[Free] 2018(May) Dumps4cert Testinsides Cisco 300-075 Dumps with VCE and PDF Download 51-60

Dumps4cert.com : Latest Dumps with PDF and VCE Files
2018 May Cisco Official New Released 300-075
100% Free Download! 100% Pass Guaranteed!

Advanced Solutions of Microsoft Exchange Server 2013

Question No: 51 DRAG DROP – (Topic 6)

You company has offices in the United States and Germany.

Each office contains several servers that have Exchange Server 2013 installed. The Exchange Server organization is configured for Unified Messaging (UM). Each office contains an IP-PBX device.

You need to ensure that callers to the German office can navigate the voice mail system menu in German.

In which sequence should you perform the actions? (To answer, move all of the actions from the list of actions to the answer area and arrange them in the correct order.)

Dumps4Cert 2018 PDF and VCE

Answer:

Dumps4Cert 2018 PDF and VCE

Question No: 52 – (Topic 6)

You are a network administrator for a company named Humongous Insurance. Humongous Insurance has an Active Directory forest that contains two domains.

You install the Active Directory Rights Management Services server role on a server named ADRMS1. The Active Directory Rights Management Services (AD RMS) server uses an internal certification authority (CA) for all certificates.

You plan to provide users with the ability to use AD RMS to protect all of the email messages sent to a partner company named Contoso, Ltd.

Contoso does not have AD RMS deployed.

You need to identify which components from the Humongous Insurance network must be accessible to Contoso to ensure that the users at Contoso can open protected messages.

Which two components should you identify? (Each correct answer presents part of the solution. Choose two.)

  1. the AD RMS cluster

  2. the certificate revocation list (CRL)

  3. the Active Directory domain controllers

  4. the Client Access servers

  5. the Mailbox servers

  6. the Global Catalog servers

Answer: B,C Explanation:

B: The CRL is exactly what its name implies: a list of subscribers paired with digital certificate status. The list enumerates revoked certificates along with the reason(s) for revocation. The dates of certificate issue, and the entities that issued them, are also included. In addition, each list contains a proposed date for the next release. When a potential user attempts to access a server, the server allows or denies access based on the CRL entry for that particular user.

C: If federation cannot be implemented and the external organization cannot implement their own AD RMS infrastructure, hosting the user accounts can be the best option.

However, the cost of managing such accounts (for both the IT department and each user) must be considered.

In this case, the users will need to be authenticated by a domain controller.

Question No: 53 – (Topic 6)

You have an Exchange Server organization. The organization contains servers that have either Exchange Server 2010 or Exchange Server 2013 installed.

You hire a new helpdesk technician named helpdesk1. Helpdesk1 is a member of the Recipient Management management role group.

You discover that helpdesk1 created nine new mailbox-enabled users by using the New- Mailbox command.

You need to identify which management role provides helpdesk1 with the permissions to create new mailbox-enabled users.

Which cmdlets should you run?

  1. Get-ManagementRoleEntry and Get-ManagementRoleAssignment

  2. Get-RolegroupMember and Get-ManagementRoleAssignment

  3. Get-ManagementRoleEntry and Get-RoleGroup

  4. Get-Rolegroup and Get-RoleGroupMember

Answer: A Explanation:

  • Use the Get-ManagementRoleAssignment cmdlet to retrieve management role assignments.

    Question No: 54 – (Topic 6)

    You have an Exchange Server 2013 organization that contains multiple Hub Transport servers. You need to recommend a message hygiene solution to| meet the following requirements:

    • Block servers that are known to send spam

    • Minimize administrative effort What should you recommend?

    1. an IP Block list

    2. IP Block list providers

    3. recipient filtering

    4. sender filtering

    Answer: B

    Question No: 55 – (Topic 6)

    You have an Exchange Server 2013 Organization. You plan to use the documentation fingerprinting.

    You need to identify which file type cannot be used as a template for document fingerprinting.

    Which document type should you identify?

    A. .xltx

    D. .doc

    Answer: B

    Question No: 56 – (Topic 6)

    You have a server named Server1 that has Exchange Server 2013 installed.

    Users access their mailbox by using Microsoft Outlook 2010 and Outlook Web App. You enable auditing for all of the mailboxes.

    You need to identify when a mailbox is accessed by someone other than the owner of the mailbox.

    What are two possible ways to achieve this goal? (Each correct answer presents a complete solution. Choose two.)

    1. Export the administrator audit log.

    2. Run an administrator role group report.

    3. Export the mailbox audit log.

    4. Run a non-owner mailbox access report.

    5. Review the security event log.

    Answer: C,D Explanation:

    C: Use the Auditing tab to run reports or export entries from the mailbox audit log and the administrator audit log.

    / The mailbox audit log records whenever a mailbox is accessed by someone other than the person who owns the mailbox. This can help you determine who has accessed a mailbox and what they have done.

    / The administrator audit log records any action, based on a Windows PowerShell cmdlet, performed by an administrator. This can help you troubleshoot configuration issues or identify the cause of security- or compliance-related problems.

    D: Run a Non-Owner Mailbox Access Report

    Question No: 57 – (Topic 6)

    You have an Exchange Server 2013 organization.

    You successfully migrate the public folders from a previous version of Exchange Server. You discover that one of the public folder mailboxes almost reached its quota size.

    You need to move some of the public folders in the public folder mailbox to another public folder mailbox.

    What should you run?

    1. Split-PublicFolderMailbox.ps1

    2. Set-MailPublicFolder

    3. Update-PublicFolderMailbox

    4. Set-PublicFolderMailbox

    Answer: A Explanation:

  • Split-PublicFolderMailbox.ps1

    Splits the given public folder mailbox based on the size of the folders.

  • If the content of a public folder mailbox begins to exceed your mailbox quotas, you may need to move public folders to a different public folder mailbox. There are a couple ways to do this. To move one or more public folders that don’t contain subfolders, you can use the PublicFolderMoveRequest cmdlets.

    Reference: Move a Public Folder to a Different Public Folder Mailbox

    Dumps4Cert 2018 PDF and VCE

    Question No: 58 DRAG DROP – (Topic 6)

    You have an Exchange Server 2013 organization and a Microsoft Lync Server 2013 infrastructure.

    You plan to implement voice mail for all users.

    You need to prepare the environment for the planned implementation.

    Which tool should you run in each environment? (To answer, drag the appropriate tool to the correct environment or environments. Each tool may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.)

    Dumps4Cert 2018 PDF and VCE

    Answer:

    Dumps4Cert 2018 PDF and VCE

    Question No: 59 DRAG DROP – (Topic 6)

    You have a server that has Exchange Server 2013 installed. You plan to deploy Unified Messaging (UM) to all users.

    You have two UM IP gateways named GW1 and GW2.

    Dumps4Cert 2018 PDF and VCE

    Dumps4Cert 2018 PDF and VCE

    You need to recommend a solution that meets the following security requirements:

    -> All voice traffic received by GW1 must be encrypted.

    -> All voice traffic received by GW2 must be unencrypted.

    -> All signaling traffic to GW1 and GW2 must be encrypted.

    Which security settings should you recommend configuring for each dial plan?

    To answer, drag the appropriate security setting to the correct UM dial plan in the answer area. Each security setting may be used once, more than once, or not at all. Additionally, you may need to drag the split bar between panes or scroll to view content.

    Dumps4Cert 2018 PDF and VCE

    Answer:

    Dumps4Cert 2018 PDF and VCE

    Dumps4Cert 2018 PDF and VCE

    Question No: 60 – (Topic 6)

    You have an Exchange Server 2013 organization that is integrated with Microsoft Lync Server 2013.

    You need to get a list of all the calls received and placed by a user named User1 during the last 90 days.

    Which cmdlet should you use?

    1. Get-UMMailbox

    2. Get-UMCallSummaryReport

    3. Get-UMCallDataRecord

    4. Get-UMPhoneSession

    Answer: C Explanation:

    The Get-UMCallDataRecord cmdlet displays UM call data records for the last 90 days for a UM-enabled mailbox that you specify. Each UM call data record provides detailed information about all calls either placed to or received by the specified user.

    This example displays the UM call data records for the UM-enabled user Tony. Get-UMCallDataRecord -Mailbox tony@contoso.com

    Reference: Get-UMCallDataRecord

    https://technet.microsoft.com/en-us/library/ff459248(v=exchg.150).aspx

    100% Dumps4cert Free Download!
    Download Free Demo:300-075 Demo PDF
    100% Dumps4cert Pass Guaranteed!
    300-075 Dumps

    Dumps4cert ExamCollection Testking
    Lowest Price Guarantee Yes No No
    Up-to-Dated Yes No No
    Real Questions Yes No No
    Explanation Yes No No
    PDF VCE Yes No No
    Free VCE Simulator Yes No No
    Instant Download Yes No No