Download New Updated 70-341 Questions With 98 Percent Same As Real 70-341 Exam! (111-120)
2015 Free Download of Latest Microsoft 70-341 Practce Exam Questions from Braindump2go will help you have a 100% success of 70-341 real exam! All questions are the latest checked and released! Answers are 100% correct guaranteed! In order to increase your confidence, 100% Full Money Back Guarantee is promised by Braindump2go! Instant Download Now! Vendor: Microsoft Exam Code: 70-341 Exam Name: Microsoft Core Solutions of Microsoft Exchange Server 2013 Keywords: 70-341 Exam Dumps,70-341 PDF Download,70-341 VCE Download,70-341 Study Guide,70-341 Study Material,70-341 Braindump,70-341 Exam Questions,70-341 Book QUESTION 111 A user fails to connect to his mailbox by using Outlook Anywhere. The user successfully connects to the mailbox by using an Exchange ActiveSync-enabled mobile device and Outlook Web App. You need to identify what prevents the users from connecting to the mailbox by using Outlook Anywhere. Which tool should you use? A. Microsoft Outlook Connectivity Test B. Microsoft Exchange RPC Extractor C. Microsoft Exchange Server Profile Analyzer D. Exchange Server MAPI Editor Answer: A Explanation: Outlook Web App You can use Outlook Web App to access your Office 365 or other Microsoft Exchange-based email account via a web browser. The URL (web address) you'll use to sign in to Outlook Web App depends on the type of account you have. Outlook Web App can be used to access any email account that's hosted on a server that's running Microsoft Exchange Server 2013. Mobile devices that are enabled for Microsoft Exchange ActiveSync let users access most of their Microsoft Exchange mailbox data any time, anywhere. There are many different mobile phones and devices enabled for Exchange ActiveSync. These include Windows Phones, Nokia mobile phones, Android phones and tablets, and the Apple iPhone, iPod, and iPad. Although both phone and non-phone mobile devices support Exchange ActiveSync, in most Exchange ActiveSync documentation, we use the term mobile device. Unless the feature or features we're discussing require a cellular telephone signal, such as SMS message notification, the term mobile device applies to both mobile phones and other mobile devices such as tablets. EXCHANGE SERVER SETTINGS: Outlook Anywhere (RPC over HTTP) allows you to use Outlook to connect to your Exchange server from remote locations without first connecting to the VPN. You can also/alternatively, use Outlook Web Access by logging in at https://xmail.bu.edu/ 1 or www.bu.edu/webmail. For remote connections, Outlook offers Outlook Anywhere, an alternative to VPN connections that allows you to use Outlook just as you normally do at your organization, without the need for any special connections or hardware, such as smart cards and security tokens. Outlook can connect to Exchange through the Internet by using remote procedure call (RPC) over HTTP. The Outlook Anywhere feature allows you to access your Exchange account remotely from the Internet when you are working outside your organization's firewall. Test Outlook Anywhere Connectivity http://technet.microsoft.com/en-us/library/ee633453(v=exchg.150).aspx 4 2 Applies to: Exchange Server 2013 You can test for end-to-end client Outlook Anywhere connectivity by using either the Shell or the Exchange Remote Connectivity Analyzer (ExRCA). This includes testing for connectivity through the Autodiscover service, creating a user profile, and signing in to the user's mailbox. All the required values are retrieved from the Autodiscover service. Exchange Remote Connectivity Analyzer (ExRCA The Exchange Remote Connectivity Analyzer (ExRCA) is a web-based tool designed to test connectivity with a variety of Exchange protocols. You can access the ExRCA https://www.testexchangeconnectivity.com/ 3 The Microsoft Exchange Remote Connectivity Analyzer (ExRCA) can help you confirm that connectivity for your Exchange servers is configured correctly and diagnose any connectivity issues. The Remote Connectivity Analyzer website offers tests for Microsoft Exchange ActiveSync, Exchange Web Services, Microsoft Outlook, and Internet email. Use the Shell to test Outlook Anywhere connectivity To use the Shell to test Outlook Anywhere connectivity, use the Test-OutlookConnectivity cmdlet. Run the following command. Test-OutlookConnectivity -ProbeIdentity 'OutlookMailboxDeepTestProbe' -MailboxId [email protected] -Hostname contoso.com NOT B The Microsoft Exchange RPC Extractor is a command-line tool that can parse network captures and interpret remote procedure calls made from a client to Microsoft Exchange Server. RPX uses the information provided in the Microsoft Exchange Server protocol documentation to parse RPCs, remote operations (ROPs), and the parameters for each ROP. NOT C The Microsoft Exchange Server Profile Analyzer tool lets administrators collect estimated statistical information from a single mailbox store or across an Exchange Server organization. You can use the collected data to perform the following operations: - Analyze the performance and health of a mailbox server. - Improve capacity planning models. - Improve testing methodologies and tools. - Improve future client and server products. NOT D Use the Microsoft Exchange MAPI Editor to view and modify the contents of a Messaging API (MAPI) store directly. http://technet.microsoft.com/en-us/library/ee633453(v=exchg.150).aspx 4 2 QUESTION 112 You have an Exchange Server 2013 organization. A user named User1 has a mailbox that is enabled for Unified Messaging (UM). User1 has nine call answering rules. When User1 attempts to create a new call answering rule, the user receives an error message. You need to identify what prevents User1 from creating a call answering rule. What should you identify? A. The mailbox of User1 has the CallAnsweringRulesEnabled parameter set to $false B. The UM mailbox policy of User1 has the AllowCallAnsweringRules parameter set to $false. C. User1 exceeds the Inbox rules storage quota. D. User1 has the maximum number of call answering rules allowed. Answer: D QUESTION 113 Your company has a main office and a branch office. An Active Directory site exits for each office. The offices are connected by a WAN link. You plan to deploy Exchange Server 2013 in each site. You need to identify the number of Exchange servers required to meet the following requirements: - Maintain user access to mailboxes if a single server fails - Use the minimize account of Exchange servers in each site How many servers should you deploy in each site? A. 1 B. 2 C. 3 D. 4 Answer: B QUESTION 114 Hotspot Question You need to recommend which script the administrators must run to create the reports required to meet the technical requirements. Which script should you recommend? To answer, select the appropriate script in the answer area. Answer: QUESTION 115 You need to create an exclusion for two helpdesk RBAC (Role Based Access Control) groups to not have access to managers. You will need to pick 3 powershell commands from the available choices A. New-ManagementRole, New-ManagementScope,Set-ManagementScope (Guessed) B. New-ManagementScope, RecipientRestrictionFilter ,New-ManagementRoleAssignment (Guessed) C. New-ManagementScope, New-ManagementRoleAssignment, CustomRecipientWriteScope (Guessed) D. Unsure of commands and correct answer Answer: C Explanation: Only chose C as Microsoft recommends that you: - define the scope, - then the role, - then the role group, and finally, - the role assignment. However it appears that the custom scope with a recipient filter has to be created in order to filter the scope for the 2 helpdesk role based access groups. The scope, role, and role group assignments are linked by the role assignment itself. Microsoft recommends that you first define the scope, then the role, then the role group, and, finally, the role assignment. users assigned the management role. In general, a management role indicates what you can create or modify, and a management role scope indicates where you can create or modify. Regular scopes can be either implicit or explicit scopes, both of which are discussed later in this topic. Exclusive An exclusive scope behaves almost the same as a regular scope. The key difference is that it enables you to deny users access to objects contained within the exclusive scope if those users aren't assigned a role associated with the exclusive scope. All exclusive scopes are explicit scopes, which are discussed later in this topic. Scopes can be inherited from the management role, specified as a predefined relative scope on a management role assignment, or created using custom filters and added to a management role assignment. Scopes inherited from management roles are called implicit scopes while predefined and custom scopes are called explicit scopes. The following sections describe each type of scope: - Implicit Scopes - Explicit Scopes - Predefined Relative Scopes - Custom Scopes - Recipient Filter Scopes - Configuration Scopes Each role can have the following types of scopes: Recipient read scope The implicit recipient read scope determines what recipient objects the user assigned the management role is allowed to read from Active Directory. Recipient write scope The implicit recipient write scope determines what recipient objects the user assigned the management role is allowed to modify in Active Directory. Configuration read scope The implicit configuration read scope determines what configuration objects the user assigned the management role is allowed to read from Active Directory. Configuration write scope The implicit configuration write scope determines what organizational, database, and server objects the user assigned the management role is allowed to modify in Active Directory. Recipient objects include mailboxes, distribution groups, mail enabled users, and other objects. Configuration objects include servers running Microsoft Exchange Server 2013, and databases located on servers running Exchange. Each type of scope can be either an implicit scope or explicit scope. Role Based Access Control Groups Role Based Access Control (RBAC) is the permissions model used in Microsoft Exchange Server 2013. With RBAC, you don't need to modify and manage access control lists (ACLs), which was done in Exchange Server 2007. ACLs created several challenges in Exchange 2007, such as modifying ACLs without causing unintended consequences, maintaining ACL modifications through upgrades, and troubleshooting problems that occurred due to using ACLs in a nonstandard way. RBAC enables you to control, at both broad and granular levels, what administrators and end-users can do. RBAC also enables you to more closely align the roles you assign users and administrators to the actual roles they hold within your organization. In Exchange 2007, the server permissions model applied only to the administrators who managed the Exchange 2007 infrastructure. In Exchange 2013, RBAC now controls both the administrative tasks that can be performed and the extent to which users can now administer their own mailbox and distribution groups. RBAC has two primary ways of assigning permissions to users in your organization, depending on whether the user is an administrator or specialist user, or an end-user: management role groups and management role assignment policies. Each method associates users with the permissions they need to perform their jobs. A third, more advanced method, direct user role assignment, can also be used Built-in Role Groups Microsoft Exchange Server 2013 includes several management role groups by default. The following built-in role groups provide you with a preconfigured set of roles that you can assign to various administrator and specialist users in your organization. Organization Management View-Only Organization Management Recipient Management UM Management Help Desk Hygiene Management Compliance Management Records Management Discovery Management Public Folder Management Server Management Delegated Setup How to use -Exclude switch in Remove-Item cmdlet in PowerShell today i was trying to remove some junk folders and files in a specific folder. But i don't want to remove all of file and folder , i want to keep few folders. Then i think that i should use the -Exclude switch with Remove-Item Cmdlet. I tried to use -Exclude switch but somehow i failed to get it working because i don't know the exact patter used by -Exclude switch. After few minutes of testing i get it done and i thought i should share this tip with you. $Lenovo = "D:P-TempLenovo*" Remove-Item -Recurse -Path $Lenovo -Exclude system,temp,updates.ser,"*.xml" -Verbose -Force In $Lenovo variable i specified the folder path in which I want to remove the items I want to Exclude folder name "System","temp" and file name "updates.ser" and all .XML Files in -Exclude switch give the folder name which you don't want to delete, no need to put the in a double quotes "" in folder name . You can provide multiple folder name separated by comma. in pattern matching make sure you put the wild cards in double quotes "". POWERSHELL COMMMANDS New-ManagementScope (Example) http://technet.microsoft.com/en-us/library/dd335137(v=exchg.150).aspx 5 EXAMPLE 4 This example creates the Protected Exec Users exclusive scope. Users that contain the string "VP" in their title match the recipient filter for the scope. When the exclusive scope is created, all users are immediately blocked from modifying the recipients that match the exclusive scope until the scope is associated with a management role assignment. If other role assignments are associated with other exclusive scopes that match the same recipients, those assignments can still modify the recipients. New-ManagementScope -Name "Protected Exec Users" -RecipientRestrictionFilter { Title -Like "*VP*" } -Exclusive New-ManagementRoleAssignment The exclusive scope is then associated with a management role assignment that assigns the Mail Recipients management role to the Executive Administrators role group. This role group contains administrators who are allowed to modify the mailboxes of high-profile executives. Only the administrators of the Executive Administrators role group can modify users with the string "VP" in their title. New-ManagementRoleAssignment -SecurityGroup "Executive Administrators" -Role "Mail Recipients" -CustomRecipientWriteScope "Protected Exec Users" This example assigns the Eng Help Desk role to the Eng HD Personnel role group. The assignment restricts the recipient write scope of the role to the contoso.com/Engineering/Users OU. Users who are members of the Eng HD Personnel role group can only create, modify, or remove objects contained within that OU. New-ManagementRoleAssignment -Role "Eng Help Desk" -SecurityGroup "Eng HD Personnel" –RecipientOrganizationalUnitScope contoso.com/Engineering/Users New-ManagementRole Use the New-ManagementRole cmdlet to create a management role based on an existing role or create an unscoped management role. EXAMPLE 1 This example creates the management role Redmond Journaling View-Only based on the Journaling parent role. New-ManagementRole -Name "Redmond Journaling View-Only" -Parent Journaling New-RoleGroup Use the New-RoleGroup cmdlet to create a management role group on a server running Microsoft Exchange Server 2013. EXAMPLE 1 This example creates a role group. The Mail Recipients and Mail Enabled Public Folders roles are assigned to the role group, and the users Kim and Martin are added as members. Because no scopes were provided, Kim and Martin can manage any recipient and reset passwords for any users in the organization. New-RoleGroup -Name "Limited Recipient Management" -Roles "Mail Recipients", "Mail Enabled Public Folders" -Members Kim, Martin Look here: Understanding Management Role Scopes http://technet.microsoft.com/en-us/library/dd335146(v=exchg.150).aspx 6 As we need to set deny access we want to set explicit recipcient filter scope for the existing helpdesk group, removing the managers from the scope. Then create a new RBAC group and implicit scope the managers mailboxes. So my guess would be something like New-ManagementRole -Name "Management role for CEO" New-ManagementScope -Name "Management Scope for CEO" -RecipientRestrictionFilter { Title -Like "*CEO*" } -Exclusive Set-ManagementScope "Helpdesk Users" -RecipientRestrictionFilter { Company -eq 'Contoso users' -and Function -like 'CEO' As we do not know what RBAC setup already exists, this kind of smells like Microsoft, but hey this is a start. QUESTION 116 You have an Exchange Server 2013 organization that contains five servers. Your company has a finance department, a marketing department, and a research department. Users in the marketing department are prevented from creating more than two Exchange ActiveSync device associations. You have a user named User5 in the finance department. You need to prevent User5 from creating more than two Exchange ActiveSync device associations. Which cmdlet should you use? A. Set-ThrottlingPolicyAssociation B. Set-ResourcePolicy C. Set-ActiveSyncMailboxPolicy D. Set-CASMailbox Answer: A Explanation: Set-ThrottlingPolicyAssociation: Exchange 2013 Help Set-ThrottlingPolicy: Exchange 2013 Help QUESTION 117 You have an Exchange Server 2013 organization named for Contoso. A user named Admin1 is a member of the Domain Admins group. Admin1 fails to synchronize a new Windows Phone device by using Exchange ActiveSync and receives an HTTP 500 error message. Admin1 successfully logs on to Outlook Web App and Outlook Anywhere. You need to ensure that Admin1 can synchronize the new Windows Phone device by using Exchange ActiveSync. What should you do? A. Install a trusted root certificate on the Windows Phone device. B. Create a new mobile device mailbox policy. C. Enable permission inheritance on the Admin1 user account. D. Disable permission inheritance on the Admin1 user account. Answer: C Explanation: Mobile device mailbox policy In Microsoft Exchange Server 2013, you can create mobile device mailbox policies to apply a common set of policies or security settings to a collection of users. After you deploy Exchange ActiveSync in your Exchange 2013 organization, you can create new mobile device mailbox policies or modify existing policies. When you install Exchange 2013, a default mobile device mailbox policy is created. All users are automatically assigned this default mobile device mailbox policy. NOT A It is possible to save a digital certificate to a file and install a digital certificate on a Windows Mobile phone. Microsoft Exchange ActiveSync enables a variety of mobile phones to synchronize with an Exchange mailbox. A digital certificate might need to be installed on a user's mobile phone if Exchange ActiveSync is required to use Secure Sockets Layer (SSL) and your organization uses a certificate that isn't from a trusted commercial certification authority (CA). No mention of SSL in this question NOT B This is a permission inheritance issue. NOT D Need to enable permission inheritance not disable it or leave it as disabled. C QUESTION 118 You have an Exchange Server 2013 organization that contains a server named EX1. Your network contains a non-critical internal application that regularly connects to the POP3 Service on EX1. Users report that Outlook Web App performs more slowly than usual. You discover that EX1 frequently has a CPU utilization that is greater than 85 percent. You need to configure EX1 temporarily to allocate more processor resources to Outlook Web App and to allocate less processor resources to POP3. Which two new policies should you create? (Each correct answer presents part of the solution. Choose two.) A. a throttling policy that sets OWAMaxConcurrency to 25 B. a workload policy for POP3 that sets the WorkloadClassification to Discretionary C. a workload policy for Outlook Web App that sets the WorkloadClassification to Discretionary D. a throttling policy that sets PopMaxConcurrency to 25 E. a workload policy for POP3 that sets the WorkloadClassification to CustomerExpectation F. a workload policy for Outlook Web App that sets the WorkloadClassification to CustomerExpectation Answer: BF Explanation: A workload policy An Exchange workload is an Exchange Server feature, protocol, or service that's been explicitly defined for the purposes of Exchange system resource management. Each Exchange workload consumes system resources such as CPU, mailbox database operations, or Active Directory requests to run user requests or background work. Examples of Exchange workloads include Outlook Web App, Exchange ActiveSync, mailbox migration, and mailbox assistants. There are two ways to manage Exchange workloads: by monitoring the health of system resources or by controlling how resources are consumed by individual users (sometimes called user throttling in Exchange 2010). Managing workloads based on the health of system resources is new in Microsoft Exchange Server 2013. Controlling how resources are consumed by individual users was possible in Exchange Server 2010, and this capability has been expanded for Exchange Server 2013. You can customize the workload management settings if you want to change the default behavior of the feature for the needs of your environment. Workload classifications Each Exchange workload (for example, the Calendar Synchronization Assistant workload), is assigned a classification. Workload policy settings are used to group each workload into a class. Classification is used to control both priority and target resource usage. Exchange workloads can be assigned one of the following classifications: Urgent Customer Expectation Internal Maintenance Discretionary Workloads in a higher classification group are given preference as resource health shows signs of degrading. For example, when a resource such as local server CPU reaches high usage, workloads classified as Internal Maintenance may continue to run, while workloads classified as Discretionary may be stopped. NOT A D A throttling policy is related to Exchange 2010 NOT C Do not need to allocate less priority to Outlook Web App, but more NOT E POP3 is allocated too much resources with a WorkloadClassification of CustomerExpectation Correct Answer B Need to allocate less priority to POP3 Correct Answer F Outlook Web App is allocated the appropriate amount of resources with a WorkloadClassification of CustomerExpectation QUESTION 119 Hotspot Question Your company has an Exchange Server 2013 organization. The company hires 200 temporary employees. You create a mailbox for each temporary employee. You create a new management role named CustomBaseOptions that uses MyBaseOptions as a parent. You create a new management role named CustomContactlnfo that uses MyContactlnfo as a parent. You plan to apply the new management roles to the temporary employees. You need to identify which management roles must be modified to prevent the temporary employees from performing the following task: - Adding a user photo - Viewing delivery reports - Viewing the Install Apps feature - Changing the value of the office location Which management roles should you identify? To answer, select the appropriate management role for each task in the answer area. Answer: Explanation: ADDING A USER PHOTO MyBaseOptions View and modify the basic configuration of their own mailbox and associated settings. VIEWING DELIVERY REPORTS MyBaseOptions includes the following delivery reports information Delivery Success Delivery Failure Email submission from the senders mailbox Message was read etc... VIEWING THE INSTALL APPS FEATURE MyBaseOptions View and modify the basic configuration of their own mailbox and associated settings. CHANGING THE VALUE OF THE OFFICE LOCATION The MyContactInformation management role enables individual users to modify their contact information, including address and phone numbers. QUESTION 120 You have an Exchange Server 2013 organization. You are troubleshooting an email delivery problem. You need to disable temporarily the antimalware scanning on a server that has Exchange Server 2013 installed. The solution must ensure that the antimalware engine continues to download updates. What should you run? A. the Set-TransportConfig cmdlet B. the Disable-Antimalwarescanning.psl script C. the New-MalwareFilterPolicy cmdlet D. the Set-MalwareFilteringServer cmdlet Answer: D Explanation: Disable or Bypass Anti-Malware Scanning Important: Bypassing malware filtering should only be done when troubleshooting a problem. You should restore malware filtering after you have finished troubleshooting. To temporarily bypass malware filtering, run the following command: Set-MalwareFilteringServer <ServerIdentity> -BypassFiltering $true To restore malware filtering, run the following command: Set-MalwareFilteringServer <ServerIdentity> -BypassFiltering $false
100% 70-341 Complete Success & Money Back Guarantee! By utilizing Braindump2go high quality Microsoft 70-341 Exam Dumps Products, You can surely pass 70-341 certification 100%! Braindump2go also offers 100% money back guarantee to individuals in case they fail to pass Microsoft 70-341 in one attempt. http://www.braindump2go.com/70-341.html 7
|