[Virtual] 70-284 Microsoft exam prep 65-80 (Mar 2016)

70-284 Royal Pack Testengine pdf

100% Actual & Verified — 100% PASS

Unlimited access to the world's largest Dumps library! Try it Free Today!

Get it now →

Product Description:
Exam Number/Code: 70-284
Exam name: MCSA 2003 Installing, Configuring, and Administering Microsoft Exchange 2003 Server
n questions with full explanations
Certification: Microsoft Certification
Last updated on Global synchronizing

Free Certification Real IT 70-284 Exam pdf Collection

Exam Code: 70-284 (Practice Exam Latest Test Questions VCE PDF)
Exam Name: MCSA 2003 Installing, Configuring, and Administering Microsoft Exchange 2003 Server
Certification Provider: Microsoft
Free Today! Guaranteed Training- Pass 70-284 Exam.

2016 Mar 70-284 Study Guide Questions:

Q65. You are the Exchange administrator for your company. The network consists of a single Active Directory domain. Exchange Server 2003 is implemented as the company wide messaging system. The relevant portion of the network is configured as shown in the exhibit. (Click the exhibit)

Server1 is configured as a front-end server and as an incoming SMTP relay. It also hosts Microsoft Outlook Web Access, which is used by Internet users to access company e-mail.

Users stop receiving e-mail messages from the Internet. You use the DNS name and IP address to send test e-mail messages directly to Server1 from the Internet. However, your e-mail messages are simply queued on Server1 along with a large number of other messages.

You need to ensure that users can receive e-mail messages from the internet.

What should you do?

Exhibit:


A. Configure the external DNS mail exchanger (MX) resource record of the e-mail domain to point to server1.

B. Configure the internal firewall to allow server1 to communicate with the Exchange server and the global catalog server.

C. Configure the default SMTP virtual server on Server1 to use the Exchange server as a smart host server.

D. Configure the default SMTP virtual server on server1 to deliver all e-mail messages that have unresolved recipients to the Exchange server.

Answer: B


Q66. Your network contains a single Exchange organization. The organization includes Exchange Server 5.5 servers and Exchange Server 2003 servers.

An Exchange Server 5.5 server hosts all public folders for the organization.

You need to ensure that all users that have mailboxes on the Exchange Server 2003 servers can view the public folders in the global address list (GAL).

What should you do?

A. Use Active Directory Connector(ADC) to configure a public folder connection agreement.

B. Use the Public Folder Migration tool to migrate all public folders to an Exchange 2003 server.

C. Use Exchange System Manager to configure a replica of all the public folders on an Exchange 2003 server.

D. Use Microsoft Office Outlook to export the public folders and import the folders to an Exchange Server 2003 server.

Answer: A


Q67. Your network consists of a single Active Directory domain and 10 Active Directory sites. Each site contains an Exchange Server 2003 server and UNIX-based SMTP server.

You configure the UNIX server in each site to relay outgoing e-mail messages through the Exchange Server 2003 servers.

E-mail delivery from the UNIX-based SMTP servers to the Internet fails.

You need to enable the UNIX servers to relay SMTP messages through the Exchange Server 2003 servers.

What should you do on each Exchange Server 2003 server?

A. Add a SMTP virtual server that allows anonymous SMTP connections.

B. Create a new SMTP virtual server and enable the local Guest user account.

C. Create an SMTP connector and configure the local UNIX server as a smart host. 

D. Configure the default SMTP virtual server to relay SMTP messages from the IP address of the local UNIX

Answer: D


Q68. You are the Exchange administrator for your company. Exchange Server 2003 runs on a Microsoft Windows Server 2003 member server.  The Exchange server contains two mailbox stores.  AlI user accounts are located in the Accounts organizational unit (OU).

An e-mail virus infects all mailboxes on both mailbox stores.  You create a nonadministrative user that needs to be able to use the Exmerge utility. This user does not have the necessary permissions to open other users' mailboxes.

You need to assign this user permission to open all users' mailboxes to extract the virus.

What should you do?

A. Assign the user Full Control permissions to the Accounts OU.

B. Assign the user Send As and Receive As permissions to the administrative group.

C. Add the user to the Exchange Domain Servers group.

D. Add the user to the Enterprise Admins global group and to the Exchange server's local Administrators group.

Answer: B


Q69. Your company has an Exchange Server 2003 organization.

All company users have e-mail addresses that use the alias@contoso.com format.

You need to assign the users e-mail addresses that use their first name and the first letter of their last name.

Which address format should you use?

A. %g%1s@contoso.com

B. %g1%s@contoso.com

C. %s1%g@contoso.com

D. %s%1g@contoso.com

Answer: A


70-284 dumps

Renewal 70-284 free exam questions:

Q70. Your Exchange organization includes a mail-enabled distribution group named AllEmployees.

You need to ensure that only members of a group named Group1 can send e-mail messages to the AllEmployees group.

Which properties should you modify? 

A. Modify the properties of Group1.

B. Modify the properties of each Group1 member.

C. Modify the properties of the AllEmployees group.

D. Modify the properties of the global address list (GAL).

Answer: C


Q71. Your Exchange organization contains recipients from the contoso.com and fabrikam.com domains.

All fabrikam.com users have a fabrikam.com e-mail address, All contoso.com users have a contoso.com address.

You need to configure the fabrikam.com user objects to have both contoso.com and fabrikam.com e-mail addresses.

What should you use?

A. Active Directory Migration Tool version 3.0 to move users from the fabrikam.com domain to the contoso.com domain.

B. Dsmod.exe to modify the mail attribute of each user in the fabrikam.com domain.

C. Exchange System Manager to create a recipient policy.

D. Ldifde.exe to modify the targetAddress attribute of each user in the fabrikam.com domain.

Answer: C


Q72. You are the Exchange administrator for your company. The Exchange organization contains 10 servers that run Exchange Server 2003, All users send and receive e-mail messages by using Microsoft Outlook.

Your company has many different departments and a total of 10,000 users. For each department, management asks you to create one address list that contains all users in that department. Management also ask you to create a confidential address list.  The membership of the confidential address list will consist of several users from every department.

For each department, you create an address list that uses the department attribute.

Now you need to create the confidential address list. You must ensure that members of the Managers group are the only user; who can identify the members of the list by using outlook. You must not affect any existing e-mail functionality.

What should you do?

A. Modify the permissions of the user accounts of individuals in the confidential address list so that only the Managers group has permission to send e-mail messages to these accounts.  Create a confidential address list that includes the required user accounts.

B. Modify the permissions of the user accounts of individuals in the confidential address list so that only the Managers group has permission to view these accounts.  Create a confidential address list that includes the required user accounts.

C. Configure the department attribute as confidential for the user accounts of individuals in the confidential address list.  Create an address list that uses the department attribute. Modify the permissions on the address list so that only the Managers group has permission to view its membership.

D. Configure a custom attribute as Confidential for the user accounts of individuals in the confidential address list. Create an address list that uses the custom attribute. Modify the permissions on the address list so that only the Managers group has permission to view its membership.

Answer: D


Q73. You are the Exchange administrator for Pass4dumps. The network consists of a single Active Directory domain named Pass4dumps.com. The network contains nine Exchange Server 2003 computers running on Microsoft Windows Server 2003 member servers. All Exchange servers are in a single organizational unit (OU) named Exchange Servers. Only the Exchange server computer objects are contained in the Exchange Servers OU.

Users in a group named Exchange Admins are exclusively responsible for managing the Exchange organization. No other group, including the Enterprise Admins and Domain Admins groups, has permissions to manage the Exchange organization.

You discover that the Domain Admins group is in the membership list of the Exchange Admins group.

You need to ensure that any changes to group membership that would allow access to manage the Exchange organization are recorded.

What should you do?

A. Configure the Default Domain Controllers Policy to include auditing successful policy change events.

B. Create a Group Policy object (GPO) on the Exchange Servers OU to audit successful policy change events.

C. Create a Group Policy object (GPO) on the Exchange Servers OU to audit successful policy change events.

D. Create a Group Policy object (GPO) on the Exchange Servers OU to audit successful directory service access events.

Answer: A


Q74. Your network contains six Exchange Server 2003 servers.

One of the Exchange servers is configured as a front-end server.

Users report that they can access the Microsoft Office Outlook Web Access (OWA) logon page, but they fail to successfully authenticate.

You need to log which domain controller the front-end server is using to authenticate users.

What should you do on the front-end server?

A. In Exchange System Manager, enable message tracking.

B. In Exchange System Manager, configure diagnostic logging.

C. In Microsoft Internet Information Services (IIS) Manager, configure logging on the default Web site.

D. In Microsoft Internet Information Services (IIS) Manager, configure custom error messages for the default Web site.

Answer: B


70-284 answers

Pinpoint 70-284 exams:

Q75. You have an Exchange Server 2003 organization.

You create a new top-level public folder named Departments. You create a public folder named Sales in the Departments public folder.  You grant the Owner permission for the Sales public folder to a group named Sales_Admin.

You discover that members of the Sales_ Admin group can create new items and folders in the Departments public folder.

You need to ensure that members of the Sales_Admin group can create items and folders in only the Sales public folder.

What should you do on the Departments public folder? 

A. Remove the Default permission by using Microsoft Office Outlook.

B. Remove the Sales_Admin group by using the Manage Public Folder Settings Wizard. 

C. Modify the Default permission to Reviewer by using Microsoft Office Outlook.

D. Modify the Anonymous permission to Reviewer by using Microsoft Office Outlook.

Answer: C


Q76. You are the Exchange administrator for your company. The Exchange organization contains a single Exchange Server 2003 computer. The exchange server contains one storage group that has three mailbox stores. Each mailbox store contains: 200 mailboxes.

The company's service level agreement (SLA) requires that Exchange must not be offline for more than four hours. The SLA requires that in the event of data corruption, the most current data must be restored.

You want to test the recovery process on the existing Exchange server after business hours.  You need to ensure that the mailbox stores can be restored within four hours without losing the current production data.

What should you do before performing the test restore operation?

A. Create a new storage group that contains three mailbox stores, select the option to allow the mailbox stores to be overwritten by a restore operation.

B. On the existing mailbox stores, select the option to allow the mailbox stores to be overwritten by a restore operation.

C. Create the Recovery Storage Group and add the three mailbox stores.  Configure the Recovery Storage Group to use the default Recovery Storage Group path for each of the mailbox stores.

D. Create the Recovery Storage Group and add the three mailbox stores. Configure the Recovery Storage Group to use the existing database path for each of the mailbox stores.

Answer: C


Q77. Your company has a main office and two branch offices named Branch Office 1 and Branch Office 2.

The network consists of a single Active Directory domain. The relevant portion of the network is configured as shown in the exhibit (Click the Exhibit button.)

Users in branch Office 1 report that when a new user account is created in Branch Office 2, the account only appears in the global address list (GAL) two days later. New user accounts created in Branch Office 1 appear in the GAL at Branch Office 2 one day later.

You need to ensure that user accounts created in both branch offices appear in the GAL no more than one day later.

What should you do?

Exhibit:


A. Modify the site link cost for SiteLink1 to 20.

B. Configure SiteLink1 to be availably every day from 03:00 to 06:00.

C. Modify the Recipient Update Service to run every day between 18:00 and 22:00.

D. Configure the Exchange Server server in each office to use the local domain controller for directory access.

Answer: C


Q78. Your organization has one Exchange Server 2003 server named Server1.

You deploy a custom application on Server1. The application is configured to send e-mail messages to a mailbox named App1. The return address on messages sent by the application is Server1@contoso.com.

You need to ensure that the App1 mailbox only receives messages sent from Server1@contoso.com.

What should you do?

A. Configure the SMTP virtual server on Server1 to relay e-mail for messages sent from the server's local IP address.

B. Configure the application to use authentication when sending e-mail. Configure The App1 mailbox to accept messages only from authenticated users.

C. Create a mail-enabled contact named Server1 that has a Server1@contoso.com e-mail address. Configure the App1 mailbox to only accept messages from the Server1 contact.

D. Create a mailbox-enabled user named Server1 that has a Server1@contoso.com e-mail address. Assign Receive As permissions for the App1 mailbox to the Server1 user account.

Answer: C


Q79. You need to ensure that users can connect to Microsoft Office Outlook Web Access (OWA) from the Internet by using the URL: https://owa.contoso.com/exchange.


Which record should you add to the external DNS zone?

A. a host record for OWA pointing to 10.0.0.2

B. a host record for OWA pointing to 131.107.1.201

C. a host record for Server3 pointing to 10.0.0.3

D. a host record for Server3 pointing to 131.107.1.200

Answer: B


Q80. You are an Exchange administrator for your company. The Exchange organization contains an Exchange Server 2003 computer named OWA1. OWA1 is configured as a front-end server that hosts only Microsoft Outlook Web Access. A firewall is configured to reverse proxy HTTP requests to OWA1. All users access OWA1 from the Internet

Several internal e-mail messages are intercepted from OWA1 by unauthorized users.  To improve security, another administrator reconfigures OWA to accept SSL connections. The administrator successfully tests the new configuration by connecting to OWA1 from the internal network. However, users report that they cannot connect to OWA1 by using a secure connection. They can still establish a nonsecure connection.

You need to ensure that all users can establish secure connections to OWA1.

What should you do?     

A. Configure the firewall to block incoming HTTP traffic.

B. Configure the firewall to allow HTTPS traffic to pass from the Internet to OWA1.

C. Configure OWA1 to use IPSec to secure communications between OWA1 and the firewall.

D. Configure OWA1 to trust the certification authority (CA) that issued the SSL certificate.

Answer: B