Top 16 preparation labs 70-342 for IT learners (97 to 112)

70-342 Royal Pack Testengine pdf

100% Actual & Verified — 100% PASS

Unlimited access to the world's largest Dumps library! Try it Free Today!

Get it now →

Product Description:
Exam Number/Code: 70-342
Exam name: Advanced Solutions of Microsoft Exchange Server 2013
n questions with full explanations
Certification: Microsoft Certification
Last updated on Global synchronizing

Free Certification Real IT 70-342 Exam pdf Collection

Free of 70-342 question materials and software for Microsoft certification for consumer, Real Success Guaranteed with Updated 70-342 pdf dumps vce Materials. 100% PASS Advanced Solutions of Microsoft Exchange Server 2013 exam Today!

2016 Apr 70-342 Study Guide Questions:

Q97. DRAG DROP - (Topic 6) 

You have an Exchange Server 2013 organization that has Information Rights Management 

 (IRM) configured. 

Users report that they cannot apply IRM protection to email messages from Outlook Web 

App. 

You verify that the users can protect the messages by using IRM from Microsoft Outlook. 

You need to recommend a solution to ensure that the users can protect email messages by 

using IRM from Outlook Web App. 

Which four actions should you recommend? 

To answer, move the four appropriate actions from the list of actions to the answer area 

and arrange them in the correct order. 


Answer: 



Q98. DRAG DROP - (Topic 6) 

You have a server that has Exchange Server 2013 installed. 

You plan to deploy Unified Messaging (UM) to all users. 

You have two UM IP gateways named GW1 and GW2. 

You create, and then associate a new UM dial plan for each IP gateway. The IP gateways 

are configured as shown in the following table. 


You need to recommend a solution that meets the following security requirements: 

All voice traffic received by GW1 must be encrypted. 

All voice traffic received by GW2 must be unencrypted. 

All signaling traffic to GW1 and GW2 must be encrypted. 

Which security settings should you recommend configuring for each dial plan? 

To answer, drag the appropriate security setting to the correct UM dial plan in the answer area. Each security setting may be used once, more than once, or not at all. Additionally, you may need to drag the split bar between panes or scroll to view content. 


Answer: 



Q99.  (Topic 3) 

You need to recommend which tasks must be performed to meet the security requirements for Tailspin Toys. 

Which two tasks should you recommend? (Each correct answer presents part of the solution. Choose two.) 

A. Run the set-transportserver –transportsyncenabled $true command. 

B. Run the set-transportconfig –tlsreceivedomainsecurelist tailspintoys.com command. 

C. Run the set-transportservice –transportsyncenabled $true command. 

D. Create a new Receive connector. 

E. Create a new Send connector. 

Answer: B,D 

Explanation: 

* Scenario: 

Secure all of the email messages from the users at Tailspin Toys to the Contoso users. 

Ensure that all of the messages can be secured if the certificates at Tailspin Toys are 

issued by a trusted third-party certification authority (CA). 

* Configuring Domain Security on Exchange Server 2013 

1. Establish certificate trust between organizations 

2. Configure Domain Security 

TLSReceiveDomainSecureList – specifies the domains from which you want to receive 

domain secured email by using mutual Transport Layer Security (TLS) authentication. 

3. Configure connectors 

Reference: Configuring Domain Security on Exchange Server 2013 


Q100. DRAG DROP - (Topic 2) 

You need to recommend a solution to meet the compliance requirements for the research department and the statutory holidays. 

What should you recommend configuring? 

To answer, drag the appropriate object to the correct location in the answer area. Each object may be used once, more than once, or not at all. Additionally, you may need to drag the split bar between panes or scroll to view content. 


Answer: 



Q101.  (Topic 6) 

Your company has a hybrid deployment of Exchange Server 2013 and Microsoft Office 

365. 

All recipients have an SMTP suffix of contoso.com. 

You discover that all of the email messages sent to the Internet from users who have Office 365 mailboxes are routed through the on-premises Exchange servers. 

You need to ensure that all of the email messages are sent directly to the Internet. 

What should you do? 

A. Modify an organization relationship. 

B. Create a new routing group connector. 

C. Create a new transport rule. 

D. Run the Hybrid Configuration wizard. 

Answer: D 

Explanation: 

Creating and configuring a hybrid deployment with the Hybrid Configuration wizard is now a single process in Microsoft Exchange Server 2013. 

The wizard allows you to select and configure Client Access or Edge Transport servers to handle secure mail transport between the on-premises and Exchange Online organizations. The wizard configures on-premises Client Access servers and Microsoft Exchange Online(EOP) on your Office 365 organization for hybrid mail routing. By configuring new and existing Send and Receive connectors in the on-premises organization and Inbound and Outbound connectors in EOP, the wizard allows you to choose whether outbound messages delivered to the Internet from the Exchange Online organization will be sent directly to external mail recipients or routed through your on-premises Exchange servers included in the hybrid deployment. 

Reference: Hybrid Configuration wizard 


70-342-exam

Updated 70-342 latest exam:

Q102. DRAG DROP - (Topic 6) 

Contoso, Ltd., is a bank that has offices in North America and Europe. 

The company must comply with different regulations for North America and Europe. 

The company uses Information Right Management (IRM) to protect sensitive documents, such as internal financial reports. 

You need to recommend a compliance solution to meet the following requirements: 

. Prevent users from disclosing customers' personal information in email messages. 

. Prevent users from disclosing internal financial data to people outside of the company. 

. Prevent the permanent deletion of email messages of users who are under investigation. 

. Allow compliance officers to search the mailbox of users who are under investigation without being able to alter the data in the mailbox. 

Which technology should you recommend for each requirement? 

To answer, drag the appropriate technology to the correct requirement in the answer area. Each technology may be used once, more than once, or not at all. Additionally, you may need to drag the split bar between panes or scroll to view content. 


Answer: 



Q103. DRAG DROP - (Topic 5) 

You are preparing the environment for the planned retention solution. 

You need to identify which policy tags must be created to meet the retention requirements. 

Which policy tag types should you identify? (To answer, drag the appropriate policy tag types to the correct message types. Each policy tag may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.) 


Answer: 



Q104.  (Topic 6) 

You have an Exchange Server organization that contains four servers. The servers are configured as shown in the following table. 


You are deploying Unified Messaging (UM). 

You create a dial plan named UMPlan1 and a UM mailbox policy named UMPlan Mailbox Policy. 

You need to ensure that all voice mail sent to the existing extension of a user is delivered to the user's mailbox. 

Which three actions should you perform? (Each correct answer presents part of the solution. Choose three.) 

A. Create a UM hunt group 

B. Create a UM IP gateway. 

C. Configure the IP-PBX to route calls to EX3 and EX4 

D. Configure the IP-PBX to route calls to EX I and EX2. 

E. Assign EX I and EX2 to UMPlan1. 

F. Assign EX3 and EX4 to UMPlan1. 

Answer: A,B,C 

Explanation: 

* When you’re setting up Unified Messaging (UM), you must configure the IP PBXs on your 

network to communicate with the Client Access servers running the Microsoft Exchange 

Unified Messaging Call Router service and the Mailbox servers running the Microsoft 

Exchange Unified Messaging service in your Exchange organization. You must also 

configure the Client Access and Mailbox servers to communicate with the IP PBXs. 

C: A Unified Messaging (UM) IP gateway represents a physical Voice over IP (VoIP) 

gateway, IP Private Branch eXchange (PBX), or session border controller (SBC) hardware 

device. 

* Here are the basic steps for connecting VoIP gateways, IP PBXs, SIP-enabled PBXs, or 

SBCs to Client Access and Mailbox servers: 

Step 1: Install the Client Access and Mailbox servers in your organization. 

Step 2: Create and configure a Telephone Extension, SIP URI, or E.164 UM dial plan. 

Step 3: Create and configure a UM IP gateway. You must create and configure a UM IP 

gateway for each VoIP gateway, IP PBX, SIP-enabled PBX, or SBC that will be accepting 

incoming calls and sending outgoing calls. 

Step 4: Create a new UM hunt group if needed. If you create a UM IP gateway and don’t 

specify a UM dial plan, a UM hunt group will be automatically created. 

Incorrect: 

B, D: The question states, “You need to ensure that all voice mail sent to the existing extension of a user is delivered to the user's mailbox”. The dial plan is therefore a Telephone Extension dial plan. Client Access and Mailbox servers cannot be associated with Telephone Extension or E.164 dial plans. 


Q105. HOTSPOT - (Topic 4) 

You need to recommend a solution that meets the compliance requirements for emailing bank account numbers. 

Which command should you include in the recommendation? (To answer, select the appropriate options in the answer area.) 



Answer: 



Q106.  (Topic 2) 

You need to recommend a solution for the memos. The solution must meet the compliance requirements. 

What should you include in the recommendation? 

A. Secure/Multipurpose Internet Mail Extensions (S/MIME) 

B. Information Rights Management (IRM) 

C. Domain Security 

D. Data loss prevention (DLP) policies 

Answer: B 

Explanation: 

* Scenario: Management occasionally sends the staff internal memos that contain confidential information, such as sales figures. The memos must be protected so that unauthorized users cannot read the memos and internal users cannot forward the memos to external recipients. 

* With the IRM features in Exchange 2013, your organization and your users can control the rights recipients have for e-mail. IRM also helps allow or restrict recipient actions such as forwarding a message to other recipients, printing a message or attachment, or extracting message or attachment content by copying and pasting. IRM protection can be applied by users in Microsoft Outlook or Microsoft Office Outlook Web App, or it can be based on your organization's messaging policies and applied using transport protection rules or Outlook protection rules. 

Reference: Information Rights Management 


70-342 pdf

Accurate 70-342 pack:

Q107. HOTSPOT - (Topic 1) 

You need to resolve the IRM template issue. 

Which user right should you modify? 

To answer, select the appropriate user right in the answer area. 


Answer: 



Q108.  (Topic 6) 

You have an Exchange Server 2013 organization. 

The human resources (HR) department has a custom form used to enter the personal information of employees. The form uses the Microsoft Word format. 

You need to encrypt the contents of the form automatically when users in the HR department send the form to users outside the organization. 

You deploy an Active Directory Rights Management Services (AD RMS) template. 

Which two of the following should you create next? Each correct answer presents a complete solution. 

A. an Outlook protection rule. 

B. a Mail Tip 

C. a DLP policy template. 

D. a Policy Tip. 

Answer: A,C 


Q109. HOTSPOT - (Topic 6) 

You have an Exchange Server 2013 organization that has mailbox audit logging enabled for all users. 

You deploy two third-party applications named App1 and App2. Both applications access a mailbox named Mailbox1. 

App1 uses a mail-enabled user account named App1_user. App2 uses a mailbox-enabled user account named App2_user. 

You need to prevent the audit logs from containing entries that relate to App2. 

Which command should you run? (To answer, select the appropriate options in the answer area.) 



Answer: 



Q110. HOTSPOT - (Topic 6) 

Your network contains two Active Directory sites named Site1 and Site2. Both sites contain an equal number of users. Each site contains two Exchange Server 2013 Mailbox servers. 

You need to recommend a high-availability solution that meets the following requirements: 

. If a single Mailbox server fails, the active mailbox database copies on that server must fail over to a Mailbox server in the same site. 

. If both Mailbox servers in the same site fail, the active mailbox databases copies must be switched over to the other site manually. 

. If a WAN link fails, multiple copies of the same mailbox database must not be activated in both sites simultaneously. 

How should you configure the database availability groups (DAGs)? (To answer, configure the appropriate options in the answer area.) 



Answer: 



Q111.  (Topic 6) 

You have an Exchange Server 2013 organization that contains a database available group (DAG) named DAG1. DAG1 contains three Mailbox servers named Server1, Server2, and Server3. DAG1 contains a mailbox database copy named DB1. 

You implement a lagged copy of DB1 on Server3. The copy lag time is seven days. 

You need to ensure that copies of successfully processed email messages are stored on Server1 and Server2 for seven days. 

What should you modify? 

A. The Shadow Redundancy settings 

B. The Safety Net settings 

C. The settings of DAG1 

D. The settings of DB1 

Answer: B 

Explanation: 

Microsoft Exchange 2013 Safety Net is a new feature in Exchange Server 2013 that prevents data loss by maintaining a queue of successfully delivered messages. 

The Exchange 2013 Safety Net is essentially a delivery queue that exists on each Exchange 2013 mailbox server. Each time a message is delivered to a database, a copy of that message is held within the Safety Net. The message copy remains in the Safety Net until its expiration date, which is determined by the administrator. 


Q112. DRAG DROP - (Topic 6) 

Your company has two offices. Each office is configured as an Active Directory site. The sites are named Site1 and Site2. 

You have an Exchange Server 2013 organization that is configured as shown in the following exhibit. (Click the Exhibit button.) 


Datacenter Activation Coordination (DAC) mode is enabled on the database availability group (DAG) named DAG1. 

You are testing a site failover by shutting down all of the servers in Site1. 

You need to mount the databases in Site2. 

Which four commands should you run in sequence? (To answer, move the appropriate four commands from the list of commands to the answer area and arrange them in the correct order. More than one order of answer choices is correct. You will receive credit for any of the correct orders you select.) 


Answer: 




see more http://www.pdfcollection.net/70-342-pdf.html
http://www.exambible.com/70-342-exam/