTransportService

    2. Set-TransportConfig

    3. Set-MailboxTransportService

    4. Set-TransportService

    Answer: B Explanation:

    / Internal email messages must be rejected if the messages cannot be protected by using Shadow Redundancy

    We need to use the Set-TransportConfig cmdlet with the RejectMessageOnShadowFailure parameter.

    Question No: 250 – (Topic 12)

    You are evaluating the deployment of two additional Client Access servers and a hardware load balancer in the London office.

    You need to recommend changes to the Client Access namespace design to meet the site resiliency requirements.

    Which three actions should you recommend? (Each correct answer presents part of the solution. Choose three.)

    1. In the London office, set mail.proseware.com as the external host name for Outlook Anywhere. In the New York office, set mail.proseware.com as the external host name for Outlook Anywhere.

    2. In the London office, set lonmail.proseware.com as the internal host name for Outlook Anywhere. In the New York office, set nycmail.proseware.com as the internal host name for Outlook Anywhere.

    3. Use DNS round robin for the external host name for Outlook Anywhere.

    4. Use DNS round robin for the internal host name for Outlook Anywhere.

    5. In the London office, set nycmail.proseware.com as the external host name for Outlook Anywhere. In the New York office, set lonmail.proseware.com as the external host name for Outlook Anywhere.

    6. In the London office, set mail.proseware.com as the internal host name for Outlook Anywhere. In the New York office, set mail.proseware.com as the internal host name for Outlook Anywhere.

    Answer: A,B,C Explanation:

    A: Use mail.proseware.com as the external host name for Outlook Anywhere at both locations.

    B: Use internal names (lonmail.proseware.com and nycmail.proseware.com) as the internal host name for Outlook Anywhere in London and New York respectively.

    C: To meet the resiliency requirement use the external host name (mail.proseware.com) for DNS round robin for Outlook anywhere.

    • From scenario:

      / Users connect to mail.proseware.com for Microsoft Outlook and Outlook Web App services. Mail.proseware.com resolves to an IP address on a hardware load balancer.

      / All Outlook Anywhere users are enabled for Cached Exchange Mode.

      / Proseware has two main offices located in New York and London.

      /

      Site Resiliency Requirements

      • All mailboxes must be available if a single site becomes unavailable. The solution must not require administrator intervention.

      • User traffic on the WAN links must be minimized.

    • Split DNS for Exchange Server 2013

      Split DNS allows your internal clients to receive a different answer to their DNS lookups than an external client would receive. In effect you have your Exchange namespace hosted on your internal DNS server, with records configured to point to internal IP addresses.

      100% Free Download!
      Download Free Demo:70-385 Demo PDF
      100% Pass Guaranteed!
      Download 2017 EnsurePass 70-385 Full Exam PDF and VCE

      EnsurePass ExamCollection Testking
      Lowest Price Guarantee Yes No No
      Up-to-Dated Yes No No
      Real Questions Yes No No
      Explanation Yes No No
      PDF VCE Yes No No
      Free VCE Simulator Yes No No
      Instant Download Yes No No

      2017 EnsurePass IT Certification PDF and VCE

    [Free] 2017(Sep) EnsurePass Pass4sure Microsoft 70-385 Dumps with VCE and PDF 231-240

    EnsurePass
    2017 Sep Microsoft Official New Released 70-385
    100% Free Download! 100% Pass Guaranteed!
    http://www.EnsurePass.com/70-385.html

    Recertification for MCSE: Messaging

    Question No: 231 DRAG DROP – (Topic 10)

    You need to implement a solution to meet the security requirement for the temporary employees.

    You deploy an Active Directory Rights Management Services (AD RMS) cluster, and then you run the Set-IRMConfiguration cmdlet.

    Which three actions should you perform?

    To answer, move the three appropriate actions from the list of actions to the answer area and arrange them in the correct order.

    Ensurepass 2017 PDF and VCE

    Answer:

    Ensurepass 2017 PDF and VCE

    Question No: 232 DRAG DROP – (Topic 10)

    The Montreal data center experiences a power failure.

    You need to ensure that all the users can access their mailbox. Which three actions should you perform?

    To answer, move the three appropriate actions from the list of actions to the answer area and arrange them in the correct order.

    Ensurepass 2017 PDF and VCE

    Answer:

    Ensurepass 2017 PDF and VCE

    Question No: 233 – (Topic 11)

    You need to recommend a solution that meets the compliance requirements for email messages that contain information about the Fabrikam acquisition.

    Which three actions should you recommend? (Each correct answer presents part of the solution. Choose three.)

    1. Create an Outlook protection rule.

    2. Create a new custom message classification.

    3. Modify the registry on all client computers.

    4. Modify the Content Filtering settings.

    5. Export the Message Classification configuration to an .xml file.

    Answer: B,C,E Explanation:

    B: Use the New-MessageClassification cmdlet to create a message classification instance in your organization.

    E: After you create a new message classification, you can specify the message classification as a transport rule predicate. Before Microsoft Outlook and Outlook Web App users can apply the message classification to messages, you must update the end-user systems with the message classification XML file created by the Export- OutlookClassification.ps1 script file. The Export-OutlookClassification.ps1 script file is located in the %ExchangeInstallPath%Scripts directory.

    C: Microsoft Office Outlook requires a local file (Classifications.xml) that contains definitions of the message classifications that Microsoft Exchange Server supports before Outlook users can apply message classifications to their messages. You must also create a registry key that enables message classification and references the Classifications.xml file on the Outlook user#39;s computer.

    • From scenario:

      Compliance Requirements include:

      Users must use a custom message classification when they send email messages that contain information about the planned acquisition of Fabrikam.

      Question No: 234 – (Topic 11)

      You need to implement a solution that meets the collaboration requirements. What should you do?

      1. Run the Set-CASMailbox cmdlet.

      2. Create an organization relationship.

      3. Create a new sharing policy.

      4. Modify the organization configuration.

      Answer: B Explanation:

    • Scenario: Custom recipient MailTips created in the Exchange Server organization of Trey Research must be visible to the users at Fabrikam. The solution must ensure that administrators can define a subset of users who can share their MailTips.

    • MailTips Over Organization Relationships

    You may want to restrict certain types of MailTips. You can either allow all MailTips to be returned or allow only a limited set that would prevent NDRs. You can configure this setting with the MailTipsAccessLevel parameter on the Set-OrganizationRelationship cmdlet.

    Reference: MailTips over organization relationships

    Question No: 235 DRAG DROP – (Topic 11)

    You need to recommend a solution that supports the planned changes for the public folders.

    Which four cmdlets should you recommend running in sequence? (To answer, move the appropriate four cmdlets from the list of cmdlets to the answer area and arrange them in the correct order.)

    Ensurepass 2017 PDF and VCE

    Answer:

    Ensurepass 2017 PDF and VCE

    Question No: 236 DRAG DROP – (Topic 11)

    You need to identify which technologies must be used to meet the security requirements.

    Which technologies should you identify? (To answer, drag the appropriate technologies to the correct requirements. Each technology may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.)

    Ensurepass 2017 PDF and VCE

    Answer:

    Ensurepass 2017 PDF and VCE

    Question No: 237 HOTSPOT – (Topic 11)

    You need to recommend a solution that meets the compliance requirements for emailing bank account numbers.

    Which command should you include in the recommendation? (To answer, select the appropriate options in the answer area.)

    Ensurepass 2017 PDF and VCE

    Ensurepass 2017 PDF and VCE

    Answer:

    Ensurepass 2017 PDF and VCE

    Explanation:

    Ensurepass 2017 PDF and VCE

    * Scenario: All users must be notified before they send an email message that contains any five bank account numbers to an external recipient. The users must be able to override the requirement if they have a valid business reason to send the email message.

    *

    Transport rules apply actions to messages, most with corresponding action values. RejectUnlessSilentOverride

    Message is rejected unless the sender has chosen to override the policy restriction. RejectUnlessExplicitOverride

    This is the same as RejectUnlessSilentOverride, but the sender can also provide a justification for overriding the policy restriction.

    Question No: 238 HOTSPOT – (Topic 11)

    You are attempting to resolve the email delivery issue for Fabrikam.

    You need to identify which certificate is being used by the servers in the Exchange Server organization of Fabrikam.

    In which directory on EX1 should you review the log files? (To answer, select the appropriate directory in the answer area.)

    Ensurepass 2017 PDF and VCE

    Answer:

    Ensurepass 2017 PDF and VCE

    Explanation:

    Ensurepass 2017 PDF and VCE

    • Scenario: After a change to a certificate, users report that email messages sent to Fabrikam are not delivered.

    • ProtocolLog

      Protocol logging records the SMTP conversations that occur between messaging servers as part of message delivery. These SMTP conversations occur on Send connectors and Receive connectors that exist in the Front End Transport service on Client Access servers, the Transport service on Mailbox servers, and the Mailbox Transport service on Mailbox servers. You can use protocol logging to diagnose mail flow problems.

      Question No: 239 – (Topic 11)

      You need to implement a solution that meets the compliance requirements for the members of the legal department.

      Which two cmdlets should you use? (Each correct answer presents part of the solution. Choose two.)

      1. New-RoleAssignmentPolicy

      2. Add-ManagementRoleEntry

      3. New-ManagementRoleAssignment

      4. New-ManagementRole

      5. New-ManagementScope

      Answer: C,D Explanation:

    • From scenario:

    / Only the users in the legal department must be able to use eDiscovery to view the contents of email messages sent by the finance department users.

    / Users in the legal department use a shared mailbox named Legal. Legal is enabled for In- Place Hold. Legal is the only mailbox on DB2.

    We need to assign the role to the legal department users using the New- ManagementRoleAssignment cmdlet.

    To restrict the eDiscovery access to the finance users emails, we need to create a scope using the New-ManagementScope cmdlet.

    Question No: 240 HOTSPOT – (Topic 11)

    You need to recommend a solution that meets the auditing requirements.

    Which command should you include in the recommendation? (To answer, select the appropriate options in the answer area.)

    Ensurepass 2017 PDF and VCE

    Ensurepass 2017 PDF and VCE

    Answer:

    Ensurepass 2017 PDF and VCE

    Explanation:

    Ensurepass 2017 PDF and VCE

    * Scenario:

    The following actions must be audited for actions in the Legal mailbox only:

    ->Delegate – Purge mailbox content

    ->Delegate – Transfer file between folders

    ->Administrator – Messages sent by administrator

    ->Administrator – Open any content within the mailbox

    * Use the Set-Mailbox cmdlet to modify the settings of an existing mailbox. HardDelete: An e-mail is permanently deleted

    Move: An e-mail is moved to another folder

    MessageBind: An e-mail is opened or viewed in the preview pane

    Create: An item (excluding folders) is created in the mailbox (a message is sent, for example)

    100% Free Download!
    Download Free Demo:70-385 Demo PDF
    100% Pass Guaranteed!
    Download 2017 EnsurePass 70-385 Full Exam PDF and VCE

    EnsurePass ExamCollection Testking
    Lowest Price Guarantee Yes No No
    Up-to-Dated Yes No No
    Real Questions Yes No No
    Explanation Yes No No
    PDF VCE Yes No No
    Free VCE Simulator Yes No No
    Instant Download Yes No No

    2017 EnsurePass IT Certification PDF and VCE

    [Free] 2017(Sep) EnsurePass Pass4sure Microsoft 70-385 Dumps with VCE and PDF 221-230

    EnsurePass
    2017 Sep Microsoft Official New Released 70-385
    100% Free Download! 100% Pass Guaranteed!
    http://www.EnsurePass.com/70-385.html

    Recertification for MCSE: Messaging

    Question No: 221 – (Topic 9)

    You need to recommend a solution for the voice mail traffic. The solution must meet the technical requirements.

    Which two configurations should you include in the recommendation? (Each correct answer presents part of the solution. Choose two.)

    1. A dial plan.

    2. A server certificate

    3. A transport rule

    4. A data loss prevention (DLP) policy

    5. A call answering rule

    Answer: A,B Explanation:

  • Scenario: Voice mail traffic between the telephone system and the Exchange Server environment must be encrypted.

  • A: Use the EAC to configure Protected Voice Mail from authenticated callers

    ->In the EAC, navigate to Unified Messaging gt; UM dial plans. In the list view, select the UM dial plan you want to modify, and then click Edit.

    ->On the UM Dial Plan page, under UM Mailbox Policies, select the UM mailbox policy you want to manage, and then click Edit.

    ->On the UM Mailbox Policy page gt; Protected voice mail, under Protect voice message from authenticated callers, select one of the following options:

    ->Click Save.

    B:

    • In on-premises and hybrid deployments, you can configure a Client Access and Mailbox server to use mutual Transport Layer Security (mutual TLS) to encrypt the SIP and RTP traffic sent and received from other devices and servers. When you configure the dial plan to use SIP secured mode, only the SIP signaling traffic will be encrypted, and the RTP media channels will still use TCP, which isn’t encrypted. However, when you configure the dial plan to use Secured mode, both the SIP signaling traffic and the RTP media channels are encrypted. An encrypted signaling media channel that uses Secure Realtime Transport Protocol (SRTP) also uses mutual TLS to encrypt the VoIP data.

    • When you’re deploying Transport Layer Security (TLS) with UM, the certificates that are

      used on the Client Access server and the Mailbox server both must contain the local computer#39;s fully qualified domain name (FQDN) in the certificate’s Subject Name. To work around this issue, use a public certificate and import the certificate on all Client Access and Mailbox servers, any VoIP gateways, IP PBXs, and all the Lync servers.

      Question No: 222 – (Topic 9)

      You need to recommend a solution to ensure that during the planned migrations, all Autodiscover requests are processed by the Exchange Server 2013 Client Access servers.

      What should you recommend?

      1. On the Exchange Server 2007 Client Access servers, modify the AutodiscoverServiceInternalURI.

      2. On the Exchange Server 2007 Client Access servers, modify the ExternalURL value of the Autodiscover virtual directory.

      3. On the Exchange Server 2013 Client Access servers, modify the ExternalURL value of the Autodiscover virtual directory.

      4. On the Exchange Server 2013 Client Access servers, modify the AutodiscoverServiceInternalURI.

      Answer: A Explanation:

      The Exchange Server 2007 Client Access servers must be configured to use the Exchange Server 2013 Client Access server. We do this by setting the AutodiscoverServiceInternalURI property.

      Question No: 223 HOTSPOT – (Topic 9)

      You need to recommend a database availability group (DAG) design that meets the technical requirements.

      Which DAG design should you recommend?

      To answer, select the appropriate design in the answer area.

      Ensurepass 2017 PDF and VCE

      Answer:

      Ensurepass 2017 PDF and VCE

      Question No: 224 – (Topic 9)

      You need to recommend a solution for the memos. The solution must meet the compliance requirements.

      What should you include in the recommendation?

      1. Secure/Multipurpose Internet Mail Extensions (S/MIME)

      2. Information Rights Management (IRM)

      3. Domain Security

      4. Data loss prevention (DLP) policies

      Answer: B Explanation:

    • Scenario: Management occasionally sends the staff internal memos that contain confidential information, such as sales figures. The memos must be protected so that unauthorized users cannot read the memos and internal users cannot forward the memos to external recipients.

    • With the IRM features in Exchange 2013, your organization and your users can control the rights recipients have for e-mail. IRM also helps allow or restrict recipient actions such as forwarding a message to other recipients, printing a message or attachment, or extracting message or attachment content by copying and pasting. IRM protection can be applied by users in Microsoft Outlook or Microsoft Office Outlook Web App, or it can be based on your organization#39;s messaging policies and applied using transport protection rules or Outlook protection rules.

      Reference: Information Rights Management

      Question No: 225 DRAG DROP – (Topic 10)

      You need to create a federation trust for the planned organization relationship. Which three actions should you perform?

      To answer, move the three appropriate actions from the list of actions to the answer area and arrange them in the correct order.

      Ensurepass 2017 PDF and VCE

      Answer:

      Ensurepass 2017 PDF and VCE

      Question No: 226 DRAG DROP – (Topic 10)

      You need to recommend which tasks must be performed to meet the compliance

      requirement for the marketing department. Which three actions should recommend?

      To answer, move the three appropriate actions from the list of actions to the answer area and arrange them in the correct order.

      Ensurepass 2017 PDF and VCE

      Answer:

      Ensurepass 2017 PDF and VCE

      Question No: 227 – (Topic 10)

      You implement the UM pilot.

      You capture and analyze a network trace from the IP-PBX.

      You discover that SIP/MTLS requests for TCP 5061 to EX1 are dropped.

      You need to ensure that the IP-PBX can route calls successfully to the Exchange Server 2013 organization.

      What should you do?

      1. Modify the IP-PBX to route calls to EX5 and EX6.

      2. Modify the port used on the IP-PBX.

      3. Modify the SIP listening port on EX1.

      4. Deploy a server that has Exchange Server 2010 and the Unified Messaging server role installed.

      Answer: A

      Question No: 228 – (Topic 10)

      You need to identify which technologies must be deployed to meet the Office 365 coexistence requirements.

      Which two technologies should you identify? (Each correct answer presents part of the solution. Choose two.)

      1. the Microsoft Online Services Directory Synchronization tool

      2. Active Directory Federation Services (AD FS) 2.0

      3. Active Directory Rights Management Services (AD RMS)

      4. an internal root CA

      5. Active Directory Lightweight Directory Services (AD LDS)

      Answer: A,B Explanation:

    • Scenario: Contoso identifies the following Office 365 coexistence requirements:

      / Office 365 users must be able to access their mailbox by using their Active Directory user account in Contoso.

      / On-premises users must be able to share free/busy information and calendar information with the Office 365 users.

      A: When you create an Office 365 mailbox in Exchange Online in a hybrid deployment, the mail user is created in Active Directory on-premises. Directory synchronization, if it#39;s configured, automatically synchronizes this new user object to Office 365, where it’s converted to a cloud mailbox in Exchange Online. You can create Office 365 mailboxes as regular user mailboxes, resource mailboxes for meeting rooms and equipment, and shared mailboxes.

      B: Step-By-Step: Setting up AD FS and Enabling Single Sign-On to Office 365

      Question No: 229 – (Topic 10)

      You are evaluating the implementation of the organization relationship.

      You need to recommend which tasks must be performed to ensure that the Contoso users can view the Out of Office message of the Tailspin Toys users before the Contoso users send a message to the Tailspin Toys users.

      What should you recommend doing before implementing the organization relationship?

      1. Create a Policy Tip.

      2. Upgrade all of the client computers to Outlook 2010.

      3. Create a MailTip.

      4. Publish the Autodiscover service of Tailspin Toys.

      5. Create a remote domain.

      Answer: B

      Explanation: * Scenario: Implement an organization relationship between Contoso and Tailspin Toys.

      Question No: 230 – (Topic 10)

      You need to recommend which tasks must be performed to meet the security requirements for Tailspin Toys.

      Which two tasks should you recommend? (Each correct answer presents part of the solution. Choose two.)

      1. Run the set-transportserver -transportsyncenabled $true command.

      2. Run the set-transportconfig -tlsreceivedomainsecurelist tailspintoys.com command.

      3. Run the set-transportservice -transportsyncenabled $true command.

      4. Create a new Receive connector.

      5. Create a new Send connector.

        Answer: B,D Explanation:

    • Scenario:

      Secure all of the email messages from the users at Tailspin Toys to the Contoso users. Ensure that all of the messages can be secured if the certificates at Tailspin Toys are issued by a trusted third-party certification authority (CA).

    • Configuring Domain Security on Exchange Server 2013

      1. Establish certificate trust between organizations

      2. Configure Domain Security

        TLSReceiveDomainSecureList – specifies the domains from which you want to receive domain secured email by using mutual Transport Layer Security (TLS) authentication.

      3. Configure connectors

        Reference: Configuring Domain Security on Exchange Server 2013

        100% Free Download!
        Download Free Demo:70-385 Demo PDF
        100% Pass Guaranteed!
        Download 2017 EnsurePass 70-385 Full Exam PDF and VCE

        EnsurePass ExamCollection Testking
        Lowest Price Guarantee Yes No No
        Up-to-Dated Yes No No
        Real Questions Yes No No
        Explanation Yes No No
        PDF VCE Yes No No
        Free VCE Simulator Yes No No
        Instant Download Yes No No

        2017 EnsurePass IT Certification PDF and VCE

    [Free] 2017(Sep) EnsurePass Pass4sure Microsoft 70-385 Dumps with VCE and PDF 211-220

    EnsurePass
    2017 Sep Microsoft Official New Released 70-385
    100% Free Download! 100% Pass Guaranteed!
    http://www.EnsurePass.com/70-385.html

    Recertification for MCSE: Messaging

    Question No: 211 – (Topic 8)

    You need to recommend a solution for the HR voice mail. The solution must meet the security requirements.

    What should you recommend?

    1. Create a UM mailbox policy and associate the policy to UM1. Configure the voice mail protection settings of the UM mailbox policy. Create an auto attendant and link the auto

      attendant to UM1.

    2. Create a UM mailbox policy and associate the policy to a new dial plan. Configure the voice mail protection settings of the UM mailbox policy. Create an auto attendant and link the auto attendant to the new dial plan.

    3. Create a UM mailbox policy and associate the policy to a new dial plan. Configure the voice mail protection settings of the UM mailbox policy. Assign the UM mailbox policy to the mailbox of the HR department.

    4. Create a UM mailbox policy and associate the policy to UM1. Configure the voice mail protection settings of the UM mailbox policy. Assign the UM1 mailbox policy to the mailbox of the HR department.

    Answer: D Explanation:

  • Scenario:

    / Use Information Rights Management (IRM) to protect all of the voice mails left for the telephone number of the human resource (HR) department.

    / There is a UM dial plan named UM1.

  • The Protected Voice Mail feature is available with Exchange 2010 and later versions of Unified Messaging (UM). It can be configured on a UM mailbox policy.

  • By default, a single UM mailbox policy is created every time you create a UM dial plan. The new UM mailbox policy is automatically associated with the UM dial plan, and part of the dial plan name is included in the display name of the UM mailbox policy. You can edit this default UM mailbox policy. You can create additional UM mailbox policies to apply a common set of settings for groups of users.

  • Question No: 212 – (Topic 8)

    The Internet link in the Tampa office will be unavailable during the weekend.

    You need to ensure that all outbound email messages are sent from the Charlotte office during the planned outage.

    What should you do?

    1. Modify the cost of the Tampa SMTP Send connector.

    2. Create a new mail exchanger (MX) record named SMTP2.fabrikam.com in the internal DNS zone.

    3. Modify the smart host of the Tampa SMTP Send connector.

    4. Modify the preference value of the fabrikam.com mail exchanger (MX) records.

    Answer: C Explanation:

    Sometimes you need to route all your outbound emails trough a SMTP smart host and not route them directly to the internet.

    From scenario:

    • A Send connector named Tampa SMTP that uses SMTP1 as a smart host. The cost of the Tampa SMTP connector is 10.

    • Mailbox servers in the Tampa office that provide outbound SMTP services to the Internet.

    • An SMTP relay device named SMTP1 in the Tampa office.

      Question No: 213 HOTSPOT – (Topic 8)

      You need to configure transport rules to meet the technical requirements for the PII data and the financial data.

      How should you configure the rules?

      To answer, disable the appropriate rule or rules in the answer area.

      Ensurepass 2017 PDF and VCE

      Answer:

      Ensurepass 2017 PDF and VCE

      Explanation:

      Ensurepass 2017 PDF and VCE

      The question asks which rules should be DISABLED. We need to disable the two Allow Override rules and leave the rest in place.

      Question No: 214 HOTSPOT – (Topic 8)

      You need to resolve the IRM template issue. Which user right should you modify?

      To answer, select the appropriate user right in the answer area.

      Ensurepass 2017 PDF and VCE

      Answer:

      Ensurepass 2017 PDF and VCE

      Topic 9, A.Datum Overview

      General Overview

      A. Datum Corporation is a pet supply company that has stores across North America.

      A. Datum has an Exchange Server 2007 organization. A. Datum plans to migrate to Exchange Server 2013.

      Physical Locations

      A. Datum has five locations. The locations are configured as shown in the following table.

      Ensurepass 2017 PDF and VCE

      Existing Environment Network Infrastructure

      All of the locations connect to the each other by using a WAN link. The New York, Toronto, and Chicago locations connect directly to the Internet.

      All client computers run Windows 7 and Office 2010. All servers run Windows Server 2008.

      Active Directory Environment

      The network contains an Active Directory domain named adatum.local. Adatum.local is the corporate domain based in the United States. The network contains a domain named Canada.adatum.local. Canada.adatum.local is the domain for the stores in Canada.

      Each location is configured as an Active Directory site. The forest functional level is Windows Server 2008.

      The main office and both of the distribution centers each has two domain controllers for their respective domain. All of the other locations have one domain controller for their respective domain. All of the domain controllers are global catalog servers.

      Exchange Infrastructure

      The main office and the distribution centers each have three servers that have Exchange Server 2007 installed.

      The servers have the following configurations:

      ->Two of the servers have cluster continuous replication (CCR) deployed

      ->One of the servers has the Client Access server role and the Hub Transport server role installed

      Each store contains a server that has Exchange Server 2007 installed. Each server has mailboxes for active users and mailboxes for inactive users. Each server has approximately 50 mailboxes.

      Remote users access Outlook Web Access by using a namespace of mail.adatum.com, which resolves to the Client Access server in the New York office.

      Requirements Planned Changes

      The company plans to implement the following changes:

      ->Migrate all of the mailboxes in the main office and the distribution centers to Exchange Server 2013.

      ->Integrate a new telephone system to the Exchange Server 2013 organization.

      ->Deploy a standalone certification authority (CA) that will be used to issue all of the certificates for the messaging infrastructure.

      Technical Requirements

      The company identifies the following technical requirements:

      ->Hardware costs must be minimized whenever possible.

      ->The impact on end users if a site fails must be minimized.

      ->Voice mail traffic between the telephone system and the Exchange Server environment must be encrypted.

      ->Each user must be able to access the internal resources and their mailbox by using a single user account.

      Compliance Requirements

      After a security review, the company identifies the following compliance requirements for the new Exchange Server environment:

      ->All administrative changes made to the mailboxes must be tracked.

      ->The legal department must be able to search for messages in all of the mailboxes.

      ->Users must be prevented from sending email during an upcoming statutory

      holiday.

      ->All store managers must be prevented from permanently deleting email messages from their Inbox.

      ->All email messages must be archived for a minimum of five years to meet regulatory requirements.

      ->Management occasionally sends the staff internal memos that contain confidential information, such as sales figures. The memos must be protected so that unauthorized users cannot read the memos and internal users cannot forward the memos to external recipients.

      ->The users in the research department must be able to send email to anyone in the organization, but only the members of a group named Execs must be able to send email to the research users. All other users must be notified that email sent to the research users will remain undelivered.

      Question No: 215 DRAG DROP – (Topic 9)

      You need to recommend a solution to meet the compliance requirements for the research department and the statutory holidays.

      What should you recommend configuring?

      To answer, drag the appropriate object to the correct location in the answer area. Each object may be used once, more than once, or not at all. Additionally, you may need to drag the split bar between panes or scroll to view content.

      Ensurepass 2017 PDF and VCE

      Answer:

      Ensurepass 2017 PDF and VCE

      Question No: 216 – (Topic 9)

      You are creating a contingency plan to be implemented if the entire New York site fails after Exchange Server 2013 is deployed.

      You need to recommend which tasks must be performed to ensure that all of the users can access Outlook Web App from the Chicago site if the New York fails.

      Which three actions should you recommend? (Each correct answer presents part of the solution. Choose three.)

      1. On the Client Access server in the Chicago site, set the ExternalURL of Outlook Web App to mail.adatum.com.

      2. On the Mailbox server in the Chicago site, set the ExternalURL of Outlook Web App to mail.adatum.com.

      3. Modify the host (A) record for mail.adatum.com to point to the Client Access server in the Chicago site.

      4. On the Client Access server in the Chicago site, set the internal URL of Outlook Web App to mail.adatum.local.

      5. Install the mail.adatum.com certificate and private key on the Client Access server in the Chicago site.

      Answer: A,C,E Explanation:

      A: Example: To configure an external URL for Outlook Web App, run the following command in Exchange Management Shell.

      Set-OwaVirtualDirectory quot;lt;CAS2013gt;\OWA (Default Web Site)quot; -ExternalUrl https://mail.contoso.com/OWA

      C: Need a new record in the DNS.

      E: In Exchange 2013, you can use the Certificate Wizard to request a digital certificate from a certification authority. After you’ve requested a digital certificate, you’ll need to install it on the Client Access server.

      Reference: Exchange 2013 Client Access server configuration

      Question No: 217 – (Topic 9)

      You need to recommend an auditing solution that meets the compliance requirements. What should you recommend?

      1. Export the mailbox audit log.

      2. Run an administrator role group report.

      3. Run a non-owner mailbox access report.

      4. Export the administrator audit log.

      Answer: D Explanation:

    • Scenario: All administrative changes made to the mailboxes must be tracked.

    • You can use administrator audit logging in Microsoft Exchange Server 2013 to log when a user or administrator makes a change in your organization. By keeping a log of the changes, you can trace changes to the person who made the change, augment your change logs with detailed records of the change as it was implemented, comply with regulatory requirements and requests for discovery, and more.

      Reference: Administrator audit logging

      Question No: 218 – (Topic 9)

      You deploy a new certificate to a Client Access server.

      You test the new certificate by using Outlook Anywhere from the Internet. The test generates certificate errors.

      You need to prevent the errors from reoccurring.

      To which two stores should you add the root CA certificate? (Each correct answer presents part of the solution. Choose two.)

      1. the personal store on the client computers

      2. the personal store on the Client Access server

      3. the personal store on the Mailbox servers

      4. the Trusted Root Certification Authorities store on the client computers

      5. the Trusted Root Certification Authorities store on the Client Access server

      6. the Trusted Root Certification Authorities store on the Mailbox servers

      Answer: D,E Explanation:

      D: Outlook Anywhere won#39;t work with a self-signed certificate on the Client Access server. Self-signed certificates must be manually copied to the trusted root certificate store on the client computer or mobile device. When a client connects to a server over SSL and the server presents a self-signed certificate, the client will be prompted to verify that the certificate was issued by a trusted authority. The client must explicitly trust the issuing authority. If the client confirms the trust, then SSL communications can continue.

      E: If you are providing external access to Autodiscover by using Outlook Anywhere you must install a valid SSL certificate on the Client Access server.

      Question No: 219 – (Topic 9)

      You need to recommend a solution to ensure that the store managers meet the compliance requirements.

      What should you include in the recommendation?

      1. Retention tags and retention policies

      2. Deleted item retention

      3. An in-place hold

      4. Personal archives

      Answer: C Explanation:

    • Scenario: All store managers must be prevented from permanently deleting email messages from their Inbox.

    • In Exchange 2013, you can use In-Place Hold to accomplish the following goals: Place user mailboxes on hold and preserve mailbox items immutably

      Preserve mailbox items deleted by users or automatic deletion processes such as MRM

    • Preserve items indefinitely or for a specific duration Etc.

      Reference: n-Place Hold and Litigation Hold

      Question No: 220 – (Topic 9)

      You need to recommend a solution to meet the compliance requirement for the legal department.

      What should you include in the recommendation?

      1. A retention hold

      2. The Discovery Management management role group

      3. A litigation hold

      4. The Recipient Management management role group

      Answer: B Explanation:

    • Scenario: The legal department must be able to search for messages in all of the mailboxes.

    • Administrators or users who are members of the Discovery Management role group can perform searches of mailboxes in the Exchange organization for data that meets specific criteria and can also configure litigation holds on mailboxes.

      100% Free Download!
      Download Free Demo:70-385 Demo PDF
      100% Pass Guaranteed!
      Download 2017 EnsurePass 70-385 Full Exam PDF and VCE

      EnsurePass ExamCollection Testking
      Lowest Price Guarantee Yes No No
      Up-to-Dated Yes No No
      Real Questions Yes No No
      Explanation Yes No No
      PDF VCE Yes No No
      Free VCE Simulator Yes No No
      Instant Download Yes No No

      2017 EnsurePass IT Certification PDF and VCE

    [Free] 2017(Sep) EnsurePass Pass4sure Microsoft 70-385 Dumps with VCE and PDF 201-210

    EnsurePass
    2017 Sep Microsoft Official New Released 70-385
    100% Free Download! 100% Pass Guaranteed!
    http://www.EnsurePass.com/70-385.html

    Recertification for MCSE: Messaging

    Question No: 201 – (Topic 7)

    Your company, Fabrikam Inc., has an Exchange Server 2013 organization. The organization that contains three servers named Server1, Server2, and Server3. Server1

    and Server2 are members of a database availability group (DAG) named DAG1.

    DAG1 contains two mailbox databases. All databases are active on Server1 and replicate to Server2.

    You start an unplanned maintenance on Server1 and shut down Server1. You discover that the databases do not mount on Server2. You restart Server1 and the databases mount automatically on Server1.

    You need to identify what prevents the databases from switching over successfully to Server2.

    Which cmdlet should you run?

    1. Test-ReplicationHealth

    2. Test-OutlookConnectivity

    3. Test-ServiceHealth

    4. Get-AvailabilityReportOutage

    Answer: A

    Question No: 202 HOTSPOT – (Topic 7)

    Your company has an Exchange Server 2013 organization named contoso.com. All users run Microsoft Outlook 2010 or Outlook 2013.

    The company recently acquired another company named A. Datum Corporation. All of the users at A. Datum run Linux-based computers and use a third-party IMAP client to access their email messages.

    You configure IMAP over SSL to use the external URL of mail.contoso.com. You need to publish the IMAP settings to Outlook Web App.

    What command should you run? (To answer, select the appropriate options in the answer area,)

    Ensurepass 2017 PDF and VCE

    Ensurepass 2017 PDF and VCE

    Answer:

    Ensurepass 2017 PDF and VCE

    Question No: 203 DRAG DROP – (Topic 7)

    You have an Exchange Server 2013 organization.

    You need to recommend a solution to ensure that users can access their mailbox by using IMAP4.

    The solution must meet the following requirements:

    ->The users must be able to download their email messages from multiple devices.

    ->The users must be able to look up their SMTP server from Outlook Web App.

    ->All IMAP4 connections must be audited.

    What should you recommend? To answer drag the appropriate recommendation to the correct requirement. Each recommendation may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.

    Ensurepass 2017 PDF and VCE

    Answer:

    Ensurepass 2017 PDF and VCE

    Explanation:

    Box 1: Run the Set-SendConnector Settings cmdlet. Box 2: Run the Set-MAP Settings cmdlet.

    Box 3: Run the Set-ReceiveConnector Settings cmdlet.

    Question No: 204 HOTSPOT – (Topic 7)

    Your company has two main offices. One office is located in Atlanta and the other office is located in Washington.

    The offices connect to each other by using a dedicated WAN link.

    You have an Exchange Server 2013 organization that contains four servers. The servers are configured as shown in the following table.

    Ensurepass 2017 PDF and VCE

    The company opens a new office in New York. The New York office connects directly to the Washington office via a dedicated WAN link. You configure a separate Active Directory site for each office.

    You discover poor response times when scheduling meetings and configuring Microsoft Outlook profiles from the client computers in the New York office.

    You need to reduce the amount of time required to schedule meetings and to configure Outlook profiles from the computers in the New York office.

    What command should you run? (To answer, select the appropriate options in the answer area.)

    Ensurepass 2017 PDF and VCE

    Ensurepass 2017 PDF and VCE

    Answer:

    Ensurepass 2017 PDF and VCE

    Question No: 205 – (Topic 7)

    You have an Exchange Server 2010 organization.

    You deploy a server that has Exchange Server 2013 installed.

    You plan to install five additional servers that have Exchange Server 2013 installed. You are a member of the Organization Management management role group.

    Your company hires an external IT consultant named Admin1.

    The company#39;s security policy states that all external consultants must have the minimum number of required permissions on the network.

    You need to ensure that Admin1 can install a server named EX2. The solution must meet the requirements of the security policy.

    Which two tasks should you perform? (Each correct answer presents part of the solution. Choose two.)

    1. Add Admin1 to the Exchange Server role group.

    2. Create a new management role and a new role assignment policy.

    3. Run setup and specify the/newprovisionectservenex2 parameter.

    4. Add Admin1 to the Delegated Setup management role group.

    Answer: C,D

    Question No: 206 DRAG DROP – (Topic 8)

    The security department implements a new firewall between the IP-PBX system and the servers in the Tampa office.

    You discover that SIP sessions cannot be established between the IP-PBX and EX1.

    You need to identify which ports must be opened between the IP-PBX and the Exchange Server 2013 servers.

    Which ports should you identify?

    To answer, drag the appropriate port or ports to the correct group of servers in the answer area. Each port or ports may be used once, more than once, or not at all. Additionally, you may need to drag the split bar between panes or scroll to view content.

    Ensurepass 2017 PDF and VCE

    Answer:

    Ensurepass 2017 PDF and VCE

    Explanation:

    Ensurepass 2017 PDF and VCE

    You can configure the TCP port that#39;s used to listen for Session Initiation Protocol (SIP) requests on a Unified Messaging (UM) IP gateway. By default, when you create a UM IP gateway, the TCP SIP listening port number is set to 5060.

    The Microsoft Exchange Unified Messaging service and the UM worker process use multiple Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) service ports to communicate with IP gateways.

    The Microsoft Exchange Unified Messaging service and the UM worker process use Session Initiation Protocol (SIP) over TCP.

    By default, the Microsoft Exchange Unified Messaging service listens on both TCP port 5060 in Unsecured mode and TCP port 5061 when mutual Transport Layer Security (mutual TLS) is used.

    Each UM worker process that#39;s created listens on port 5065 and 5067 (unsecured) and 5066 and 5068 (secured).

    But when an IP gateway or IP PBX sends Realtime Transport Protocol (RTP) traffic to the Speech Engine service worker process, the IP gateway or IP PBX will use a valid UDP port that ranges from 1024 through 65535.

    Question No: 207 HOTSPOT – (Topic 8)

    You need to ensure that the HR1 group can perform the tasks required to meet the technical requirements.

    To which group should you add HR1?

    To answer, select the appropriate group in the answer area.

    Ensurepass 2017 PDF and VCE

    Answer:

    Ensurepass 2017 PDF and VCE

    Explanation:

    Ensurepass 2017 PDF and VCE

    • Scenario:

      Ensure that the members of a group named HR1 can search all of the mailboxes for sensitive email content.

    • Discovery management

    If you want users to be able to use Microsoft Exchange Server 2013 In-Place eDiscovery, you must first authorize them by adding them to the Discovery Management role group.

    Members of the Discovery Management role group have Full Access mailbox permissions for the Discovery mailbox that#39;s created by Exchange Setup.

    Question No: 208 – (Topic 8)

    You are evaluating the implementation of the planned static IP addresses for DAG1. You need to identify the appropriate IP addresses for DAG1.

    Which two IP addresses should you identify? (Each correct answer presents part of the solution. Choose two.)

    A. 169.254.0.10

    B. 192.168.1.10

    C. 192.168.2.10

    D. 192.168.10.10

    E. 192.168.20.10

    F. 224.0.0.10

    Answer: B,D Explanation:

    * Scenario:

    / Assign a static IP address to DAG1.

    / A database availability group (DAG) named DAG1 that contains EX2, EX3, EX5, and EX6. DAG1 is configured to use DHCP to obtain an IP address.

    / Subnet 192.168.1.0/24 and subnet 192.168.10.0/24 are assigned as the MAPI network.

    • A DAG network is a collection of one or more subnets used for either replication traffic or MAPI traffic. Each DAG contains a maximum of one MAPI network and zero or more replication networks.

      Question No: 209 – (Topic 8)

      You need to recommend an Outlook protection rule solution to meet the technical requirements.

      What should you recommend?

      1. Create an Outlook protection rule and filter the rule based on the FromDepartment property. Apply the Do Not Forward protection template to the rule and enable the UserCanOverride setting.

      2. Create an Outlook protection rule and filter the rule based on the FromDepartment property. Apply the Do Not Forward protection template to the rule and disable the UserCanOverride setting.

      3. Create an Outlook protection rule and filter the rule based on the SentTo property. Apply the Do Not Forward protection template to the rule and disable the UserCanOverride setting.

      4. Create an Outlook protection rule and filter the rule based on the SentTo property. Apply the Do Not Forward protection template to the rule and enable the UserCanOverride setting.

      Answer: B Explanation:

    • Scenario:

      Prevent the forwarding of email messages sent by users who have a value of Legal in their Department field.

    • Use FromDepartment property and do not allow the user to override.

    Question No: 210 HOTSPOT – (Topic 8)

    You plan to create two retention tags named Tag1 and Tag2. Tag1 will be used to move email messages to the Archive mailbox. Tag2 will be used to delete the email messages.

    You need to identify which settings must be configured in the retention tags to meet the technical requirements.

    How should you configure each retention tag?

    To answer, configure the appropriate options for each retention tag setting in the answer area.

    Ensurepass 2017 PDF and VCE

    Ensurepass 2017 PDF and VCE

    Answer:

    Ensurepass 2017 PDF and VCE

    Explanation:

    Ensurepass 2017 PDF and VCE

    [Free] 2017(Sep) EnsurePass Pass4sure Microsoft 70-385 Dumps with VCE and PDF 191-200

    EnsurePass
    2017 Sep Microsoft Official New Released 70-385
    100% Free Download! 100% Pass Guaranteed!
    http://www.EnsurePass.com/70-385.html

    Recertification for MCSE: Messaging

    Question No: 191 – (Topic 7)

    You have an Exchange Server 2013 organization. Each user has an In-Place Archive.

    You discover that several items in a user#39;s In-Place Archive are corrupt. You need to ensure that the user can access the corrupt items.

    Which tool should you use?

    1. The Repair-FileIntegrity cmdlet

    2. The Isinteg command

    3. The New-MailboxRepairRequest cmdlet

    4. The Eseutil command

    Answer: C

    Question No: 192 – (Topic 7)

    A user fails to connect to his mailbox by using Outlook Anywhere. The user successfully connects to the mailbox by using an Exchange ActiveSync-enabled mobile device and Outlook Web App.

    You need to identify what prevents the users from connecting to the mailbox by using Outlook Anywhere.

    Which tool should you use?

    1. Microsoft Outlook

    2. Microsoft Exchange Server Deployment Assistant

    3. Microsoft Exchange RPC Extractor

    4. Microsoft Exchange Server Profile Analyzer

    5. Microsoft Exchange Server User Monitor

    6. Microsoft Exchange Load Generator

    7. Exchange Remote Connectivity Analyzer

    8. Exchange Server MAPI Editor

    Answer: G

    Question No: 193 – (Topic 7)

    You have an Exchange Server 2013 organization that contains two Client Access servers and two Mailbox servers.

    You configure DNS round robin on the Client Access servers. All of the host (A) and alias (CNAME) records in the DNS zone are configured to have a TTL value of 10 minutes.

    You need to recommend a solution to fail over client connections to a Client Access server automatically if Internet Information Services (US) fails. The solution must minimize costs.

    What should you recommend?

    1. Deploy a Client Access server array.

    2. Reduce the TTL values on all of the A and CNAME records to one minute.

    3. Deploy a hardware load balancing solution.

    4. Deploy Network Load Balancing (NLB) on each Client Access server.

    Answer: C

    Question No: 194 HOTSPOT – (Topic 7)

    Your company has an Exchange Server 2013 organization. The company hires 200 temporary employees.

    You create a mailbox for each temporary employee.

    You create a new management role named CustomBaseOptions that uses MyBaseOptions as a parent. You create a new management role named CustomContactInfo that uses MyContactInfo as a parent.

    You plan to apply the new management roles to the temporary employees.

    You need to identify which management roles must be modified to prevent the temporary employees from performing the following task:

    ->Adding a user photo

    ->Viewing delivery reports

    ->Viewing the Install Apps feature

    ->Changing the value of the office location Which management roles should you identify?

    To answer, select the appropriate management role for each task in the answer area.

    Ensurepass 2017 PDF and VCE

    Ensurepass 2017 PDF and VCE

    Answer:

    Ensurepass 2017 PDF and VCE

    Explanation:

    Box 1: CustomBaseOption

    Box 2: CustomBaseOption

    Box 3: CustomBaseOption

    Box 4: CustomContactInfo

    Question No: 195 – (Topic 7)

    You have an Exchange Server 2013 organization named for Contoso. A user named Admin1 is a member of the Domain Admins group.

    Admin1 fails to synchronize a new Windows Phone device by using Exchange ActiveSync and receives an HTTP 500 error message. Admin1 successfully logs on to Outlook Web App and Outlook Anywhere.

    You need to ensure that Admin1 can synchronize the new Windows Phone device by using Exchange ActiveSync.

    What should you do?

    1. Install a trusted root certificate on the Windows Phone device.

    2. Create a new mobile device mailbox policy.

    3. Enable permission inheritance on the Admin1 user account.

    4. Disable permission inheritance on the Admin1 user account.

    Answer: C

    Question No: 196 – (Topic 7)

    You are evaluating the implementation of a Database Availability Group (DAG).

    You need to recommend changes to the planned implementation to minimize the loss of large email messages if a single DAG member fails.

    What should you recommend changing?

    1. The preference of the mail exchanger (MX) records

    2. The duration of single item recovery

    3. The intervals of shadow redundancy

    4. The size of the transport dumpster

    Answer: C

    Question No: 197 HOTSPOT – (Topic 7)

    Your network contains two Active Directory sites named MainSite and DRSite.

    You have an Exchange Server 2013 organization that contains two servers. The servers are configured as shown in the following table.

    Ensurepass 2017 PDF and VCE

    The active copy of DB1 is located on EX1. There are typically 100 MB of log files queued on EX1.

    You need to recommend a procedure to allow administrators to mount the mailbox database copies on EX2 if EX1 fails. The recovery point objective (RPO) for mailbox data is 200 MB.

    Which command should you recommend running? (To answer, select the appropriate options in the answer area.)

    Ensurepass 2017 PDF and VCE

    Ensurepass 2017 PDF and VCE

    Answer:

    Ensurepass 2017 PDF and VCE

    Question No: 198 HOTSPOT – (Topic 7)

    You have an Exchange Server 2013 organization that contains a database availability group (DAG) named DAG1. DAG1 contains two servers named EX01 and EX02.

    On EX01, you have three networks. The networks are configured as shown in the following table.

    Ensurepass 2017 PDF and VCE

    You need to ensure that DAGNetwork02 is the primary replication network and DAGNetwork03 is configured for iSCSI traffic only.

    What two commands should you run? (To answer, select the appropriate options in the answer area.)

    Ensurepass 2017 PDF and VCE

    Ensurepass 2017 PDF and VCE

    Answer:

    Ensurepass 2017 PDF and VCE

    Question No: 199 – (Topic 7)

    You have an Exchange Server 2013 organization named for A.Datum Inc. A user named User1 is a member of the Domain Admins group. User1 fails to synchronize a new Windows Phone device by using Exchange ActiveSync and receives an HTTP 500 error message.

    User1 successfully logs on to Outlook Web App and Outlook Anywhere. You need to ensure that User1 can synchronize the new Windows Phone device by using Exchange ActiveSync. Which two tasks should you perform? (Each correct answer presents a complete solution. Choose two.)

    1. Disable permission inheritance on the User1 user account.

    2. Enable permission inheritance on the User1 user account.

    3. Install a trusted root certificate on the Windows Phone device.

    4. Create a new mobile device mailbox policy.

    5. Modify the Exchange ActiveSync policy that applies to User1’s mailbox.

    Answer: B,E

    Question No: 200 – (Topic 7)

    You have an Exchange Server 2013 organization.

    You need to ensure that an administrator named Adminl receives a daily email message that contains a log of all the Exchange Server administrative actions.

    Which cmdlet should you use in a scheduled task?

    1. Search-AdminAuditLog

    2. Set-AdminAuditLogConfig

    3. New-AdminAuditLogSearch

    4. Write-AdminAuditLog

    Answer: C

    100% Free Download!
    Download Free Demo:70-385 Demo PDF
    100% Pass Guaranteed!
    Download 2017 EnsurePass 70-385 Full Exam PDF and VCE

    EnsurePass ExamCollection Testking
    Lowest Price Guarantee Yes No No
    Up-to-Dated Yes No No
    Real Questions Yes No No
    Explanation Yes No No
    PDF VCE Yes No No
    Free VCE Simulator Yes No No
    Instant Download Yes No No

    2017 EnsurePass IT Certification PDF and VCE

    [Free] 2017(Sep) EnsurePass Pass4sure Microsoft 70-385 Dumps with VCE and PDF 181-190

    EnsurePass
    2017 Sep Microsoft Official New Released 70-385
    100% Free Download! 100% Pass Guaranteed!
    http://www.EnsurePass.com/70-385.html

    Recertification for MCSE: Messaging

    Question No: 181 – (Topic 7)

    You have an Exchange Server 2013 organization that contains five servers.

    Your company has a finance department, a marketing department, and a research department.

    Users in the marketing department are prevented from creating more than two Exchange ActiveSync device associations.

    You have a user named User5 in the finance department.

    You need to prevent User5 from creating more than two Exchange ActiveSync device associations.

    Which cmdlet should you use?

    1. Set-ThrottlingPolicyAssociation

    2. Set-ResourcePolicy

    3. Set-ActiveSyncMailboxPolicy

    4. Set-CASMailbox

    Answer: A

    Question No: 182 – (Topic 7)

    You have an Exchange Server 2013 organization.

    An Active Directory administrator is concerned about the permissions assigned to a group named Exchange Trusted Subsystem. Exchange Trusted Subsystem has a member named Exchange Windows Permissions.

    You need to show the Active Directory administrator all of the permissions assigned to Exchange Trusted Subsystem.

    What should you use?

    1. ADSI Edit

    2. Active Directory Sites and Services

    3. Dsget

    4. Active Directory Users and Computers

    Answer: D

    Question No: 183 – (Topic 7)

    You have an Exchange Server 2013 organization that contains 20 servers.

    You plan to deploy Exchange Server 2013 RTM Cumulative Update 1 (CU1) to the first

    Exchange server in the organization.

    You need to ensure that a user named ExchangeAdmin can deploy CU1 to the first server, The solution must minimize the number of permissions assigned to ExchangeAdmin.

    To which groups should you add ExchangeAdmin?

    1. Schema Admins, Domain Admins, and Enterprise Admins

    2. Schema Admins, Domain Admins, and Delegated Setup

    3. Domain Admins and Organization Management

    4. Enterprise Admins and Organization Management

    Answer: A

    Question No: 184 – (Topic 7)

    You have an Exchange Server 2013 organization. You are troubleshooting an email delivery problem.

    You need to disable temporarily the antimalware scanning on a server that has Exchange Server 2013 installed. The solution must ensure that the antimalware engine continues to download updates.

    What should you run?

    1. The Set-TransportConfig cmdlet

    2. The New-MalwareFilterPolicy cmdlet

    3. The Disable-Antimalwarescanning.psl script

    4. The Set-MalwarServer cmdlet

    Answer: D

    Question No: 185 – (Topic 7)

    Your company has four offices. Each office connects to two of the other offices by using a direct WAN link. Each office is configured as an Active Directory site. The office

    connections and the Active Directory site links are configured as shown in the exhibit (Click the Exhibit button.)

    Ensurepass 2017 PDF and VCE

    You have Exchange Server 2013 organization that contains four servers. The servers are configured as shown in the following table.

    Ensurepass 2017 PDF and VCE

    You discover that email messages sent from the site in Montreal to the site in Miami are routed through the site in New York.

    You need to ensure that all of the email messages sent from the Montreal site to the Miami site are routed through the Washington site.

    What should you run?

    1. Set-AdSite1ink Site1inkl -ExchangeCost 25

    2. Set-AdSite Washington#39; -HubSiteEnabled $false

    3. Set-AdSite1ink SiteUnkl -ExchangeCost 15

    4. Set-AdSite New York#39; -Hubsiteenabled Sfalse

    Answer: C

    Question No: 186 HOTSPOT – (Topic 7)

    Your network contains an Active Directory forest named contoso.com. The forest contains one domain and two sites named Site1 and Site2. Site1 connects directly to the Internet.

    You have an Exchange Server 2010 organization.

    Users access their email remotely by using Outlook Web App and Outlook Anywhere by connecting to the name mail.contoso.com.

    You plan to migrate to Exchange Server 2013.

    Exchange Server 2010 and Exchange Server 2013 will co-exist for several months during the migration. During the co-existence phase, the organization will contain seven servers. The servers will be configured as shown in the following table.

    Ensurepass 2017 PDF and VCE

    You need to identify which host names must be associated to which servers. The solution must ensure that the users can access mailboxes on EX2, EX4, EX6, and EX7.

    What should you do? (To answer, select the appropriate target for each host name in the

    dialog box in the answer area.)

    Ensurepass 2017 PDF and VCE

    Ensurepass 2017 PDF and VCE

    Answer:

    Ensurepass 2017 PDF and VCE

    Question No: 187 – (Topic 7)

    Your network contains an Active Directory forest. The forest contains a single domain named contoso.com. You have an Exchange Server 2013 organization named Contoso.

    You plan to create an additional SMTP domain named sales.contoso.com. You will use sales.contoso.com as the primary SMTP address for the users in the sales department.

    You create a new email address policy and apply the policy to the sales users.

    New sales users report that when they attempt to access their email from the Internet for the first time by using Microsoft Outlook 2010, they fail to connect. The sales users connect to their mailbox internally successfully by using Outlook 2010. All other users can connect to their mailbox from the Internet and internally.

    You need to ensure that the new sales users can connect to the Exchange Server 2013 organization by using Outlook Anywhere from the Internet.

    Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)

    1. Modify each existing Service Connection Point (5CP) object in Active Directory to point to autodiscover.sales.contoso.com.

    2. From DNS Manager, create a host (A) record for autodiscover.sales.contoso.com.

    3. On the Client Access servers, deploy a new certificate that includes the autodiscover.sales.contoso.com name.

    4. Create a new Autodiscover virtual directory on the Client Access servers and configure ExternalURL to use autodiscover.sales.contoso.com.

    5. Create a new Service Connection Point (SCP) object in Active Directory that points to autodiscover.sales.contoso.com.

    Answer: B,C

    Question No: 188 – (Topic 7)

    You have an Exchange Server 2013 organization that contains two Edge Transport servers. The Edge Transport servers are configured to perform recipient filtering.

    You deploy a new Edge Transport server named Edge3. You need to ensure that Edge3 performs recipient filtering. What should you do?

    1. Create a new Edge Subscription for Edge3.

    2. Run the Set-TransportConfig cmdlet on Edge3.

    3. Export the Edge Subscription from an existing Edge Transport server and import the Edge Subscription to Edge3.

    4. Run the ExportEdgeConfig.ps1 and the ImportEdgeConfig.ps1 scripts.

    Answer: D

    Question No: 189 HOTSPOT – (Topic 7)

    You have an Exchange Server 2013 organization. You enable single item recovery for all users.

    A user named User1 accidentally deletes important email messages sent from a user named User2. User1 reports that he cannot locate the email messages in his Deleted Items folder.

    You need to recover the items.

    What command should you run? (To answer, select the appropriate options in the answer area.)

    Ensurepass 2017 PDF and VCE

    Ensurepass 2017 PDF and VCE

    Answer:

    Ensurepass 2017 PDF and VCE

    Question No: 190 – (Topic 7)

    You have an Exchange Server 2010 organization.

    Users access Outlook Web App by using the name mail.contoso.com. You deploy Exchange Server 2013 to the existing organization.

    You change the DNS record of mail.contoso.com to point to an Exchange Server 2013 Client Access server.

    The users report that they can no longer access their mailbox from Outlook Web App.

    The OWA virtual directory in Exchange Server 2010 is configured as shown in the exhibit. (Click the Exhibit button.)

    Ensurepass 2017 PDF and VCE

    You need to ensure that the users on Exchange Server 2010 can access Outlook Web App.

    Which setting should you change?

    1. WindowsAuthentication

    2. FormsAuthentication

    3. LegacyRedirectType

    4. FailbackUri

    Answer: A

    100% Free Download!
    Download Free Demo:70-385 Demo PDF
    100% Pass Guaranteed!
    Download 2017 EnsurePass 70-385 Full Exam PDF and VCE

    EnsurePass ExamCollection Testking
    Lowest Price Guarantee Yes No No
    Up-to-Dated Yes No No
    Real Questions Yes No No
    Explanation Yes No No
    PDF VCE Yes No No
    Free VCE Simulator Yes No No
    Instant Download Yes No No

    2017 EnsurePass IT Certification PDF and VCE