This page was exported from Braindump2go Free Exam Dumps with PDF and VCE Collection [ https://www.mcitpdump.com ] Export date:Fri Apr 26 23:55:05 2024 / +0000 GMT ___________________________________________________ Title: [2016-Sep.-New]Braindump2go Offers 70-341 Braindump VCE Free Files for Instant Download[NQ101-NQ110] --------------------------------------------------- 2016/09 New 70-341:Microsoft Core Solutions of Microsoft Exchange Server 2013 Exam Questions and Answers Updated Today!Free Instant Download 70-341 Exam Dumps (PDF & VCE) 261Q&As from Braindump2go.com Today!100% Real Exam Questions!     100% Exam Pass Guaranteed!1.|2016/09 New 70-341 Exam Dumps (PDF & VCE) 261Q&As Download: http://www.braindump2go.com/70-341.html 2.|2016/09 New 70-341 Exam Questions & Answers: https://drive.google.com/folderview?id=0B75b5xYLjSSNbTQ2eEI5ZkRZUVE&usp=sharing QUESTION 101You have an Exchange Server 2013 organization that contains 20 Mailbox servers. You plan to create 10 mailbox databases on each Mailbox server. You need to create a naming convention for all mailbox databases.What should you include in your naming convention? A.    For each mailbox database, provide a database name that is unique within the organization.B.    For each mailbox database, provide a database name that is unique within the Mailbox server.C.    For each mailbox database file, provide a file name that is unique within the organization.D.    For each mailbox database file, provide a file name that is unique within the Mailbox server. Answer: A QUESTION 102You have an Exchange Server organization that contains three servers that have Exchange Server 2013 installed and one server that has Exchange Server 2010 installed. You create the custom RBAC roles shown in the following table.The Seattle help desk manages all of the users in an organizational unit (OU) named Seattle. The Miami help desk manages all of the users in an OU named Miami. The IT Administrators manage all of the users in the forest. You need to recommend which commands must be run to prevent only the members of both help desks from modifying the properties of users who have a department attribute value of Manager. Which three commands should you run? (Each correct answer presents part of the solution. Choose three.)  A.    new-managementscope "executive users exclusive scope"-recipientrestrictionfilter { department -eq "manager" } -exclusive sorceB.    new-managementroleassignment -name "managers" -securitygroup "managers" -role "mail recipients" -exclusiverecipientwritescope "executive users exclusive scope"C.    new-roleassignmentpolicy -name "limited end user policy" -roles "mypersonalinformation".D.    new-rolegroup -name "managers" -roles "mail recipients" -members adminsE.    new-rolegroup -name "help desk" -roles "mail recipients" -members admins Answer: ABDExplanation:Note:- (A) Use the New-ManagementScope cmdlet to create a regular or exclusive management scope. After you create a regular or exclusive scope, you need to associate the scope with a management role assignment. To associate a scope with a role assignment, use the New-ManagementRoleAssignment cmdlet.- (B) Use the New-ManagementRoleAssignment cmdlet to assign a management role to a management role group, management role assignment policy, user, or universal security group (USG). QUESTION 103You have an Exchange Server 2007 organization.You recently deployed a server that has Exchange Server 2013 installed. The Exchange Server organization contains three servers. The servers are configured as shown in the following table.Server2 contains a mailbox for a user named User1. You move the mailbox of User1 to Server3. After the move, User1 fails to access his mailbox by using Outlook Web App. Users who have mailboxes on Server1 and Server2 can access their mailboxes by using Outlook Web Access. You need to ensure that User1 can access his mailbox from the Internet by using Outlook Web App at https://mail.contoso.com. The solution must ensure that users who have mailboxes on Server1 and Server2 can continue to use Outlook Web Access. Which three actions should you perform? (Each correct answer presents part of the solution. Choose three.)  A.    Export the certificate on Server1 and import the certificate to Server 3.B.    On all of the Exchange servers, install a new certificate that contains the mail.contoso.com and legacy.contoso.com names.C.    Redirect all of the traffic from the Internet for mail.contoso.com to Server3.D.    On all of the Exchange servers, install a new certificate that contains the Server1.contoso.com, server2.contoso.com, server3.contoso.com, and legacy.contoso.com names.E.    Create a host (A) record named legacy.contoso.com that points to Server1. Answer: ABEExplanation:Client Connectivity in an Exchange 2013 Coexistence Environmenthttp://technet.microsoft.com/en-US/exdeploy2013/Checklist?state=2419-W-FgBEAgAAQACAAIECAQAAAAg~http://technet.microsoft.com/en-US/exdeploy2013/Checklist?state=2419-W-EQBEAgAAQACAAIECAQAAAAg~ QUESTION 104You host Exchange Server 2013 organizations for several hundred tenants. The infrastructure contains several custom transport agents. You need to prevent the transport agents from overloading the processors on one of the Exchange servers. Which cmdlet should you run? A.    Set-WorkloadPolicyB.    Set-ResourcePolicyC.    Set-TransportAgentD.    Set-ThrottlingPolicy Answer: A QUESTION 105Drag and Drop QuestionYou have an Exchange Server 2013 organization that contains a server named EX1. You have a user named User1 in the marketing department. You need to prevent User1 from submitting more than 50 email messages per minute to the Exchange Server organization by using Microsoft Outlook.Which three commands should you run? To answer, move the three appropriate commands from the list of commands to the answer area and arrange them in the correct order. Answer:  Explanation:Note:Box 1:- Use the New-ThrottlingPolicy cmdlet to create a non-default user throttling policy.- The MessageRateLimit parameter specifies the number of messages per minute that can be submitted to transport.Box 3:- Use the Set-Mailbox cmdlet to modify the settings of an existing mailbox. You can use this cmdlet for one mailbox at a time./ parameter: ThrottlingPolicyMicrosoft.Exchange.Configuration.Tasks.ThrottlingPolicyIdParameter QUESTION 106Drag and Drop QuestionYou have an Exchange Server 2013 organization that contains four servers named EX1, EX2, EX3, and EX4. All of the servers are members of a database availability group (DAG) named DAG1. Each server has a copy of a mailbox database named DB1. DB1 has the following characteristics:- The replay lag time on Ex4 is set to 14 days.- Single item recovery on all of the servers is set to 14 days. - None of the servers have Volume Shadow Copy Service (VSS) backups. Ex4 has a folder named F:RDB that is used to store database files during restore operations. Twenty days ago, a user named User1 deleted an email message that had a subject of "Sales Report".You need to restore the deleted email message to the mailbox of User1. You copy the lagged database and the log files that are older than 20 days to F:RDB.Which three actions should you perform? To answer, move the three appropriate actions from the list of actions to the answer area and arrange them in the correct order. Answer:   QUESTION 107Your company has three offices. Each office is configured as an Active Directory site. You have three servers that have Exchange Server 2013 installed named EX1, EX2 and EX3.All three servers have the Client Access server role and the Mailbox server role installed. The Active Directory site links and costs are configured as shown in the exhibit. (Click the Exhibit button.)Site B is designated as a hub site. EX2 fails. You discover that all email messages sent from the users in Site A to the users in Site C are queued on a server in Site A. You need to ensure that the email messages are sent to Site C as quickly as possible. What should you do first?  A.    Modify the Active Directory site link costs.B.    Configure Site A as a hub site.C.    Modify the Exchange-specific site link cost.D.    Remove the hub site. Answer: D QUESTION 108Your network contains an internal network and a perimeter network. The internal network contains four offices. The perimeter network is located in a separate office. Each internal office has a direct WAN link to all other internal offices. Each of the four offices that make up the internal network is configured as an Active Directory site. The Active Directory sites and site links are configured as shown in the exhibit. (Click the Exhibit button.)Your company has an Exchange Server 2013 organization. Each site contains two servers that have the Mailbox server role and the Client Access server role installed. To the perimeter network, you deploy two servers that have Exchange Server 2010 Service Pack 2 (SP2) and the Edge Transport server role installed. You configure an Edge Subscription to Site1. You deploy a new email notification application to Site4. The application will send 25,000 email messages daily to external recipients. You need to identify which WAN links will have increased traffic from the new email application. Which WAN link or links should you identify? (Each answer presents part of the solution. Choose all that apply.)  A.    The WAN link between Site4 and the perimeter networkB.    The WAN link between Site4 and Site3C.    The WAN link between Site1 and the perimeter networkD.    The WAN link between Site4 and Site1E.    The WAN link between Site4 and Site2 Answer: CEExplanation:C: the traffic will increase on the single WAN link on the perimeter network.E: The traffic will increase between Site4 and Site2 since the cost of this link (5) plus the cost of the link between Site2 and Site1 (1) is lower the cost on the direct link between Site4 and Site1 (10).Incorrect answers:Not A: There is no WAN link between Site4 and the perimeter network. Not B: The cost of the WAN link between site3 and site3 is high (10). This path will not be chosen.Not D: There is no WAN link between Site4 and Site1. QUESTION 109You have network contoso.com. contoso.com consist of AD DS Domain contoso.com. All Servers running Windows Server 2012 and all Clients running Windows 8 Pro. Server1 runs Mailbox Server Role and Client Access Server Role. You are configuring Anti-Spam Filtering on Server1. You need to ensure that all emails with words "Free Credit Check" are rejected unless the email is sent to Finance Distribution Group. You also need to ensure that all emails from partner company Domain name adatum.com bypass the Anti-Spam Filter. You run the Add-ContentFilterPhrase and add the words "Free Credit Check" What should you do next? A.    Run the Set-TransportConfig and Set-ContentFilterConfigB.    Run the Set-SenderReputationConfig and Set-TransportConfigC.    Run the Set-ContentFilterConfig and Set-RecipientFilterConfigD.    Run the Set-SenderFilterConfig and Set-RecipientFilterConfig Answer: AExplanation:http://technet.microsoft.com/en-gb/library/bb201691(v=exchg.150).aspxhttp://www.jaapwesselius.com/2013/01/10/installing-exchange-server-2013-part-iii/http://zaliasrobotas.blogspot.co.uk/2013/11/how-to-enable-and-configure-spam-filter.htmlhttp://www.techieshelp.com/exchange-2013-enable-anti-spam/ QUESTION 110You are evaluating the implementation of a Database Availability Group (DAG). You need to recommend changes to the planned implementation to minimize the loss of large email messages if a single DAG member fails. What should you recommend changing? A.    The preference of the mail exchanger (MX) recordsB.    The duration of single item recoveryC.    The intervals of shadow redundancyD.    The size of the transport dumpster Answer: CExplanation:Shadow redundancy intervals will need to be ammendedSafetyNet is a component of Shadow Redundancy. -> .http://technet.microsoft.com/en-us/library/dd351027(v=exchg.150).aspxExample 1:ShadowResubmitTimeSpan on Set-TransportConfig3 hoursHow long a server waits before deciding that a primary server has failed and assumes ownership of shadow messages in the shadow queue for the primary server that's unreachable.Example 2:SafetyNetHoldTime on Set-TransportConfig2 daysHow long successfully processed messages are retained in Safety Net. Unacknowledged shadow messages eventually expire from Safety Net after the sum of SafetyNetHoldTime and MessageExpirationTimeout on Set-TransportService. !!!RECOMMEND!!!1.|2016/09 New 70-341 PDF & 70-341 VCE 261Q&As Download: http://www.braindump2go.com/70-341.html 2.|2016/09 New 70-341 Questions & Answers: https://drive.google.com/folderview?id=0B75b5xYLjSSNbTQ2eEI5ZkRZUVE&usp=sharing --------------------------------------------------- Images: --------------------------------------------------- --------------------------------------------------- Post date: 2016-09-13 01:52:07 Post date GMT: 2016-09-13 01:52:07 Post modified date: 2016-09-13 01:52:07 Post modified date GMT: 2016-09-13 01:52:07 ____________________________________________________________________________________________ Export of Post and Page as text file has been powered by [ Universal Post Manager ] plugin from www.gconverters.com