- Home
- Server Administration
- Advanced Solutions of Microsoft Exchange Server 2013 (70-342)
16.
Contoso and Fabrikam are two divisions of the same company. Both were historically
separate entities and remain so for email due to compliance reasons. Both organizations
have an Exchange Server 2013 deployment in two different datacenters and they
use rack space at the partner company’s datacenter to host passive DAG nodes. They
would also like to use the Internet connection of the partner in the event of an outage
with their own connection for inbound mail flow. What do they need to configure in
addition to the records pointing to the primary datacenter?
- A.Create the following DNS records: contoso.com MX 5 mail.fabrikam.com fabrikam.com MX 5 mail.contoso.com
- B.Create the following DNS records: contoso.com MX 10 mail.fabrikam.com fabrikam.com MX 10 mail.contoso.com
- C.Create the following DNS records: contoso.com MX 20 mail.fabrikam.com fabrikam.com MX 20 mail.contoso.com
- D.For each organization, create an internal relay accepted domain and a send connector with the matching address space as the accepted domain.
- E.For each organization, create an external relay accepted domain and a send connector with the matching address space as the accepted domain.
- Answer & Explanation
- Report
Answer : [C, E]
Explanation :
Explanation :
A. Incorrect: This answer would route all emails during normal working times to the
wrong datacenter. B. Incorrect: This answer would distribute emails across both datacenters all the time. C. Correct: This answer adds a lower priority MX record that would only be used when the higher priority record server has gone offline. D. Incorrect: As the question covers two different organizations there is a choice of which accepted domain to include. The internal relay allows the email address of the other company to be added to email address lists and email addresses in the other domain given to users in the first domain. This is not required by the scenario and so this is not the best answer given the options. E. Correct: This answer allows for emails to be accepted by the other partner and forwarded to the first partner, queued if necessary, but without accidently opening the possibility of having an email address list with this domain listed on it. |
17.
Which of the following Windows PowerShell commands will return the list of servers
and the state of the servers in a cluster?
- A.Get-ClusterNode
- B.Get-ClusterServer
- C.Get-Cluster
| FL *node* - D.Cluster.exe Node
- Answer & Explanation
- Report
Answer : [A]
Explanation :
Explanation :
A. Correct: Get-ClusterNode returns the nodes in the cluster and their status with
regard to being up or down. B. Incorrect: This PowerShell cmdlet is not a valid cmdlet. C. Incorrect: This PowerShell cmdlet does not contain information about the cluster nodes. D. Incorrect: This is a cmd prompt executable and not a PowerShell cmdlet. It does return the same information as the correct answer and the exe can be run in a PowerShell window, but it is not a PowerShell cmdlet as required by the question. |
18.
You notice that when using Get-MailboxDatabaseCopyStatus on a server that hosts
only passive database copies, you have a large copy queue length of over 10,000 logs for one of these databases. Which of the following could be the potential impacts of
this issue?
- A.Backups will not truncate log files
- B.Disk space for logs might run out.
- C.The active database might dismount.
- D.The transaction logs on the lagged copy will auto play forward.
- Answer & Explanation
- Report
Answer : [A, B, C]
Explanation :
Explanation :
A. Correct: As there will be log files that have not been copied to a passive copy they
cannot be truncated by backup. This is expected behavior when you have a copy
queue length that exceeds 100 logs. B. Correct: This is also correct. You should have enough disk space on the server with the active copy to store enough logs to cover your largest expected network outage - which is the most likely reason for a large copy queue length. C. Correct: If you run out of disk space on the active log folder then if the active database shares that drive, you run out of disk space for the database too, which will cause the database to shutdown. D. Incorrect: The playing forward of any lagged copy happens when the lagged copy disk space runs out and not when the active copy is short on disk space. |
19.
What does the RCPT SMTP verb do?
- A.It tells the SMTP server to send a read receipt.
- B.It tells the SMTP client to send a read receipt.
- C.It tells the SMTP client that the email has been received.
- D.It tells the SMTP server the email address of the recipients of the email.
- Answer & Explanation
- Report
Answer : [D]
Explanation :
Explanation :
A. Incorrect: The Notify verb is used for receipts. B. Incorrect: SMTP verbs are sent from the client to the server. C. Incorrect: The SMTP server tells the SMTP client that the message has been received with a 250 response to the data termination period or the BDAT verb. D. Correct: RCPT is the recipient verb in SMTP. |
20.
Over a period of time you have sent a number of S/MIME protected messages using
Outlook. You did not keep a backup of your digital certificate and you have accidently
deleted this certificate. Which of the following will you not be able to do going forward?
(Choose all that apply.)
- A.You will not be able to sign emails.
- B.You will not be able to encrypt emails.
- C.You will not be able to read signed emails from others.
- D.You will not be able to read encrypted emails from others.
- E.You will not be able to read signed emails you have sent that are in your Sent Items folder.
- F.You will not be able to read encrypted emails you have sent to others that are in your Sent Items folder.
- Answer & Explanation
- Report
Answer : [A, B, D and F]
Explanation :
Explanation :
A. Correct: You need the private key to sign emails. B. Correct: You need the private key to encrypt a copy of the email that is placed in Sent Items by Outlook, therefore if you do not have a private key you cannot encrypt messages to others as the copy to yourself cannot be created. C. Incorrect: To read a signed email you need the sender’s public key. D. Correct: You need your private key, which is part of your certificate, to read encrypted emails sent to you by others. E. Incorrect: You will be able to read signed emails because they are not encrypted. F. Correct: To open previously encrypted emails that you have sent to others, you need your private key. |