IT認証試験問題集
毎月、ITshikenは1500人以上の受験者が試験準備を助けて、試験に合格するために受験者にご協力します
 ホームページ / 70-342 問題集  / 70-342 問題練習

Microsoft 70-342 問題練習

Advanced Solutions of Microsoft Exchange Server 2013 試験

最新更新時間: 2020/11/16,合計1822問。

いい買物の日:70-342 最新真題を買う時、日本語版と英語版両方を同時に獲得できます。

実際の問題集を練習し、試験のポイントを了解し、テストに申し込むするかどうかを決めることができます。

さらに試験準備時間の35%を節約するには、70-342 問題集を使用してください。

 / 122

Question No : 1
You have an Exchange Server 2013 organization. You need to prevent a user named User1 from permanently deleting an email message in his mailbox.
What should you do on the mailbox of User1?

正解:
Explanation:
In Exchange 2013, you can use In-Place Hold to accomplish the following goals: Place user mailboxes on hold and preserve mailbox items immutably Preserve mailbox items deleted by users or automatic deletion processes such as MRM Use query-based In-Place Hold to search for and retain items matching specified criteria Preserve items indefinitely or for a specific duration Place a user on multiple holds for different cases or investigations Keep In-Place Hold transparent from the user by not having to suspend MRM Enable In-Place eDiscovery searches of items placed on hold

Question No : 2
You are an Administrator for an International Finance Company. You plan to deploy an Exchange Server 2013 Organization. The company's Compliance Policy requires that all users be prevented from sending email messages that contain more than one Bank Account number to external recipients. You need to meet the compliance policy requirement.
What should you create?

正解:
Explanation:
Sensitive Information Types in DLP Policies When you create DLP policies, you can include rules that include checks for sensitive information. The conditions that you establish within a policy, such as how many times something has to be found before an action is taken or exactly what that action is can be customized within your new custom policies in order to meet your business requirements. Sensitive information rules are integrated with the transport rules framework by introduction of a condition that you can customize: If the message contains…Sensitive Information. This condition can be configured with one or more sensitive information types that are contained within the messages.

Question No : 3
Your company is investigating a user named User1. You need to prevent User1 from permanently deleting items from his mailbox.
What should you run?

正解:

Question No : 4
Your company acquires a new internet domain name. You need to ensure that all users can receive email messages sent to the new domain name.
Which two actions should you perform? (Each correct answer presents part of the solution. Choose two).

正解:

Question No : 5
You need to ensure that users in the organization are notified before they send email messages to external recipients.
Which cmdlet should you run?

正解:

Question No : 6
Your company has an Exchange Server 2010 organization. The network contains an internal root certification authority (CA). You plan to add a disclaimer to all email messages sent by users in the company. You need to ensure that the disclaimer can be added to encrypted email messages.
What should you do?

正解:

Question No : 7
You have an Exchange Server 2010 organization. A user named User1 connects to his mailbox using Microsoft Office Outlook. User1 reports that he is unable to send encrypted email messages to an external recipient named User2. You verify that User1 and User2 have email encryption certificates. You need to ensure that User1 can send encrypted email messages to User2.
What should you do first?

正解:

Question No : 8
Your company has a main office and a branch office. An Active Directory site exits for each office. The offices are connected by a WAN link. You plan to deploy Exchange Server 2013 in each site.
You need to identify the number of Exchange servers required to meet the following requirements:
- Maintain user access to mailboxes if a single server fails
- Use the minimize account of Exchange servers in each site
How many servers should you deploy in each site?

正解:

Question No : 9
You have an Exchange Server 2010 organization named adatum.com. All public folders are stored on a server named EX5. You deploy a new server named EX6. EX6 has Exchange Server 2013 installed. You move all mailboxes to EX6. You need to move the public folders to EX6. The solution must ensure that users can access the public folders after EX5 is decommissioned.
Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)

正解:
Explanation:
B: Use the New-PublicFolderMigrationRequest cmdlet to begin the process of migrating public folders from Microsoft Exchange Server 2007 or Exchange Server 2010 to Exchange Server 2013.
Note: See step 4 and 5 below.
Step 1: Download the migration scripts
Step 2: Prepare for the migration
Step 3: Generate the .csv files
Step 4: Create the public folder mailboxes on the Exchange 2013 server
Step 5: Start the migration request
Example:
New-PublicFolderMigrationRequest -SourceDatabase (Get-PublicFolderDatabase CServer <Source server name>) -CSVData (Get-Content <Folder to mailbox map path> -Encoding Byte) -BadItemLimit $BadItemLimitCount
Step 6: Lock down the public folders on the legacy Exchange server for final migration (downtime required)
Step 7: Finalize the public folder migration (downtime required)
Step 8: Test and unlock the public folder migration

Question No : 10
You have an Exchange Server 2013 organization that contains multiple Hub Transport servers.
You need to recommend a message hygiene solution to meet the following requirements:
- Block servers that are known to send spam
- Minimize administrative effort
What should you recommend?

正解:

Question No : 11
Drag and Drop
You have a server that has Exchange Server 2013 installed. You plan to deploy Unified Messaging (UM) to all users. You have two UM IP gateways named GW1 and GW2. You create, and then associate a new UM dial plan for each IP gateway.
The IP gateways are configured as shown in the following table.



You need to recommend a solution that meets the following security requirements:
- All voice traffic received by GW1 must be encrypted.
- All voice traffic received by GW2 must be unencrypted.
- All signaling traffic to GW1 and GW2 must be encrypted.
Which security settings should you recommend configuring for each dial plan? To answer, drag the appropriate security setting to the correct UM dial plan in the answer area. Each security setting may be used once, more than once, or not at all. Additionally, you may need to drag the split bar between panes or scroll to view content.



正解:

Question No : 12
You are an administrator for a company named Contoso, Ltd. Contoso has an Exchange Server 2013 organization. Contoso has a partnership agreement with a company named A.Datum Corporation. A.Datum has an Exchange server 2013 organization. Both organizations have a federation trust to the Microsoft Federation Gateway. Users at Contoso plan to share their free/busy information with users at A.Datum. You need to recommend which tasks must be performed to ensure that the A.Datum users can see the free/busy information of the Contoso users.
Which two actions should you recommend? (Each correct answer presents part of the solution. Choose two.)
A. In the Exchange Server organization of Contoso, configure directory synchronization.
B. In the Exchange Server organization of A. Datum, create a sharing policy.
C. In the Exchange Server organization of A. Datum, configure directory synchronization.
D. In the Exchange Server organization of Contoso, create an organization relationship.
E. In the Exchange Server organization of Contoso, create a sharing policy.
F. In the Exchange Server organization of A. Datum, create an organization relationship.

正解: DE
Explanation:
Configure Federated Sharing
Step 1: Create and configure a federation trust (this has already been done here)
Step 2 (D): Create an organization relationship
An organization relationship enables users in your Exchange organization to share calendar free/busy information as part of federated sharing with other federated Exchange organizations.
Step 3 (E): Create a sharing policy
Sharing policies enable user-established, people-to-people sharing of both calendar and contact information with different types of external users. They support the sharing of calendar and contact information with external federated organizations, external non-federated organizations, and individuals with Internet access. If you don't need to configure people-to-people or contact sharing (organization-level sharing only), you don't need to configure a sharing policy.
Step 4: Configure an Auto discover public DNS record
Note:
With federated sharing, users in your on-premises Exchange organization can share free/busy calendar information with recipients in other Exchange organizations that are also configured for federated sharing. Free/busy sharing can be enabled between two organizations running Exchange 2013 and also between organizations with a mixed Exchange deployment.

Question No : 13
You have an Exchange Server 2013 organization that contains one Client Access server named EX1 and one Mailbox server named EX2. You have a perimeter network and an internal network. The perimeter network contains an Edge Transport server named EX3 that has Exchange Server 2010 installed. You need to ensure that all of the email messages sent to and received from the Internet are routed through the EX3.
Which three actions should you perform? (Each correct answer presents part of the solution. Choose three.)

正解:
Explanation:
http://technet.microsoft.com/en-us/library/jj150569%28v=exchg.150%29.aspx

Question No : 14
You hire a junior administrator named Admin5. Admin5 is a member of the Recipient Management management role group. You discover that Admin5 created two new mailbox-enabled users by using the New-Mailbox command. You need to identify which management role provides Admin5 with the permissions to create new mailbox-enabled users.
Which cmdlets should you run?

正解:
Explanation:
* Use the Get-ManagementRoleEntry cmdlet to retrieve management role entries that have been configured on management roles.
* Use the Get-ManagementRoleAssignment cmdlet to retrieve management role assignments.

Question No : 15
You are a network administrator for a company named Contoso, Ltd. You install the Active Directory Rights Management Services server role on a server. The Active Directory Rights Management Services (AD RMS) server uses an internal certification authority (CA) for all certificates. You plan to provide users with the ability to use AD RMS to protect all of the email messages sent to a partner company named A . Datum Corporation. A. Datum does not have AD RMS deployed. You need to identify which components from the Contoso network must be accessible to A. Datum to ensure that the users at A. Datum can open protected messages.
Which two components should you identify? (Each correct answer presents part of the solution. Choose two.)
A. The Active Directory domain controllers
B. The Client Access servers
C. The certificate revocation list (CRL)
D. The Mailbox servers

正解: AC
Explanation:
A: Active Directory Rights Management Services (AD RMS) requires at least one Active Directory domain controller.
C: As a local CA is used we need access to the CRL.

 / 122