Final Mail Server

Ace your homework & exams now with Quizwiz!

Which of the following actions should you perform prior to performing a dial tone recovery? Choose all that apply A. Create a RSG that impersonates the appropriate storage group B. Copy transaction logs from the failed database to the RSG directory C. Restore the appropriate database backup to the RSG D. Mount the database within the RSG

A B C D

Which of the of the following are good security practices with regards to exchange? Choose all that apply A. limit access to email B. encrypt email traffic between clients and email servers C. ensure that client computers are regularly updated D. ensure that Exchange Server 2007 is regularly updated

A B C D

Your organization uses a combination of ActiveSync and Blackberry enabled smartphone devices. In the past contact information was stolen within your organization because smartphone users left their device unattended. How can you combat this problem. Choose all that apply A. Create an ActiveSync policy that forces smartphone users to require device passwords. B. Create an IT policy that forces Blackberry devices to require device passwords C. In the activesync policy, specify that devices will be locked after 15 minutes of inactivity D. In the IT policy, specify that devices locked after 15 minutes of inactivity.

A B C D

Which of the following are requirement before running the setup /PrepareSchema command? choose all that apply A. Your user account must be part of the Enterprise Admins group B. Your user account must be a part of the Schema Admins group C. The DC that hosts the Schema Master FSMO must be on a computer running Exchange Server 2003 SPI or Exchange Server 2003 R2 D. Your Exchange server must be in the same AD site as the Schema Master FSMO

A b c d

Which of the following email addresses are likely from a spammer? Choose all that apply A. [email protected] B. [email protected] C. [email protected] D. [email protected]

A b d

Which of the following items must you specify when you enable a user for UM? A. PIN information B. Telephone extension C. UM mailbox policy D. UM dial plan name

A Pin Information B. telephone extension C. Um mailbox policy

Which of the following allows exchanger server 2007 to scale from small to large organizations? Choose all that apply A. 64-bit architecture B.separation of roles C. unlimited database size D. support for new business requirements such as UM and MRM

A. B. C. D.

Which of the following directories contain Exchange-related programs following a successful Exchange Server 2007 installation? A. %systemroot%\Program Files\Microsoft\Exchange Server\bin B. %systemroot%\Program Files\Microsoft\Exchange Server\OBA C. %systemroot%\Program Files\Microsoft\Exchange Server\Scripts D. %systemroot%\Program Files\Microsoft\Exchange Server\ExchangeMTA

A. %systemroot%\Program Files\Microsoft\Exchange Server\bin

How many ActiveSync policies can be applied to a single mailbox user? A. 1 B. 2 C. 8 D. unlimited

A. 1

Which of the following ports is used by Edge sync traffic that is protected by SSL? A. 50636 B. 443 C.995 D. 993

A. 50636

Which of the following authentication methods on a receiver connector are appropriate for POP3 and IMAP4 clients? A. Basic B. Exchange Server C. Integrated Windows D. TLS

A. Basic C. Integrated Windows

Which of the following Exchange server roles requires that the RPC over HTTP Proxy be installed? A. CAS B. Mailbox C. Hub D. Edge

A. CAS

Which of the following server roles in Exchange Server 2007 handles POP3 connections from the client. A. CAS B. Hub C. Mailbox D. Edge

A. CAS The CAS role provides client email access

Which of the following Exchange server roles require that IIs is installed? Choose all that apply A. CAS B. Mailbox C. Hub D. Edge role

A. Cas B. Mailbox

Which of the following must you do to configure premium journaling using the Exchange Server 2007 Journaling agent? A. Create journal rules B. configure the properties of each mailbox that will participate in premium journaling C. Create a journal policy D. Configure the properties of the mailbox database that will participate in premium journaling

A. Create journal rules

Your organization uses tape media to perform exchange database backups. The IT manager has stressed the need for quick restoration of an Exchange database in the event of database corruption. In addition restored information should be no more than one day old. Which of the following backup sets would meet these needs? A. Differential backups during weekdays and full backups on weekends B. Copy backups during weekdays and full backups on weekends C. Incremental backups during weekdays and full backups on weekends D. Fullbackups during weekdays and weekends

A. Differential backups during weekdays and full backups on weekends

When configuring OWA options which selections will improve the security of your OWA clients? Choose all that apply A. Disabling the change password feature of OWA B. Disabling WebReady content viewing C. Specifying more restrictive options on the Private computer file access tab than on the Public computer file access tab D. restricting the attachments that OWA users can download.

A. Disabling the change password feature of OWA B. Disabling WebReady content viewing D. restricting the attachments that OWA users can download

Which of the following email protocols encrypts data during transfer? A. ESMTPS B. IMAP4 C. IIS D. RPC

A. ESMTPS ESMTPS encrypts data using SSL/TLS

Which of the following cmdlets may be used to obtain a list of mailboxes for users within a particular department that will be sent to the Move Mailbox cmdlet? A. Get-Mailbox B. Import-CSV C. ForEach-Object D. Set-MailboxDatabase

A. Get-Mailbox

Which of the following protocols are enabled by default on a new CAS role server? Choose all that apply A. HTTP/HTTPS (OWA) B. POP3/POP3s C. Activesync D. MAPI RPC

A. HTTP/HTTPS (OWA) C. ActiveSync D. MAPI RPC

A user in one of your departments is having trouble connecting to their Exchange server using MAOU ROC. No other users are experiencing the same issues. What would be your first course of action when troubleshooting this problem? A. Have the user attempt to connect to the Exchange server Ip address using the ping utility B. Have the user attempt to connect to the Exchange server FQDN using the ping utility C. Check the functionality of the MAPI RPC Protocol for all users using the Test-MAPIConnectivity cmdlet on the CAS role server D. Check the functionality of the MAPI RPC protocol for the affected user only using the Test-MAPIConnectivity cmdlet on the CAS role server

A. Have the user attempt to connect to the Exchange server IP address using the ping utility

Which of the following Exhange server roles contain a message tracking log? Choose all that apply A. hub B. mailbox C. CAS D. edge

A. Hub B. mailbox D. edge

Which of the following protocols provides a persisten connection between the email client and server? Choose all that apply A. IMAP4 B. MAPI RPC C. POP3 D. Outlook Anywhere

A. IMAP4 B. MAPI RPC D. Outlook Anywhere

Which high availability technologies provide high availability for the mailbox databases on a Mailbox role server but not against the failure of the Mailbox role itself? Choose all that apply A. LCR B. SCC C. SCR D.CCR

A. LCR C. SCR

Which of the following high availability technologies use log shipping and replay? Choose all that apply A. LCR B. SCC C. SCR D. CCR

A. LCR C. SCR D. CCR

You need to ensure that all recipient objects within your organization contain two email addresses. How can you achieve this? Choose two A. Modify the default email address policy and add an additional email address format. B. Create a new email address policy with a lower priority than the default email address policy that contains two email address formats. C. Create a new email address policy with a lower priority than the default email address policy that contains an additional email address format. D. Create a new email address policy with a higher priority than the default email address policy that contains two email address formats.

A. Modify the default email address policy and add an additional email address format. D. Create a new email address policy with a higher priority than the default email address policy that contains two email address formats.

If a mailbox user within your organization legally changes their name, what actions should you perform on the recipient object? Choose all that apply A. Modify the user information B. Modify the alias C. Change the primary email address D. Remove any secondary email addresses

A. Modify the user information B. Modify the alias

Which of the following should be disabled on the private interface of a CCr or SCC cluster? choose all that apply A. NetBIOS over TCP/IP B. Quality of Service C. File and Printer sharing for Microsoft Networks D. Dynamic DNS update

A. NetBIOS over TCP/IP C. File and Printer sharing for Microsoft networks D. Dynamic DNS Updates

Only version 4 MAPI clients can obtain an OAB using Web Distribution. Which of the following are Version 4 MAPI clients? Choose all that apply A. Outlook 2007 B. Entourage 2008 C. Outlook 2003 D. Entourage X

A. Outlook 2007 B. Entourage 2008

Several users called you today stating that they could not change their passwords. After investigating, you also noticed that the time on their computers was also incorrect. Which of the following FSMO roles may be unavailable? A. PDC Emulator B. RID MAster C. Infrastructure Master D. Schema Master

A. PDC Emulator

Which of the following protocols is best suited for remote clients that have dial up internet access? A. POP3 B. IMAP4 C. MAPI RPC D. HTTP

A. POP3

You have forgotten your sartphone device password and wish to recover it using OWA. However when you access the appropriate section within OWA there are no passwords that can be recovered. What is most likely cause? A. Password recovery was not enabled in the Activesync policy that applies to your mailbox user account. B. Your smartphone device is nonprovisionable C. Your smartphone device does not support remote password recovery D. Your user account is not a member of the Exchange Organization Administrator role

A. Password recovery was not enabled in the ActiveSync policy that applies to your mailbox user account

Which of the following describes the Avg. Disk Queue length counter in the Physical Disk object for the second physical disk on your system? A. Physical Disk(1)\Avg. Disk queue Length B. Physical Disk\Avg. Disk queue Length (1) C. Physical Disk (2)\Avg. Disk queue lengthPhysical D. disk/Avg. Disk queue length (2)

A. Physical Disk (1)\Avg. Disk queue Length

Which of the following transport rule actions can be used to send emails to another recipient and not to the original recipient listed in the emails message? A. Redirect message to addresses B. Blind copy the message to addresses C. Add a recipient in the To field addresses D. Copy message to addresses

A. Redirect message to addresses

You have configured a CA-signed certificate for use with remote POP3 and IMAp4 clients. However the autodiscover service on remote clients is unable to find your Exchange servers. How can you remedy the problem? Choose two A. Request a new SSl/TLS certificate using the New-ExhangeCertificate cmdelt B. Request a new SSL/TLS certificate using the Certificate Wizard C. Include an external URL in the certificate request D. Include a Subject Alternative NAme in the certificate request

A. Request a new SSL/TLS certificate using the New-ExchangeCertificate cmdlet D. Include a Subject alternative Name in the certificate request

Your public folder database is quickly using the available space on your Mailbox server. After some investigation you notice that many of the public folders contain items that are several weeks old. You would like to ensure that items older than 7 days are automatically deleted from the public folders within the public folder database. What should you do? A. Specify a local replica age limit of 7 days on the replication tab of public folder properties B. check items must be deleted after 7 days in the properties of the public folder database. C. apply a filter that deletes items after 7 days on the Administration tab of public folder properties in Outlook D. configure a maximum retention limit of 7 days using the Set-Publicfolder cmdlet

A. Specify a local replica age limit of 7 days on the replication tab of public folder properties

Which of the following items are included within a system state backup? Choose all that apply A. the active directory database (DCs only) B. the Windows Registry C. system log files D. system boots files

A. The active directory database B. the Windows Registry D. System boot files

What could you select when setting up an Outlook 2003 or later client to allow Exchange account information to be cached to a local computer? A. Use Cached Exchange Mode B. Use security for this connection SSL C. This DAV port requires a secure Connection SSL D. Enable client side caching

A. Used Cached Exchange Mode

What two actions will back up the OAB for the current and legacy MAPI clients within your organization? Choose two A. backing up the public folder database B. backing up the system stat C. backing up the Exchange registry keys D. backing up the C:\Program Files\Microsoft\Exchange Server\ExchangeOAB\directory

A. backing up the public folder database D. backing up the C:\Program Files\Microsoft\Exchange Server\ExchangeOAB\directory

Which of the following do dynamic distribution groups use to automatically populate their group membership? Choose two A. conditions B. scope C. filter d. range

A. conditions C. Filter

Which of the following client permission levels allows you to add items to a public folder but not view or manage other items that are in the public folder? A. contributor B. author C. publishing author D. editor

A. contributor

when you create a new policy folder using the Public Folder Management Console which of the following item types can be created in the public folder by default? Choose all that apply A. email B. calendar C. post D. note

A. email C. post

Which of the following MAPI clients use public folders to obtain Offline address books and calendaring information? Choose all that apply A. entourage 2004 B. Outlook 2007 C. Outlook 2003 D. Entourage X

A. entourage 2004 C. outlook 2003 D. entourage X

Which of the following log files should be backed up on an Edge role server as part of a server backup procedure Choose all that apply A. message tracking logs B. event logs C. agent logs D. protocol logs

A. message tracking logs C. agent logs D. protocol logs

Which of the following actions should be performed immediately following a restore operation? Choose all that apply A. mount the database B. check the database for consistency C. rebuild the full-text index catalog D. defragment the database

A. mount the database C. Rebuild the full text index catalog

Which of the following utilities must you use to seize a FSMO role? A. ntdsutil.exe B. dcpromo.exe C. Active Directory domains and trusts D. Active Directory sites and services

A. ntdsutil.exe

The cmdlets used to manage LCR and SCR are identical but used for different purposes. Which of the following cmdlet options can only be used to configure log shipping and replay for SCR configuration? A. standby machine B. SCR C. target D. copy

A. standby machine

Which intended use should you select in the NEW SMTP send connector wizard if you wish to create a connector that applies to all domains on the Internet? A. Internet B. Internal C. Custom D. Partner

A.Internet

You whish to ensure that any sent items for MAPi users within your organization are archived in a folder called Sent Item Archive for 5 years. Which of the following actions should you perform? Choose all that apply A. Create a managed default foler for Sent items B. Configure retention settings for the sent items managed folder that move emails to the sent item archive folder C. Create a managed custom folder called sent item archive and configure a 5 year retention setting on it D. Create a managed folder mailbox policy that includes the Sent Items and Sent Item archive folders and apply it to the appropriate mailbox users.

B C D

How much disk space do you require across all NTFS partitions to install the CAS and UM roles on a new Exchange server with one UM language pack? A. 1.7gb B. 1.9gb C. 2.4gb D. 2.6gb

B 1.9gb

What must be configured if your organization uses the Edge role? A. ActiveSync B. EdgeSync C. X.400 D. MAPI

B Edgesync

You wish to create a group that will contain the marketing staff within your own domain. This group will be assigned permissions to resources in other domains within your forest. What is the most appropriate scope for this new group? A. Local B. Global C. Domain Local D. universal

B Global

Which option to the eseutil.exe command may be used to verify the checksums of database components? A. /g B. /k C. /m D. /d

B. /k

How many databases can be created on an Exchange Server 2007 standard edition computer? A. 1 B. 5 C. 50 D. 255

B. 5

How much RAM is recommended for a quad-core Xeon computer that will run the Mailbox role only with 800 mailboxes. A. 2gb B. 6gb C. 8gb D. 9gb

B. 6gb

Which of the following event IDs indicate an error during a backup operation? Choose all that apply A. 8000 B. 8018 C. 8001 D. 8019

B. 8018 D.8019

Your are attempting to select custom properties within the properties of a resource mailbox, but none are displayed in the selection window. What should you do? A. Register them using the AD schema B. Configure them first using the Set-ResourceConfig cmdlet C. Add them as custom attributes first D. Create the custom properties first using the Object tab of resource mailbox properties

B. Configure them first using the Set-ResourceConfig cmdlet

You plan on promoting an existing Windows server 2003 computer to become an additional domain controller in your domain. To which group must the user account you specify during the AD installation belong at minimum? A. Domain Users B. Domain Admins C. Enterprise Admins D. Schema Admins

B. Domain admins

Which of the following prefixes will be used to identify the transaction logs and checkpoint file for the second storage group on your Mailbox server? A. T01 B. E01 C. T02 D. E02

B. E01

Which of the following cmdlets will obtain the device ID for your ActiveSync-enabled smartphone? A. Get-ActivesyncDeviceID B. Get-ActiveSyncDeviceStatistics C. Export-ActivsSyncDeviceID D. Export-ActiveSyncDeviceStatistics

B. Get-ActiveSyncDeviceStatistics

Your supervisor has asked you to report on the number of users that are allowed to use POP3 and IMAP4 to access email. What cmdlet can generate this report? A. Get-Mailbox B. Get-CASMailbox C. Get-ProtocolUsage D. Get-CASServer

B. Get-CASMailbox

What intended use should you select in the New SMTP Receive Connector wizard if you wish to create a connector to match SMTP traffic from other Exchange servers within your organization? A. Internet B. Internal C. Client D. Custon

B. Internal

Which of the following protocols can be used to obtain email from an email server? Choose all that apply A. SMTP B. MAPI RPC C. POP3 D. IMAP4

B. MAPI RPC C. POP3 D. IMAP4

Which of the following email client program has support for the MAPIRPC protocol? Choose all that apply A. Windows Mail B. Microsoft Outlook C. Microsoft Outlook Express D. Microsoft Entourage

B. Microsoft outlook D. Microsoft Entourage

One of your Activesync users has lost their smartphone device. to ensure that the data on the device is not read by unauthorized persons you wish to force the removal of all data from the device using remote wipe. How can you achieve this? Choose all that apply A. Remove the ActiveSync device ID from your CAS role server using the Remove-ActiveSyncDevice cmdelt within the Exchange Management shell B. Obtain the smartphone device ID and run the Clear-ActivesyncDevice cmdlet using this device ID from within the Exchange Management shell on your computer C. Ask the user to initat a remote wipe using the Options>MobileDevices section of OWA D. Configure an Activesync policy that performs a remote wipe operation and apply the policy to the user account

B. Obtain the smartphone device ID and run the Clear-ActivesyncDevice cmdlet using this device ID from within the Exchange Management shell on your computer C. Ask the user to initat a remote wipe using the Options>MobileDevices section of OWA

Which of the following nodes within the Exchange Management console may be used to manage address lists? A. Organization Configuration > Hub transport B. Organization Configuration > Mailbox C. Server Configuration > Hub Transport D. Server configuration > Mailbox

B. Organization Configuration > Mailbox

Which of the following email clients can use the Autodiscover and Availability services in Exchange server 2007 choose all that apply A. Entourage 2004 B. Outlook 2007 C. Outlook 2003 D. Entourage 2008

B. Outlook 2007 D. Entourage 2008

which of the following utilities within the toolbox node of the exchange management console can be used to automate the collecting and analyzing of performance data to troubleshoot an active performance problem? A. Performance monitor B. Performance troubleshooter C. Performance analyzer D. Performance logs and alerts

B. Performance troubleshooter

Which of the following is not a valid email message format? A. plain text B. RPC C. HTML D. Rich Text

B. RPC PRC is an email protocol and not an email message format.

Which of the following cmdlets can you use to configure your Mailbox role server to use a passive mailbox database copy following a failure of the original mailbox database? A. Update-StorageGroupCopy B. Restore-StorageGroupCopy C. Resume-StorageGroupCopy D. Activate-StorageGroupCopy

B. Restore-StorageGroupCopy

Which of the following storage configurations use external hard disks that can be shared by multiple servers? A. Raid B. SAN C. SCSI D. PATA

B. SAN

Which high availability technology provides protection for a Mailbox role server but not for the mailbox and public folder databases on that Mailbox role server? A. LCR B. SCC C. SCR D. CCR

B. SCC

Which hih availability technologies require the use of the Windows Cluster Service? Choose all that apply A. LCR B. SCC C. SCR D. CCR

B. SCC

The arfa.com organization has a mail-enabled public folder called HRComments that stores comments and questions from users within the organization. As an HR manager you plan on replying to some of these comments and questions but do not wish to let the sender know that the reply came from your email address. What permissions must you have to the public folder in order to reply to comments and questions as [email protected]? A. Owner B. Send As C. Send on behalf D. Full control

B. Send as

Which of the following are container objects in the AD database? Choose all that apply A. group policy B. site C. domain D. OU

B. Site C. Domain D. OU

You can figure digest authentication on you CAS role server but HTTP clients are unable to connect using their credentials. What could be the problem? A. Digest authentication requires SSL B. the AD user accounts are not configured to store passwords using reversible encryption C. HTTP can not use Digest authentication D. The Default Web site is not configured to use HTTP

B. The AD user accounts are not configured to store passwords using reversible encryption

After installing an enterprise CA within your organization what must you install on each client computer such that they can be validate CA-signed certificates? A. The CA private key B. The CA trusted root C. The CA digital signature D. The CRL

B. The CA trusted roote

You have modified the default location for message tracking logs on your exchange server. However no new log files are created and you receive errors within event viewer indicating that message tracking was unsuccessful in writing events to the message tracking log. What could be the cause of the problem? A.You have not enabled event logging on your exchange server B. The NTFS permissions on the new message tracking directory C. The new directory is not on the system volume D. The event log service has not been restarted

B. The NTFS permissions on the new message tracking directory

Which of the following cmdlets may be used to update the Safe Sender list from an Outlook client? A. Set-ContentFilerConfig B. Update-Safelist C. Set-ContentList D. Update-Contentlist

B. Update-Safelist

Which of the following DCs are allows to participate in a Windows 200 Native mode domain? A. Windows NT4 Server B. Windows 2000 server C. Windows Server 2003 D. Windows Server 2008

B. Windows 2000 server C. Windows Server 2003 D. Windows server 2008

What must you do after configuring a NLB cluster for your CAS role servers? Choose all that apply A. conigure DNS A records for each cluster node B. configure the account settings on email clients C. configure a new SSL/TLS certificate D. configure the autodiscover and availability services

B. configure the account setting on the email clients C. configure a new SSL/TLS certificate D. configure the autodiscover and availability services

After creating a managed folder mailbox policy and applying it to mailbox users, users do not receive their managed folder settings after they restart their email clients. What must you do to make the changes take effect? Choose two A. Enable the managed folder mailbox policy B. configure the managed folder assistant within the properties of the mailbox database that stores the related mailboxes. C. Manually run the managed folder assistant within the exchange management shell D. Disable Cached exchange mode on each MAPI client

B. configure the managed folder assistant within the properties of the mailbox database that stores the related mailboxes. C. Manually run the managed folder assistant within the exchange management shell

Which of the following recipient object types contain a disabled user account? Choose all that apply A. mailbox users B. linked mailbox users C. resource mailbox D. mail users

B. linked mailbox users C. resource mailboxes.

Which of the following scan jobs in FSE may be used to scan mailbox and public folder dtabases? Choose al lthat apply A. Transport Scan Job B. manual scan job C. edge scan job D. realtime scan job

B. manual scan job D. Realtime scan job

You have recently opened a post item within a public folder using your Outlook MAPI client and wish to reply to the person who created the post item. Which button can you use to reply to the creator of the post item by posting a reply post item to the public folder rather than emailing the send? A. reply B. post reply C. create reply D. new

B. post reply

Which of the following transport rule actions only apply to Edge role servers? A. Silently drop the message B. reject the message with status code and response C. Send bounce message to sender with enhanced staus code D. Put message in quarantine

B. reject the message with staus code and response D. Put message in quarantine

What is the easiest way to apply an ActiveSync policy to several users within your organization that do not already have an ActiveSync policy manually assigned to their mailbox? A. Creat a template user that has the ActiveSync policy applied B. Set the ActiveSync policy as default C. Create a group for the users and set the ActiveSync policy on the group D. Apply the Activesync policy to all users and modify the permissions on the ActiveSync policy

B. set the Activesync policy as default

Which of the following objects is used to locate the correct site for a newly installed DC? A. site link B. subnet C. locator D. bridgehead

B. subnet

You have defined a CSV file that contains the ProhibitSendQuota field. How can you call the values within this field in a command that receives the content of CSV file via Exchange management shell command piping? A. %ProhibitSendQuota B. -ProhibitSendQuota C. $_.ProhibitSendquota D. | ProhibteSendquota

C. $_.PrhoibtSendquota

When attempting to remove AD from an existing DC that you wish to decommission, you receive an error message. Which switch to the dcpromo.exe command will allow you to remove this DC from the domain? A. /force B. /remove C. /forceremoval D. /f

C. /forceremoval

What port should you configure on your IMAP4 clients such that they can connect to your Exchange server using SSl? A. 110 B. 143 C. 993 D. 995

C. 993

What must you obtain to configure digital email signing within Entourage? A. A CRL B. A digital signature C. A user certificate, PGP or GPG key pair D. A trusted root certificate

C. A user certificate PGP or GPG key pair

You wish to create a custom form for use with a public folder. All new posts should use this form by default. Which of the following actions should you perform to provide this functionality. choose all that apply A. Publish the form to the appropriate public folder B. Specify the new form on the General tab of public folder properties within Outlook C. Add the form to the Allowed Forms section on the Forms tab of public folder properties within the Public Folder Management Console D. Create a new form using the outlook form designer

C. Add the form to the Allowed forms section on the Forms tab of public folder properties within the Public Folder Management Console.`

Which option can you deselect within an Activesync policy to prevent users from configuring personal email accounts on their smartphone? A. Allow Webbrowser B. Allow nonprovisionable devices C. Allow consumer mail D. Allow personal email account

C. Allow consumer mail

During the IIS certificate wizard which value represents the URL of the Exchange server that users must use when accessing email? A. Organization B. Location C. Common name D. Subject alternative name

C. Common name

Which cmdlet can you use to reconnect a mailbox to an existing AD user? A. Enable-Mailbox B. New-Mailbox C. Connect-Mailbox D. Reconnect-Mailbox

C. Connect-Mailbox

Which of the following is not a valid cmdlet structure? A. Get-PublicFolder B. Enable-MailboxDatabase C. Email-Send D. Update-Content

C. Email-Send

Which of the following Exchange administrative roles is server specific? A. Exchange Organization Administrator B. Exchange Public Folder Administrator C. Exchange Server Administrator D. Exchange View Only Administrator

C. Exchange Server Administrator

Which of the following commands will only display the name and size of mailboxes on your Exchange server? A. Get-MailboxStatistics | For DisplayName,ItemCount,TotalItemSize B. Get-MailboxStatistics | Where DisplayName,ItemCount,TotalItemsize C. Get-MailboxStatistics | Select-Object DisplayName,ItemCount,TotalItemSize D. Get-MailboxStatistics | Format-List DisplayName,ItemCount,TotalItemsize

C. Get-MailboxStatistics | Select-Object DisplayName,ItemCount,totalItemSize

Outlook Web Access (OWA) relies on the _______ component of Windows. A. Site B. PowerShell C. IIS D. RPC

C. IIS OWA is a component of both IIS and Exchange Server 2007

Which of the following criteria can be used within a transport rule condition to match emails that have custom labels applied to them? A. When a message header contains specific words B. Marked with importance C. Marked with classification D. With a spam confidence level rating that is greater or equal to limit

C. Marked with classification

which high availability technology can only be configured using cmdlets within the Exchange management shell? A. LCR B. SCC C. SCR D. CCR

C. SCR

During the installation of BES you enter your SRP server information and click Test Network connection. However the test fail. What is most likely the cause of this problem? A. You have not entered the correct SRP server name B. You have not entered the correct SRP key C. TCP Port 3101 is not open on your organizations firewall D. TCP Port 443 is not open on your organizations firewall

C. TCP Port 3101 is not open on your organizations firewall

When used with the New EmailAddressPolicy cmdlet which of the following email address formats represents the first name of a user followed by the first 3 characters of the last name in the domain octavius.net? A. %g%[email protected] B. %s%[email protected] C. %m%[email protected] D. %g%[email protected]

D. %g%[email protected]

Which of the following log files lists the tasks that were performed during the Exchange Server 2007 installation process? A. %systemroot%\ExcnageSetup.msilog% B. %systemroot%\ExcahngeSetup.log C. %systemroot%ExchangeSetupLogs\ExchangeSetup.msilog D. %systemroot%\ExchangeSetupLogs\ExchangeSetup.log

D. %systemroot%\ExchangeSetupLogs\ExchangeSetup.log

How much ram is recommended for a dual-core AMD64 computer that will run the Mailbox, CAS and Hub roles and plans on hosting 200mailboxes A. 2gb B. 6gb C. 8gb D. 9gb

D. 9gb

A non-delivery report (NDR) is also referred to as a A. Delivery Status Notification B. Non-Deliver receipt C. bounce message D. All of the above

D. All of the above

Which log in the Windows Event viewer contains Exchange related events? A. Security B. Directory services C. System D. Application

D. Application

You have just created a powershell script called PSScript1.ps1. What director should you place this script in such that you can execute it within the Exchange Management console? A. C:\Program Files\Microsoft\Powershell B. C:\Program Files\Microsoft\PowerShell\Scripts C. C:\ D. C:\Program Files\Microsoft\Exchange Server\Scripts\

D. C:\Program Files\Microsoft\Exchange Server\Scripts\

you would like to ensure that your network workstation receives a message when the number of concurrent client connections reaches 800. What should you do? A. Create a counter log within performance lags and alerts that monitors MSEchangeIS Mailbox\Active Client Logons and sends a network message to your workstation when the value is under 800 B. Create a performance alert within Performance Logs and Alerts that monitors MSExchangeIS Mailbox\Active Client Logons and sends a network message to your workstation when the value is under 800 C. Create a counter log withing performance logs and alerts that monitors MSEchangeIS Mailbox\Active Client Logons and sends a network message to your workstation when the value is over 800 D. Create a performance alert within Performance logs and alerts that monitors MSEchangeIS Mailbox\Active Client logons and sends a network message to your workstation when the value is over 800

D. Create a performance alert within Performance logs and alerts that monitors MSEchangeIS Mailbox\Active Client logons and sends a network message to your workstation when the value is over 800

Which of the following cmdlets can be used to mail-enable a public folder? A. Mail-enable B. Mail-EnablePublicfolder C. Enable-Publicfolder D. Enable-MailPublicFolder

D. Enable-MailPublicFolder

Which of the following bias settings would you configure within FSE to ensure that the most viruses are detected? A. Favor Performance B. Max Certainty C. Max Performance D. Favor Certainty

D. Favor Certainty

Which of the following Exchange Management Shell commands will display all the public folders under the default public folder subtree on your current Exchange server? A. List-Publicfolder"\" B. Get-PublicFolder"\" C. List-PublicFolder -All D. Get-PublicFolder -Recurse | Format-List Name

D. Get-PublicFolder -Recurse | Format-List Name

You wish to ensure that Bob Jones can modify the permissions that are set on the Comments public folder but not modify any permissions that have been assigned to Exchange administrators. Which administrative permission should you assign to Bob Jones for the comments public folder? A. ModifyPublicFolderClientPermissions B. ModifyPublicFolderPermissions C. ModifyPublicFolderAdminACL D. ModifyPublicFolderACL

D. ModifyPublicFolderACL

You receive an object related error when attempting to create a new user account within your domain. What FSMO role should you ensure is online to complete the addition of the user account? A. PDC Emulator B. Domain Naming Master C. Infrastructure Master D. RID Master

D. Rid Master

What DNS feature rotates the order of MX records before they are given to the email server that requested them? A. Failover B. Mx ordering C. Priorities D. Round Robin

D. Round Robin DNS uses round robin to rotate multiple records in DNS queries.

Which of the following cmdlets may be used to connect to the Autodiscover and Availability services for testing purposes? A. Connect-Autodiscover B. Get-OutlookConfiguration C. Get-Autodiscover D. Test-OutlookWebservices

D. Test-OutlookWebServices

A single user within your organization calls you for help after having trouble logging on to the domain. Upon further investigation you notice that he user is able to log on to the domain from another computer and that no users are able to successfully log on to the domain from the user's original computer. What is the most like cause of the problem? A. The time on the computer is incorrect and must be changed B. The user account has been disabled and must be enabled C. The user account has been locked and must be unlocked D. The computer account for the user's computer has become corrupt and must be reset

D. The computer account for the user's computer has become corrupt and must be reset

One of the users within your organization asks you to restore an email that they deleted a few moments ago from their Deleted Items folder in Outlook 2007. What is the easiest way to restore this email? A. Restore the email from a backup that is mounted to the RSG B. Restore the mailbox from the backup that is mounted to the RSG C. Delete and reconnect the user's mailbox within the Exchange Management Console D. Use the Recover Deleted Items feature of Outlook 2007

D. Use the Recover Deleted Items feature of Outlook 2007

Which of the following key combinations can be used to directly open the windows task manager? A. ctrl+alt+esc B. ctrl+shift+delete C. ctrl+alt+delete D. ctrl+shift+esc

D. ctrl+shift+esc

Which of the following cluster states indicated that a cluster node or resource is currently stopping? A. Partially online B. online pending C. offline D. offline pending

D. offline pending

Which of the following priority numbers will most likely be assigned to the DNS MX record that is used to identify a smart host? A. 10 B. 235 C. 99 D. 5

D.5

Which port do newer email client programs use when sending email using SMTP. A. 23 B. 25 C. 110 D. 587

D.587


Related study sets

Managing Incoming Calls lesson 1 -Screening Calls

View Set

CCBA Practice Test 1 - Questions I got right

View Set

Chapter 4- folk and popular culture

View Set

Chapter 26- Narcotics, Narcotic Antagonists, and Antimigraine Agents

View Set

12.8 Contrasting and Relating the Perimeter and Area of shapes

View Set