Latest Real 70-342 Tests Dumps and VCE Exam Questions 31-40
You have a server that has Exchange Server 2013 installed. You plan to deploy Unified Messaging
(UM) to all users. You have two UM IP gateways named GW1 and GW2. You create, and then
associate a new UM dial plan for each IP gateway. The IP gateways are configured as shown in the
You need to recommend a solution that meets the following security requirements:
All voice traffic received by GW1 must be encrypted.
All voice traffic received by GW2 must be unencrypted.
All signaling traffic to GW1 and GW2 must be encrypted.
Which security settings should you recommend configuring for each dial plan?
To answer, drag the appropriate security setting to the correct UM dial plan in the answer area.
Each security setting may be used once, more than once, or not at all. Additionally, you may need
to drag the split bar between panes or scroll to view content.
Select and Place:
Your company has three offices. Each office has 1,000 users and is configured as an Active
Directory site. Each site connects directly to the Internet. The network contains six servers that
have Exchange Server 2013 installed. The servers are configured as shown in the following table.
An administrator performs a datacenter switchover by changing the DNS record for
webl.adatum.com to point to the IP address of web2.adatum.com. Users from Main1 report that
when they connect to Outlook Web App, they receive a certificate warning message. You need to
recommend a solution to ensure that the users do not receive a certificate warning message
when a datacenter switchover is performed. What should you include in the recommendation?
A. Three host headers for the Default Web Site on each Client Access server.
B. One certificate that contains all of the external names as subject alternative names.
C. Three certificates that each contains one of the external names.
D. An external URL for each Client Access server set to $null.
Correct Answer: B
You have an Exchange Server 2010 organization named adatum.com. All public folders are stored
on a server named EX5. You deploy a new server named EX6. EX6 has Exchange Server 2013
installed. You move all mailboxes to EX6. You need to move the public folders to EX6. The solution
must ensure that users can access the public folders after EX5 is decommissioned. Which two
actions should you perform? (Each correct answer presents part of the solution. Choose two.)
A. On EX6, run the MoveAllReplicas.psl script.
B. On EX5, assign the FolderOwner permission to the Public Folder Management management
role group for all of the public folders.
C. On EX6, run the New-SiteMailboxProvisioningPolicy cmdlet.
D. On EX6, create a public folder mailbox.
E. On EX5, modify the replication partners for all of the public folders.
F. On EX6, run the New-PublicFolderMigrationRequest cmdlet.
Correct Answer: AB
You have an Exchange Server 2013 organization that contains a database available group (DAG)
named DAG1. DAG1 contains three Mailbox servers named Server1, Server2, and Server3. DAG1
contains a mailbox database copy named DB1. You implement a lagged copy of DB1 on Server3.
The copy lag time is seven days. You need to ensure that copies of successfully processed email
messages are stored on Server1 and Server2 for seven days. What should you modify?
A. The Shadow Redundancy settings.
B. The Safety Net settings.
C. The settings of DAG1.
D. The settings of DB1.
Correct Answer: B
You have an Exchange Server 2013 organization. All users are issued certificates from an internal
certification authority (CA). Users who have a laptop can access their mailbox from the Internet
by using Outlook Anywhere. When the users attempt to view or to create digitally signed email
messages while they are connected to the Internet, the users receive a warning message. When
the users use their laptop on the internal network, the users do not receive a warning message.
You need to ensure that the users can send and receive digitally signed email messages without
receiving a warning message. What should you do?
A. Publish the root certificate of the CA to a server that is accessible from the Internet.
B. Publish the certificate revocation list (CRL) to a server that is accessible from the Internet.
C. Install a trusted root CA certificate on all Client Access servers.
D. Install a trusted root CA certificate on all of the laptops.
Correct Answer: B
You need to meet the compliance policy requirement. What should you create?
A. A data loss prevention (DLP) policy and a DLP policy rule.
B. A retention policy, a retention tag, and a Policy Tip.
C. A throttling policy and a throttling policy association.
D. A transport rule and a moderated mailbox.
Correct Answer: A
Your network contains two Active Directory sites named Site1 and Site2. You have an Exchange
Server 2013 organization that contains six servers. The servers are configured as shown in the
All of the mailbox databases replicate to all of the servers. Users in Site1 connect to sitelmail.
contoso.com to access their mailbox. Users in 5ite2 connect to site2-mail.contoso.com to access
their mailbox. All of the users use Microsoft Outlook 2013. You need to identify which DNS
modification must be made to fail over the email services from Site1 to Site2. Which DNS
modification should you identify?
To answer, select the appropriate record to modify and the new data for the record in the answer
You have an Exchange Server 2013 organization and a Microsoft Lync Server 2013 infrastructure.
You plan to implement voice mail for all users. You need to prepare the environment for the
planned implementation. Which tool should you run in each environment?
To answer, drag the appropriate tool to the correct environment or environments. Each tool may
be used once, more than once, or not at all. You may need to drag the split bar between panes or
scroll to view content.
Select and Place:
You have an Exchange Server 2013 organization that has mailbox audit logging enabled for all
users. You deploy two third-party applications named App1 and App2. Both applications access a
mailbox named Mailbox1. App1 uses a mail-enabled user account named App1_user. App2 uses a
mailbox enabled user account named App2_user. You need to prevent the audit logs from
containing entries that relate to App2. Which command should you run?
To answer, select the appropriate options in the answer area.
You have an Exchange Server 2013 organization that has Unified Messaging (UM) enabled for all
mailboxes. The organization is configured to use an IP gateway to connect to a legacy PBX. An
administrator recently performed some configuration changes. After the changes, users report
that their voice mail is no longer being delivered to their Exchange Server mailbox. The users do
not report any other problem. You need to identify which configuration change causes the issue.
Which cmdlet should you run?
Correct Answer: A