Microsoft

  • Free Download Pass4sure and Lead2pass 70-688 Exam Question with PDF & VCE (51-60)

    QUESTION 51
    You support desktop computers that run Windows 8 Pro and are used as guest terminals in a reception area. They are connected to the Internet and are configured with automatic logon by using a local user account. You discover new applications on the Start screen of the computers. You need to restrict access to Windows Store for local user accounts on the computers. What should you do?

    A.    From Local Computer Policy, navigate to App Package Deployment and disable All Trusted Apps to Install.
    B.    From Local Computer Policy, select Store and enable Turn off the Store application.
    C.    From Local Computer Policy, select Store and disable Turn off Automatic Downloads for Updates.
    D.    From Local Computer Policy, select Store and disable Allow Store to install apps on Windows To
    Go workspaces.

    Answer: B

    (more…)

  • Free Download Pass4sure and Lead2pass 70-688 Exam Question with PDF & VCE (41-50)

    QUESTION 41
    You administer a company network that includes computers that run Windows 8 Enterprise in an Active Directory domain. The company has purchased a subscription to Windows Intune. Corporate security policy requires that computers in the accounting department have file and program activity logged. A user in the accounting department uses a computer that is managed by Windows Intune. You need to ensure that file and program activity is always monitored on this computer. What should you do?

    A.    Create a new Windows Firewall Setting policy in the Windows Intune Admin Console.
    B.    In the Windows Intune Admin Console, create a new Windows Intune Agent Settings policy that
    uses the recommended settings.
    C.    Create a new Windows Intune Mobile Security policy in the Windows Intune Admin Console.
    D.    Create and deploy a custom policy in the Windows Intune Center Settings template.

    Answer: B

    (more…)

  • Free Download Pass4sure and Lead2pass 70-688 Exam Question with PDF & VCE (31-40)

    QUESTION 31
    You are a systems administrator for Contoso; Ltd. All client computers run Windows 8 and are members of the contoso.com Active Directory domain. Users log on to their computers by using domain user accounts. Contoso develops an internal line of business (LOB) Windows Store app. You want to deploy the LOB app to the client computers and configure the app to access various resources in the domain. You need to enable all users to run the LOB app and access the required resources from the LOB app. What should you do?

    A.    Certify the LOB app with Windows Store.
    Ask users to log on to their computers by using a Microsoft Account.
    Install the LOB app from Windows Store.
    Ask users to log off, and then log back on in by using their domain accounts.
    B.    Restart each computer by using WinPE.
    From WinPE, copy all of the LOB app executable files in the Program Files folder.
    Restart into Windows 8 and ask users to log on by using their domain accounts.
    C.    Use the DISM utility to include the LOB app in a new Windows 8 image.
    Reimage the computers with the new image.
    Join the computers to a new workgroup.
    Ask each user to log on to the computer by using a new Microsoft Account that ends with @contoso.com.
    D.    Configure the Allow all trusted apps to install policy settings for all computers.
    Ask users to log on by using their domain accounts, and then execute a PowerShell script that includes
    the add- appxpackage cmdlet.

    Answer: A

    (more…)

  • Free Download Pass4sure and Lead2pass 70-688 Exam Question with PDF & VCE (21-30)

    QUESTION 21
    You have a computer that runs Windows 8. The computer has a shared folder named C:\Marketing. The shared folder is on an NTFS volume. The current NTFS and share permissions are configured as follows:

    image
    UserA is a member of both the Everyone group and the Marketing group. UserA must access
    C:\Marketing from across the network. You need to identify the effective permissions of UserA to the C:\Marketing folder. What permission should you identify?

    A.    Read
    B.    Full Control
    C.    Modify
    D.    Read and Execute

    Answer: C

    (more…)

  • Free Download Pass4sure and Lead2pass 70-688 Exam Question with PDF & VCE (11-20)

    QUESTION 11
    Hotspot Questions
    You support desktop computers that run Windows 8 Enterprise. One computer is a member of a workgroup and is used as a guest computer in a reception area. You need to configure the SmartScreen setting to require administrator approval before running downloaded unknown software on the desktop computer. Which policy setting should you use? (To answer, select the appropriate object in the answer area.)

    image
    Answer:

    image 

    (more…)

  • Free Download Pass4sure and Lead2pass 70-688 Exam Question with PDF & VCE (1-10)

    QUESTION 1
    You administer client computers that run Windows 8 Enterprise deployed by using Windows Deployment Services (WDS).
    Your company recently purchased 25 new tablets that run Windows 8 Pro. For all 25 new tablets, you want to replace the existing Windows 8 Pro installation with Windows 8 Enterprise.
    You need to deploy the Windows 8 Enterprise image to all 25 tablets simultaneously by using the existing WDS infrastructure.
    What should you do?

    A.    Start the tablets from the Windows To Go workspace.
    B.    Start the tablets from a USB flash drive with a customized Windows Preinstallation Environment (WinPE).
    C.    Start the tablets normally. Map the Windows Image (WIM) file from a WDS network share.
    D.    Start the tablets from a customized Windows Recovery Environment (WinRE).

    Answer: A

    QUESTION 2
    Drag and Drop Questions
    Your company recently purchased 25 new laptops. All 25 laptops have the same hardware configuration and do not have any operating system installed. You have been asked to deploy Windows 8 on these laptops. You have installed and configured Windows 8 on a reference laptop. You need to create an image and deploy it to the 25 new laptops. Which four actions should you perform in sequence? (To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.)

    image
    Answer:

    image  
    Explanation:
    Note:
    * You can create a reference computer by deploying Windows, and then removing the computer- specific information from the system.
    * On the destination computer, you will create a structure for the partitions where you apply your images. The partition structure on the destination computer must match the partition structure of the reference computer.
    * Use the Diskpart tool and the DISM tool to apply Windows images to one or more partitions onto a computer for deployment.
    * Use the DISM tool to apply images to your Windows partition. Reference: How to Capture Images of Hard Disk Partitions by Using DISM Reference: How to Apply Images by Using DISM

    QUESTION 3
    Drag and Drop Questions
    You administer computers that run windows 7 and Windows 8. You run an application that saves files that contain local settings unique to each user. You want to allow users to synchronize settings for an application to any enterprise computer when they log on to the enterprise computer. You need to implement a solution that will move a user’s settings files to any computer. You also need to ensure that you can roll back the changes if necessary. Which required task or tasks should you perform with each approach? (To answer, drag the appropriate required task to the corresponding approach. Each required task may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.)

    image 

    Answer:

    image  
    Explanation:
    Note:
    * Microsoft User Experience Virtualization (UE-V) uses settings location templates to roam application settings between user computers. Some standard settings location templates are included with User Experience Virtualization. You can also create, edit, or validate custom settings location templates with the UE-V Generator.
    * Settings template catalog
    The User Experience Virtualization settings template catalog is a folder path on UE-V computers or a Server Message Block (SMB) network share that stores all the custom settings location templates. The UE-V agent retrieves new or updated templates from this location. The UE-V agent checks this location once each day and updates its synchronization behavior based on the templates in this folder. Templates that were added or updated in this folder since the last time that the folder was checked are registered by the UE-V agent. The UE-V agent deregisters templates that are removed from this folder. By default, templates are registered and unregistered one time per day at 3:30 A.M.
    local time by the task scheduler.
    * The Microsoft Desktop Optimization Pack (MDOP) is a suite of technologies available as a subscription for Software Assurance customers. MDOP virtualization technologies help personalize the user experience, simplify application deployment, and improve application compatibility with the Windows operating system (UE-V/App-V/MED-V). Additionally, MDOP helps manage, monitor, and deploy key Windows features (MBAM/AGPM). Using MDOP shifts desktop repair from reactive to proactive, saving time and removing challenges associated with troubleshooting and repairing system failures (DaRT).
    Reference: Create UE-V Settings Location Templates with the UE-V Generator

    QUESTION 4
    Drag and Drop Questions
    You support a computer that runs Windows 8 Enterprise. You want to create a dual-boot configuration by using the native boot virtual hard disk (VHD) method. You need to create an alternate Windows 8 installation. Which three actions should you perform in sequence? (To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.)

    image
    Answer:

    image 

    QUESTION 5
    Drag and Drop Questions
    You support computers that run Windows 8 Enterprise. Company policy requires that Microsoft Internet Explorer be the only browser allowed and supported. You collect software metering data and discover that several users are running other third-party browsers. You need to block other web browsers from running on the computers. All other applications should be allowed. Which three actions should you perform in sequence? (To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.)

    image
    Answer:

    image 
    Explanation:
    Note:
    * Use Computer Configuration (not user configuration).
    * Restrict Access to Programs with AppLocker in Windows 7 If you share a computer and don’t want other users accessing certain applications, there is a new feature in Windows 7 that allows you to block them. We restrict what programs other users can access using AppLocker.
    Under Local Computer Policy go to Computer Configuration \ Windows Settings \ Security Settings \ Application Control Policies \ AppLocker.
    Now under AppLocker Properties check the boxes next to Configured under Executable rules then click Ok.

    image
    Finally create a Deny Executable rule for each browser you want to block.

    QUESTION 6
    Drag and Drop Questions
    You support computers that run windows 8 Enterprise. AppLocker policies are deployed. Company policy states that AppLocker must be disabled. You need to disable AppLocker. Which three actions should you perform in sequence? (To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.)

     image
    Answer:

    image
    Explanation:
    Note:
    * Before you can enforce AppLocker policies, you must start the Application Identity service by using the Services snap-in console.
    * The Application Identity service determines and verifies the identity of an application. Stopping this service will prevent AppLocker policies from being enforced.

    QUESTION 7
    Drag and Drop Questions
    You administer laptops and virtual desktop computers that run Windows 8 and are joined to an Active Directory domain. Your company provides virtual desktop computers to all users. Employees in the sales department also use laptops, sometimes connected to the company network and sometimes disconnected from the company network. You want sales department employees to have the same personal data, whether they are using their virtual desktop computers or their laptops. You need to configure the network environment to meet the requirements. Which three actions should you perform in sequence? (To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.)

    image 

    Answer:

    image  
    Explanation:
    Note:
    Folder Redirection and Offline Files are used together to redirect the path of local folders (such as the Documents folder) to a network location, while caching the contents locally for increased speed and availability.
    * Folder Redirection enables users and administrators to redirect the path of a known folder to a new location, manually or by using Group Policy. The new location can be a folder on the local computer or a directory on a file share. Users interact with files in the redirected folder as if it still existed on the local drive. For example, you can redirect the Documents folder, which is usually stored on a local drive, to a network location. The files in the folder are then available to the user from any computer on the network.
    * Offline Files makes network files available to a user, even if the network connection to the server is unavailable or slow. When working online, file access performance is at the speed of the network and server. When working offline, files are retrieved from the Offline Files folder at local access speeds. A computer switches to Offline Mode when:
    The new Always Offline mode has been enabled
    The server is unavailable
    The network connection is slower than a configurable threshold The user manually switches to Offline Mode by using the Work offline button in Windows Explorer Reference: Folder Redirection, Offline Files, and Roaming User Profiles overview

    QUESTION 8
    You manage a network that includes computers that run Windows 8 Enterprise. All of the computers on the network are members of an Active Directory domain. The company recently proposed a new security policy that prevents users from synchronizing applications settings, browsing history, favorites, and passwords from the computers with their Microsoft accounts. You need to enforce these security policy requirements on the computers. What should you do?

    A.    From each computer, navigate to Change Sync Settings and set the Sync Your Settings options for
    Apps, Browser, and Passwords to Off.
    B.    On the Group Policy Object, configure the Accounts: Block Microsoft accounts Group Policy setting
    to Users can’t add or log on with Microsoft accounts.
    C.    On the Group Policy Object, configure the Accounts: Block Microsoft accounts Group Policy setting
    to Users can’t add Microsoft accounts.
    D.    From each computer, navigate to Change Sync Settings and set the Sync Your Settings option to Off.

    Answer: B

    QUESTION 9
    You administer a computer that runs Windows 8 Pro. You need to create a backup copy of the computer system drive. The backup copy must support a complete system drive restore to another computer. What should you do?

    A.    Create a system restore point.
    B.    Run the bcdedit /export command.
    C.    Perfom a backup to a shared folder by using the wbadmin command with the -allcritical switch.
    D.    Create a system recovery drive.

    Answer: C

    QUESTION 10
    You manage client computers that run Windows 8 and are part of a workgroup. These computers are configured to use Microsoft Update. Updates are downloaded every day at 10:00 and installed automatically. Users report that their computers sometimes reboot without any interaction. You need to prevent unplanned automatic reboots of the computers. What should you do?

    A.    Enable the Reschedule Automatic Updates scheduled installations policy setting.
    B.    Disable the Re-prompt for restart with scheduled installations policy setting.
    C.    Enable the Automatic Updates detection frequency policy setting.
    D.    Enable the No auto-restart with logged on users for scheduled automatic updates installations policy setting.

    Answer: A

    If you want to pass Microsoft 70-688 successfully, donot missing to read latest lead2pass Microsoft 70-688 dumps.
    If you can master all lead2pass questions you will able to pass 100% guaranteed.

    http://www.lead2pass.com/70-688.html

  • Passed Microsoft 70-341 Exam with Pass4sure and Lead2pass PDF & VCE (121-130)

    Case Study 6: Trey Research (QUESTION 121 ~ QUESTION 131)
    Overview
    Trey Research is a pharmaceutical company that has 10,000 users. Most of the users work remotely, including the users in the finance department. The finance department users reside in an organizational unit (OU) named Finance.
    Trey Research purchases a partner pharmaceutical company named Fabrikam, Inc. Fabrikam has 2,000 users and hosts its own Exchange Server 2010 organization.
    Existing Environment
    Active Directory Environment
    The network of Trey Research contains an Active Directory forest. The forest contains an empty parent domain named treyresearch.com and a child domain named main.treyresearch.com. The forest contains one site named DefaultSite.
    The Trey Research network and the Fabrikam network connect to each other by using a WAN link. A two-way trust exists between the Trey Research and Fabrikam networks.
    Trey Research Exchange Server Organization
    Trey Research has an Exchange Server 2013 organization that contains four servers. The servers are configured as shown in the following table.

    image
    EX1 and EX2 are the members of a database availability group (DAG) named DAG1.
    Trey Research has three databases named DB1, DB2, and DB3. DB1 and DB2 replicate between all of the servers in DAG1. DB3 is mounted on EX4.

    (more…)

  • Passed Microsoft 70-341 Exam with Pass4sure and Lead2pass PDF & VCE (111-120)

    QUESTION 111
    A user fails to connect to his mailbox by using Outlook Anywhere. The user successfully connects to the mailbox by using an Exchange ActiveSync-enabled mobile device and Outlook Web App. You need to identify what prevents the users from connecting to the mailbox by using Outlook Anywhere. Which tool should you use?

    A.    Microsoft Outlook Connectivity Test
    B.    Microsoft Exchange RPC Extractor
    C.    Microsoft Exchange Server Profile Analyzer
    D.    Exchange Server MAPI Editor

    Answer: A
    Explanation:
    COURTESY OF DNS53 FROM UNITED STATES
    ADDED CONNECTIVITY TEST TO OPTION A, AS IT IS MORE ACCURATE AND WITHOUT IT THE OPTION IS AMBIGUOUS.
    TECHNICALLY THIS IS THE MICROSOFT OUTLOOK CONNECTIVITY TEST WITHIN
    EXCHANGE SERVER REMOTE CONNECTIVITY ANALYSER.
    Outlook Web App
    You can use Outlook Web App to access your Office 365 or other Microsoft Exchange-based email account via a web browser.
    The URL (web address) you’ll use to sign in to Outlook Web App depends on the type of account you have.
    Outlook Web App can be used to access any email account that’s hosted on a server that’s running Microsoft Exchange Server 2013.

    image

    image

    Mobile devices that are enabled for Microsoft Exchange ActiveSync let users access most of their Microsoft Exchange mailbox data any time, anywhere.

    (more…)

  • Passed Microsoft 70-341 Exam with Pass4sure and Lead2pass PDF & VCE (101-110)

    QUESTION 101
    You have an Exchange Server 2013 organization that contains 20 Mailbox servers. You plan to create 10 mailbox databases on each Mailbox server. You need to create a naming convention for all mailbox databases.
    What should you include in your naming convention?

    A.    For each mailbox database, provide a database name that is unique within the organization.
    B.    For each mailbox database, provide a database name that is unique within the Mailbox server.
    C.    For each mailbox database file, provide a file name that is unique within the organization.
    D.    For each mailbox database file, provide a file name that is unique within the Mailbox server.

    Answer: A

    QUESTION 102
    You have an Exchange Server organization that contains three servers that have Exchange Server 2013 installed and one server that has Exchange Server 2010 installed. You create the custom RBAC roles shown in the following table.

    image
    The Seattle help desk manages all of the users in an organizational unit (OU) named Seattle. The Miami help desk manages all of the users in an OU named Miami. The IT Administrators manage all of the users in the forest. You need to recommend which commands must be run to prevent only the members of both help desks from modifying the properties of users who have a department attribute value of Manager. Which three commands should you run? (Each correct answer presents part of the solution. Choose three.)

    A.    new-managementscope "executive users exclusive scope"
    -recipientrestrictionfilter { department -eq "manager" } -exclusive sorce
    B.    new-managementroleassignment -name "managers" -securitygroup "managers"
    -role "mail recipients" -exclusiverecipientwritescope "executive users exclusive scope"
    C.    new-roleassignmentpolicy -name "limited end user policy" -roles "mypersonalinformation".
    D.    new-rolegroup -name "managers" -roles "mail recipients" -members admins
    E.    new-rolegroup -name "help desk" -roles "mail recipients" -members admins

    Answer: ABD
    Explanation:
    Note:
    * (A) Use the New-ManagementScope cmdlet to create a regular or exclusive management scope. After you create a regular or exclusive scope, you need to associate the scope with a management role assignment.
    To associate a scope with a role assignment, use the New- ManagementRoleAssignment cmdlet.
    * (B) Use the New-ManagementRoleAssignment cmdlet to assign a management role to a management role group, management role assignment policy, user, or universal security group (USG).

    QUESTION 103
    You have an Exchange Server 2007 organization.
    You recently deployed a server that has Exchange Server 2013 installed. The Exchange Server organization contains three servers. The servers are configured as shown in the following table.

    image
    Server2 contains a mailbox for a user named User1. You move the mailbox of User1 to Server3. After the move, User1 fails to access his mailbox by using Outlook Web App. Users who have mailboxes on Server1 and Server2 can access their mailboxes by using Outlook Web Access. You need to ensure that User1 can access his mailbox from the Internet by using Outlook Web App at https://mail.contoso.com. The solution must ensure that users who have mailboxes on Server1 and Server2 can continue to use Outlook Web Access. Which three actions should you perform? (Each correct answer presents part of the solution. Choose three.)

    A.    Export the certificate on Server1 and import the certificate to Server 3.
    B.    On all of the Exchange servers, install a new certificate that contains the mail.contoso.com and
    legacy.contoso.com names.
    C.    Redirect all of the traffic from the Internet for mail.contoso.com to Server3.
    D.    On all of the Exchange servers, install a new certificate that contains the Server1.contoso.com,
    server2.contoso.com, server3.contoso.com, and legacy.contoso.com names.
    E.    Create a host (A) record named legacy.contoso.com that points to Server1.

    Answer: BCE

    QUESTION 104
    You host Exchange Server 2013 organizations for several hundred tenants. The infrastructure contains several custom transport agents. You need to prevent the transport agents from overloading the processors on one of the Exchange servers. Which cmdlet should you run?

    A.    Set-WorkloadPolicy
    B.    Set-ResourcePolicy
    C.    Set-TransportAgent
    D.    Set-ThrottlingPolicy

    Answer: B

    QUESTION 105
    Drag and Drop Question
    You have an Exchange Server 2013 organization that contains a server named EX1. You have a user named User1 in the marketing department. You need to prevent User1 from submitting more than 50 email messages per minute to the Exchange Server organization by using Microsoft Outlook.
    Which three commands should you run?
    To answer, move the three appropriate commands from the list of commands to the answer area and arrange them in the correct order.

    image
    Answer:

    image  
    Explanation:
    Note:
    Box 1:
    * Use the New-ThrottlingPolicy cmdlet to create a non-default user throttling policy.
    * The MessageRateLimit parameter specifies the number of messages per minute that can be submitted to transport.
    Box 3:
    * Use the Set-Mailbox cmdlet to modify the settings of an existing mailbox. You can use this cmdlet for one mailbox at a time.
    / parameter: ThrottlingPolicy
    Microsoft.Exchange.Configuration.Tasks.ThrottlingPolicyIdParameter

    QUESTION 106
    Drag and Drop Question
    You have an Exchange Server 2013 organization that contains four servers named EX1, EX2, EX3, and EX4. All of the servers are members of a database availability group (DAG) named DAG1. Each server has a copy of a mailbox database named DB1. DB1 has the following characteristics:
    – The replay lag time on Ex4 is set to 14 days.
    – Single item recovery on all of the servers is set to 14 days.
    – None of the servers have Volume Shadow Copy Service (VSS) backups.
    Ex4 has a folder named F:\RDB that is used to store database files during restore operations. Twenty days ago, a user named User1 deleted an email message that had a subject of "Sales Report".
    You need to restore the deleted email message to the mailbox of User1. You copy the lagged database and the log files that are older than 20 days to F:\RDB.
    Which three actions should you perform?
    To answer, move the three appropriate actions from the list of actions to the answer area and arrange them in the correct order.

    image
    Answer:

    image 

    QUESTION 107
    Your company has three offices. Each office is configured as an Active Directory site. You have three servers that have Exchange Server 2013 installed named EX1, EX2 and EX3. All three servers have the Client Access server role and the Mailbox server role installed. The Active Directory site links and costs are configured as shown in the exhibit. (Click the Exhibit button.)

    image
    Site B is designated as a hub site. EX2 fails. You discover that all email messages sent from the users in Site A to the users in Site C are queued on a server in Site A. You need to ensure that the email messages are sent to Site C as quickly as possible. What should you do first?

    A.    Modify the Active Directory site link costs.
    B.    Configure Site A as a hub site.
    C.    Modify the Exchange-specific site link cost.
    D.    Remove the hub site.

    Answer: D

    QUESTION 108
    Your network contains an internal network and a perimeter network. The internal network contains four offices. The perimeter network is located in a separate office. Each internal office has a direct WAN link to all other internal offices. Each of the four offices that make up the internal network is configured as an Active Directory site. The Active Directory sites and site links are configured as shown in the exhibit. (Click the Exhibit button.)

    image
    Your company has an Exchange Server 2013 organization. Each site contains two servers that have the Mailbox server role and the Client Access server role installed. To the perimeter network, you deploy two servers that have Exchange Server 2010 Service Pack 2 (SP2) and the Edge Transport server role installed. You configure an Edge Subscription to Site1. You deploy a new email notification application to Site4. The application will send 25,000 email messages daily to external recipients. You need to identify which WAN links will have increased traffic from the new email application. Which WAN link or links should you identify? (Each answer presents part of the solution. Choose all that apply.)

    A.    The WAN link between Site4 and the perimeter network
    B.    The WAN link between Site4 and Site3
    C.    The WAN link between Site1 and the perimeter network
    D.    The WAN link between Site4 and Site1
    E.    The WAN link between Site4 and Site2

    Answer: CE
    Explanation:
    C: the traffic will increase on the single WAN link on the perimeter network.
    E: The traffic will increase between Site4 and Site2 since the cost of this link (5) plus the cost of the link between Site2 and Site1 (1) is lower the cost on the direct link between Site4 and Site1 (10).
    Incorrect answers:
    Not A: There is no WAN link between Site4 and the perimeter network. Not B: The cost of the WAN link between site3 and site3 is high (10). This path will not be chosen.
    Not D: There is no WAN link between Site4 and Site1.

    QUESTION 109
    You have network contoso.com. contoso.com consist of AD DS Domain contoso.com. All Servers running Windows Server 2012 and all Clients running Windows 8 Pro. Server1 runs Mailbox Server Role and Client Access Server Role. You are configuring Anti-Spam Filtering on Server1. You need to ensure that all emails with words "Free Credit Check" are rejected unless the email is sent to Finance Distribution Group. You also need to ensure that all emails from partner company Domain name adatum.com bypass the Anti-Spam Filter. You run the Add-ContentFilterPhrase and add the words "Free Credit Check" What should you do next?

    A.    Run the Set-TransportConfig and Set-ContentFilterConfig
    B.    Run the Set-SenderReputationConfig and Set-TransportConfig
    C.    Run the Set-ContentFilterConfig and Set-RecipientFilterConfig
    D.    Run the Set-SenderFilterConfig and Set-RecipientFilterConfig

    Answer: C
    Explanation:
    COURTESY OF DNS53 FROM UNITED STATES
    NOT A
    Set-TransportConfig not required in this scenario
    Use the Set-TransportConfig cmdlet to modify the transport configuration settings for the whole Exchange organization.
    NOT B
    Set-TransportConfig not required in this scenario
    Use the Set-TransportConfig cmdlet to modify the transport configuration settings for the whole Exchange organization.
    Use the Set-SenderReputationConfig cmdlet to modify the sender reputation configuration on a Mailbox server or an Edge Transport server.
    EXAMPLE 1
    This example makes the following modifications to the sender reputation configuration:
    It sets the sender reputation action to block all senders whose sender reputation level (SRL) rating exceeds the SRL threshold.
    It sets the SRL blocking threshold to 6.
    It sets the number of hours that senders are put on the blocked senders list to 36 hours.
    Set-SenderReputationConfig -SenderBlockingEnabled $true -SrlBlockThreshold
    6 – SenderBlockingPeriod 36
    NOT D
    Who sent the emails is not required in this scenario
    Use the Set-SenderFilterConfig cmdlet to modify the Sender Filter agent configuration.
    EXAMPLE 1
    This example makes the following modifications to the Sender Filter agent configuration:
    It enables blocking of blank senders.
    It blocks messages from lucernepublishing.com and all subdomains. It adds [email protected] and [email protected] to the blocked senders list without affecting any existing entries.
    Set-SenderFilterConfig -BlankSenderBlockingEnabled $true -BlockedDomainsAndSubdomains
    lucernepublishing.com -BlockedSenders @{Add="[email protected]","[email protected]"} C
    Use the Set-ContentFilterConfig cmdlet to modify the content filter configuration on a Mailbox server or an Edge Transport server.
    EXAMPLE 1
    This example specifies the sender domain woodgrovebank.com as a bypassed domain. Messages received from that domain bypass the Content Filter agent. Set-ContentFilterConfig -BypassedSenderDomains woodgrovebank.com Use the Set-RecipientFilterConfig cmdlet to enable and configure the Recipient Filter agent.
    EXAMPLE 2
    This example makes the following changes to the Recipient Filter agent configuration:
    Enables the Blocked Recipients list.
    Adds two users to the Blocked Recipients list.
    Set-RecipientFilterConfig -BlockListEnabled $true -BlockedRecipients
    [email protected],[email protected]

    QUESTION 110
    You are evaluating the implementation of a Database Availability Group (DAG). You need to recommend changes to the planned implementation to minimize the loss of large email messages if a single DAG member fails. What should you recommend changing?

    A.    The preference of the mail exchanger (MX) records
    B.    The duration of single item recovery
    C.    The intervals of shadow redundancy
    D.    The size of the transport dumpster

    Answer: D
    Explanation:
    A database availability group (DAG) is the base component of the high availability and site resilience framework built into Microsoft Exchange Server 2013.
    A DAG is a group of up to 16 Mailbox servers that hosts a set of databases and provides automatic databaselevel recovery from failures that affect individual servers or databases. A DAG is a boundary for mailbox database replication, database and server switchovers, failovers, and an internal component called Active Manager. Active Manager, which runs on every server in a DAG, manages switchovers and failovers.
    NOT A
    Not relevant to this scenario
    NOT B
    Not relevant to this scenario
    Single item recovery provides an additional layer of protection so that you can recover items that were accidentally deleted by a user or by automated processes such as the Managed Folder Assistant.
    Single item recovery simplifies recovery and reduces recovery time because you can recover items without recovering an entire mailbox or mailbox database from backup media. To learn more, see "Single item recovery" in Recoverable Items Folder.

    If you want to pass Microsoft 70-341 successfully, donot missing to read latest lead2pass Microsoft 70-341 dumps.
    If you can master all lead2pass questions you will able to pass 100% guaranteed.

    http://www.lead2pass.com/70-341.html

  • Passed Microsoft 70-341 Exam with Pass4sure and Lead2pass PDF & VCE (91-100)

    QUESTION 91
    Drag and Drop Question
    You have an Exchange Server 2013 organization that contains a server named Server1. A user named User1 has an administrative assistant named Assistant1. A user named User2 has an administrative assistant named Assistant2.
    You need to configure access to Outlook to meet the following requirements:
    – Assistant1 must be able to send email messages as a User1.
    – Assistant2 must be able to send email messages on behalf of User2.
    Which cmdlets should you use? (To answer, drag the appropriate cmdlets to the correct requirements. Each cmdlet may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.)

    image
    Answer:

    image  
    Explanation:
    Add-MailboxFolderPermission
    Use the Add-MailboxFolderPermission cmdlet to manage folder-level permissions for all folders within a user’s mailbox.
    For information about the parameter sets in the Syntax section below, see Syntax. This example assigns permissions for Ed to access Ayla’s Marketing mailbox folder and applies the Owner role to his access of that folder.
    Add-MailboxFolderPermission -Identity [email protected]:\Marketing -User [email protected] ?AccessRights Owner
    Add-MailboxPermission
    Use the Add-MailboxPermission cmdlet to add permissions to a mailbox. This example grants Kevin Kelly full access to Terry Adams’s mailbox.
    Note:
    The Identity parameter requires the full name of the user to be enclosed in quotation marks ("). Add-MailboxPermission -Identity "Terry Adams" -User KevinKelly -AccessRights FullAccess ?InheritanceType
    All
    Add-ADPermission
    Use the Add-ADPermission cmdlet to add permissions to an Active Directory object. This example grants Send As permissions for Aaron Painter to Terry Adams’s mailbox. Add-ADPermission -Identity "Terry Adams" -User AaronPainter -AccessRights ExtendedRight – ExtendedRights
    "Send As" Send As rights is applied to Active directory object.
    Set-Mailbox
    Use the Set-Mailbox cmdlet to modify the settings of an existing mailbox. You can use this cmdlet for one mailbox at a time. To perform bulk management, you can pipeline the output of various Get- cmdlets (for example, the Get-Mailbox or Get-User cmdlets) and configure several mailboxes in a single-line command.
    You can also use the Set-Mailbox cmdlet in scripts.
    For information about the parameter sets in the Syntax section below, see Syntax. This example delivers John Woods’s email messages to John’s mailbox and also forwards them to Manuel Oliveira’s ([email protected]) mailbox.
    Set-Mailbox -Identity John -DeliverToMailboxAndForward $true -ForwardingSMTPAddress [email protected]
    Send on Behalf
    The Send on Behalf permission allows a user to send email on behalf of the shared mailbox. For example, if
    John logs into the shared mailbox Reception Building 32 and sends an email, it will appear to recipients as being sent by "John on behalf of Reception Building 32". To grant Send on Behalf permissions, you must use the Exchange Management Shell. Use the Set- Mailbox cmdlet with the GrantSendonBehalf parameter.

    (more…)

Posts navigation