Dumps4cert.com : Latest Dumps with PDF and VCE Files
2018 Aug Microsoft Official New Released 70-483
100% Free Download! 100% Pass Guaranteed!

Advanced Solutions of Microsoft Exchange Server 2013

Question No: 31 HOTSPOT – (Topic 4)

You need to configure the Exchange Server UM dial plan for the planned integration of UM and Lync Server.

How should you configure the UM dial plan? (To answer, select the appropriate dial plan type and VoIP security mode in the answer area.)

Dumps4Cert 2018 PDF and VCE

Dumps4Cert 2018 PDF and VCE

Answer:

Dumps4Cert 2018 PDF and VCE

Explanation:

Dumps4Cert 2018 PDF and VCE

  • Scenario: Integrate Unified Messaging (UM) services with the Lync Server 2013 infrastructure.

  • If you want to integrate Exchange Unified Messaging (UM) with Lync Server 2013, you must perform the following tasks:

/ On the Exchange UM server, create a SIP dial plan based on your organization’s specific

/ To encrypt Enterprise Voice traffic, configure the security settings on the Exchange UM SIP dial plan as SIP Secured or Secured.

Etc.

Note:

* There are three formats or URI types that can be configured on UM dial plans:

/ Telephone Extension (TeleExtn)

/ SIP URI

Session Initiation Protocol (SIP) is a standard protocol for initiating interactive user sessions that involve multimedia elements such as video, voice, chat, and gaming. SIP is a request-to-response based protocol that answers requests from clients and responses from servers.

/ E.164

* When you configure the dial plan to use SIP secured mode, only the SIP signaling traffic will be encrypted, and the RTP media channels will still use TCP, which isn’t encrypted.

However, when you configure the dial plan to use Secured mode, both the SIP signaling traffic and the RTP media channels are encrypted. An encrypted signaling media channel that uses Secure Realtime Transport Protocol (SRTP) also uses mutual TLS to encrypt the VoIP data.

Question No: 32 HOTSPOT – (Topic 4)

You are attempting to resolve the email delivery issue for Fabrikam.

You need to identify which certificate is being used by the servers in the Exchange Server organization of Fabrikam.

In which directory on EX1 should you review the log files? (To answer, select the appropriate directory in the answer area.)

Dumps4Cert 2018 PDF and VCE

Answer:

Dumps4Cert 2018 PDF and VCE

Dumps4Cert 2018 PDF and VCE

Explanation:

Dumps4Cert 2018 PDF and VCE

  • Scenario: After a change to a certificate, users report that email messages sent to Fabrikam are not delivered.

  • ProtocolLog

Protocol logging records the SMTP conversations that occur between messaging servers as part of message delivery. These SMTP conversations occur on Send connectors and Receive connectors that exist in the Front End Transport service on Client Access servers, the Transport service on Mailbox servers, and the Mailbox Transport service on Mailbox servers. You can use protocol logging to diagnose mail flow problems.

Question No: 33 – (Topic 4)

You need to recommend a solution that meets the compliance requirements for email messages that contain information about the Fabrikam acquisition.

Which three actions should you recommend? (Each correct answer presents part of the solution. Choose three.)

  1. Create an Outlook protection rule.

  2. Create a new custom message classification.

  3. Modify the registry on all client computers.

  4. Modify the Content Filtering settings.

  5. Export the Message Classification configuration to an .xml file.

Answer: B,C,E Explanation:

B: Use the New-MessageClassification cmdlet to create a message classification instance in your organization.

E: After you create a new message classification, you can specify the message classification as a transport rule predicate. Before Microsoft Outlook and Outlook Web App users can apply the message classification to messages, you must update the end-user systems with the message classification XML file created by the Export- OutlookClassification.ps1 script file. The Export-OutlookClassification.ps1 script file is located in the %ExchangeInstallPath%Scripts directory.

C: Microsoft Office Outlook requires a local file (Classifications.xml) that contains definitions of the message classifications that Microsoft Exchange Server supports before Outlook users can apply message classifications to their messages. You must also create a registry key that enables message classification and references the Classifications.xml file on the Outlook user#39;s computer.

  • From scenario:

    Compliance Requirements include:

    Users must use a custom message classification when they send email messages that contain information about the planned acquisition of Fabrikam.

    Question No: 34 DRAG DROP – (Topic 4)

    You need to identify which technologies must be used to meet the security requirements. Which technologies should you identify? (To answer, drag the appropriate technologies to

    Dumps4Cert 2018 PDF and VCE

    Answer:

    Dumps4Cert 2018 PDF and VCE

    Question No: 35 – (Topic 4)

    You need to implement a solution that meets the collaboration requirements. What should you do?

    A. Run the Set-CASMailbox cmdlet.

    D. Modify the organization configuration.

    Answer: B Explanation:

  • Scenario: Custom recipient MailTips created in the Exchange Server organization of Trey Research must be visible to the users at Fabrikam. The solution must ensure that administrators can define a subset of users who can share their MailTips.

  • MailTips Over Organization Relationships

    You may want to restrict certain types of MailTips. You can either allow all MailTips to be returned or allow only a limited set that would prevent NDRs. You can configure this setting with the MailTipsAccessLevel parameter on the Set-OrganizationRelationship cmdlet.

    Reference: MailTips over organization relationships

    Question No: 36 DRAG DROP – (Topic 4)

    You restore the files of DB3 to EX3.

    You need to mount DB3 on EX3. The solution must ensure that email messages sent to the users of DB3 while the database was offline are delivered once DB3 is mounted.

    Which three actions should you perform in sequence? (To answer, move the appropriate three actions from the list of actions to the answer area and arrange them in the correct order.)

    Dumps4Cert 2018 PDF and VCE

    Answer:

    Dumps4Cert 2018 PDF and VCE

    Explanation:

    Dumps4Cert 2018 PDF and VCE

    Dumps4Cert 2018 PDF and VCE

    http://technet.microsoft.com/en-us/library/dd876926(v=exchg.150).aspx

    Question No: 37 – (Topic 4)

    You need to implement a solution that meets the compliance requirements for the members of the legal department.

    Which two cmdlets should you use? (Each correct answer presents part of the solution. Choose two.)

    1. New-RoleAssignmentPolicy

    2. Add-ManagementRoleEntry

    3. New-ManagementRoleAssignment

    4. New-ManagementRole

    5. New-ManagementScope

    Answer: C,D Explanation:

  • From scenario:

/ Only the users in the legal department must be able to use eDiscovery to view the contents of email messages sent by the finance department users.

/ Users in the legal department use a shared mailbox named Legal. Legal is enabled for In- Place Hold. Legal is the only mailbox on DB2.

We need to assign the role to the legal department users using the New- ManagementRoleAssignment cmdlet.

To restrict the eDiscovery access to the finance users emails, we need to create a scope using the New-ManagementScope cmdlet.

Overview

General Overview

Proseware, Inc., is an international manufacturing company that has 1,000 users. Proseware has a sales department, a marketing department, a research department, and a human resources department.

Proseware purchases another company named Contoso, Ltd. Contoso has 500 users.

Physical Locations

Proseware has two main offices located in New York and London.

The offices connect to each other by using a WAN link. Each office connects directly to the Internet. Contoso has a single office in Dallas.

Existing Environment

Active Directory Environment

The Proseware network contains an Active Directory forest named proseware.com. The forest contains a single domain. All domain controllers run Windows Server 2012.

Each office contains three domain controllers. Each office is configured as an Active Directory site.

The Contoso network contains an Active Directory forest named contoso.com. The forest contains a single domain. All domain controllers run Windows Server 2012.

Exchange Server Organization

Proseware has an Exchange Server 2013 organization that contains four servers. The servers are configured as shown in the following table.

Dumps4Cert 2018 PDF and VCE

EX3 and EX4 are the members of a database availability group (DAG) named DAG1. DAG1 has two DAG networks. The networks are configured as shown in the following table.

Dumps4Cert 2018 PDF and VCE

Users connect to mail.proseware.com for Microsoft Outlook and Outlook Web App services. Mail.proseware.com resolves to an IP address on a hardware load balancer.

All Outlook Anywhere users are enabled for Cached Exchange Mode.

Proseware pilots a hybrid deployment of Exchange Server 2013 and Microsoft Office 365. The mailbox of each pilot user is moved to Office 365. For the pilot mailboxes, all inbound email messages from the Internet are delivered to the Exchange Server organization, and then forwarded to Office 365.

Contoso has an Exchange Server 2010 organization.

Problem Statements

Proseware identifies the following issues:

-> MapiNet is saturated with network traffic caused by the database replication between the members of DAG1 over MapiNet.

-> The pilot users report that entries added to their Safe Senders list and their Blocked Senders list fail to work.

-> A recent power outage in the New York office prevents all users from accessing their mailbox.

-> A user named User1 reports that email messages are being sent from her mailbox without her consent.

Requirements Planned Changes

Proseware plans to implement the following changes:

-> Several users at Contoso will use a mailbox at Proseware as their primary mailbox. The Contoso users will use Autodiscover to configure their client settings and will use single sign-on.

-> For a special project, an IT administrator will create 20 distribution groups that will each contain 200 members.

-> Certain users in both companies will have a contoso.com SMTP suffix as their primary email address.

Technical Requirements

Proseware identifies the following technical requirements for the Exchange Server organization:

-> Internal email messages must be rejected if the messages cannot be protected by

using Shadow Redundancy.

-> All database replication between DAG1 members must occur over the ReplNet network.

Site Resiliency Requirements

Proseware identifies the following site resiliency requirements for the Exchange Server organization:

-> All mailboxes must be available if a single site becomes unavailable. The solution must not require administrator intervention.

-> User traffic on the WAN links must be minimized.

Email Security Requirements

Proseware identifies the following requirements for securing email messages:

-> Email recipients must be able to identify whether an email message was modified during delivery.

-> All email messages stored in the mailbox databases must be protected from theft.

-> Users must be able to encrypt email messages from Outlook Web App.

Retention Requirements

Proseware plans to reduce mailbox server storage usage and to limit company liability. Proseware identifies the following requirements:

-> Email messages in the Deleted Items folder must be retained for only 30 days.

-> Email messages in a mailbox folder named Projects must be retained for 540 days, unless the messages contain contractual information.

-> Email messages in the Projects folder that contain contractual information must be retained indefinitely.

-> All other email messages must be removed after one year.

Question No: 38 – (Topic 5)

You are evaluating the deployment of two additional Client Access servers and a hardware load balancer in the London office.

You need to recommend changes to the Client Access namespace design to meet the site resiliency requirements.

Which three actions should you recommend? (Each correct answer presents part of the solution. Choose three.)

  1. In the London office, set mail.proseware.com as the external host name for Outlook Anywhere. In the New York office, set mail.proseware.com as the external host name for Outlook Anywhere.

  2. In the London office, set lonmail.proseware.com as the internal host name for Outlook Anywhere. In the New York office, set nycmail.proseware.com as the internal host name for Outlook Anywhere.

  3. Use DNS round robin for the external host name for Outlook Anywhere.

  4. Use DNS round robin for the internal host name for Outlook Anywhere.

  5. In the London office, set nycmail.proseware.com as the external host name for Outlook Anywhere. In the New York office, set lonmail.proseware.com as the external host name for Outlook Anywhere.

  6. In the London office, set mail.proseware.com as the internal host name for Outlook Anywhere. In the New York office, set mail.proseware.com as the internal host name for Outlook Anywhere.

Answer: A,B,C Explanation:

A: Use mail.proseware.com as the external host name for Outlook Anywhere at both locations.

B: Use internal names (lonmail.proseware.com and nycmail.proseware.com) as the internal host name for Outlook Anywhere in London and New York respectively.

C: To meet the resiliency requirement use the external host name (mail.proseware.com) for DNS round robin for Outlook anywhere.

  • From scenario:

    / Users connect to mail.proseware.com for Microsoft Outlook and Outlook Web App services. Mail.proseware.com resolves to an IP address on a hardware load balancer.

    / All Outlook Anywhere users are enabled for Cached Exchange Mode.

    / Proseware has two main offices located in New York and London.

    /

    Site Resiliency Requirements

    • All mailboxes must be available if a single site becomes unavailable. The solution must not require administrator intervention.

    • User traffic on the WAN links must be minimized.

  • Split DNS for Exchange Server 2013

Split DNS allows your internal clients to receive a different answer to their DNS lookups than an external client would receive. In effect you have your Exchange namespace hosted on your internal DNS server, with records configured to point to internal IP addresses.

Question No: 39 HOTSPOT – (Topic 5)

Which command should you recommend? (To answer, select the appropriate options in the answer area.)

Dumps4Cert 2018 PDF and VCE

Dumps4Cert 2018 PDF and VCE

Answer:

Dumps4Cert 2018 PDF and VCE

Explanation:

Dumps4Cert 2018 PDF and VCE

  • Scenario: A user named User1 reports that email messages are being sent from her mailbox without her consent.

  • Set-Mailbox -AuditDelegate

The AuditDelegate parameter specifies the operations to log for delegate users.

Dumps4Cert 2018 PDF and VCE

Question No: 40 – (Topic 5)

You need to recommend a solution to meet the technical requirements for redundancy during email delivery.

Which cmdlet should you include in the recommendation?

  1. Set-FrontendTransportService

  2. Set-TransportConfig

  3. Set-MailboxTransportService

  4. Set-TransportService

Answer: B Explanation:

/ Internal email messages must be rejected if the messages cannot be protected by using Shadow Redundancy

We need to use the Set-TransportConfig cmdlet with the RejectMessageOnShadowFailure parameter.

100% Dumps4cert Free Download!
70-483 PDF
100% Dumps4cert Pass Guaranteed!
70-483 Dumps

Dumps4cert ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No