MS-203: Microsoft 365 Messaging

Ace your homework & exams now with Quizwiz!

As the Messaging administrator at Tailspin Toys, Alan Deyoung is planning a cutover migration. Which of the following items should Alan consider when planning a cutover migration? -A cutover migration migrates Outlook Cached-Mode OST files -Unified messaging must be enabled on the mailboxes before you migrate them -A cutover migration doesn't migrate security groups and system mailboxes

A cutover migration doesn't migrate security groups and system mailboxes -A cutover migration only moves mailboxes, mail users, mail contacts, and mail-enabled groups. Security Groups and system mailboxes aren't migrated.

Which of the following steps should be completed before running an IMAP migration? -Ask users to empty their Deleted Items folder -Change the MX record to Microsoft 365 -Send a Welcome message to your users to let them know about Microsoft 365 and how to sign into their new mailboxes

Ask users to empty their Deleted Items folder - Before running an IMAP migration, you must let your users know about the migration and how it impacts them. You should provide them with instruction as to the tasks that must be completed before, during, and after the migration. As a best practice, you should ask your users to reduce their mailbox size as much as possible and empty their Deleted Items folder.

As the Messaging administrator for Contoso, Holly Dickson wants to create an address-book policy (ABP) to limit the size of the offline address book for users. Holly has used the Exchange Management Shell in Exchange Server to turn on ABP routing and create an Address Book Policy. What's the next step that Holly must complete to finish configuring the ABP? -Customize the ABP settings -Assign address lists to the ABP -Assign the ABP to a mailbox user

Assign the ABP to a mailbox user - After turning on ABP routing and creating an ABP, the next step in the configuration process is to assign the ABP to a mailbox user (or to multiple mailbox users).

Fabrikam has Exchange Server deployed in a resource forest. As the Messaging administrator for Fabrikam, Holly Spencer wants to employ linked mailboxes for users whose primary accounts are in a separate, trusted forest. For each linked mailbox that Holly creates, what is created in the domain where Exchange is deployed and associated with the linked mailbox? -A shared mailbox -A disabled user account -A one-way trust between the domain where Exchange is deployed and the domain where the user account exists

A disabled user account -When configuring a linked mailbox, the user account that accesses the linked mailbox doesn't exist in the forest where Exchange is deployed. When you create the linked mailbox, a disabled user account is created in the domain where Exchange is deployed and associated with the linked mailbox. The user account from the account forest is granted full control of the mailbox.

. Contoso has a Customer Support team that provides a helpdesk for responding to customer and employee questions. Customers and employees must call into the helpdesk with their questions. As the Messaging administrator for Contoso, Holly Dickson wants to update their helpdesk so that it can also receive email messages. What recipient type should Holly create to help the Customer Support team respond to email messages from both employees and customers? -A shared mailbox -A linked mailbox -A Microsoft 365 group

A shared mailbox -Shared mailboxes provide a way for teams or departments that provide centralized services, such as helpdesks or support, to respond to requests from employees or customers.

In an Exchange Online deployment, what must each user mailbox be associated with? -A user account that's created in Microsoft 365 -An Active Directory user account -An Offline Address Book

A user account that's created in Microsoft 365 - In Exchange Online, each user mailbox is associated with a user account that's created in Microsoft 365.

Which Microsoft Defender for Office 365 tool identifies and blocks malicious files in online libraries? -Safe Attachments -Anti-malware -Advanced threat protection for SharePoint, OneDrive, and Microsoft Teams

Advanced threat protection for SharePoint, OneDrive, and Microsoft Teams -These tools identify and block malicious files in online libraries.

As the Messaging administrator for Tailspin Toys, Alan Deyoung is planning to run a staged migration to move the company's user mailboxes to Microsoft 365. Alan must determine when to change the company's MX record to point to Exchange Online. At which point should Alan change the company's MX record? -Before the final synchronization run -After all migration batches are complete -Tailspin doesn't need to change the MX record

After all migration batches are complete -In a Staged migration, your DNS MX record must point to the on-premises environment for the entirety of the migration because Azure AD Connect synchronizes your Active Directory to Microsoft 365. As such, you should not change the DNS MX record to point to Microsoft 365 until after all your migration batches are complete.

As the Messaging administrator for Fabrikam, Holly Spencer plans to deploy Edge Transport servers. How can Holly reduce the effort needed to administer the Edge Transport servers? -By deploying EdgeSync -By creating an Edge Subscription -By creating Azure IoT Edge Transport rules

By deploying EdgeSync -Edge Transport servers can be deployed without using EdgeSync. However, using EdgeSync can reduce the effort needed to administer the Edge Transport servers.

Which transport service component is responsible for making routing decisions? -Submission queue -Pickup directory -Categorizer

Categorizer -The categorizer is the component that's responsible for making routing decisions. Each message is retrieved from the submission queue and processed by the categorizer to determine how a message should be delivered. Once the message delivery process has been determined, the categorizer places the message in a delivery queue.

As the Messaging administrator for Tailspin Toys, Alan Deyoung plans to run a staged migration for its Exchange 2007 environment. Which of the following items is a Microsoft 365 post-migration task that Alan must complete? -Change the Autodiscover DNS record to point to Tailspin's Microsoft 365 organization -Set up directory synchronization between Tailspin's on-premises Active Directory and Microsoft 365 using Azure AD Connect -Ensure Tailspin's Exchange 2007 organization can be reached from Microsoft 365 using Outlook Anywhere

Change the Autodiscover DNS record to point to Tailspin's Microsoft 365 organization -One of the post-configuration tasks that must be completed to finish the transition to Exchange Online and Microsoft 365 is to change the Autodiscover DNS record to point to the company's Microsoft 365 organization.

As the Messaging administrator for Contoso, Holly Dickson just finished running an IMAP migration. What should Holly do next? -Reset user email passwords -Change the MX record to Microsoft 365 -Communicate changes to users

Change the MX record to Microsoft 365 - After the IMAP migration is complete, you must change the DNS MX record of all your SMTP domains so that new email is delivered to Microsoft 365. As a best practice, you should wait a day or two to ensure the DNS settings are propagated to all the other SMTP servers on the Internet so that no messages are transferred to your old mail server.

As the Messaging Administrator for Contoso, Holly Dickson is configuring the company's Exchange Online deployment. Holly has configured Internet SMTP email to be sent out directly from Exchange Online Protection to the recipient's mail server. What other configuration must Holly complete in Contoso's Exchange Online deployment? -Configure Exchange Online internal routing to route any messages from Contoso's Exchange organization to an Internet domain to the Internet -Subscribe to Exchange Online Protection for email protection services for on-premises mailboxes -Configure Contoso's DNS MX record to point inbound to Exchange Online

Configure Contoso's DNS MX record to point inbound to Exchange Online -The only other requirement in an Exchange Online deployment is to configure the organization's DNS MX record to point inbound to Exchange Online.

Contoso wants to migrate from a third-party email solution to its Exchange Server. Since the domain suffix is the same for all users in the third-party email solution and Contoso's Exchange Server, what must Contoso's Messaging administrator do to properly configure the Exchange Server to allow correct email routing? -Configure one or more Active Directory sites as hub sites -Configure an SMTP Receive connector that enables an Exchange Transport service to receive mail from any other SMTP sources -Configure a shared namespace environment

Configure a shared namespace environment -Shared namespace is a scenario where an organization shares the same SMTP domain between its Exchange Server and a third-party email solution. Since the domain suffix is the same for all users, Exchange Server must be configured properly to allow correct email routing. This design requires the Messaging administrator to configure a shared namespace environment.

As the Messaging administrator for Lucerne Publishing, Patti Fernandez wants to implement an anti-phishing policy that applies to all users in the organization. What's the easiest way for Patti to implement such a policy? -Configure the Sender Policy Framework -Create a custom anti-phishing policy in the Microsoft 365 Defender portal and configure it for all users in the company -Configure the default anti-phishing policy in the Microsoft 365 Defender portal to meet the company's needs

Configure the default anti-phishing policy in the Microsoft 365 Defender portal to meet the company's needs - Anti-phishing policies are managed in the Microsoft 365 Defender portal. The default policy applies to all users within the organization. Patti can fine-tune anti-phishing protection by configuring the default policy to meet the company's needs.

As the Messaging administrator for Tailspin Toys, Alan Deyoung wants to assign built-in role groups in Exchange to several administrators. However, Alan has discovered that the built-in role groups in Exchange don't match the job function of these administrators. What should Alan do? -Assign the built-in role groups to the administrators and then customize the roles assigned to these role groups to meet Tailspin's requirements -Create custom role groups and add roles to them -Create custom roles that meet Tailspin's requirements and assign the roles to the administrators

Create custom role groups and add roles to them - If the built-in role groups in Exchange don't match the job function of your administrators, you can create custom role groups and add roles to them.

Which of the following items is a prerequisite to creating a migration batch for a cutover or staged migration? -Creating a migration endpoint to connect Microsoft 365 -Enabling Unified Messaging on the mailboxes before you migrate them -Disabling directory synchronization on the company's Microsoft 365 tenant

Creating a migration endpoint to connect Microsoft 365 - Creating a migration endpoint to connect Microsoft 365 to your on-premises Exchange server is a prerequisite to creating a migration batch for a cutover or staged migration. Once the batch is created, you must verify this connection. The connection can be verified as a separate task in the EAC or during creation of the migration batch.

Which migration option doesn't require mail routing coexistence, and organizations just need to switch their DNS? -Cutover migration -Hybrid deployment -Staged migration

Cutover migration - Cutover migration isn't a real coexistence. It provides migration of the user account information and mailbox data. However, no mail routing coexistence is required. Organizations just need to switch their DNS.

Lucerne Publishing has an Exchange 2016 deployment but doesn't want long-term coexistence. Lucerne has less than 1,000 mailboxes to migrate to Microsoft 365. Which of the following migration options should it consider implementing to migrate its user mailboxes? -Cutover migration -Staged migration -Full hybrid configuration

Cutover migration - If the organization has Exchange but doesn't want long-term coexistence, the deciding factor is the number of users. If there are fewer than 2000 users, the recommended solution is an Exchange cutover migration.

Which migration option requires you to change the MX record before your final synchronization run? -Staged migration -Cutover migration -IMAP migration

Cutover migration -When running a cutover migration, you must change the DNS MX record before your final synchronization run. Doing so will ensure that no mail will be routed to your on-premises Exchange server after the mailbox migration is complete.

Northwind Traders has finished running its staged migration. Which of the following items is a post-migration task that Northwind should complete? -Update its on-premises Exchange servers to allow Outlook Anywhere communication for Microsoft 365 -Disable Unified Messaging on the mailboxes that were migrated -Decommission all Exchange Servers but one

Decommission all Exchange Servers but one - Once there are no messages being sent in your source Exchange 2003 or 2007 environment, you can decommission all your servers but one. One Exchange server must be available to complete any necessary management tasks. It's recommended that you keep one Exchange server on-premises to use the Exchange Admin Center and Exchange Management Shell to manage your users, groups, and contacts. Having one Exchange Server available is necessary because you can't manage all user attributes in Exchange Online after enabling directory synchronization.

Contoso previously used Public Folders in its Exchange Server 2019 deployment. Now that the company has migrated to a hybrid deployment, it wants to configure Public Folder coexistence with Microsoft 365. As Contoso's Messaging administrator, Holly Dickson has satisfied the prerequisites for Public Folder coexistence with Microsoft 365. What task must Holly now complete to configure Public Folder coexistence? -Enable the Exchange Online organization to access the on-premises Public Folder mailboxes by pointing to all the company's proxy Public Folder mailboxes -Run Azure AD Connect -Enable the Exchange Online organization to access the on-premises Public Folder mailboxes by pointing to the company's Public Folder mailboxes

Enable the Exchange Online organization to access the on-premises Public Folder mailboxes by pointing to the company's Public Folder mailboxes -For Exchange Server 2013 or later, you must enable the Exchange Online organization to access the on-premises Public Folders by pointing to your Public Folder mailboxes.

As the Messaging administrator for Lucerne Publishing, Patti Fernandez is planning the company's password policy. Patti wants to maximize the security of the sign-in credentials for Lucerne's users. Which of the following items is a best practice that Patti should implement as part of the company's password management policy? -Enforce at least six character minimum length requirement -Periodic password resets should occur on short intervals -Enforce registration for multifactor authentication

Enforce registration for multifactor authentication -Multifactor authentication (MFA) requires the use of more than one verification method. MFA adds a second layer of security to user sign-in and transactions.

As a Global admin for Contoso, Holly Dickson wants to deploy a Microsoft 365 integrated app. When configuring the app, Holly selected the Deploy from AppSource option. What's the implication of selecting this option? -Holly must manually roll out updates to the app -When the app starts, it automatically downloads for the user -Enhancements to the app will automatically be made available to users without Holly's intervention

Enhancements to the app will automatically be made available to users without Holly's intervention - With the AppSource option, updates and enhancements to the app will automatically be made available to users without Holly's intervention.

Contoso recently began experiencing back pressure in its Exchange Server deployment. Message delivery slowed down and incoming messages were being blocked. What's the best way for Contoso to avoid back pressure? -Ensure the organization's Exchange Server has the necessary amount of system resources -Download the Microsoft Connectivity Analyzer tool -Enable protocol logging on SMTP Send and SMTP Receive connectors

Ensure the organization's Exchange Server has the necessary amount of system resources - Exchange Server monitors the resources used for message transport and throttles resource usage to ensure the system remains functional. When resource usage is throttled, you'll notice symptoms such as slow message delivery or incoming messages being blocked. The best way to avoid back pressure is to ensure the Exchange server has the necessary amount of system resources, including memory and disk space.

As the Messaging administrator for Tailspin Toys, Alan Deyoung created an address list that contains all recipients in Tailspin's Dallas office. Alan then created another address list that contains all recipients in Tailspin's Chicago office. Alan then created a third list titled Research and Development. This list is within the Dallas address list, and it contains all employees who work in Dallas' Research and Development department. The Research and Development list is a subcategory of the Dallas address list. What are these subcategories of address lists known as? -Hierarchical address lists -Nested address lists -Segmented address lists

Hierarchical address lists -Subcategories of address lists are known as hierarchical address lists.

Fabrikam's email address policy assigns to each mailbox an email address that's based on the user's first name and last name. What does Exchange Server do if two users have the same first name and last name? -It assigns the first name and the first letter of the last name as the local part of the second user's email address -It assigns the first letter of the first name followed by the last name as the local part of the email address -It appends a number to the local part of the second user's email address

It appends a number to the local part of the second user's email address - If two users have the same first name and last name, Exchange Server appends a number to the local part of the second user's email address when the email address policy assigns an email address to the mailbox and the email address is based on the user's first name and last name.

As the Messaging administrator for Fabrikam, Holly Spencer wants to create a recipient type that provides team collaboration such as document storage, a centralized calendar, a OneNote notebook, and project plans. This type can also be used to distribute emails to the team in one space. What recipient type should Holly create? -Distribution groups -Security groups -Microsoft 365 groups

Microsoft 365 groups -These groups are available only in Microsoft 365 and provide team collaboration such as document storage, a centralized calendar, a OneNote notebook, working collaborative on project plans, and team email distribution in one space. Microsoft 365 groups are excellent for team or department collaboration that uses other resources such as a OneNote or OneDrive. Because Microsoft 365 groups provide hooks into multiple Microsoft 365 services, they can be used as a tool to aid adoption and drive business value.

Contoso recently purchased Lucerne Publishing. As the Messaging administrator for Contoso, Holly Dickson wants to implement an Exchange hybrid deployment. However, with the acquisition of Lucerne Publishing, Holly is interested in a hybrid configuration that provides quick onboarding during acquisition scenarios. Which hybrid configuration option should Holly implement? -Full Hybrid Configuration -Minimal Hybrid Configuration -Exchange Modern Hybrid

Minimal Hybrid Configuration - Minimal hybrid configuration is intended for small or medium-sized organizations that need a seamless migration experience for their users. Typically, this option is used in scenarios where hybrid is used as a migration option that doesn't require enhanced features. The minimal hybrid configuration is also an excellent solution for a quick onboarding during merger and acquisition scenarios.

Fabrikam has an on-premises Exchange Server 2019 deployment. As the Messaging administrator for Fabrikam, Holly Spencer plans to create the connectors that connect Fabrikam's on-premises Exchange environment to EOP. Which connector should Holly create that acts as a Send connector for sending all outgoing mail to EOP? -On-premises connector -EOP outbound connector -EOP inbound connector

On-premises connector - This connector is a Send connector that sends all outgoing mail to EOP.

As the Messaging administrator for Contoso, Holly Dickson has discovered that several of the company's transport rules have conditions that overlap. What should Holly do to address this situation? -Modify the rules to only have one condition per rule -Modify the rules to eliminate any overlap of conditions -Order the rules properly

Order the rules properly - In many cases, you must apply several transport rules in your organization. If these transport rules have conditions that can overlap in some cases, it's important that you order them properly.

As the Messaging administrator for Tailspin Toys, Alan Deyoung is troubleshooting a connectivity issue in Tailspin's Exchange hybrid deployment. Alan has discovered that free/busy information and mailbox migrations aren't passing through the firewall between Exchange on-premises and Exchange Online. What TCP port should Alan check to troubleshoot this issue? -Port 25 -Port 443 -Port 80

Port 443 -TCP port 443 is used for free/busy information and mailbox migrations.

As the Messaging administrator for Tailspin Toys, Alan Deyoung just ran the Hybrid Configuration Wizard (HCW). What happened when Alan ran the HCW? -It configured Exchange with the full Hybrid feature set -It enabled Tailspin Toys to optionally complete a one-time transfer of its organizational settings from its Exchange Server on-premises environment to Exchange Online -It configured Exchange with the minimal settings needed so that Tailspin Toys can seamlessly move its mailboxes to Exchange Online

It enabled Tailspin Toys to optionally complete a one-time transfer of its organizational settings from its Exchange Server on-premises environment to Exchange Online -Microsoft added a feature to the HCW called Organization Configuration Transfer (OCT). OCT enables an organization to complete a one-time transfer of its organizational settings from its Exchange Server on-premises environment to Exchange Online.

There are two requirements for an Outlook client to use an offline address book. One of the requirements is that the client can't be connected to Exchange. What's the second requirement? -The client must be assigned an address book policy -The client must be configured in cached mode -The organization must turn on ABP routing in PowerShell

The client must be configured in cached mode -Offline address books (OABs) are downloadable copies of the address lists that are used by Outlook clients. To use an OAB, a client must be configured in cached mode, and it can't be connected to Exchange.

Northwind Traders recently migrated from its Exchange Server 2016 CU2 deployment to Exchange Online. It wants to remove its on-premises Exchange servers, so the company's Messaging administrator, Alan Deyoung, must migrate its public folders to Exchange Online. Which of the following tasks must Alan complete before migrating the company's public folders? -Configure a hybrid deployment -Move all your mailboxes to Exchange Online before migrating legacy public folders -Upgrade your Exchange 2016 servers to CU4 or later

Upgrade your Exchange 2016 servers to CU4 or later -For a modern public folder migration, Exchange 2016 servers must run at least Exchange Server 2016 CU4 or later. Since Northwind Traders is running Exchange Server 2016 CU2, it must upgrade to CU4 or later before it can migrate its modern public folders to Exchange Online.

Fabrikam has an Exchange Server 2019 deployment. As Fabrikam's Messaging administrator, Holly Spencer wants to implement outbound spam filtering. What must Holly do to provide outbound spam filtering in Fabrikam's Exchange Server deployment? -Configure spam filtering policies in the Microsoft 365 Defender portal -Configure spam filtering policies in the Exchange admin center -Use Exchange Online Protection

Use Exchange Online Protection - Outbound spam filtering isn't available in Exchange Server deployments without using Exchange Online Protection (EOP).

As the Message administrator for Fabrikam, Holly Spencer is considering whether to implement Safe Links. Which of the following tasks should Holly complete before deploying Safe Links at Fabrikam? -Verify Fabrikam has Microsoft Defender for Office 365 licensed -Verify that a default policy is in place that applies to selected domains -Review the order of the policies in the Exchange admin center

Verify Fabrikam has Microsoft Defender for Office 365 licensed - Holly should verify that Fabrikam has Microsoft Defender for Office 365 licensed Before implementing Safe Links.

As the Messaging administrator for Fabrikam, Holly Spencer wants to use address lists to sort the company's GAL into multiple views. Holly's goal is to make it easier for Fabrikam's users to locate recipients. Holly wants to configure address lists with recipient filters that will determine the scope of recipients and add conditional filtering based on properties such as company, department, and state or region. Which type of recipient filter should Holly use? -Hierarchical address list filters -Custom filters -Pre-canned filters

Pre-canned filters - A pre-canned filter is a commonly used Exchange filter that you can use to meet various recipient-filtering criteria for creating address lists. For example, using pre-canned filters, you can determine the scope of recipients and add conditional filtering based on properties such as company, department, and state or region.

As the Messaging administrator at Contoso, Holly Dickson has finished running their IMAP migration. Holly also changed the MX record of the company's domain to point to Microsoft 365. What should Holly do next to finalize the migration? -Manually start the migration batch again -Registering any SMTP domains in Microsoft 365 -Remove the migration batch

Remove the migration batch -To finish the migration, allow either 72 hours for the final delta-synchronization to complete or manually start the migration batch again. Once you're sure that all messages are migrated, you should remove the migration batch.

As the Messaging administrator for Lucerne Publishing, Patti Fernandez wants to disable dynamic throttling and instead, customize throttling by adjusting several MRS settings. What's the next step that Patti must complete after making changes to the MRS config file? -Restart the Microsoft Exchange Mailbox Replication service -Run the Remote Connectivity Analyzer tool -Update the company's SPF and DKIM records in DNS

Restart the Microsoft Exchange Mailbox Replication service - After you make changes to the MRS config file, you must restart the Microsoft Exchange Mailbox Replication service.

The principles of retention define the order in which multiple retention policies are applied to content. What's the first principle of retention? -Retention wins over deletion -Longest retention period wins -Explicit inclusion wins over implicit inclusion

Retention wins over deletion -The first principle of inclusion that's applied to content is Retention wins over deletion. At the highest level, content being retained by one policy can't be permanently deleted by another policy.

As the Messaging administrator at Contoso, Holly Dickson wants to migrate the company's on-premises public folders over to Microsoft 365 Groups. Doing so will enable Contoso to take advantage of the latest collaboration features from Microsoft, as opposed to staying with the older public folder technology. Contoso currently has an Exchange Server 2019 deployment. What must Holly do to migrate Contoso's on-premises public folders to Microsoft 365 Groups? -Store the public folders on an encrypted hard drive and physically ship the drive to Microsoft -Set up an Exchange hybrid environment -Upload the public folders to the Import service using your existing Internet connection

Set up an Exchange hybrid environment - If your public folders are on-premises, you must have an Exchange hybrid environment set up before you can migrate the public folder data to Microsoft Groups.

Fabrikam has a Microsoft 365 E5 subscription. As the Messaging administrator for Fabrikam, Holly Spencer wants to configure storage quotas to control the size of mailboxes and manage the growth of mailbox databases in the company's Exchange Online deployment. What's the fixed maximum storage quota for the primary mailbox in Fabrikam's Exchange Online deployment? -50 GB -100 GB -250 GB

100 GB -In Microsoft 365, Exchange Online storage quotas have a fixed maximum for the primary mailbox. They also depend on subscription type, such as 50 GB for Business subscriptions and 100 GB for Enterprise subscription. Since Fabrikam has a Microsoft 365 E5 subscription, it has a 100 GB maximum storage quota.

Which port used by Exchange is the most import port used for client access? -25/TCP -80/TCP -443/TCP

443/TCP - Most client access is tunneled over HTTPS. This port is the most important port for client access.

Which port used by Exchange is the most import port used for client access? -25/TCP -80/TCP -443/TCP

443/TCP -Most client access is tunneled over HTTPS. This port is the most important port for client access.

Contoso has implemented an Exchange Online deployment. What extra configuration must Contoso complete to enable Exchange Online Protection? -Run the Hybrid Configuration Wizard -Create connectors -No extra configuration is needed

No extra configuration is needed - When you register for Exchange Online or Microsoft 365, EOP is automatically applied to any message that is received or sent from your online tenant. No extra configuration is needed.

What's the next thing that happens after a message is received by the Transport service on a Mailbox server? -The message is categorized -The ultimate destination of the message is determined -Determine how to best reach the destination

The message is categorized - When a message is received by the Transport service on a Mailbox server, the message must be categorized. Categorization has multiple phases, the first of which is recipient resolution, then determining the destination, and finally determining the routing path.

Contoso and Fabrikam each have an Exchange Server 2019 deployment. As the new Messaging administrator for Contoso, Holly Dickson wants to configure federated sharing between the two organizations. While verifying which Azure AD authentication system instance each Exchange organization uses, Holly discovered that a federation trust already exists between the two organizations. Given this situation, what does Holly need to do to implement federated sharing with Fabrikam? -Run the Federation Trust wizard to generate a new self-signed certificate -Change the existing federated trust relationship to reflect each organization's current domain infrastructure -Configure an organization relationship

Configure an organization relationship - If a federation trust to the Azure AD authentication system already exists for both Exchange organizations, you don't need to change the federation trust. Instead, you just have to configure an organization relationship or sharing policy.

Which anti-spam agent on Edge Transport servers uses an IP blocklist, IP allowlist, IP blocklist providers, and IP allowlist providers to determine whether a connection should be blocked or allowed? -Connection Filtering agent -Recipient Filter agent -Sender Filter agent

Connection Filtering agent -Connection filtering uses an IP blocklist, IP allowlist, IP blocklist providers, and IP allowlist providers to determine whether a connection should be blocked or allowed.

Fabrikam has an on-premises Exchange Server 2019 deployment. As the Messaging administrator for Fabrikam, Holly Spencer wants to run EOP Standalone on Fabrikam's on-premises email servers. What must Holly do to enable mail flow between EOP and Fabrikam's Exchange environment? -Create connectors -Open port 80 in Fabrikam's firewall -Create connectors using the Hybrid Configuration Wizard

Create connectors - For EOP standalone, you must create the connectors yourself.

Which of the following items is a type of multiple forest topologies that Microsoft Exchange Server supports? -Security forest -Cross forest -Active Directory forest

Cross forest - Microsoft Exchange Server supports Cross-forest and Resource forest topologies. A cross-forest topology type can have multiple forests, each with their own installation of Exchange. A resource forest topology type has an Exchange forest and one or more accounts forests.

Which Exchange Management Shell cmdlet isn't available when connected to Exchange Online? -Get-MessageTrace -Get-MessageTraceDetails -Get-MessageTrackingLog

Get-MessageTrackingLog -The Get-MessageTrackingLog cmdlet isn't available when connected to Exchange Online. Instead of Get-MessageTrackingLog, you must use Get-MessageTrace and Get-MessageTraceDetails to view results for message tracking.

Mary is one of Contoso's regional Sales managers. Mary has asked Holly Dickson, the company's Messaging administrator, for permission to run searches and to preview and export search results in the Content Search page. What role group must Holly assign to Mary to provide this functionality? -Compliance Data Administrator -Compliance Administrator -eDiscovery Manager

eDiscovery Manager -You must be a member of the eDiscovery Manager role group in the Microsoft 365 Defender portal to run searches and to preview and export search results in the Content Search page. You don't have to assign other search permissions in Exchange Online.

As the Messaging administrator for Contoso, Holly Dickson wants to assign multiple end-user roles to Susie, who's an end user in the Sales department. What's the easiest way for Holly to assign multiple end-user roles to Susie? -Assign a role group that includes multiple roles -Through a role assignment policy -By assigning each individual end-user role to Susie

By assigning each individual end-user role to Susie -Holly can't assign a role group to Susie, because role groups are only used with administrative roles and not end-user roles. Holly must assign each individual end-user role to Susie.

Which anti-spam agent assigns a spam confidence level (SCL) to each message based on data from both legitimate messages and spam messages? -Content Filter agent -Sender Filter agent -Attachment Filtering agent

Content Filter agent -The Content filtering agent assigns an SCL to each message based on data from both legitimate messages and spam messages.

As the Messaging administrator for Lucerne Publishing, Patti Fernandez wants to create journaling rules to record email communications as part of Lucerne's email retention strategy. What's the maximum number of journal rules that Patti can create in Microsoft 365? -10 -25 -50

10 -In Microsoft 365, the maximum number of journal rules that you can create is 10.

As the Messaging administrator for Fabrikam, Holly Spencer is using the Queue Viewer tool to troubleshoot some recent SMTP mail flow issues. Holly has noticed that there's many messages in the Mailbox Delivery queue. What's the most common cause for this situation? -A dismounted mailbox database -The categorizer is having problems processing the messages -Messages can' be routed to their destination

A dismounted mailbox database - There's a delivery queue for each mailbox database to which messages are destined. On a busy server, you may see a few messages in each queue. If there are many messages in a queue, the most common cause is a dismounted mailbox database.

Mail flow processing requires multiple DNS record types to be configured. What record type should you verify when troubleshooting mail routing in a coexistence scenario to ensure that it's configured properly? -A records -CNAME records -TXT records

A records - When you're troubleshooting mail routing during coexistence, you should verify that A records and PTR records are properly configured in a coexistence scenario.

Mail flow processing requires multiple DNS record types to be configured. What record type should you verify when troubleshooting mail routing in a coexistence scenario to ensure that it's configured properly? -A records -CNAME records -TXT records

A records -When you're troubleshooting mail routing during coexistence, you should verify that A records and PTR records are properly configured in a coexistence scenario.

RBAC applies permissions to all Exchange objects within what type of Exchange forest? -A Resource forest -All forests in the same forest topology type -A single forest

A single forest - RBAC applies permissions to all Exchange objects within a single forest. The RBAC configuration in each forest is configured independently of all other forests.

Fabrikam has an on-premises Exchange Server deployment. As the Messaging administrator for Fabrikam, Holly Spencer wants to implement mailbox audit logging to help determine who has accessed a specific mailbox and what they've done. What must Holly do to implement mailbox audit logging? -Holly doesn't have to do anything, since mailbox audit logging is activated by default in Exchange Server -Activate audit logging for all mailboxes using the Exchange admin center -Activate audit logging for the specific mailbox using the Exchange Management Shell

Activate audit logging for the specific mailbox using the Exchange Management Shell -Mailbox audit logging must be activated manually per mailbox in Exchange Server. You can't use the Exchange admin center (EAC) to enable or disable mailbox audit logging. Instead, you must use the Exchange Management Shell to enable mailbox audit logging.

Tailspin Toys has an Exchange Server 2019 on-premises deployment. Alan Deyoung, who's assigned the Microsoft 365 Messaging admin role, wants to configure the company's password policy in Microsoft 365. However, Alan has discovered that the password policy settings are disabled in the Microsoft 365 admin center. Which of the following items would cause these settings to be disabled? -Password policies can only be defined for Exchange Online and hybrid deployments -Password policies can only be defined in Azure Active Directory -Alan is assigned the Microsoft 365 Messaging admin role and not the Global Administrator role

Alan is assigned the Microsoft 365 Messaging admin role and not the Global Administrator role - You must be assigned the Global admin role to configure password policy in Microsoft 365.

Which anti-phishing feature in Exchange Online Protection turns spoof intelligence on or off, turns unauthenticated sender identification in Outlook on or off, and specifies the action for blocked spoofed senders? -Spoof intelligence -Anti-phishing policies -Implicit email authentication

Anti-phishing policies -These policies turn spoof intelligence on or off, turn unauthenticated sender identification in Outlook on or off, and specify the action for blocked spoofed senders (move to Junk Email folder or quarantine).

As the Messaging administrator for Lucerne Publishing, Patti Fernandez enabled anti-spam functionality on the company's Exchange Server Mailbox server. What happened as a result of this action? -The Transport service routes messages through a hub site to check for spam -Anti-spam transport agents were installed -When Exchange Server calculates the least-cost routing path, the cost assigned to anti-spam testing is added to the total cost

Anti-spam transport agents were installed -If anti-spam functionality is enabled on an Exchange Server Mailbox server, the anti-spam transport agents are installed. This transport agent in turn scans messages that pass through the Transport service.

Which type of SMTP domain is an accepted domain in which all recipients are hosted in the Exchange organization? -Authoritative domain -Remote domain -Relay domain

Authoritative domain - An authoritative domain is an accepted domain in which all recipients are hosted in the Exchange organization.

As the Messaging administrator for Lucerne Publishing, Patti Fernandez wants to eliminate the potential for data theft or exposure because of lost, stolen, or inappropriately decommissioned computers and disks. Which of the following encryption technologies should Patti implement to provide this functionality? -Distributed Key Manager (DKIM) -BitLocker -Office 365 Message Encryption

BitLocker -Microsoft 365 servers use BitLocker to encrypt the disk drives containing customer data at rest at the volume-level. BitLocker eliminates the potential for data theft or exposure because of lost, stolen, or inappropriately decommissioned computers and disks.

Contoso and Fabrikam each have an Exchange Server 2019 deployment. As the Messaging administrator for Contoso, Holly Dickson wants to configure federated sharing between the two organizations. However, Holly wants to control the federated sharing by limiting it to specific users. How can Holly implement this level of federated sharing? -By creating an organization relationship with Fabrikam -By creating sharing policies within Exchange that are assigned to selected users -By using the default sharing policy within Exchange

By creating sharing policies within Exchange that are assigned to selected users - A sharing policy that you create in Exchange can be assigned to specific users. This design enables you to ensure that sharing policies can be granular and not automatically available for everybody in an external organization as when you configure organization relationships.

Which advanced anti-phishing feature in Microsoft Defender for Office 365 uses machine learning and other heuristics to identify and analyze messages that are involved in coordinated phishing attacks against the entire service and your organization? -Anti-phishing policies -Campaign Views -Attack simulator

Campaign Views -Campaign Views use machine learning and other heuristics to identify and analyze messages that are involved in coordinated phishing attacks against the entire service and your organization.

As the Messaging administrator for Tailspin Toys, Alan Deyoung wants to use Content Search to find and remove high-risk email that contains sensitive data. Alan has created and refined a Content Search that returns these messages. What's the next step that Alan must complete? -Delete the returned messages using the Microsoft 365 Defender portal -Delete the returned messages using the Microsoft Purview compliance portal -Connect to the Microsoft Compliance portal PowerShell and run the New- ComplianceSearchAction cmdlet

Connect to the Microsoft Compliance portal PowerShell and run the New-ComplianceSearchAction cmdlet - After you've created and refined a Content Search to return the messages that you want to remove, the final step is to connect to the Microsoft Compliance portal PowerShell and then run the New-ComplianceSearchAction cmdlet to delete the messages. Deleted messages are moved to a user's Recoverable Items folder.

Which transport service component represents a collection of transport servers that are responsible for delivering messages to a specific routing destination? -Connector -Transport agent -Delivery groups

Delivery groups -Delivery groups represent the collection of transport servers that are responsible for delivering messages to a specific routing destination. Each routing destination has its own delivery group. Transport servers in a delivery group can be Exchange Server 2019, 2016 or 2013 Mailbox servers.

Which anti-spoofing technology lets you add a digital signature to outbound email messages in the message header? -Sender Policy Framework (SPF) -DomainKeys Identified Mail (DKIM) -Domain-based Message Authentication, Reporting, and Conformance (DMARC)

DomainKeys Identified Mail (DKIM) - DKIM lets you add a digital signature to outbound email messages in the message header. When you configure DKIM, you authorize your domain to associate, or sign, its name to an email message using cryptographic authentication. Email systems that get email from your domain can use this digital signature to help verify whether incoming email is legitimate.

As the Messaging administrator for Fabrikam, Holly Spencer wants to control the flow of messages that Fabrikam users send to and receive from the Internet. What feature should Holly implement to provide this functionality? -Transport rules -Edge transport rules -Inbox rules in Outlook

Edge transport rules - Edge Transport rules are used to control the flow of messages sent to or received from the Internet.

Tailspin Toys is planning to implement a hybrid Exchange deployment. As the Messaging administrator for Tailspin Toys, Alan Deyoung is planning the company's email flow between Exchange Online and the company's on-premises Exchange Servers. What other email flow component must Alan organize? -The Transport Layer Security (TLS) that encrypts messages -The SMTP send and receive connectors used by the Hybrid Configuration Wizard -Email flow to and from the Internet

Email flow to and from the Internet -A hybrid deployment is typically configured to share a common SMTP email namespace. This design requires routing messages between an organization's on-premises Exchange servers and Exchange Online. For this reason, you must consider how to organize the email flow to and from the Internet, and between Exchange Online and the Exchange Server on-premises.

Which transport rule component identifies the messages that the actions shouldn't apply to? -Exceptions -Conditions -Properties

Exceptions -Exceptions are an optional component, since they identify the messages that the actions shouldn't apply to. The same message identifiers that are available in conditions are also available in exceptions. Exceptions override conditions and prevent the rule actions from being applied to a message, even if the message matches all the configured conditions.

As the Messaging administrator for Contoso, Holly Dickson wants to create a new receive connector that will be used for communication with external applications, users, and mail servers outside of Contoso's Exchange organization. Which of the following roles should Holly assign to this connector? -Frontend Transport -Hub Transport -POP Transport

Frontend Transport -This role is typically used for communication with external applications, users, and mail servers outside of the Exchange organization.

Which type of connectors are configured for the Exchange Server organization? -Receive connectors -Send connectors -Inbound connectors

Send connectors - Send connectors are configured for the Exchange Server organization.

As the Messaging administrator for Fabrikam, Holly Spencer wants to create new user roles and assign them to role assignment policies. How should Holly complete this task? -Holly must use the Exchange Management Shell -Holly must use the Exchange admin center (EAC) -Holly must use the Microsoft 365 Defender portal

Holly must use the Exchange Management Shell -While you can use the EAC to create and manage custom role assignment policies, it doesn't allow you to assign custom roles to them. To create new user roles and assign them to role assignment policies, you must use the Exchange Management Shell.

As the Messaging administrator for Contoso, Holly Dickson wants to enable MFA for individual user accounts. Holly navigated to the Microsoft 365 admin center and to the Active users page, but the Multifactor Authentication option was disabled on the menu bar. What could be the likely cause of this situation? -Conditional Access policies weren't enabled -Security defaults weren't enabled -Holly was not a Global admin

Holly was not a Global admin -To configure multifactor authentication in Microsoft 365, you must be a Microsoft 365 Global administrator.

As the Messaging administrator for Fabrikam, Holly Spencer wants to run a message trace on message data that was created over a month ago. Where can Holly view this data? -In the Exchange admin center -In the Microsoft 365 Defencer portal -In a downloadable .CSV file

In a downloadable .CSV file -Trace data is available for the past 90 days. If a message is older than seven days, you can only view the results in a downloadable .CSV file. Since the message data that Holly is investigating is over a month old, Holly must download the .CSV file that's generated from the message trace to view the results.

As the Messaging administrator for Contoso, Holly Dickson wants to configure anti-malware policies. Where can Holly configure these policies? -In the Exchange Management Shell -In the Microsoft 365 Defender portal -In Exchange Online Protection

In the Exchange Management Shell - Anti-malware policies can be configured in either the Exchange admin center (EAC) or through PowerShell commands in the Exchange Management Shell (EMS).

As the Messaging administrator for Lucerne Publishing, Patti Fernandez wants to regain control of the organization's messaging data by eliminating the need for personal store (.pst) files. Which messaging compliance feature in Exchange Online should Patti configure to provide this functionality? -eDiscovery -In-place archiving -Retention policies

In-place archiving -In-place archiving helps you regain control of your organization's messaging data by eliminating the need for personal store (.pst) files and allowing users to store messages in an archive mailbox accessible in Outlook and Outlook on the web.

As the Messaging administrator for Contoso, Holly Dickson wants to configure Exchange Online Protection for Contoso's Exchange Server deployment. What must Holly do to configure EOP? -Configure Contoso's DNS MX record to point to Microsoft 365 -Install an EOP Send connector in the on-premises Exchange Server environment -Configure Contoso's DNS PTR records

Install an EOP Send connector in the on-premises Exchange Server environment - EOP requires only an EOP Send connector in an on-premises Exchange Server environment so that messages are sent to the EOP domain for scanning.

Contoso is experiencing a slowdown in mail delivery. Which of the following issues can be causing this problem? -Contoso installed a transport agent created by a third party -There are multiple sites with the same routing cost -Large numbers of DLP policies are deployed

Large numbers of DLP policies are deployed -Large numbers of DLP policies can slow down mail delivery. As such, you should only deploy the policies that your organization requires. You should also verify they're properly configured.

Which type of hold in Exchange Server is either enabled or disabled for a mailbox? -In-place hold -Litigation hold -Discovery hold

Litigation hold -Litigation Hold is either enabled or disabled for a mailbox. When Litigation Hold is enabled for a mailbox, all items in the mailbox are placed on hold.

Which source in the Application log includes information about Active Directory access, insufficient permissions, message tracking log corrupted, and the Transport Log Search service failing to start? -MSExchangeTransportLogSearch -MSExchange Messaging Policies -MSExchange Store Driver Delivery

MSExchangeTransportLogSearch -This source includes information about Active Directory access, insufficient permissions, message tracking log corrupted, and the Transport Log Search service failing to start.

Which Microsoft Exchange tool provides detailed message activity information as mail flows through the transport pipeline on Mailbox servers and Edge Transport servers? -Protocol logging -Message tracking logs -Telnet

Message tracking logs -Message tracking logs provide much more detailed information about message delivery than delivery reports. Message tracking records the message activity as mail flows through the transport pipeline on Mailbox servers and Edge Transport servers.

Holly Dickson is the Messaging administrator for Contoso. Holly suspects that a user can't send email to different users where email is sent over multiple connectors. What tool should Holly use to troubleshoot this issue? -Protocol logs -Message tracking logs -Event logs

Message tracking logs - Message tracking logs are used to analyze all message activity as mail flows through the transport pipeline on an Exchange server. If you suspect that a user can't send email to different users where email is sent over multiple connectors, then message tracking logs should be analyzed to troubleshoot the issue.

Which message transport component can be configured to block automatic replies sent to SMTP domains that are external? -Foreign connectors -External relay domain -Remote domain

Remote domain - A remote domain can be configured to block automatic replies sent to SMTP domains that are external to your Exchange Server organization.

Which Safe Attachments option removes detected malware attachments and notifies recipients that attachments have been removed? -Block -Dynamic Delivery -Replace

Replace -This option removes detected malware attachments and notifies recipients that attachments have been removed. Messages that contain malicious attachments are quarantined.

As the Messaging administrator for Fabrikam, Holly Spencer wants to implement Messaging records management (MRM). What MRM feature will enable Holly to apply retention settings to an entire mailbox and default mailbox folders such as Inbox and Deleted Items? -Retention policies -The Managed Folder Assistant -Retention tags

Retention tags -MRM is accomplished using retention tags and retention policies. Retention tags are used to apply retention settings to an entire mailbox and default mailbox folders such as Inbox and Deleted Items. You can also create and deploy retention tags that Outlook and Outlook on the web users can use to apply to folders or individual messages.

Fabrikam has an Exchange Server 2019 on-premises environment. The company also has an Azure AD Premium Plan 1 subscription and a Microsoft 365 E3 tenant. As the company's Messaging administrator, Holly Spencer wanted to implement self-service password reset (SSPR) so that Fabrikam's users can reset their own passwords. However, Holly was unable to do so. What prevented Holly from implementing SSPR? -SSPR isn't available in Exchange Server on-premises environments -SSPR is only available with Microsoft 365 E5 subscriptions -SSPR is only available with Azure AD Premium Plan 2 subscriptions

SSPR isn't available in Exchange Server on-premises environments - SSPR is only available in Exchange Online and hybrid environments. It isn't available in Exchange Server on-premises environments.

As the Messaging administrator for Contoso, Holly Dickson wants to create a specific mailbox for the Sales department. Holly wants to create this mailbox so that members of the Sales department can access the messages directed to the department. This mailbox will enable the Sales department to centrally store, respond to, and manage messages. What recipient type should Holly create? -Distribution group -Linked mailbox -Shared mailbox

Shared mailbox - Shared mailboxes can be accessed by multiple users as an extra mailbox in Outlook. Team, department, or project mailboxes are used to centrally store, respond to, and manage messages. Organizations often use a shared mailbox to provide one specific mailbox for a dedicated group of people, such as sales, help desk, or general information requests.

Which of the following items is a free Microsoft offering that acts as a trust broker between two federated Exchange Server organizations? -The Azure AD authentication system -A Security Assertion Markup Language (SAML) delegation token -The Federated Trust wizard

The Azure AD authentication system - The Azure AD authentication system is an Azure-based service, which is a free Microsoft offering that acts as a trust broker between two federated Exchange Server organizations. Instead of establishing a direct trust as with forest trusts in Active Directory Domain Services (AD DS), you establish a trust between your Exchange server environment and the Azure AD authentication system.

Fabrikam has an Exchange Server deployment. As the Messaging administrator for Fabrikam, Holly Spencer is analyzing the tools that are available to help manage mail flow in Exchange. What tool provides the most detailed information about message delivery so that Holly can determine whether Fabrikam's mail flow is using the correct Exchange servers and connectors? -Queue viewer -Delivery reports -The Get-MessageTrackingLog cmdlet

The Get-MessageTrackingLog cmdlet - You can use message tracking to make sure the mail flow is using the correct Exchange servers and connectors. There's no graphical tool for viewing the message tracking logs. While delivery reports provide this information, Message tracking logs provide much more detailed information about message delivery than delivery reports. To view this information in message tracking logs, you use the Get-MessageTrackingLog cmdlet with filtering to identify the log events you wish to review.

Organizations that implement federated sharing must first configure a federation trust with what object? -The Microsoft Azure AD authentication system -The organization that you want to establish a federated trust with -Exchange Online or Exchange Server 2010 or higher

The Microsoft Azure AD authentication system - Federation refers to the underlying trust infrastructure that supports federated sharing. When you configure federation, you configure a federated trust with the Microsoft Azure AD authentication system.

Contoso has an on-premises Exchange Server deployment. As the Messaging administrator for Contoso, Holly Dickson disabled a user's archiving mailbox for troubleshooting purposes. What happens to the disabled archive mailbox when the deleted mailbox retention period is reached? -The contents of the disabled archive mailbox are removed -The disabled archive mailbox is purged from the mailbox database -The disabled archive mailbox is kept in the mailbox database

The disabled archive mailbox is purged from the mailbox database - In on-premises deployments, a disabled archive mailbox is kept in the mailbox database until the deleted mailbox retention period for that database is reached. During this period, you can reconnect the same disabled archive mailbox to a user's primary mailbox. When the deleted mailbox retention period is reached, the disconnected archive mailbox is purged from the mailbox database.

As the new Messaging administrator for Lucerne Publishing, Patti Fernandez has discovered that several mailboxes have mailbox items that never expire. Which of the following items may have caused this situation? -The mailboxes have multiple retention policies that have conflicting retention tags -The mailboxes have a retention policy that doesn't have retention tags linked to it -The Managed Folder Assistant wasn't scheduled

The mailboxes have a retention policy that doesn't have retention tags linked to it - Although retention tags don't need to be linked to a retention policy, this strategy isn't recommended. If mailboxes have a retention policy that doesn't have retention tags linked to it, this situation may cause mailbox items to never expire.

As the Messaging administrator for Lucerne Publishing, Patti Fernandez wants to prevent users from overloading the performance of the company's Exchange Server. To do this, Pattis wants Exchange Server to delay the user whenever they reach the configured limit for the defined time interval. What is this type of workload usage known as? -Maximum usage -Traffic shaping -Burst allowances

Traffic shaping - With traffic shaping, Exchange Server delays the user whenever a user reaches the configured limit for the defined time interval. This type of workload usage prevents users from overloading the performance of the server. Users' business tasks usually aren't affected because the delays are short and almost undetectable.

What's the highest level of split permissions? -The separation of Exchange management and Compliance management -The separation of Active Directory management and Azure Active Directory management -The separation of Exchange management and Active Directory management

The separation of Exchange management and Active Directory management -The highest level of split permissions is the separation of Exchange management and Active Directory management.

What does Exchange Server use to provide anti-spam protection? -Spam confidence levels -Transport agents -Anti-spam message headers

Transport agents - Exchange uses transport agents to provide anti-spam protection. The built-in agents that are available in Exchange Server are relatively unchanged from Exchange Server 2010. In modern Exchange deployments, configuration and management of these agents is available only in the Exchange Management Shell.

Which Safe Links feature combines elements of Safe Links and Safe Attachments into a single feature, whose purpose is to protect users in the event a link points to a malicious file on a web server? -Spoofing intelligence -Dynamic delivery -URL detonation

URL detonation - URL detonation combines elements of Safe Links and Safe Attachments into a single feature, whose purpose is to protect users in the event a link points to a malicious file on a web server. When a user selects a link to a file on a web server, the file is downloaded into the Safe Attachments sandbox environment and detonated.

As the Messaging admin for Lucerne Publishing, Patti Fernandez wants to create explicit assignment policies. How should Patti create these policies? -Using the Microsoft 365 Defender portal -Using the Exchange admin center (EAC) -Using the Exchange Management Shell (EMS)

Using the Exchange admin center (EAC) - You can only create explicit assignment policies using the EAC. If you want to create a new default assignment policy, you must use the Exchange Management Shell.

Holly Spencer is Fabrikam's Messaging administrator. Fabrikam is experiencing issues in its Exchange Server deployment. SMTP mail flow is being inhibited, and messages have been getting stuck in the transport pipeline. Messages are also being rejected for exceeding the maximum message size. What should Holly troubleshoot that may be causing these issues? -Verify proper configuration of Fabrikam's send and receive connectors -Verify that port 110/TCP isn't restricted -Consider disabling the built-in malware agent in Exchange Server if Fabrikam has other software that conducts malware scanning on email

Verify proper configuration of Fabrikam's send and receive connectors - Receive and send connectors that are configured improperly can inhibit mail flow and cause messages to become stuck in the transport pipeline. Send and receive connectors can also be responsible for messages that are rejected for exceeding the maximum message size.

Which role group enables members to conduct searches and place holds on mailboxes, SharePoint Online sites, and OneDrive for Business locations? -eDiscovery Manager -Compliance Administrator -Compliance Data Administrator

eDiscovery Manager -The eDiscovery Manager role group enables members to conduct searches and place holds on mailboxes, SharePoint Online sites, and OneDrive for Business locations.

Which Microsoft 365 feature can search across all Microsoft 365 services in a single, unified search operation? -eDiscovery hold -eDiscovery case -Litigation hold

eDiscovery case - This feature is available in theMicrosoft Purview compliance portal and serves the same purpose as eDiscovery hold, but with a different web interface. It also provides the ability to search across all Microsoft 365 services in a single, unified search operation.

As the Messaging administrator for Lucerne Publishing, Patti Fernandez is analyzing the company's mail flow configuration in its Exchange Server deployment. Which feature of Lucerne's Exchange deployment are the first to accept external messages and scan them for spam and malware? -perimeter servers -External mail servers -Mailbox servers

perimeter servers - The servers configured in your MX record are your perimeter servers that are the first to accept external messages and often scan them for spam and malware.

Patti Fernandez is the new Messaging administrator for Lucerne Publishing. After several managers changed jobs, Patti investigated Lucerne's permission management model and discovered that the previous administrator had assigned roles directly to users. As a result, Patti had to manually reassign those managers' roles to their replacements. Patti soon realized how inefficient and complex this process was. To avoid this situation in the future, what should Patti do to make it easier to manage role assignments and reduce the complexity of Lucerne's permission model? -Create new roles directly from scratch for each manager -Assign roles to a universal security group (USG) -Use role groups and role assignment policies to give permissions to users

Use role groups and role assignment policies to give permissions to users -While you can also assign roles directly to users, it increases the complexity of your permissions model. For this reason, it's recommended that you use role groups and role assignment policies to give permissions to your users. You can assign the roles to a role group or role assignment policy, and then just add or remove members of the role group or change role assignment policies as needed.

As the Messaging admin for Fabrikam, Holly Spencer wants to create a mailbox for Patti Fernandez. The mailbox will have Active Directory split permissions enabled. Holly began by creating a user account for Patti using Active Directory tools. What's the next step that Holly must complete? -Use the Exchange management tools to mailbox enable Patti's account -Configure Exchange permissions on Patti's account -Add Patti's account to the Mail Recipient role

Use the Exchange management tools to mailbox enable Patti's account -After creating Patti's user account using Active Directory tools, Holly must use the Exchange management tools to mailbox enable Patti's account.

As the Messaging administrator for Tailspin Toys, Alan Deyoung wants to set storage quota limits for user mailboxes. Alan has set the "Prohibit send" quota to 8 MB and the "Prohibit send and receive" quota to 10 MB. Alan has selected the "Issue a warning" check box to automatically warn mailbox users that their mailbox is approaching its storage limit. For the Issue warning quota message to be sent, what value must Alan set the "Issue warning" quota to? -4 MB -8 MB -20 MB

4 MB - The message associated with the "Issue warning" quota won't be sent to the user unless the value of this setting is greater than 50% of the value specified in the "Prohibit send" quota. Since Alan set the "Prohibit send" quota to 8 MB, the "Issue warning" quota must be set to at least 4 MB; otherwise, the Issue warning quota message won't be sent.

What's the maximum number of mail items that can be migrated from a user's mailbox during an IMAP migration? -250,000 -500,000 -700,000

500,000 -You can migrate a maximum of 500,000 mail items from a user's mailbox (emails are migrated from newest to oldest) during an IMAP migration.

As the Messaging administrator for Tailspin Toys, Alan Deyoung plans to deploy an Edge Transport server. Which of the following factors should Alan consider when deploying the Edge Transport server? -The Edge Transport server should be installed on a computer that's a member of the internal Active Directory -The computer running the Edge Transport server doesn't require an FQDN -Active Directory communications shouldn't be allowed through the firewall that protects the internal network from the perimeter network

Active Directory communications shouldn't be allowed through the firewall that protects the internal network from the perimeter network - Active Directory communications shouldn't be allowed through the firewall that protects the internal network from the perimeter network. Doing so can cause security issues, such as allowing an unauthorized user to retrieve your email addresses directly from Active Directory and then use them for spam.

As the Messaging admin for Tailspin Toys, Alan Deyoung is planning the company's role assignment policies. In doing so, Alan has realized that the default role assignment policy isn't enough to fulfill all of Tailspin's business requirements. When this situation occurs, an organization has three options that it can choose from to address the issue. Which of the following items is one of those options? -Create a new role assignment policy from the built-in roles and assign it to role groups -Create new end-user roles and add them to role groups -Add or remove user roles from the default role assignment policy

Add or remove user roles from the default role assignment policy -This item is one of the options that an organization can choose from. The other two options are: Create a new role assignment policy from the built-in roles and assign it to individual users, and Create new end-user roles and add them to a role assignment policy.

Tailspin Toys runs Exchange Server 2019. As the company's Messaging administrator, Alan Deyoung increased the maximum Sent message size for the organization from 10 MB to 20 MB. However, Alan later learned that some users' messages were being blocked because they were too large. The blocked messages were all around 15 MB in size. Why were they blocked? -Alan didn't update the Shadow redundancy setting -Alan didn't change the maximum message size on Tailspin Toys' Send connector to 20 MB -Alan didn't adjust the message throttling setting on the Send connector

Alan didn't change the maximum message size on Tailspin Toys' Send connector to 20 MB - Even if you configure organization level settings, you may still need to configure individual services or Exchange objects. For example, if you change the maximum message size for your organization, you must also change the maximum message sizes on your receive and send connectors. Failure to do so will still block your users' messages if they're too large.

As the Messaging administrator for Contoso, Holly Dickson disabled the user mailbox for Patti Fernandez. Which of the following items results from this action? -All Exchange attributes are removed from Patti's user account in Active Directory -Patti's disabled mailbox is still visible -Patti's AD user account is disabled and Patti can't sign into the domain

All Exchange attributes are removed from Patti's user account in Active Directory -When a mailbox is disabled, all Exchange attributes are removed from the associated user account in Active Directory.

As the Messaging administrator for Fabrikam, Holly Spencer ran Restart-WebAppPool MSExchangeOWAAppPool on the company's local Exchange 2019 server. What was a side effect of running this command? -It uploaded the on-premises authorization certificate to Azure Active Directory ACS -It created an authorization server object for Fabrikam's Exchange Online organization -All Fabrikam users were disconnected from OWA

All Fabrikam users were disconnected from OWA -Running Restart-WebAppPool MSExchangeOWAAppPool on your local Exchange 2016 or 2019 server will disconnect all your users from OWA.

As the Messaging administrator for Contoso, Holly Dickson wants to use Azure AD Connect to enable coexistence between Contoso's on-premises Active Directory Domain Services (AD DS) environment and Microsoft 365. Which of the following items is an Azure AD Connect feature that Holly should be aware of when using Azure AD Connect as the directory synchronization tool for Microsoft 365? -New user objects in on-premises AD DS are added to Microsoft 365, and Microsoft 365 licenses are automatically assigned to these objects -Attributes of existing user, group, or contact objects that are modified in on-premises AD DS are modified in Microsoft 365; however, not all on-premises AD DS attributes are synchronized to Microsoft 365 -Existing user objects that are disabled on-premises are disabled in Microsoft 365, and licenses of the disabled objects are automatically unassigned

Attributes of existing user, group, or contact objects that are modified in on-premises AD DS are modified in Microsoft 365; however, not all on-premises AD DS attributes are synchronized to Microsoft 365 -Attributes of existing user, group, or contact objects that are modified in on-premises AD DS are modified in Microsoft 365. However, not all on-premises AD DS attributes are synchronized to Microsoft 365.

As the Messaging administrator for Fabrikam, Holly Spencer is planning to implement a hybrid Exchange deployment. Which of the following hybrid deployment components must Holly deploy on an on-premises Exchange server before configuring Fabrikam's hybrid deployment? -Exchange Online Protection -Azure AD Connect -Active Directory Federation Services

Azure AD Connect - To support the unified GAL, synchronization of AD DS replicates information about mail-enabled objects from on-premises Active Directory to Microsoft 365. You must deploy Azure Active Directory Connect on an on-premises server before you can configure a hybrid deployment.

Which hybrid deployment component synchronizes your local Active Directory information to Azure Active Directory, which is used by Microsoft 365? -The AD FS server -Exchange Online Protection -Azure AD Connect

Azure AD Connect -Azure AD Connect synchronizes your local Active Directory information to Azure Active Directory, which is used by Microsoft 365. This design is a one-way synchronization of users, groups, and contacts, with limited write-back of Exchange related attributes to support coexistence and Exchange Online protection.

As the Message administrator for Contoso, Holly Dickson wants to configure mutual TLS to secure a connector to Fabrikam, one of Contoso's partner organizations. Securing a connector to Fabrikam will enable Holly to manage secured message paths between domains over the Internet. In this configuration, how should the Contoso mailbox server verify the identity of the Fabrikam mailbox server? -By reviewing the receive protocol log for STARTTLS events that are marked successful -By validating the certificate provided by the Fabrikam mailbox server -By verifying the identity of the server that's stored in Fabrikam's MX record

By validating the certificate provided by the Fabrikam mailbox server - An organization should configure mutual TLS to secure a connector to a partner organization. In this configuration, each mailbox server should verify the identity of the other server by validating the certificate the other mailbox server provides. This design is an easy way for administrators to manage secured message paths between domains over the Internet.

Lucerne Publishing currently has one Edge Transport server. As the company's Messaging administrator, Patti Fernandez wants to expand the company's messaging infrastructure by creating additional Edge Transport servers. None of the Edge Transport servers are domain joined. How can Patti apply the company's Edge Transport rules from its existing Edge Transport server to the new Edge Transport servers? -Clone the Edge Transport server configuration -Enable automated replication of transport rules on the new Edge Transport servers -Move the Edge Transport rules from the Edge Transport server to the company's mailbox servers

Clone the Edge Transport server configuration -Edge Transport rules are configured on each Edge Transport server. Edge Transport rules that you create and configure on Edge Transport servers are stored in the local instance of AD LDS on the server. No automated replication of transport rules occurs on Edge Transport servers. Rules on the Edge Transport server apply only to messages that flow through the local server. If you need to apply the same set of mail flow rules on multiple Edge Transport servers, you can clone the Edge Transport server configuration, or export and import the mail flow rules.

Fabrikam's Sales team has been running content searches on a large number of mailboxes and SharePoint sites. As the Messaging administrator for Fabrikam, Holly Spencer is getting frustrated with the performance of these searches. What can Holly recommend to the Sales team to help them improve the performance of their content searches? -Buy more powerful computers -Run their searches using PowerShell rather than the Microsoft Purview compliance portal -Clone their content searches into multiple, smaller searches

Clone their content searches into multiple, smaller searches -Although enhanced by scalability and performance improvements, searching a large number of mailboxes or SharePoint sites when using Content Search may still take a while to complete. Cloning a Content Search can be used to break up a large, single search into multiple, smaller searches that run more quickly.

Which of the following items provides the smoothest way to move mailboxes from the user perspective, but also requires the greatest effort for messaging administrators? -Staged migration -Minimal hybrid configuration / Express migration -Coexistence

Coexistence - In a coexistence, you can move mailboxes between your on-premises mail servers and Exchange Online as your business allows, and without the users noticing a difference. As such, coexistence provides the smoothest way to move mailboxes from the user perspective, but it also requires the greatest effort for messaging administrators.

Fabrikam is performing a cross-tenant migration. As the company's Messaging administrator, Holly Spencer has verified that the user objects being migrated are present in the target tenant and as MailUsers in Exchange Online. However, Holly just discovered that a target MailUser was previously licensed for Exchange Online. What must Holly do to correct this situation so that the MailUser can be migrated to Exchange Online? -Complete a cleanup of the cloud mail end user -Synchronize the correct ExchangeGuid to the target mail user -Apply a new Exchange Online license to the target MailUser

Complete a cleanup of the cloud mail end user - If the target MailUser was previously licensed for or had an ExchangeGuid that doesn't match the Source ExchangeGuid, you must complete a cleanup of the cloud mail end user.

Fabrikam has multiple mailbox servers. As the Messaging administrator for Fabrikam, Holly Spencer wants to configure a message transport rule that can identify and act on messages that flow through the transport pipeline in Fabrikam's Exchange organization. What must Holly do to make this new rule accessible to all of Fabrikam's mailbox servers? -Configure the rule on each of Fabrikam's mailbox servers -Configure the rule on one of Fabrikam's mailbox servers -Configure the rule in the Configuration container in Active Directory

Configure the rule on one of Fabrikam's mailbox servers - Transport rules are configured at the mailbox server level. Transport rules configured on one Mailbox server automatically apply to all other Mailbox servers in the organization. Exchange Server stores the transport rules in the Configuration container in Active Directory and replicates them throughout the Active Directory forest. This process makes the rules accessible to all other Mailbox servers. By doing so, Exchange Server applies the same transport rules to all email messages that users send or receive in the organization.

Contoso and Fabrikam are both Exchange Server organizations. As the Messaging administrator for Contoso, Holly Dickson wants to create an organization relationship with Fabrikam. What's the first thing that Holly must do to accomplish this task? -Create the organization relationship in the Exchange admin center -Use Autodiscover to obtain the uniform resource locator (URL) for Fabrikam's Availability Web Service -Create a TXT record in Contoso's public DNS that validates the Contoso domain that will be used to configure the federated trust

Create a TXT record in Contoso's public DNS that validates the Contoso domain that will be used to configure the federated trust - When you configure the organization relationship in the Exchange admin center, the Azure AD authentication system checks your DNS zone and searches for the appropriate TXT resource record. This record must have the content for validating the domain that will be used to configure the OrgID for the federation trust. Holly must create this TXT record before creating the organization relationship.

As the Messaging administrator for Tailspin Toys, Alan Deyoung wants to move a user's archive mailbox to another mailbox database on the same Mailbox server. What must Alan do to move the user's archive mailbox? -Create a migration batch and perform a remote mailbox move request -Create a mailbox move request -Create a migration endpoint for a local mailbox move

Create a mailbox move request -Alan must create a mailbox move request to move the user's archive mailbox to another mailbox database on the same Mailbox server or to another server, independent of the primary mailbox.

When running a cutover migration, which of the following actions can be completed by the migration wizard? -Prepare the on-premises Exchange Servers to allow Outlook Anywhere communication for Microsoft 365 -Create a migration endpoint in Microsoft 365 that connects to the source email system -Change the Autodiscover DNS record for all its SMTP domains

Create a migration endpoint in Microsoft 365 that connects to the source email system - As a preparatory task, an organization can create a migration endpoint in Microsoft 365 that connects to its source email system. If it doesn't create a migration endpoint, the migration wizard will create one when it creates a migration batch.

As the Messaging administrator for Lucerne Publishing, Patti Fernandez is planning which Microsoft 365 authentication option to use for Lucerne's Exchange hybrid deployment. Patti wants a system in which users no longer authenticate against Azure AD. Instead, the password they enter will be authenticated against Lucerne's local Active Directory without any type of redirection. Which type of authentication option is Patti interested in implementing? -Directory synchronization with Pass-through authentication -Directory synchronization federated with AD FS -Directory synchronization with Password hash synchronization

Directory synchronization with Pass-through authentication -Both PTA and federation delegate authentication control to your directory service. By doing so, users no longer authenticate against Azure AD. However, with PTA, the user isn't redirected (which is the case with federation). Instead, the Azure AD service validates the password entered against the organization's Active Directory.

What's the first task you must complete to configure RBAC split permissions? -Create a role group, which will contain the Active Directory administrators that can create security principals -Disable Active Directory split permissions if it's enabled -Create regular and delegating role assignments between the Mail Recipient Creation role and the Recipient Management role group

Disable Active Directory split permissions if it's enabled -The first task that an organization must complete to configure RBAC split permissions is to disable Active Directory split permissions if it's enabled.

When Microsoft Exchange Server was deployed at Contoso, all Contoso administrators were given Full Access permissions to all the company's user mailboxes. As the number of Contoso employees has increased over time, the administrators have begun experiencing performance issues when starting Outlook. What should Contoso do to efficiently address this situation? -Remove Full Access permissions to all user mailboxes for each administrator -Change each administrator's permissions for all user mailboxes from Full Access to Send As -Disable Automapping

Disable Automapping -Automapping is an Exchange feature that allows an Outlook client to automatically map to any mailbox to which the user has Full Access permissions. If a user has Full Access permissions to so many mailboxes that it causes performance issues when starting Outlook, then you may need to disable automapping.

Which of the following types of groups can be migrated to Microsoft 365 groups? -Distribution groups -Security groups -Dynamic distribution groups

Distribution groups -Microsoft 365 offers the ability to migrate a distribution list to a Microsoft 365 group. Only distribution groups can be converted. You can't migrate security groups or dynamic distribution groups to Microsoft 365 groups. You can migrate distribution groups even if they contain mailboxes, shared mailboxes, site mailboxes, or mail users.

As the Messaging administrator for Lucerne Publishing, Patti Fernandez wants to implement a hybrid Exchange deployment. Which of the following items is a recommended best practice to implementing a hybrid deployment that Patti should follow? -Manually configure the hybrid deployment so that you have complete control over configuration settings -At the beginning, move production mailboxes for all users -Don't change the MX resource record at first

Don't change the MX resource record at first - Don't change the MX resource record until after you've verified the hybrid deployment works.

As the Messaging administrator for Lucerne Publishing, Patti Fernandez wants to import PST files using the PST Import tool. What's the first thing that Patti should do? -Upload or copy the PST files -Download the PST import tool and key to a private Azure storage location -Create a PST import-mapping file

Download the PST import tool and key to a private Azure storage location -The first step is to download the tool and access key used to upload the PST files or copy them to a hard drive. The access key is unique to your organization and provides you (or Microsoft data center personnel if you use drive shipping) with the necessary permissions to upload PST files to a private and secure Azure storage location.

As the Messaging administrator for Fabrikam, Holly Spencer is planning the company's Exchange hybrid deployment. Fabrikam uses self-signed certificates for its Exchange Servers. How does this scenario affect the type of hybrid deployment that Holly can install? -Fabrikam must use Exchange Classic Hybrid -Fabrikam must install Trusted Digital Certificates for HTTPS services -Fabrikam must use Exchange Modern Hybrid

Fabrikam must use Exchange Modern Hybrid -If you use self-signed certificates for Exchange Servers, you must use Exchange Modern Hybrid because Exchange Classic Hybrid doesn't support self-signed certificates.

Which of the following items describes Hybrid Agent functionality? -Free busy requests from cloud users to on-premises users traverse the Hybrid Agent -MailTips, Message Tracking, and Multi-mailbox search traverse the Hybrid Agent -SMTP email traffic traverses the Hybrid Agent

Free busy requests from cloud users to on-premises users traverse the Hybrid Agent -Two Exchange-related flows traverse the Hybrid Agent - Free busy requests from cloud users to on-premises users, and Mailbox migrations to and from the cloud.

What Microsoft 365 feature enables messaging administrators to follow email messages as they pass through Exchange Online Protection? -REST/OData Tenant Reporting web service -Message trace -Microsoft Remote Connectivity Analyzer

Message trace -The Microsoft 365 message trace feature enables messaging administrators to follow email messages as they pass through Exchange Online Protection. This feature can help you determine whether a targeted email message was received, rejected, deferred, or delivered by the service. It also shows what actions occurred to the message before it reached its final status

As the Messaging administrator for Contoso, Holly Dickson wants to configure the company's hybrid deployment to receive inbound email from the Internet. As part of this requirement, Holly wants Microsoft to handle Contoso's email domains. Holly also wants to automatically take advantage of the antivirus and anti-spam scanning engines from Exchange Online Protection (EOP). Given these requirements, which of the following methods should Holly select to receive inbound email from the Internet? -Inbound to Exchange Online -Inbound to on-premises Exchange Server -Inbound messages directly

Inbound to Exchange Online - This option is used if you want Microsoft to handle your email domains, and you want to automatically take advantage of the antivirus and anti-spam scanning engines from Exchange Online Protection (EOP). To configure this feature, point the MX resource record to Exchange Online Protection. Exchange Online automatically delivers messages that are located on the on-premises Exchange Server by using the Exchange Server that you define when you run the Hybrid Deployment Wizard.

Fabrikam had earlier limited the connections to its source email system. It now plans to run an IMAP migration. Holly Spencer is the Messaging administrator at Fabrikam. Holly has created a CSV file that lists all the mailboxes to be migrated. Holly has also verified all the existing SMTP domains in Fabrikam's Microsoft 365 tenant. What can Holly do to improve the IMAP migration performance? -Select the IMAP migration wizard option to only migrate message items and not contact, calendar items, and tasks -Select the IMAP migration wizard option to only migrate messages that are less than 35 MB in size -Increase client/server total connections

Increase client/server total connections - If you had previously limited the connections to your source email system, you should consider increasing them to improve migration performance. Common connection limits include client/server total connections, per-user connections, and IP address connections on either the server or the firewall.

As the Messaging administrator for Contoso, Holly Dickson wants to investigate message tracking in Contoso's Exchange Online deployment. Which of the following features should Holly use for this investigation? -Message traces -Message tracking logs -Document fingerprinting

Message traces - The ability to investigate message tracking logs is only available in on-premises Exchange Server deployments. To investigate message tracking in Exchange Online, you must instead use Message traces.

When journaling is implemented, what does the Journal agent do when a message matches a journal rule and is to be submitted to the journaling mailbox? -It generates a journal report and attaches the message to the report -It stores the email message in the archive mailbox -It sends an automatic email notification to the Compliance Manager that contains information from the original message

It generates a journal report and attaches the message to the report - A journal report is the message that the Journaling agent generates when a message matches a journal rule and is to be submitted to the journaling mailbox. The original message that matches the journal rule is included unaltered as an attachment to the journal report. The body of a journal report contains information from the original message such as the sender email address, message subject, message-ID, and recipient email addresses.

Which of the following items is a feature of DAuth? -It's required for some Exchange 2016 and later features, such as cross-premises discovery and automatic archive retention -It's a standards-based framework that is widely used across the web services industry and within other Microsoft products such as Hotmail -It uses standard federation technologies to allow Exchange organizations to establish trusted relationships with each other

It uses standard federation technologies to allow Exchange organizations to establish trusted relationships with each other -Exchange Federated Sharing is also known as Delegated Federation or Delegated Authentication (DAuth). It uses standard federation technologies to allow Exchange organizations to establish trusted relationships with each other.

Where is the configuration and recipient information the Edge Transport server uses to process messages stored? -Active Directory -Locally in AD LDS -Azure Active Directory

Locally in AD LDS - The configuration and recipient information used by the Edge Transport server to process messages is stored locally in AD LDS. Creating an Edge Subscription establishes secure, automatic replication of information from Active Directory to AD LDS.

As the Messaging administrator for Lucerne Publishing, Patti Fernandez wants to run a staged migration to move the user mailboxes from its Exchange 2013 deployment to Microsoft 365. Patti plans to create a CSV file that includes the batches of users that should be migrated. Each batch will have up to 2,000 user mailboxes. Patti also plans to implement directory synchronization using Azure AD Connect to ensure the Exchange Online address list is updated when a mailbox migration is finished. What problem will Patti face when trying to run a staged migration? -Batches can only have up to 1,000 user mailboxes -Lucerne's Exchange environment doesn't support staged migrations -Directory synchronization isn't supported in a staged migration

Lucerne's Exchange environment doesn't support staged migrations - A staged migration can only be run in Exchange 2003 and 2007 environments. Staged migrations aren't supported in organizations running Exchange 2010 or later. Since Lucerne Publishing is running Exchange 2013, Patti can't run a staged migration.

As the Messaging administrator for Tailspin Toys, Alan Deyoung wants to create Exchange recipient types that contain information about people or organizations that exist outside the Tailspin Toys' Exchange organization. These recipient types will also have an external email address. What recipient type should Alan create? -Mail contacts -Linked mailboxes -Remote mailboxes

Mail contacts -Mail contacts contain information about people or organizations that exist outside an Exchange organization and that have an external email address. They show external contacts in Global Address List so that your users can add them to their distribution lists. Exchange routes all messages sent to the mail contact to this external email address.

As the Messaging administrator for Contoso, Holly Dickson wants to create a specific type of group that can be used to distribute messages and to provide access to resources, such as control access to OneDrive and SharePoint. What recipient type should Holly create? -Distribution list -Microsoft 365 group -Mail-enabled security group

Mail-enabled security group -Mail-enabled security groups can be used to distribute messages and to provide access to resources, such as control access to OneDrive and SharePoint.

As the Messaging administrator for Contoso, Holly Dickson wants to keep the company as secure as possible. Which of the following recommendations should Holly build in to the company's password policy to provide a secure password system? -Require character composition requirements within passwords, such as * & ^ % $ -Require mandatory periodic password resets for user accounts -Maintain an eight character minimum length requirement for passwords

Maintain an eight character minimum length requirement for passwords -One of the recommendations for keeping an organization as secure as possible is to maintain an eight character minimum length requirement for passwords. Remember, longer passwords aren't necessarily better.

As the Messaging administrator for Contoso, Holly Dickson wants to create retention policies for Exchange Online, SharePoint Online, and Microsoft Teams. Where should Holly create these retention policies? -Microsoft 365 Defender portal -Exchange admin center -Microsoft Purview compliance portal

Microsoft Purview compliance portal - Retention Policies created in Microsoft Purview are usable across multiple services, such as Exchange Online, SharePoint Online, Teams, and so on. Retention policies created in the EAC are available in Exchange only.

Which of the following built-in user roles allows an end user to view and modify basic configuration and access settings for Outlook on the web? -MyDiagnostics -MyBaseOptions -MyProfileInformation

MyBaseOptions -This built-in role enables end users to view and modify basic configuration and access settings for Outlook on the web.

As the messaging administrator for Contoso, Holly Dickson is trying to determine how Exchange Server determines which routing path to use for message delivery at Contoso. The company's least-cost route includes multiple Active Directory sites. Which of the following scenarios describes how Exchange Server determines the AD site to use for delivery on the least-cost route? -Message delivery hops through each site -Other Active Directory sites on the least-cost path are only used if there's a delivery error Delivery groups can't span multiple Active Directory sites

Other Active Directory sites on the least-cost path are only used if there's a delivery error -After the least-cost route for message delivery has been selected, the Transport service in the source delivery group attempts to deliver the message directly to the destination delivery group. If the least-cost route includes multiple Active Directory sites, other Active Directory sites on the least-cost path are only used if there's a delivery error or the organization configured a modification.

Which of the following items is a prerequisite that must be satisfied to enable Public Folder coexistence with Microsoft 365? -Outlook Anywhere must be enabled and functional on the on-premises Exchange servers -Each server that hosts a Public Folder database requires the Client Access services role to be installed -One mailbox database must be created per Exchange server that holds Public Folder databases

Outlook Anywhere must be enabled and functional on the on-premises Exchange servers -To configure Public Folder coexistence with Microsoft 365, Outlook Anywhere must be enabled and functional on the on-premises Exchange servers.

Contoso has implemented a hybrid Exchange deployment. As the Messaging administrator for Contoso, Holly Dickson wants to verify the company's Exchange Web Services and Exchange ActiveSync settings are still configured properly and haven't changed in any way. How can Holly verify the company's configuration settings? -Run the Microsoft Remote Connectivity Analyzer tool -Monitor message routings to ensure messages flow successfully and don't queue somewhere -Deploy monitoring software to monitor the federated delegation

Run the Microsoft Remote Connectivity Analyzer tool -The Microsoft Remote Connectivity Analyzer (RCA) is a Microsoft tool that can verify your configuration, such as the Exchange Web Services or Exchange ActiveSync settings, and ensure that all settings are configured properly. Because a hybrid deployment uses those services to communicate between Exchange Online and on-premises, an organization should occasionally run the RCA to verify that its configuration hasn't changed in any way.

As the Messaging administrator for Tailspin Toys, Alan Deyoung is troubleshooting a client access issue in coexistence. Tailspin has been experiencing Autodiscover issues and namespace issues. What should Alan do to troubleshoot these client access problems? -Run the Outlook Test Email AutoConfiguration tool -Run the Remote Connectivity Analyzer tool -Verify the Service URL is configured in the Intranet zone

Run the Outlook Test Email AutoConfiguration tool -Organizations should run the Outlook Test Email AutoConfiguration tool to look for Autodiscover issues and namespace or certificate issues.

Which of the following attributes is a feature of shared mailboxes? -Shared mailboxes can provide a generic email address to field customer inquiries -A shared mailbox can have its own username and password -A shared mailbox requires a Microsoft 365 license

Shared mailboxes can provide a generic email address to field customer inquiries -Shared mailboxes provide a generic email address, such as [email protected] or [email protected], to field customer inquiries.

Northwind Traders has an Exchange 2007 deployment with over 2,500 users. It's currently planning to migrate its user's mailboxes to Exchange Online. Which migration option should Northwind use? -Cutover migration -Full hybrid configuration -Staged migration

Staged migration - Both staged and cutover migrations can be used with Exchange 2007 deployments. However, cutover migrations are recommended for organizations with fewer than 2,000 users, while staged migrations are recommended for organizations with more than 2,000 users.

As the Messaging administrator for Contoso, Holly Dickson wants to bulk-import PST files to Exchange Online using the PST Import tool. While planning this migration, Holly has come to realize there are far more PST files than what was originally expected. Many of the files are also large in size. Given this information, what's the recommended approach that Holly should follow to import the data to Microsoft 365? -Upload the PST files to the Import service using Contoso's existing Internet connection -Store your PST files on an encrypted hard drive, send it to Microsoft, and have Microsoft upload the data -Use a third-party bulk transfer tool to upload the files to Microsoft 365

Store your PST files on an encrypted hard drive, send it to Microsoft, and have Microsoft upload the data - This drive shipping option is especially useful if you have many PST files, or the files are large in size, either of which could cause a network upload to take many days or weeks to complete. With this option, you can store your PST files on an encrypted hard drive and physically ship the drive to Microsoft. This option saves you from having to transfer the data over the Internet using the Network Upload option.

As the Messaging administrator for Lucerne Publishing, Patti Fernandez is troubleshooting an issue with client access in coexistence. What's the recommended task that Patti should complete that will help the organization focus its troubleshooting to speed up the time for resolution? -Start troubleshooting on the Edge Transport servers -Test client access across all the protocols to identify the protocol(s) that aren't working -Verify the user is signed into their device using their domain account rather than a local account

Test client access across all the protocols to identify the protocol(s) that aren't working -When an organization troubleshoots client access in coexistence, the problem is often limited to a single protocol. For example, Outlook on the Web may not work, but Outlook will work. When troubleshooting, it's recommended that you test client access across all the protocols to identify the protocol(s) that aren't working. This approach will help the organization focus its troubleshooting to speed up the time for resolution.

Contoso has implemented Azure AD Connect pass-through authentication (PTA). As the Messaging administrator for Contoso, Holly Dickson was notified that all the company's users are being prompted to input their credentials. After entering their username and password, there's a long pause during validation, and then pass-through authentication fails with an error message. Which of the following items causes this problem? -The https://autologon.microsoftazuread-sso.com/ URL isn't defined in the Intranet zone -Port 25 isn't enabled -The Microsoft Azure Active Directory Application Proxy Connector service isn't running

The Microsoft Azure Active Directory Application Proxy Connector service isn't running - Pass-through authentication relies on a service named Microsoft Azure Active Directory Application Proxy Connector (WAPCSvc). If this service isn't running, then pass-through authentication will be unavailable.

Contoso's Exchange Server deployment has multiple routing paths, but they all have the same cost. When determining mail flow, what's the next option that Exchange uses to determine which routing path to use? -The path whose Active Directory site has the lowest alphanumeric name -The path with the lowest number of hops -The path whose Active Directory site has the largest maximum message size

The path with the lowest number of hops - In cases where there are multiple routing paths with the same cost, the path with the lowest number of hops is preferred.

As a best practice, what should the default role assignment policy contain? -The permissions that apply to the organization's broadest set of users -The Organization Management role group -The organization's default universal security group (USG)

The permissions that apply to the organization's broadest set of users - As a best practice, the default role assignment policy that an organization uses should contain the permissions that apply to its broadest set of users.

What happens when you hide a user mailbox from address lists? -The recipient is prevented from receiving email messages -The recipient is hidden from all address lists but not the GAL -The recipient is hidden from all address lists and the GAL

The recipient is hidden from all address lists and the GAL - Hiding the recipient from an address list doesn't prevent the recipient from receiving email messages. Doing so only hides the recipient from all address lists and the GAL.

Contoso has implemented an Edge Transport server to provide a secure SMTP gateway for all incoming and outgoing Internet email in the organization. The Edge Transport server will enable Contoso to maintain a secure border between external SMTP mail and its internal Exchange 2019 servers. It will also provide anti-spam protection. Which of the following methods can Contoso use to provide anti-malware protection? -Through the Edge Transport role in Exchange Server 2019 -Through Azure IoT Edge Transport rules -Through Exchange Online Protection

Through Exchange Online Protection -Exchange Server 2019's Edge Transport role doesn't include anti-malware agents. If you don't want to rely upon Exchange 2019 Mailbox servers to provide anti-malware protection, you must use either Microsoft products such as Exchange Online Protection, or third-party software that integrates with Exchange Server 2019 to provide anti-malware protection.

As the Messaging administrator for Tailspin Toys, Alan Deyoung wants to grant Send of Behalf of permissions to a shared mailbox. How must Alan configure this permission? -Through the Exchange admin center -Through Exchange PowerShell -Through either the Exchange admin center or Exchange PowerShell

Through Exchange PowerShell - The Send on Behalf of permission is only configurable through PowerShell.

Fabrikam recently merged with Contoso. As the Messaging administrator for Contoso, Holly Dickson must move the Fabrikam users' Exchange Online mailboxes into Contoso's Microsoft 365 tenant. How can Holly accomplish this task? -Using the Microsoft Exchange Mailbox Replication Service (MRS) -Through the Exchange admin center (EAC) -Through Windows PowerShell

Through Windows PowerShell - Cross-tenant mailbox moves are done using Windows PowerShell. The feature doesn't have a UI through the Exchange admin center (EAC) portal. Administrators can use the New-MigrationBatch cmdlet, available through the Move Mailboxes management role, to execute cross-tenant moves.

What's the primary function of the Edge Transport server? -To secure both inbound and outbound Internet email -To reduce the administration tasks Messaging administrators must complete in the perimeter network -To replicate AD DS information to AD LDS

To secure both inbound and outbound Internet email -The primary function of the Edge Transport server is to secure both inbound and outbound Internet email. After an organization configures an Edge Subscription between its Exchange servers and the Edge Transport servers in its perimeter network, both inbound and outbound Internet email are enabled.

As the Messaging administrator for Fabrikam, Holly Spencer discovered that the Microsoft Azure AD Sync (ADSync) service isn't running. Holly completed standard troubleshooting steps to validate the status of the service, but it still won't start. Holly verified that the account used by the service is still valid, enabled, and not locked out, and that its password hasn't expired. What's the next step that Holly should do to determine why the ADSync service won't start? -Verify the Windows Management Instrumentation service is running -Verify the Connector credentials are valid -Verify that none of the servers are set for Staging mode

Verify the Windows Management Instrumentation service is running - The Microsoft Azure AD Sync service depends on the Windows Management Instrumentation service, which should also be running. If the ADSync service account appears to be OK, you should then check the status of the Windows Management Instrumentation service and verify that it's running.

When must an organization manually configure OAuth? -When the hybrid deployment uses federated delegation -When the Exchange organization includes Exchange 2007 or 2010 servers -If Azure AD Connect isn't running

When the Exchange organization includes Exchange 2007 or 2010 servers -OAuth must be manually configured when your Exchange organization includes Exchange 2007 or 2010 servers. The Hybrid Configuration Wizard doesn't configure OAuth in this situation.

Contoso's Exchange Server environment is running workloads that have each type of available workload classification assigned. Because the resources used by each Exchange Server workload are highly used, Exchange Server has begun to progressively slow down the workloads. Which workloads will Exchange Server slow down first? -Workloads with an Internal Maintenance classification -Workloads with a Discretionary classification -Workloads with a Customer Expectation classification

Workloads with a Discretionary classification -If server resources are highly used, Exchange Server progressively slows down the lowest priority workloads. Priorities are defined by the classification assigned to each workload: Urgent, Customer Expectation, Internal Maintenance, and Discretionary. Urgent classification has the highest priority and Discretionary classification has the lowest priority. Because Contoso has resources running workloads with each type of classification, the Discretionary workloads are slowed down first.


Related study sets

AP Environmental Science - 10&11

View Set

ECO208 review Questions week 10-15

View Set

Mid term part 4 compression/ACPI

View Set

Chapter 2: Body Structure - Medical Terminology Simplified

View Set

Chapter 4: Health of the Individual, Family, and Community

View Set

lesson 2:debt securities:all 3 videos

View Set

AP bio hard questions at the back (which is all)

View Set