How to pass Microsoft 70-341 Real Exam in 24 Hours [test question 17-32]

★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions

Free Instant Download NEW 70-341 Exam Dumps (PDF & VCE):
Available on: https://www.certleader.com/70-341-dumps.html


70-341 Product Description:
Exam Number/Code: 70-341 vce
Exam name: Core Solutions of Microsoft Exchange Server 2013
n questions with full explanations
Certification: Microsoft Certification
Last updated on Global synchronizing

Instant Access to Free VCE Files: Microsoft 70-341 Core Solutions of Microsoft Exchange Server 2013

70-341 examcollection

Simulation of 70-341 exam price materials and pdf for Microsoft certification for IT specialist, Real Success Guaranteed with Updated 70-341 pdf dumps vce Materials. 100% PASS Today!

2016 Mar 70-341 Study Guide Questions:

Q17. You have an Exchange Server 2013 organization. 

An Active Directory administrator is concerned about the permissions assigned to a group named Exchange Trusted Subsystem. Exchange Trusted Subsystem has a member named Exchange Windows Permissions. 

You need to show the Active Directory administrator all of the permissions assigned to Exchange Trusted Subsystem. 

What should you use? 

A. ADSI Edit 

B. Active Directory Sites and Services 

C. Dsget 

D. Active Directory Users and Computers 

Answer: D 


Q18. You have an Exchange Server 2013 organization that contains four servers. 

All users access their email by using Microsoft Outlook 2010. 

An administrator deploys a shared mailbox named Project. 

You assign all of the users in the marketing department Full Access permissions to Project. 

You discover that Project automatically appears in Outlook to all of the marketing 

department users. 

You need to ensure that Project only appears in Outlook to the marketing department users 

who add the mailbox manually to their Outlook profile. 

Which two cmdlets should you run? (Each correct answer presents part of the solution. 

Choose two.) 

A. Remove-MailboxPermission 

B. Set-Mailbox 

C. Remove-Mailbox 

D. Add-MailboxPermission 

E. New-Mailbox 

Answer: A,B 


Q19. HOTSPOT 

You need to implement the SCL configurations to support the planned changes. 

Which value should you set for each SCL option? (To answer, configure the appropriate options in the dialog box in the answer area.) 



Answer: 



Q20. You have an Exchange Server 2013 organization that contains two servers named EX1 

and EX2. 

EX1 and EX2 are members of a database availability group (DAG) named DAG1. DAG1 

contains four mailbox databases. All databases are active on EX1 and replicate to EX2. 

You start an unplanned maintenance on EX1 and shut down EX1. 

You discover that the databases do not mount on EX2. 

You restart EX1 and the databases mount automatically on EX1. 

You need to identify what prevents the databases from switching over successfully to EX2. 

Which cmdlet should you run? 

A. Test-ServiceHealth 

B. Test-OutlookConnectivity 

C. Get-AvailabilityReportOutage 

D. Test-ReplicationHealth 

Answer: D 


Q21. DRAG DROP 

You have an Exchange Server 2013 organization that contains two servers. The servers are configured as shown in the following table. 


You need to create a new database availability group (DAG) that contains EX1 and EX2. 

Which three actions should you perform? 

To answer, move the three appropriate actions from the list of actions to the answer area and arrange them in the correct order. 


Answer: 



70-341 training

Abreast of the times 70-341 brain dumps:

Q22. DRAG DROP 

You deploy an Active Directory forest that contains two domains named contoso.com and child.contoso.com. 

You plan to deploy Exchange Server 2013 servers to the child.contoso.com domain. 

You need to prepare Active Directory for the installation of the first Exchange Server 2013 servers. 

Which command should you run in each domain? (To answer, drag the appropriate commands to the correct domains. Each command may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.) 


Answer: 



Q23. Your company has two offices. Each office is configured as an Active Directory site. 

You have an Exchange Server 2013 organization that contains four servers. The servers are configured as shown in the following table. 


MBX1 and MBX2 are members of a database availability group (DAG) named DAG1. A mailbox database named DB1 has a copy on each Mailbox server. DB1 is active on MBX2. 

You are creating a disaster recovery plan for the organization. 

You need to identify how email messages will be received for the mailboxes on DB1 if the Exchange Server transport services fail on MBX2 because of messages in the poison message queue. 

What should you identify? 

A. Email messages will be queued on MBX1, and then delivered directly to the mailboxes on MBX2. 

B. The Exchange Server transport services will restart automatically, and then put all delivery queues in a Retry state. 

C. The Exchange Server transport services will restart automatically, and then purge the poison messages. 

D. Email messages will be queued on CAS1 or CAS2, and then delivered directly to the mailboxes on MBX2. 

Answer: B 


Q24. HOTSPOT 

Your company has two main offices. One office is located in Atlanta and the other office is located in Washington. 

The offices connect to each other by using a dedicated WAN link. 

You have an Exchange Server 2013 organization that contains four servers. 

The servers are configured as shown in the following table. 


The company opens a new office in New York. The New York office connects directly to the Washington office via a dedicated WAN link. You configure a separate Active Directory site for each office. 

You discover poor response times when scheduling meetings and configuring Microsoft Outlook profiles from the client computers in the New York office. 

You need to reduce the amount of time required to schedule meetings and to configure Outlook profiles from the computers in the New York office. 

What command should you run? (To answer, select the appropriate options in the answer area.) 



Answer: 



Q25. You have network contoso.com. contoso.com consist of AD DS Domain contoso.com. All Servers running Windows Server 2012 and all Clients running Windows 8 Pro. 

Server1 runs Mailbox Server Role and Client Access Server Role. 

You are configuring Anti-Spam Filtering on Server1. 

You need to ensure that all emails with the words “Free Credit Check” are rejected unless the email is sent to Finance Distribution Group. 

You also need to ensure that all emails from partner company 

Domain name adatum.com bypass the Anti-Spam Filter. 

You run the Add-ContentFilterPhrase and add the words “Free Credit Check” 

What should you do next? 

A. Run the Set-TransportConfig and Set-ContentFilterConfig 

B. Run the Set-SenderReputationConfig and Set-TransportConfig 

C. Run the Set-ContentFilterConfig and Set-RecipientFilterConfig 

D. Run the Set-SenderFilterConfig and Set-RecipientFilterConfig 

Answer: C 


Q26. DRAG DROP 

You have an Exchange Server 2013 organization that contains a database availability group (DAG) named DAG1. The organization contains three servers. The servers are configured as shown in the following table. 


EX1 and EX2 are members of DAG1. EX1 has an active copy of a database named DB1 and a passive copy of a database named DB2. EX2 has a passive copy of DB1 and an active copy of DB2. 

You plan to create a public folder named Invoices. 

You need to ensure that users can access the Invoices public folder if one of the DAG members fails. The solution must ensure that the users can send email messages to the Invoices public folder. 

Which three actions should you perform in sequence? (To answer, move the appropriate three actions from the list of actions to the answer area and arrange them in the correct order.) 


Answer: 


70-341 real exam

Certified 70-341 exam price:

Q27. You are testing the planned implementation of Exchange Server 2013. 

After you begin moving several mailboxes to Exchange Server 2013, you discover that users on the internal network that have been moved are prompted repeatedly for their credentials when they run Microsoft Outlook. 

You run the Get-OutlookAnywhere cmdlet on CH-EX4, and receive the following output: 


You need to prevent the internal users from being prompted for their credentials when they 

connect to their mailbox by using Outlook. 

Which property should you modify by using the Set-OutlookAnywhere cmdlet? 

A. IISAuthenticationMethods 

B. InternalHostname 

C. ExternalHostname 

D. ExternalClientAuthenticationMethod 

E. InternalClientAuthenticationMethod 

Answer: A 


Topic 4, A.Datum Corporation

Overview

A. Datum Corporation is an airline catering company that has 8,000 users. A. Datum has three main offices. The offices are located in Detroit, Chicago, and New York.

Existing Environment

Active Directory Environment

The network contains an Active Directory forest named adatum.com. The forest contains a single domain. All domain controllers run Windows Server 2012.

Each main office contains two domain controllers. Each office is configured as an Active Directory site.

The functional level of the forest is Windows Server 2012.

Network Infrastructure

The offices connect to each other by using a dedicated WAN link. Only the office in New York and the office in Detroit connect directly to the Internet. Each office has a firewall.

The public DNS records for A. Datum are configured as shown in the following table.


The external interface for the firewall in the New York office is configured to use an IP address of 131.107.1.200 and to pass inbound traffic on port 25 and port 443 to EX2.

The external interface for the firewall in the Detroit office is configured to use an IP address of 131.107.2.200 and to pass inbound traffic on port 443 to EX4.

The Active Directory site is configured as shown in the Sites exhibit. (Click the Exhibit button.)

Exchange Server Organization

A. Datum has an Exchange Server 2013 organization that contains two servers. The servers are configured as shown in the following table.


Each server contains 15 mailbox databases.

Users use the name mail.adatum.com to connect to their mailbox from the Internet. The users use the FQDN of the servers to connect from the internal network.

AM of the users in the Detroit office have a mailbox hosted on EX2.

The default email address policy contains a single email address format of @adatum.com.

A separate Send connector exists for the Chicago office and the New York office. The local servers in each office are the only source servers in each Send connector.

The New York office is configured as a hub site. Antimalware filtering is disabled on EX1 and EX2.

Problem Statements

A. Datum identifies the following issues:

Users in the Detroit office report that sometimes, Microsoft Outlook takes a long time to open.

During a recent storage failure, administrators failed to restore the latest backup and lost all of the email messages from the previous 48 hours.

Users report that the email messages sent to some Internet domains are not received. Users in the Chicago office report that some of their email messages

generate a non-delivery report (NDR).

The help desk in the New York office reports that its most common Exchangerelated task is to restore email messages that were deleted by users more than 14 days ago. The task requires time-consuming restore operations by the help desk.

Requirements

Business Requirements

A. Datum wants to provide users with the ability to access their email from Internet Explorer 10, even when the users are disconnected from the network. This ability must only be available if the users log on to Outlook Web Access by using the Private option.

Planned Changes

You plan to deploy three additional Exchange Server 2013 servers. The servers will be configured as shown in the following table.


After the planned deployment, all of the mailboxes of the Detroit office users will be moved to EX3. All of the Detroit office users will use the name detroitmail.adatum.com when they connect from the Internet and the name ex4.adatum.com when they connect from the internal network.

Technical Requirements

A. Datum identifies the following technical requirements:

All existing and future mailboxes must be limited to 5 GB of storage.

Antimalware and anti-spam filtering must be enabled for the entire Exchange Server organization.

If storage for the mailbox database fails, administrators must be able to recover email messages handled by transport services for to the last five days.

Only the members of a group named Executives must be able to schedule meetings in a room mailbox named Boardroom. Meeting requests must not be moderated.

All of the servers in the New York office that have the Client Access server role installed must be accessed by using a load balancing solution that can mark a server as down if a specific URL on the server is unavailable.

Mailbox Creation Requirements

A. Datum identifies the following requirements for creating new mailboxes:

All mailboxes must automatically have single item recovery enabled.

All mailboxes must automatically have the Exchange ActiveSync feature disabled.

26. HOTSPOT 

You need to recommen

d a solution to meet the technical requirements for mailbox size restrictions. 

Which command should you include in the recommendation? (To answer, select the appropriate options in the answer area.) 


Answer: 



Q28. DRAG DROP 

You have an Exchange Server 2013 organization. 

You need to recommend a solution to ensure that users can access their mailbox by using IMAP4. 

The solution must meet the following requirements: 

The users must be able to download their email messages from multiple devices. 

The users must be able to look up their SMTP server from Outlook Web App. 

All IMAP4 connections must be audited. 

What should you recommend? To answer drag the appropriate recommendation to the correct requirement. Each recommendation may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content. 


Answer: 



Q29. You need to recommend which actions must be performed to meet the technical requirements for the new Contoso users. 

Which three actions should you recommend? (Each correct answer presents part of the solution. Choose three.) 

A. Configure UPN suffix routing. 

B. Configure Contoso to trust Proseware. 

C. Configure Proseware to trust Contoso. 

D. Run the New-Mailbox cmdlet and specify the –AccountDisabled parameter. 

E. Run the New-Mailbox cmdlet and specify the –LinkedMasterAccount parameter. 

F. Create a linked role group. 

Answer: A,C,E 


Q30. HOTSPOT

Your network contains an Active Directory forest. The forest contains a single domain. 

You have an Exchange Server 2013 organization named Contoso that contains a server 

named EX01. Split permissions are configured for the organization. 

You need to change the permission model to shared permissions. 

What command should you run? (To answer, select the appropriate options in the answer 

area.) 



Answer: 



Q31. You have an Exchange Server 2013 organization. 

You deploy the anti-spam features of Exchange Server 2013. 

You need to specify the spam quarantine mailbox. 

Which cmdlet should you run? 

A. Set-Mai IboxJunkEmailConfiguration 

B. Set-ContentFilterConfig 

C. Set-MalwareFilterPolicy 

D. Set-SenderFilterConfig 

Answer: B 


Q32. You have an Exchange Server 2013 organization. 

You plan to deploy Exchange ActiveSync for mobile devices. Each mobile device will be authenticated by using certificates issued by an internal certification authority (CA). 

You need to configure the organization to authenticate the mobile devices by using the certificates. 

Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.) 

A. From Internet Information Services (IIS) Manager on each Client Access server, configure the Microsoft-Server-ActiveSync virtual directory to require client certificates. 

B. From Exchange Admin Center, configure the Microsoft-Server-ActiveSync virtual directory to require client certificates. 

C. From Internet Information Services (IIS) Manager on each Client Access server, enable Active Directory Client Certificate Authentication. 

D. From Internet Information Services (IIS) Manager on each Mailbox server, enable Active Directory Client Certificate Authentication. 

Answer: B,C