Achieve New Updated (September) Microsoft 70-342 Examination Questions 101-110





You have an Exchange Server 2013 organization that contains two Mailbox servers and two Client Access servers.


You have an Active Directory Rights Management Services (AD RMS) cluster. Information Rights Management (IRM) is enabled for the Exchange Server organization.


All company executives are in a security group named Execs. All of the executives use smartphones that are managed by using a mobile device mailbox policy. The executives frequently read IRM-protected email messages by using Microsoft Outlook.


You need to ensure that the executives can read the IRM-protected messages on their smartphone.


Which task should you perform in each environment?


To answer, drag the appropriate tasks to the correct environments. Each task may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.




Correct Answer:







You have an Exchange Server 2013 organization that contains the servers configured as shown in the following table.




All of the Exchange servers run Windows Server 2012 R2 and are members of a database availability group (DAG) named DAG1. Each server has a copy of all the mailbox databases.


DAG1 is configured to have a cluster administrative access point. The file share witness is located in Site A.


You need to identify the maximum number of Mailbox servers that can fail simultaneously without affecting the mailbox access of the users.


How many servers should you identify?











Correct Answer: C


Example: Quorum requires a majority of voters to be able to communicate with each other. Consider a DAG that has four members. Because this DAG has an even number of members, an external witness server is used to provide one of the cluster members with a fifth, tie-breaking vote. To maintain a majority of voters (and therefore quorum), at least three voters must be able to communicate with each other. At any time, a maximum of two voters can be offline without disrupting service and data access. If three or more voters are offline, the DAG loses quorum, and service and data access will be disrupted until you resolve the problem.



Database availability groups










You have an Exchange Server 2013 organization.


You plan to use document fingerprinting.


You need to identify which file type cannot be used as a template for document fingerprinting.


Which document type should you identify?











Correct Answer: D


Document Fingerprinting supports the same file types that are supported in transport rules. One quick note about file types: neither transport rules nor Document Fingerprinting supports the .dotx file type, which can be confusing because that’s a template file in Word. When you see the word “template” in this and other Document Fingerprinting topics, it refers to a document that you have established as a standard form, not the template file type.



Document Fingerprinting




You have an Exchange Server 2013 organization.


A distribution group named Sales_Reports is used to distribute confidential information to all of the senior managers in your company.


You need to recommend a solution to ensure that all unencrypted messages sent to the Sales_Reports group are encrypted on the server automatically before they are stored in the mailboxes of the managers.


Which two technologies should you include in the recommendation? Each correct answer presents part of the solution.



A transport rule




Active Directory Certificate Services (AD CS)


Active Directory Rights Management Services (AD RMS)




Correct Answer: AB


A: As an administrator, you can create transport rules to enable Microsoft Office 365 Message Encryption. This service lets you encrypt outgoing email messages and remove encryption from incoming encrypted replies to those messages, depending on conditions defined in the rule.


B: Encrypted e-mail messages

Messages that are encrypted using S/MIME. Transport rules can access envelope headers contained in encrypted messages and process messages based on predicates that inspect them. Rules with predicates that require inspection of message content, or actions that modify content, can’t be processed.



Understanding How Transport Rules Are Applied





You have an Exchange Server 2013 organization that contains two servers named EX1 and EX2. Both servers are in the same Active Directory site.


You run Get-TransportConfig | fi “shadow” and you receive the following output.




Use the drop-down menus to select the answer choice that completes each statement.




Correct Answer:






Your network contains two Active Directory sites named Site1 and Site2. Both sites contain an equal number of users. Each site contains two Exchange Server 2013 Mailbox servers.


You need to recommend a high-availability solution that meets the following requirements:


clip_image012If a single Mailbox server fails, the active mailbox database copies on that server must fail over to a Mailbox server in the same site.

clip_image012[1]If both Mailbox servers in the same site fail, the active mailbox databases copies must be switched over to the other site manually.

clip_image012[2]If a WAN link fails, multiple copies of the same mailbox database must not be activated in both sites simultaneously.

How should you configure the database availability groups (DAGs)?


To answer, configure the appropriate options in the answer area.




Correct Answer:







You have an Exchange Server 2013 organization named The organization contains five Mailbox servers.


You need to prevent a user named User8 from permanently deleting an email message in his mailbox.


What should you do on the mailbox of User8?



Configure an in-place hold.


Create an Archive mailbox.


Configure a retention hold.


Create a Retention tag.


Correct Answer: A


In Exchange 2013, you can use In-Place Hold to accomplish the following goals:

Place user mailboxes on hold and preserve mailbox items immutably

Preserve mailbox items deleted by users or automatic deletion processes such as MRM

Use query-based In-Place Hold to search for and retain items matching specified criteria

Preserve items indefinitely or for a specific duration

Place a user on multiple holds for different cases or investigations

Keep In-Place Hold transparent from the user by not having to suspend MRM

Enable In-Place eDiscovery searches of items placed on hold



When a reasonable expectation of litigation exists, organizations are required to preserve electronically stored information (ESI), including email that’s relevant to the case. This expectation often exists before the specifics of the case are known, and preservation is often broad. Organizations may need to pr

eserve all email related to a specific topic or all email for certain individuals.


Failure to preserve email can expose an organization to legal and financial risks such as scrutiny of the organization’s records retention and discovery processes, adverse legal judgments, sanctions, or fines.





You have an Exchange Server 2013 organization.


You plan to implement a hybrid deployment with Microsoft Office 365. Active Directory Federation services (AD FS) will be used to provide Single Sign-On (SSO). Users will access the hybrid deployment by using Microsoft Outlook 2013 and mobile devices.


A user named User1 changes the password for his on-promises Active Directory user account.


You need to identify whether User1 will be prompted for a password when accessing his mailbox from various client types.


In the table below identify whether User1 will be prompted for a password when accessing his mailbox from various clients.


NOTE: Make only one selection in each row.




Correct Answer:





You have an Exchange Server 2010 organization named


All public folders are stored on a server named EX5.


You deploy a new server named EX6. EX6 has Exchange Server 2013 installed.


You move all mailboxes to EX6.


You need to move the public folders to EX6. The solution must ensure that users can access the public folders after EX5 is decommissioned.


Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)



On EX6, create a public folder mailbox.


On EX6, run the New-PublicFolderMigrationRequest cmdlet.


On EX5, modify the replication partners for all of the public folders.


On EX6, run the New-SiteMailboxProvisioningPolicy cmdlet.


On EX5, assign the FolderOwner permission to the Public Folder Management management role group for all of the public folders.


On EX6, run the MoveAllReplicas.ps1 script.


Correct Answer: AB


B: Use the New-PublicFolderMigrationRequest cmdlet to begin the process of migrating public folders from Microsoft Exchange Server 2007 or Exchange Server 2010 to Exchange Server 2013.



See step 4 and 5 below.


Step 1: Download the migration scripts

Step 2: Prepare for the migration

Step 3: Generate the .csv files

Step 4: Create the public folder mailboxes on the Exchange 2013 server

Step 5: Start the migration request


New-PublicFolderMigrationRequest -SourceDatabase (Get-PublicFolderDatabase -Server <Source server name>) -CSVData (Get-Content <Folder to mailbox map path> -Encoding Byte) -BadItemLimit $BadItemLimitCount

Step 6: Lock down the public folders on the legacy Exchange server for final migration (downtime required)

Step 7: Finalize the public folder migration (downtime required)

Step 8: Test and unlock the public folder migration





Contoso, Ltd., is a bank that has offices in North America and Europe.


The company must comply with different regulations for North America and Europe.


The company uses Information Right Management (IRM) to protect sensitive documents, such as internal financial reports.


You need to recommend a compliance solution to meet the following requirements:


clip_image012[3]Prevent users from disclosing customers’ personal information in email messages.

clip_image012[4]Prevent users from disclosing internal financial data to people outside of the company.

clip_image012[5]Prevent the permanent deletion of email messages of users who are under investigation.

clip_image012[6]Allow compliance officers to search the mailbox of users who are under investigation without being able to alter the data in the mailbox.


Which technology should you recommend for each requirement?


To answer, drag the appropriate technology to the correct requirement in the answer area. Each technology may be used once, more than once, or not at all. Additionally, you may need to drag the split bar between panes or scroll to view content.




Correct Answer:


Free VCE & PDF File for Microsoft 70-342 Real Exam

Instant Access to Free VCE Files: MCSE|MCSA|MCITP…
Instant Access to Free PDF Files: MCSE|MCSA|MCITP…