[Free] 2018(May) Dumps4cert Testinsides Cisco 300-080 Dumps with VCE and PDF Download 121-130

Dumps4cert.com : Latest Dumps with PDF and VCE Files
2018 May Cisco Official New Released 300-080
100% Free Download! 100% Pass Guaranteed!

Advanced Solutions of Microsoft Exchange Server 2013

Question No: 121 – (Topic 6)

You have an Exchange Server 2013 organization named contoso.com. A partner company has an Exchange Server 2010 Service Pack 2 (SP2) organization named fabrikam.com.

Both organizations have a federated trust.

In contoso.com, you run Get-FederationInformation -DomainName contoso.com and you discover that the TokenIssueURIs property has a value of

lt;uri:federation:MicrosoftOnlinegt;.

In fabrikam.com, you run Get-FederationInformation -DomainName fabrikam.com and you discover that the TokenIssueURIs property has a value of lt;uri:WindowsLiveIDgt;.

What should you do?

  1. In contoso.com, install the Exchange Web Service (EWS) Managed API.

  2. In the contoso.com, run the Set-OrganizationConfig cmdlet.

  3. In fabrikam.com, run the New-FedereationTrust cmdlet.

  4. In contoso.com, run the New-FederationTrust cmdlet.

Answer: C

Question No: 122 – (Topic 6)

You have a server named Server1 that has Exchange Server 2013 installed.

Users access their mailbox by using Microsoft Outlook 2010 and Outlook Web App.

You need to identify when a mailbox is accessed by someone other than the owner of the mailbox.

Which two actions should you perform? Each correct answer presents part of the solution.

  1. Review the security event log.

  2. Enable audit logging for all mailboxes.

  3. Export the administrator audit log.

  4. Run an administrator role group report.

  5. Run a non-owner mailbox access report.

Answer: B,E Explanation:

You have to enable mailbox audit logging for each mailbox that you want to run a non- owner mailbox access report.

The Non-Owner Mailbox Access Report in the Exchange Administration Center (EAC) lists the mailboxes that have been accessed by someone other than the person who owns the mailbox. When a mailbox is accessed by a non-owner, Microsoft Exchange logs information about this action in a mailbox audit log that’s stored as an email message in a

mailbox and when, the actions performed by the non-owner, and whether the action was successful.

Reference: Run a non-owner mailbox access report https://technet.microsoft.com/en-us/library/jj150575(v=exchg.150).aspx

Question No: 123 HOTSPOT – (Topic 6)

You manage an Exchange Server 2013 organization for an investment company at which brokers are restricted from communicating with market researchers. You need to prevent members of a group named AllBrokers from using email to share confidential information with members of a group named AllResearchers. The solution must ensure that when an email message is rejected, the sender receives a custom notification of 鈥淐ommunication Not Permitted of Compliance Reasons鈥?

What command should you use? To answer, select the appropriate options in the answer area.

Hot Area

Dumps4Cert 2018 PDF and VCE

Answer:

Dumps4Cert 2018 PDF and VCE

Explanation:

Dumps4Cert 2018 PDF and VCE

This example creates a transport rule with the following condition:

Between distribution list and distribution list. The first condition property value is the distribution group Sales-Group. The second condition property value is the distribution group Brokerage-Group.

The rule also has the following exceptions:

-> With text patterns in the subject. The value for this exception is Press Release or Corporate Communication.

-> From people. The values for this exception are the users Tony Smith and Pilar Ackerman.

The following action will be applied to any messages that match the quot;Between distribution list and distribution listquot; condition, but doesn#39;t match the quot;with text patterns in the subjectquot; or quot;from peoplequot; exceptions:

-> Send reject message to sender The value for this action is: Email messages sent

between the Sales department and the Brokerage department are prohibited.

New-TransportRule quot;BlockMessagesBetweenSalesAndBrokeragequot; -BetweenMemberOf1 quot;Sales-Groupquot; -BetweenMemberOf2 quot;Brokerage-Groupquot; -ExceptIfFrom quot;Tony Smithquot;,quot;Pilar Ackermanquot; -ExceptIfSubjectContainsWords quot;Press Releasequot;,quot;Corporate Communicationquot; – RejectMessageEnhancedStatusCode quot;5.7.1quot; -RejectMessageReasonText quot;Email

Dumps4Cert 2018 PDF and VCE

Question No: 124 HOTSPOT – (Topic 6)

Your network contains two Active Directory sites named Site1 and Site2. Both sites contain an equal number of users. Each site contains two Exchange Server 2013 Mailbox servers.

You need to recommend a high-availability solution that meets the following requirements:

-> If a single Mailbox server fails, the active mailbox database copies on that server must fail over to a Mailbox server in the same site.

-> If both Mailbox servers in the same site fail, the active mailbox databases copies

must be switched over to the other site manually.

-> If a WAN link fails, multiple copies of the same mailbox database must not be activated in both sites simultaneously.

How should you configure the database availability groups (DAGs)? (To answer, configure the appropriate options in the answer area.)

Dumps4Cert 2018 PDF and VCE

Dumps4Cert 2018 PDF and VCE

Answer:

Dumps4Cert 2018 PDF and VCE

Question No: 125 – (Topic 6)

You have an Exchange Server 2013 organization that is integrated with Microsoft Lync Server 2013. Users report that they fail to make Unified Messaging (UM) calls.

You download the Unified Message Troubleshooting tool.

Which cmdlet should you use?

  1. Test-ExchangeUMCallFlow

  2. Test-CsPhoneBootstrap

  3. Start-UMPhoneSession

  4. Test-UMConnectivity

Answer: A Explanation:

Use the Test-ExchangeUMCallFlow cmdlet (the UM Troubleshooting Tool) to test call flow between Client Access servers running the Microsoft Exchange Unified Messaging Call Router service, Mailbox servers running the Microsoft Exchange Unified Messaging service, VoIP gateways, IP PBXs, Session Initiation Protocol (SIP) servers and Microsoft Lync Server. The Test-ExchangeUMCallFlow cmdlet can be used to diagnose configuration errors found in telephony components, Exchange 2010 SP1 or later or Exchange 2013 Unified Messaging settings, and connectivity issues between on-premises and hybrid Unified Messaging deployments.

Reference: Test-ExchangeUMCallFlow

https://technet.microsoft.com/en-us/library/ff630913(v=exchg.150).aspx

Question No: 126 – (Topic 6)

You have an Exchange Server 2013 Organization that has a hybrid development with Microsoft Office 365. The hybrid deployment includes an Active Directory Federation Services (AD FS) proxy server and a DirSync server.

You plan to remove the AD FS server.

You need to configure DirSync services for Single Sign-On (SSO).

Which two actions should you perform? Each correct answer presents part of the solution.

  1. Convert the Office 365 domain to federated.

  2. Convert the Office 365 domain to managed.

    Dumps4Cert 2018 PDF and VCE

  3. Enable Password synchronization.

  4. Modify the external sharing options.

  5. Enable Password write-back.

Answer: B,D

Question No: 127 – (Topic 6)

You have a hybrid deployment of Exchange Server 2013 and Microsoft Office 365. The Exchange Server organization has a mailbox size limit of 2 GB.

You need to provide engineers with the ability to retain certain email messages indefinitely. The solution must meet the following requirements:

-> Ensure that the engineers can access the retained email messages by using Outlook Web App.

-> Ensure that the retained email messages do not apply to the mailbox size limit of

the engineers.

-> Minimize the storage requirements of the on-premises servers.

Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)

  1. From Office 365, create Archive mailboxes.

  2. Instruct the engineers to create a personal folder.

  3. Create a retention policy.

  4. From the on-premises Exchange Server 2013 organization, create Archive mailboxes.

  5. Create a data loss prevention (DLP) policy.

Answer: A,C Explanation: C:

Dumps4Cert 2018 PDF and VCE

A:

In Exchange Server an archive mailbox is a second mailbox provisioned for a user that is separate to their primary user mailbox.

Question No: 128 – (Topic 6)

You have an Exchange Server 2010 organization.

All public folders are stored on a server named Server1.

You deploy a new server named Server2. Server2 has Exchange Server 2013 installed. You move all mailboxes to Server2.

You need to move the public folders to Server2. The solution must ensure that users can access the public folders after Server1 is decommissioned.

Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)

  1. On Server2, assign the FolderOwner permission to the Public Folder Management role group for all of the public folders.

  2. On Server1, modify the replication partners for all of the public folders.

  3. On Server2, run the New-SiteMailboxProvisioningPolicy cmdlet.

  4. On Server2, create a public folder mailbox.

  5. On Server2, run the New-PublicFolderMigrationRequest cmdlet.

Answer: A,E Explanation:

D: Create the public folder mailboxes on the Exchange 2013 server E: Migrate Exchange 2010 public folders

From the Exchange 2013 Mailbox server, run the following command:

New-PublicFolderMigrationRequest -SourceDatabase (Get-PublicFolderDatabase -Server

lt;Source server namegt;) -C

Reference: Use serial migration to migrate public folders to Exchange 2013 from previous versions

https://technet.microsoft.com/en-us/library/jj150486(v=exchg.150).aspx

Question No: 129 – (Topic 6)

You have an Exchange Server 2013 organization.

The human resources (HR) department has a custom form used to enter the personal information of employees. The form uses the Microsoft Word format.

You need to prevent users in the HR department from sending any completed forms to users outside of the organization.

Which two of the following should you create? Each correct answer presents part of the solution.

  1. A Send connector of the Partner type

  2. A document fingerprint

  3. A Policy Tip

Answer: A,D Explanation:

First create a document fingerprint then create a Transport Rule to take action on the fingerprinted document.

Note: Information workers in your organization handle many kinds of sensitive information during a typical day. Document Fingerprinting makes it easier for you to protect this information by identifying standard forms that are used throughout your organization.

Document Fingerprinting is a Data Loss Prevention (DLP) feature that converts a standard form into a sensitive information type, which you can use to define transport rules and DLP policies.

Reference: Protect Your IP Using Document Fingerprints

http://blogs.technet.com/b/lystavlen/archive/2014/03/04/protect-your-ip-using-document- fingerprints.aspx

Question No: 130 – (Topic 6)

You are an administrator for a company named Contoso, Ltd. Contoso has an Exchange Server 2013 organization.

Contoso has a partnership agreement with a company named A. Datum Corporation. A. Datum has an Exchange server 2013 organization.

Both organizations have a federation trust to the Microsoft Federation Gateway. Users at Contoso plan to share their free/busy information with users at A. Datum.

You need to recommend which tasks must be performed to ensure that the A. Datum users can see the free/busy information of the Contoso users.

  1. In the Exchange Server organization of Contoso, configure directory synchronization.

  2. In the Exchange Server organization of A. Datum, create a sharing policy.

  3. In the Exchange Server organization of A. Datum, configure directory synchronization.

  4. In the Exchange Server organization of Contoso, create an organization relationship.

  5. In the Exchange Server organization of Contoso, create a sharing policy.

  6. In the Exchange Server organization of A. Datum, create an organization relationship.

Answer: D,E Explanation:

Business-to-business calendar sharing is set up by creating organization relationships. User-to-user calendar sharing is set up by applying sharing policies.

There is no requirement for Contoso users to view the free/busy information of the A.Datum users. Therefore, we don’t need to create an organization relationship in A.Datum.

Configure Federated Sharing

Step 1: Create and configure a federation trust (this has already been done here)

Step 2 (D): Create an organization relationship

An organization relationship enables users in your Exchange organization to share calendar free/busy information as part of federated sharing with other federated Exchange organizations.

Step 3 (E): Create a sharing policy

Sharing policies enable user-established, people-to-people sharing of both calendar and contact information with different types of external users. They support the sharing of calendar and contact information with external federated organizations, external non- federated organizations, and individuals with Internet access. If you don’t need to configure people-to-people or contact sharing (organization-level sharing only), you don’t need to configure a sharing policy.

Step 4: Configure an Autodiscover public DNS record

Note:

With federated sharing, users in your on-premises Exchange organization can share free/busy calendar information with recipients in other Exchange organizations that are also configured for federated sharing. Free/busy sharing can be enabled between two organizations running Exchange 2013 and also between organizations with a mixed

Dumps4Cert 2018 PDF and VCE

100% Dumps4cert Free Download!
Download Free Demo:300-080 Demo PDF
100% Dumps4cert Pass Guaranteed!
Download 2018 Dumps4cert 300-080 Full Exam PDF and VCE

Dumps4cert ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No