70-342 | A Review Of Breathing 70-342 vce


Q1.  (Topic 6) 

You have an Exchange Server 2013 organization. 

You need to prevent a user named User1 from permanently deleting an email message in 

his mailbox. 

What should you do on the mailbox of User1? 

A. Implement a retention policy. 

B. Configure a retention hold. 

C. Implement a data loss prevention (DLP) policy. 

D. Configure an in-place hold. 

Answer:

Explanation: 

In Exchange 2013, you can use In-Place Hold to accomplish the following goals: Place user mailboxes on hold and preserve mailbox items immutably Preserve mailbox items deleted by users or automatic deletion processes such as MRM Use query-based In-Place Hold to search for and retain items matching specified criteria Preserve items indefinitely or for a specific duration Place a user on multiple holds for different cases or investigations Keep In-Place Hold transparent from the user by not having to suspend MRM Enable In-Place eDiscovery searches of items placed on hold 

Q2.  (Topic 6) 

You are a network administrator for a company named Humongous Insurance. Humongous Insurance has an Active Directory forest that contains two domains. 

You install the Active Directory Rights Management Services server role on a server named ADRMS1. The Active Directory Rights Management Services (AD RMS) server uses an internal certification authority (CA) for all certificates. 

You plan to provide users with the ability to use AD RMS to protect all of the email messages sent to a partner company named Contoso, Ltd. 

Contoso does not have AD RMS deployed. 

You need to identify which components from the Humongous Insurance network must be accessible to Contoso to ensure that the users at Contoso can open protected messages. 

Which two components should you identify? (Each correct answer presents part of the solution. Choose two.) 

A. the AD RMS cluster 

B. the certificate revocation list (CRL) 

C. the Active Directory domain controllers 

D. the Client Access servers 

E. the Mailbox servers 

F. the Global Catalog servers 

Answer: B,C 

Explanation: 

B: The CRL is exactly what its name implies: a list of subscribers paired with digital 

certificate status. The list enumerates revoked certificates along with the reason(s) for 

revocation. The dates of certificate issue, and the entities that issued them, are also 

included. In addition, each list contains a proposed date for the next release. When a 

potential user attempts to access a server, the server allows or denies access based on the 

CRL entry for that particular user. 

C: If federation cannot be implemented and the external organization cannot implement 

their own AD RMS infrastructure, hosting the user accounts can be the best option. 

However, the cost of managing such accounts (for both the IT department and each user) 

must be considered. 

In this case, the users will need to be authenticated by a domain controller. 

Q3.  (Topic 5) 

You discover that the Large Audience MailTip is not displayed when users compose an email message to the 20 new distribution groups. 

You need to ensure that the Large Audience MailTip is displayed for the new distribution groups immediately. 

Which cmdlet should you use? 

A. Set-DistributionGroup 

B. Set-MailboxServer 

C. Set-ClientAccessServer 

D. Start-ManagedFolderAssistant 

Answer:

Explanation: 

We need to use the Set-MailboxServer cmdlet with the ForceGroupMetricsGeneration parameter to force a count of the number of members of the distribution groups. 

The ForceGroupMetricsGeneration parameter specifies that group metrics information must be generated on the Mailbox server regardless of whether that server generates an offline address book (OAB). By default, group metrics are generated only on servers that generate OABs. Group metrics information is used by MailTips to inform senders about how many recipients their messages will be sent to. You need to use this parameter if your organization doesn't generate OABs and you want the group metrics data to be available. 

Q4.  (Topic 2) 

You need to recommend a solution for the voice mail traffic. The solution must meet the technical requirements. 

Which two configurations should you include in the recommendation? (Each correct answer presents part of the solution. Choose two.) 

A. A dial plan. 

B. A server certificate 

C. A transport rule 

D. A data loss prevention (DLP) policy 

E. A call answering rule 

Answer: A,B Explanation: 

* Scenario: Voice mail traffic between the telephone system and the Exchange Server environment must be encrypted. 

A: Use the EAC to configure Protected Voice Mail from authenticated callers . In the EAC, navigate to Unified Messaging > UM dial plans. In the list view, select the UM dial plan you want to modify, and then click Edit. . On the UM Dial Plan page, under UM Mailbox Policies, select the UM mailbox policy you want to manage, and then click Edit. . On the UM Mailbox Policy page > Protected voice mail, under Protect voice 

message from authenticated callers, select one of the following options: . Click Save. 

B: 

* In on-premises and hybrid deployments, you can configure a Client Access and Mailbox server to use mutual Transport Layer Security (mutual TLS) to encrypt the SIP and RTP traffic sent and received from other devices and servers. When you configure the dial plan to use SIP secured mode, only the SIP signaling traffic will be encrypted, and the RTP media channels will still use TCP, which isn’t encrypted. However, when you configure the dial plan to use Secured mode, both the SIP signaling traffic and the RTP media channels are encrypted. An encrypted signaling media channel that uses Secure Realtime Transport Protocol (SRTP) also uses mutual TLS to encrypt the VoIP data. 

* When you’re deploying Transport Layer Security (TLS) with UM, the certificates that are used on the Client Access server and the Mailbox server both must contain the local computer's fully qualified domain name (FQDN) in the certificate’s Subject Name. To work around this issue, use a public certificate and import the certificate on all Client Access and Mailbox servers, any VoIP gateways, IP PBXs, and all the Lync servers. 

Q5. DRAG DROP - (Topic 6) 

You have an Exchange Server 2013 organization and a Microsoft Lync Server 2013 infrastructure. 

You plan to implement voice mail for all users. 

You need to prepare the environment for the planned implementation. 

Which tool should you run in each environment? (To answer, drag the appropriate tool to the correct environment or environments. Each tool may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.) 

Answer: 

Q6.  (Topic 6) 

You have an Exchange Server 2013 organization. 

The human resources (HR) department has a custom form used to enter the personal information of employees. The form uses the Microsoft Word format. 

You need to encrypt the contents of the form automatically when users in the HR department send the form to users outside the organization. 

You deploy an Active Directory Rights Management Services (AD RMS) template. 

Which two of the following should you create next? Each correct answer presents a complete solution. 

A. an Outlook protection rule. 

B. a Mail Tip 

C. a DLP policy template. 

D. a Policy Tip. 

Answer: A,C 

Q7.  (Topic 6) 

You have an Exchange Server 2013 organization. 

All users are issued certificates from an internal certification authority (CA). 

Users who have a laptop can access their mailbox from the Internet by using Outlook Anywhere. 

When the users attempt to view or to create digitally signed email messages while they are connected to the Internet, the users receive a warning message. 

When the users use their laptop on the internal network, the users do not receive a warning message. 

You need to ensure that the users can send and receive digitally signed email messages without receiving a warning message. 

What should you do? 

A. Publish the root certificate of the CA to a server that is accessible from the Internet. 

B. Publish the certificate revocation list (CRL) to a server that is accessible from the Internet. 

C. Install a trusted root CA certificate on all Client Access servers. 

D. Install a trusted root CA certificate on all of the laptops. 

Answer:

Explanation: 

It works inside the network. Therefore the CA is trusted. Without access to the CRL, you’ll get an error saying A revocation check could not be performed for the certificate. 

Q8.  (Topic 6) 

Your company has a main office and a branch office. An Active Directory site exits for each office. 

The offices are connected by a WAN link. 

You plan to deploy Exchange Server 2013 in each site. 

You need to identify the number of Exchange servers required to meet the following requirements: 

-Maintain user access to mailboxes if a single server fails. 

-Use the minimize account of Exchange servers in each site. 

How many servers should you deploy in each site? 

A. 1 

B. 2 

C. 3 

D. 4 

Answer:

Q9. HOTSPOT - (Topic 6) 

You have an Exchange Server 2013 organization named contoso.com. 

Contoso.com has a federated trust to another Exchange Server 2013 organization named 

fabrikam.com. 

You need to ensure that users from fabrikam.com can view the availability of users in contoso.com. 

What command should you run? To answer, select the appropriate options in the answer area. 

Answer: 

Q10. HOTSPOT - (Topic 6) 

You have an Exchange Server 2013 organization that contains two servers named EX1 and EX2. Both servers are in the same Active Directory site. 

You run Get-TransportConfig | fi “shadow” and you receive the following output. 

Use the drop-down menus to select the answer choice that completes each statement. 

Answer: