Dumps4cert.com : Latest Dumps with PDF and VCE Files
2018 Aug Microsoft Official New Released 70-483
100% Free Download! 100% Pass Guaranteed!

Advanced Solutions of Microsoft Exchange Server 2013

Question No: 1 HOTSPOT – (Topic 1)

You plan to create two retention tags named Tag1 and Tag2. Tag1 will be used to move email messages to the Archive mailbox. Tag2 will be used to delete the email messages.

You need to identify which settings must be configured in the retention tags to meet the technical requirements.

How should you configure each retention tag?

area.

Dumps4Cert 2018 PDF and VCE

Dumps4Cert 2018 PDF and VCE

Answer:

Dumps4Cert 2018 PDF and VCE

Dumps4Cert 2018 PDF and VCE

Explanation:

Dumps4Cert 2018 PDF and VCE

  • Scenario:

    Dumps4Cert 2018 PDF and VCE

  • Both Tag Types should affect all email messages. For the first policy move the archive after 30 days. The second policy should permanently delete the messages after 365 days.

    Question No: 2 HOTSPOT – (Topic 1)

    You need to configure transport rules to meet the technical requirements for the PII data and the financial data.

    How should you configure the rules?

    To answer, disable the appropriate rule or rules in the answer area.

    Dumps4Cert 2018 PDF and VCE

    Answer:

    Dumps4Cert 2018 PDF and VCE

    Explanation:

    Dumps4Cert 2018 PDF and VCE

    The question asks which rules should be DISABLED. We need to disable the two Allow Override rules and leave the rest in place.

    Dumps4Cert 2018 PDF and VCE

    Question No: 3 – (Topic 1)

    What should you recommend?

    1. Create an Outlook protection rule and filter the rule based on the FromDepartment property. Apply the Do Not Forward protection template to the rule and enable the UserCanOverride setting.

    2. Create an Outlook protection rule and filter the rule based on the FromDepartment property. Apply the Do Not Forward protection template to the rule and disable the UserCanOverride setting.

    3. Create an Outlook protection rule and filter the rule based on the SentTo property. Apply the Do Not Forward protection template to the rule and disable the UserCanOverride setting.

    4. Create an Outlook protection rule and filter the rule based on the SentTo property. Apply the Do Not Forward protection template to the rule and enable the UserCanOverride setting.

    Answer: B Explanation:

  • Scenario:

    Prevent the forwarding of email messages sent by users who have a value of Legal in their Department field.

  • Use FromDepartment property and do not allow the user to override.

Question No: 4 – (Topic 1)

You are evaluating the implementation of the planned static IP addresses for DAG1. You need to identify the appropriate IP addresses for DAG1.

Which two IP addresses should you identify? (Each correct answer presents part of the solution. Choose two.)

A. 169.254.0.10

B. 192.168.1.10

C. 192.168.2.10

F. 224.0.0.10

Answer: B,D Explanation:

* Scenario:

/ Assign a static IP address to DAG1.

/ A database availability group (DAG) named DAG1 that contains EX2, EX3, EX5, and EX6. DAG1 is configured to use DHCP to obtain an IP address.

/ Subnet 192.168.1.0/24 and subnet 192.168.10.0/24 are assigned as the MAPI network.

  • A DAG network is a collection of one or more subnets used for either replication traffic or MAPI traffic. Each DAG contains a maximum of one MAPI network and zero or more replication networks.

    Question No: 5 – (Topic 1)

    You need to recommend a solution for the HR voice mail. The solution must meet the security requirements.

    What should you recommend?

    1. Create a UM mailbox policy and associate the policy to UM1. Configure the voice mail protection settings of the UM mailbox policy. Create an auto attendant and link the auto attendant to UM1.

    2. Create a UM mailbox policy and associate the policy to a new dial plan. Configure the voice mail protection settings of the UM mailbox policy. Create an auto attendant and link the auto attendant to the new dial plan.

    3. Create a UM mailbox policy and associate the policy to a new dial plan. Configure the voice mail protection settings of the UM mailbox policy. Assign the UM mailbox policy to the mailbox of the HR department.

    4. Create a UM mailbox policy and associate the policy to UM1. Configure the voice mail protection settings of the UM mailbox policy. Assign the UM1 mailbox policy to the mailbox of the HR department.

    Answer: D

  • Scenario:

    / Use Information Rights Management (IRM) to protect all of the voice mails left for the telephone number of the human resource (HR) department.

    / There is a UM dial plan named UM1.

  • The Protected Voice Mail feature is available with Exchange 2010 and later versions of Unified Messaging (UM). It can be configured on a UM mailbox policy.

  • By default, a single UM mailbox policy is created every time you create a UM dial plan. The new UM mailbox policy is automatically associated with the UM dial plan, and part of the dial plan name is included in the display name of the UM mailbox policy. You can edit this default UM mailbox policy. You can create additional UM mailbox policies to apply a common set of settings for groups of users.

Question No: 6 – (Topic 1)

The Internet link in the Tampa office will be unavailable during the weekend.

You need to ensure that all outbound email messages are sent from the Charlotte office during the planned outage.

What should you do?

  1. Modify the cost of the Tampa SMTP Send connector.

  2. Create a new mail exchanger (MX) record named SMTP2.fabrikam.com in the internal DNS zone.

  3. Modify the smart host of the Tampa SMTP Send connector.

  4. Modify the preference value of the fabrikam.com mail exchanger (MX) records.

Answer: C Explanation:

Sometimes you need to route all your outbound emails trough a SMTP smart host and not route them directly to the internet.

Dumps4Cert 2018 PDF and VCE

  • A Send connector named Tampa SMTP that uses SMTP1 as a smart host. The cost of

    the Tampa SMTP connector is 10.

  • Mailbox servers in the Tampa office that provide outbound SMTP services to the Internet.

  • An SMTP relay device named SMTP1 in the Tampa office.

Question No: 7 DRAG DROP – (Topic 1)

The security department implements a new firewall between the IP-PBX system and the servers in the Tampa office.

You discover that SIP sessions cannot be established between the IP-PBX and EX1.

You need to identify which ports must be opened between the IP-PBX and the Exchange Server 2013 servers.

Which ports should you identify?

To answer, drag the appropriate port or ports to the correct group of servers in the answer area. Each port or ports may be used once, more than once, or not at all. Additionally, you may need to drag the split bar between panes or scroll to view content.

Dumps4Cert 2018 PDF and VCE

Answer:

Dumps4Cert 2018 PDF and VCE

Dumps4Cert 2018 PDF and VCE

Explanation:

Dumps4Cert 2018 PDF and VCE

You can configure the TCP port that#39;s used to listen for Session Initiation Protocol (SIP) requests on a Unified Messaging (UM) IP gateway. By default, when you create a UM IP gateway, the TCP SIP listening port number is set to 5060.

The Microsoft Exchange Unified Messaging service and the UM worker process use multiple Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) service ports to communicate with IP gateways.

The Microsoft Exchange Unified Messaging service and the UM worker process use Session Initiation Protocol (SIP) over TCP.

By default, the Microsoft Exchange Unified Messaging service listens on both TCP port 5060 in Unsecured mode and TCP port 5061 when mutual Transport Layer Security (mutual TLS) is used.

Each UM worker process that#39;s created listens on port 5065 and 5067 (unsecured) and 5066 and 5068 (secured).

But when an IP gateway or IP PBX sends Realtime Transport Protocol (RTP) traffic to the

Dumps4Cert 2018 PDF and VCE

Question No: 8 HOTSPOT – (Topic 1)

You need to ensure that the HR1 group can perform the tasks required to meet the technical requirements.

To which group should you add HR1?

To answer, select the appropriate group in the answer area.

Dumps4Cert 2018 PDF and VCE

Answer:

Dumps4Cert 2018 PDF and VCE

Dumps4Cert 2018 PDF and VCE

Explanation:

Dumps4Cert 2018 PDF and VCE

  • Scenario:

    Ensure that the members of a group named HR1 can search all of the mailboxes for sensitive email content.

  • Discovery management

    If you want users to be able to use Microsoft Exchange Server 2013 In-Place eDiscovery,

    Dumps4Cert 2018 PDF and VCE

    Members of the Discovery Management role group have Full Access mailbox permissions

    for the Discovery mailbox that#39;s created by Exchange Setup.

    Question No: 9 HOTSPOT – (Topic 1)

    You need to resolve the IRM template issue. Which user right should you modify?

    To answer, select the appropriate user right in the answer area.

    Dumps4Cert 2018 PDF and VCE

    Answer:

    Dumps4Cert 2018 PDF and VCE

    Topic 2, A.Datum Overview

    General Overview

    A. Datum has an Exchange Server 2007 organization. A. Datum plans to migrate to Exchange Server 2013.

    Physical Locations

    A. Datum has five locations. The locations are configured as shown in the following table.

    Dumps4Cert 2018 PDF and VCE

    Existing Environment Network Infrastructure

    All of the locations connect to the each other by using a WAN link. The New York, Toronto, and Chicago locations connect directly to the Internet.

    All client computers run Windows 7 and Office 2010. All servers run Windows Server 2008.

    Active Directory Environment

    The network contains an Active Directory domain named adatum.local. Adatum.local is the corporate domain based in the United States. The network contains a domain named Canada.adatum.local. Canada.adatum.local is the domain for the stores in Canada.

    Each location is configured as an Active Directory site. The forest functional level is Windows Server 2008.

    The main office and both of the distribution centers each has two domain controllers for their respective domain. All of the other locations have one domain controller for their respective domain. All of the domain controllers are global catalog servers.

    Exchange Infrastructure

    The main office and the distribution centers each have three servers that have Exchange Server 2007 installed.

    The servers have the following configurations:

    -> Two of the servers have cluster continuous replication (CCR) deployed

    -> One of the servers has the Client Access server role and the Hub Transport server role installed

    Each store contains a server that has Exchange Server 2007 installed. Each server has mailboxes for active users and mailboxes for inactive users. Each server has approximately 50 mailboxes.

    Remote users access Outlook Web Access by using a namespace of mail.adatum.com, which resolves to the Client Access server in the New York office.

    Requirements Planned Changes

    The company plans to implement the following changes:

    -> Migrate all of the mailboxes in the main office and the distribution centers to Exchange Server 2013.

    -> Integrate a new telephone system to the Exchange Server 2013 organization.

    -> Deploy a standalone certification authority (CA) that will be used to issue all of the certificates for the messaging infrastructure.

    Technical Requirements

    The company identifies the following technical requirements:

    -> Hardware costs must be minimized whenever possible.

    -> The impact on end users if a site fails must be minimized.

    -> Voice mail traffic between the telephone system and the Exchange Server environment must be encrypted.

    -> Each user must be able to access the internal resources and their mailbox by using a single user account.

    Compliance Requirements

    After a security review, the company identifies the following compliance requirements for the new Exchange Server environment:

    -> All administrative changes made to the mailboxes must be tracked.

    -> The legal department must be able to search for messages in all of the mailboxes.

    -> Users must be prevented from sending email during an upcoming statutory holiday.

    -> All store managers must be prevented from permanently deleting email messages from their Inbox.

    -> All email messages must be archived for a minimum of five years to meet regulatory requirements.

    -> Management occasionally sends the staff internal memos that contain confidential information, such as sales figures. The memos must be protected so that unauthorized users cannot read the memos and internal users cannot forward the memos to external recipients.

    -> The users in the research department must be able to send email to anyone in the organization, but only the members of a group named Execs must be able to send email to the research users. All other users must be notified that email sent to the research users will remain undelivered.

    Question No: 10 – (Topic 2)

    What should you recommend?

    1. Export the mailbox audit log.

    2. Run an administrator role group report.

    3. Run a non-owner mailbox access report.

    4. Export the administrator audit log.

    Answer: D Explanation:

  • Scenario: All administrative changes made to the mailboxes must be tracked.

  • You can use administrator audit logging in Microsoft Exchange Server 2013 to log when a user or administrator makes a change in your organization. By keeping a log of the changes, you can trace changes to the person who made the change, augment your change logs with detailed records of the change as it was implemented, comply with regulatory requirements and requests for discovery, and more.

    Reference: Administrator audit logging

    100% Dumps4cert Free Download!
    70-483 PDF
    100% Dumps4cert Pass Guaranteed!
    70-483 Dumps

    Dumps4cert ExamCollection Testking
    Lowest Price Guarantee Yes No No
    Up-to-Dated Yes No No
    Real Questions Yes No No
    Explanation Yes No No
    PDF VCE Yes No No
    Free VCE Simulator Yes No No
    Instant Download Yes No No