M  C  S  E    F  O  R  E  V  E  R

EXCHANGE 5.5

E x c h a n g e  S t u d y   G ui d e


Updated: 10/04/99

 

 

 

 

 

 

 

 


 

 

 

 

 

 

Planning

Back to Top

Q: Your company has 5 Exchange sites connected by MESH topology. X.400 Connectors are used to connect the sites. Each site also has an Internet Mail Service running. You want to make sure that all outgoing SMTP messages are only sent out of their sites through the IMS server, and not the X.400 Connector. Which of the following would accomplish this?

A. Create SMTP address space on each X.400 Connector. Assign a cost of 100 to each SMTP address space.
B. Create an X.400 address space on each IMS. Assign a cost of 1 to each X.400 address space.
C. Create an X.400 address space on each IMS. Assign a cost of 100 to each X.400 address space.
D. Replace the existing address space on each IMS with SMTP address space. Assign a cost of 100 to each SMTP address space.

Ans: A

Q: You are using the import utility of MS Exchange Admin to modify a large number of existing mailboxes. You want to add an area code to the Telephone-Office2 field of each of these mailboxes. The export information of one of these recipients is listed below:

Obj-Class    Alias Name    Display Name     Telephone-Office1    Telephone-Office2
Mailbox       Mpeterson       Mary Peterson   801-333-4343           333-5654

Which field or fields must you include in your import file in order to add an area code to the Telephone-Office2 field? (Choose all that apply)

A. Mode
B. Obj-Class
C. Alias name
D. Display Name
E. Telephone-Office1
F. Telephone-Office2

Ans: A, B, C & F (The new version only requests 3 choices. Choose B,C and F.)

Q: A user named Bill Bob leaves your company due to scandals. Management would like a user named Al Pacino to assume his responsibilities. What could you do so that Al can receive Bill’s e-mail messages?

A. Make Al’s mailbox an alternate recipient for Bill’s mailbox.
B. Disable Bill’s user account and give Al's profile permission to access Bill’s mailbox.
C. Delete Bill’s mailbox and forward all undeliverable messages to Al.
D. Create a rule in Bill’s mailbox to forward all of Bill’s mail to Al.

Ans: A

Q: You are planning the configuration of an Exchange Server computer that will route mail to the Internet. You want to minimize cost by limiting the amount of time your server is connected to the Internet via an Internet Service provider (ISP). How should you configure the Internet Mail Service and connectivity to the Internet to minimize cost?

A. Establish a dedicated connection to the Internet. Configure the Internet Mail Service to minimize the bandwidth it uses when sending mail.
B. Establish a dial-up connection to the Internet. Configure the Internet Mail Service to use ETRN to retrieve mail from the ISP.
C. Establish a dedicated connection to the Internet. Configure the Internet Mail Service to use ETRN to retrieve mail from the ISP.
D. Establish a dial-up connection to the Internet. Configure the Internet Mail Service to use TURN to retrieve mail from the ISP.

Ans: B (dial-up / ETRN)

Q: You want to provide long-term consistency between Exchange Server and Microsoft Mail. Users will eventually be migrated from Microsoft Mail to Exchange Server. What should you do to create a global distribution list that will be available to users on both systems?

A. Establish directory synchronization between Exchange Server and Microsoft Mail. Create an Exchange Server distribution list that includes all of the users.
B . Establish directory synchronization between Exchange Server and Microsoft Mail. Create a Microsoft Mail distribution list that includes all of the users.
C. Establish Internet mail connectivity between Exchange Server and Microsoft Mail. Create SMTP-based custom recipients for each Microsoft Mail user. Create an Exchange Server distribution list that includes all Exchange Server users and all Microsoft Mail Internet-based custom recipients.
D. Create MS Mail distribution list that includes all MS Mail users. Create Exchange Server distribution list that includes all Exchange Server users. Create Exchange Server distribution list that includes MS Mail distribution list and Exchange Server distribution list.

Ans: D  (Create Exchange distribution list which includes both MS Mail DL and Exchange DL.)

Q: Your company has both Microsoft Exchange Server and MS Mail. There will eventually be a migration from Mail to Exchange, but right now you need to come up with a coexistence strategy. Part of that strategy is to make a global distribution list available that contains recipients from both systems. How could you do that?

A. Create both an MS Mail distribution list that includes all MS Mail users and an Exchange distribution list that includes all Exchange users. Create an Exchange distribution list that includes the both the MS Mail DL and the Exchange DL.
B. Create Internet Mail Connectivity between the two systems. Create SMTP custom recipients for each Microsoft Mail user. Create a DL that includes Exchange users and SMTP custom recipients.
C. Configure directory synchronization between the two systems. After synchronization has taken place, create a master distribution list on the MS Mail post office.
D. Configure directory synchronization between the two systems. After synchronization has taken place, create a master distribution list on the Exchange Server.

Ans: A (Just different wording from different wordy people!)

Q: Your company is migrating 125 users from Microsoft Mail to Exchange Server. You want to limit the amount of data that is migrated to 50 MB per user. You also want to enforce a 50-MB mailbox limit once each user has been migrated to Exchange Server. What should you do? (Choose two.)

A. Migrate only e-mail messages for all users.
B. Run the 'Edbutil' utility before you begin the migration.
C. Set the Exchange Server mailbox storage limit to 50 MB.
D. Reduce the size of the Microsoft Mail message store to 50 MB before migration.
E. Run the Microsoft Mail 'Reqmain' utility before you begin the migration.

Ans: C & ? (For A, why migrate just e-mails? For B, edbutil is for defraging IS database. Isn't it being used as a troubleshooting tool? Yet, I don't mind using it before migration. And Reqmain is used to update a dir replication between MS Mail and EXC SRV. Is it necessary to use it before migration. I would rather defrag than update dir replication. Then why not set 50MB for MS Mail before migration? I prefer B.)

Q: Your company uses a single master domain model. You are planning your Exchange Server environment. You want to require users to enter a password every time they start MS Outlook. What should you do so that users are required to enter a password?

A. Install the Exchange Server in a non-trusted domain.
B. Delete the password list file on each client computer.
C. Configure user profiles so that network security is not used during logon.
D. Configure user profiles to encrypt information when the user connects to Exchange Server by using the network and Dial-Up Networking.

Ans: C (To enter password twice -- Disable "Network Security to logon")

Q: 25 client access licences. 25 users use MS Outlook. 10 new employees, modem supports 5 connections at one time. 5 uses http and 5 uses POP3. How many licence to purchase ?

Ans: 10

Q: What information is contained in Exchange.stf and Outlook.sff files?

Ans: Installation customization settings as well as registry modifications and protocol binding order.

Q: Which of Exchange Core components must be running at all times?

A. IS
B. SA
C. DS
D. MTA

Ans: B (System Attendant)

Q: Which of Exchange Core components will generate a newly created email address for a new recipient?

Ans: SA

Which of Exchange Core components will translate the messages to foreign systems (SMTP, X.400)?

Ans: MTA

Q: How many key management server are there?

Ans: One

Back to Top

Installation and Configuration

Back to Top

INSTALLATIONS:

You have installed a new Exchange 5.5 Server in your network. All the existing servers are 5.0 What do you need to do next?

A. Update all to 5.5
B. Update all bridgehead server to 5.5
C. Convert all existing to 5.5
D. Nothing

Ans: D

Q; You have installed a new Exchange 5.5 Server in your network. All the existing servers are 4.0 What do you need to do next?

A. Update all to 5.5
B. Update all bridgehead server to 5.5
C. Convert all existing to 5.5
D. Nothing

Ans:  B

Q: How do you install exchange 5.5 admin on a WKS 4.0 machine?

A. Choose minimal setup
B. Choose custom/complete setup
C. Copy the \exchsrvr\admin directory to workstation
D. Start the \exchsrvr\admin\admin.exe from server

Ans: B

Q: How to upgrade from Exchange 4.0 to 5.5?

Ans: Install Service Pack 2, upgrade brigdehead servers first (least amount of time), and the rest in any order. Public Folder Servers first when Private Store points to public store.

Q: You will be installing two Exchange sites that will be connected with the X.400 Connector. You do not want administrators from one site to be able to administer the other site. What type of trust relationship, if any would have to be established and what amount of account information exchanged between the two sites?

A. Establish a two-way trust relationship. No account information needs to be exchanged.
B. Establish a one-way trust relationship in either direction. Both accounts must have the same name and password.
C. No trust relationship is needed. No account information needs to be exchanged.
D. No trust relationship is needed. Account and password information needs to be exchanged.

Ans: C

Q: You install two servers in Exchange Server site. The two servers are named Server A and Server B. All users in the finance department connect to Server A. All users in the marketing department connect to Server B. Each department has its own Exchange Server administrator. The site has only one recipients container. You want the marketing administrator to be able to add and delete recipients on both servers. You want the marketing administrator to be able to modify only objects in the recipients container. How should you configure security?

A. Add the marketing administrator to the Domain Admins group.
B. Grant the appropriate permissions to the marketing administrator on the site container.
C. Grant the appropriate permissions to the marketing administrator on the organization container.
D. Grant the appropriate permissions to the marketing administrator on the configuration container.

Ans: A

Q: Maria is installing Exchange Server for her company. The company has two separate domains that are named Exec and Sales. Maria does not want to establish any trust relationships. Maria installs an Exchange Server computer in each domain. Each server is installed in its own site. Both sites belong to the same organization. Maria configures a service account named Msxsrv in each domain. Both service accounts have the same password. Which two actions must Maria take so that the two servers can communicate with each other by using a Site Connector? (Choose two).

A. In both sites, configure ‘Site Connectors’ to use the ‘Msxsrv account’ on the ‘override property’ page.
B. On each server, give the ‘Msxsrv account’ user rights to ‘log on locally’ and ‘log on as a service’.
C. On each server, give the ‘Msxsrv account’ user rights to ‘access the computer from the network’.
D. On each server, make the ‘Msxsrv service account’ a member of the ‘Administrators’ group.

Ans: A & C ? (Please send me an answer on this one if you have it.)

Q: You will be using a scripted installation to setup a number of Microsoft Exchange Client applications. You will use Setup Editor to modify EXCHNG.STF. Even though all workstations use both TCP/IP and IPX, you want clients to use only IPX when connection to their Microsoft Exchange servers. What should you do to accomplish that configuration?

A. Remove TCP/IP from the RPC binding order in the installation script.
B. Remove TCP/IP from all workstations.
C. Unbind TCP/IP from workstation network adapters.
D. Unbind TCP/IP from the Microsoft Exchange server network adapter.

Ans: A

Q: When adding MS Exchange Server to an existing site, which two pieces of information do you need to know?

A. Name of existing Exchange Server in that site and password for the site service account in that site.
B. Organization name and site name.
C. Site name and administrator’s user account.
D. Organization name and administrator’s user account.

Ans: A (Name & Password)

Q: If you wanted all new client installations to be configured to use IPX and not use TCP/IP, which action would you perform?

A. Use Setup Editor to remove TCP/IP from the RPC binding order.
B. Do nothing, that is already the default.
C. This can not be done.
D. Run SETUP.EXE /A

Ans: A

Q: Your network has hundreds of users. You have just installed MS Exchange Server on five servers. You would like clients to connect to this one server and perform an over-the-network installation. However, you would like the clients to have the option during their installations to select any of the five Exchange servers. How would you do that?

A. Leave the Exchange Server field blank in DEFAULT.PRF.
B. Enter "any" in the Exchange Server field in DEFAULT.PRF.
C. Delete the Exchange Server field in DEFAULT.PRF.
D. Configure separate shares for each server and set the default in DEFAULT.PRF accordingly.

Ans: D

Q: Clients on your network use both IPX and TCP/IP, but, for your MS Outlook installation for 32-bit clients, you want them to only use IPX. What file would you have to modify?

A. outlook.prf
B. default.prf
C. exchng.stf
D. outlook.stf

Ans: D

Q: You have created MS Exchange client network installation point on one of your servers. You want to predetermine the client settings in order to create a standard installation. What do you need to do to predefine the user settings of Exchange clients?

A. Edit DEFAULT.PRF and copy this file to the installation share point. 
B. Edit DEFAULT.PRF and copy this file to each user’s home directory.
C. Edit TEMPLATE.PRF and copy this file to the installation share point.
D. Edit TEMPLATE.PRF and copy this file to each user’s home directory.

Ans: A

Q: You plan to install an Exchange Server computer. There are 200 client computers on your LAN. There are also 150 client computers that connect to the LAN by using an asynchronous dial-up connection. Your LAN is divided into four segments as shown in the following table. All segments are connected by a 10/100 Ethernet Switch.

Segment     Number of users          Ethernet Segment Speed
A                       0                                    100 megabit
B                    125                                    10 megabit
C                     75                                     10 megabit
D                    150 (remote)                       10 megabit

What segment would you place the Exchange server on?

A. Segment A
B. Segment B
C. Segment C
D. Segment D

Ans: A

Q: You want to install Exchange Server for all users in your company's two main buildings. Building A has 15 users. Building B has 25 users. The two buildings are connected to one another by dedicated routers and a 33.6 Kbps dial-up connection. Most of the messaging traffic will occur within each building. Less than 10 percent of the messaging traffic will occur between the two buildings. Which configuration should you implement to minimize traffic between the buildings?

A. Install 1 Exchange Server PC in Building A.
B. Install 2 Exchange Server PCs in Building B. Configure servers as members of the same site.
C. Install 1 Exchange Server PC in each building. Configure servers as members of the same site.
D. Install 1 Exchange Server PC in each building. Configure each server as a member of its own site.

Ans: D

Q: You have installed the KM server in your Exchange Server organization. When employees leave your company, you disable their Exchange Server mailboxes and revoke their security keys. You leave the mailboxes in your Exchange Server organization until the key expiration date. As more keys are revoked, client performance slows down. Which security key management strategy should you use to improve the performance of client applications?

A. Extend the expiration dates on security keys.
B. Delete the security file from client computers when user mailboxes are disabled.
C. Configure a second KM server in your Exchange Server organization.
D. Delete users from the Exchange Server organization instead of revoking security keys.

Ans: B (security key/security file)

Q:Your company contains two interconnected networks and corresponding Exchange sites named Accounting and Research. Both networks use IPX and TCP/IP. The X.400 Connector is used to connect two sites. No directory replication is configured between the sites. Your Exchange servers have LDAP enabled. The users in the Accounting site report that they cannot access the LDAP directory. You find out that all the users in the Accounting network use only IPX. What can be done to allow the Accounting users to access the LDAP directory?

A. Configure directory replication.
B. Configure the Site Connector.
C. Install TCP/IP on all the Exchange servers in the Accounting site.
D. Install TCP/IP on all the client computers in the Accounting site.

Ans: D (Answer could also be phrased as "Install TCP/IP on each client...)

Q: You plan to install Exchange Server on two computers that will belong to the same organization. You want to install the servers as separate sites. Each server will be in a different Microsoft Windows NT domain. You want to connect the sites by using an X.400 connector. You want administrators to be able to administer only their own sites. Which trust relationships and account configuration should you use?

A. Establish a full two-way trust relationship. No account information needs to be shared.
B. Establish a 1-way trust relationship in either direction. Both accounts must have the same name and the same password.
C. No trust relationships need to be established. Both accounts must have the same name and the same password.
D. No trust relationships need to be established. No account information needs to be shared.

Ans: D

MIGRATIONS:

Q: The first step in a two-step migration has already taken place. The CSV file contains directory information on 2200 users. What would be the most efficient way to modify all of the recipient display names?

A. Complete the migration, and then use MS Exchange Administrator to modify the display names.
B. Edit the CSV file, and then continue with the second phase of the migration.
C. Run the first step of the Migration Wizard again and this time modify the names.
D. Run the second step of the Migration Wizard and modify the names during that process.

Ans: B

Q: You are implementing a migration from MS Mail to MS Exchange. You have just completed the first step in a two-step migration. If you wanted to modify the existing naming convention during the second step in the migration, what file would you have to modify?

A. Packing list file.
B. Primary file
C. Secondary file
D. Migration log file

Ans: B

Q: Your company is migrating from Microsoft Schedule+ 7.5 to Microsoft Outlook Calendar. You want Microsoft Outlook Calendar users to be able to read other users' Schedule+ 7.5 calendars. What must you do?

A. Configure the Schedule+ 7.5 calendar to grant read access to Outlook users.
B. Install the Schedule+ Free Busy Connector.
C. Install Schedule+ 7.5 on the Outlook users computers.
D. Configure Send As permissions for the Outlook users on the Schedule + 7.5 users' mailboxes.

Ans: B

MS MAIL VS EXCHANGE:

Q: Your company currently uses MS Mail. You have just added an Exchange server to the network. Management would like both systems to coexist and be able to exchange both messages and directory information. Management would also like to keep the current dirsync strategy. You consequently configure Exchange server as a dirsync requestor. What other step(s) must you do on the Exchange server?

A. Create a dirsync server on the Exchange Server.
B. Configure MS Mail Connector on the Exchange Server.
C.
Create a directory replication bridgehead server.
D. Reinstall MTA.

Ans: B

Q: Your company currently uses MS Mail. You have just added an Exchange server to the network. Management would like both systems to coexist and be able to exchange both messages and directory information. Management would also like to keep the current dirsync strategy. What other step(s) must you do on the Exchange server?

A. Create a dirsync server on the Exchange Server.
B. Configure the Microsoft Mail Connector on the Exchange Server.
C.
Create a directory replication bridgehead server.
D. Reinstall MTA.
E. Configure the Exchange server as a dirsync requestor.

Ans: B & E (Similar to above question)

FOLDERS:

Q: Patty has a laptop computer that she uses both at the office and when out of office doing work. Her laptop is configured with an OST file. She routinely synchronizes her laptop computer with the office server. Patty has identified a public folder that she would like to designate as an offline folder, but she does not see the Synchronization tab among the property pages of that public folder. What does she have to do to enable synchronization with that public folder?

A. The administrator must configure that public for synchronization.
B. The owner of the folder must configure it for synchronization.
C. Patty must designate the public folder as a Favorite folder.
D. Patty must logoff the server, and the folder will synchronize.

Ans: C (Favorite Folder)

Q: 5 Exchange servers are configured as a part of a single site. 3 Servers are in London and 2 in Tokyo. What should you do so that users in London always access public folders in London, before accessing replicas of the public folders in Tokyo?

Ans: Change home server to be London. (I had this one on my test and was a bit confusing whether I should that or "Set location value of the server to its city.")

NETWARE RELATED:

Q: You are the administrator of an Exchange Server computer. You want your users to be able to exchange e-mail messages with users on a Novell GroupWise computer. The GroupWise computer is configured with a message handling system (MHS) gateway and full Internet messaging connectivity. Which two actions should you take so that your users can exchange messages with the users on the GroupWise computer? (Choose two).

A. Configure a dirsync server on the Exchange Server computer.
B. Schedule directory replication on the Exchange Server computer.
C. Import the GroupWise user mailboxes to the Exchange Server computer.
D. Install and configure the Internet Mail Service on the Exchange Server Computer.
E. Add the GroupWise users as custom recipients on the Exchange Server Computer.

Ans: D & E (IMS & Groupwise users as recipients)

BACK UP:

Q: Your company's primary Exchange Server computer does not have a tape backup device. You install a standby Exchange Server computer that performs a file-based backup of the primary server every night. You want to create a batch file that will stop Exchange Server services on the primary server and copy the necessary files to the backup server. Which files must you include in the batch copy process? (Choose three).

A. directory file.
B. checkpoint file.
C. transaction log file.
D. public information store file.
E. private information store file.
F. personal information store file.

Ans: A, D & E

Q: Franz has configured the backup strategy for his Exchange Server computer for offline backups. Circular logging is disabled. Last night, a full backup was performed and completed successfully. This morning, Franz discovers that his server has stopped functioning. Franz restores the IS and the directory on the server by using MS Windows NT Backup. What should he do next?

A. Run the 'Edbutil' utility with the /r switch.
B. Update the .mdb files and any log files that exist on the Exchange Server computer.
C. Run the 'Isinteg' utility with the -patch switch.
D. Do nothing. After the files are restored, the backup program will automatically restart the Exchange Server services.

Ans: C (You need to patch up the IS.)

Q: What do you need to configure when you want to use incremental backups?

A. Enable circular logging
B. Disable circular logging
C. Use a different backup software than nt server backup
D. Nothing

Ans: B

Back to Top

Configuration and Managing Resources Access

Back to Top

CONFIGURATIONS:

Q: You want to shut down one of the chat servers on your chat network. You want to make the shutdown transparent to new users who will be connecting to your collection of chat servers. What should you do?

A. Disable new connections, and wait for all existing connections to terminate.
B. Close the portal between the other chat servers on your network.
C. At the command line, type net stop chatsvc.
D. Pause the Workstation service, and wait for all existing connections to terminate.

Ans: A

Q: You add 64 MB of RAM to your Exchange Server computer. You want to make sure that your Exchange Server uses the additional memory. What should you do?

A. Set foreground application performance to maximum.
B. Run a consistency check on the private information store.
C. Increase the paging file on the Exchange Server computer.
D. Run the Performance Optimizer utility on the Exchange Server computer.

Ans: D

Q: You create a Microsoft Outlook network share on your Exchange Server computer. You want to predefine the client application settings so that users will need to provide only the minimum configuration information when they install their client software. How should you predefine the client application settings?

A. Edit the Template .prf file. Copy this file to each user's home directory.
B. Edit the Template .prf file. Copy this file to the network share.
C. Edit the Default .prf file. Copy this file to each user's home directory.
D. Edit the Default .prf file. Copy this file to the network share.

Ans: D

Q: Which of the following can be used to modify a large number of Exchange recipients in a bulk manner?

A. Performance Monitor
B. User Manager for Domains
C. Directory Import and Export
D. Event Viewer

Ans: C

Q: Your Exchange site uses custom attributes that should not be replicated to other sites. How would you configure your site to accomplish that?

A. Specify only the custom attributes in the DS Site Configuration object.
B. Configure trust level of your recipients container to be higher than recipient containers in other sites.
C. Configure permissions on Directory Replication Connector to be only for the Domain Admins group.
D. Specify all attributes except the custom attributes in the DS Site Configuration object.

Ans: D

Q: Deleted Item Retention is enabled on a mailbox. What happens to items when they are deleted?

A. They become hidden objects in the IS.
B. They are placed in TEMP.EDB.
C. They go to the Recycle bin on the local computer.
D. They are placed in a Personal folder on the local computer.

Ans: A (hidden)

Q: Your company has multiple Exchange servers. Currently, when users create public folders, they are placed on Server A. After monitoring that server, you notice that its hard disks is almost full. You move all those public folders to Server B. How can you ensure that all future folders will be created on Server B?

A. Delete all new replicas on Server A
B. Configure Server B as the public folder server for all recipients on Server A
C. Use MS Exchange PM Optimizer to configure Server A as only a private information store server
D. Restrict top-level folder creation on Server A

Ans: B

Q:You have been asked to set the default display names to LastName FirstName, such as Smith John. Where do you configure that setting?

A. The properties of each object.
B. Only on the properties of individual mailboxes.
C. Organization properties.
D. Auto Naming property page of the Exchange Administrator program.

Ans: D (auto / property)

Q: If you wanted to reject certain IP address of Web clients from accessing your Exchange server, what program would you use?

A. Microsoft Exchange Administrator
B. Network applet in Control Panel
C. Internet Service Manager
D. Link Monitor

Ans: C

Q: If you wanted to prevent anonymous users using LDAP from seeing a particular Exchange attribute, like telephone numbers, where in the Exchange hierarchy would you have to go to prevent this?

A. Information Store Site Configuration.
B. Encryption object.
C. Directory Replication object
D. DS Site Configuration.

Ans: D

Q: Management has decided to allow company access to various newsgroups. Your Internet Service Provider can provide full newsgroup access, but they do not configure newsfeeds on a customer-by-customer basis. How would you configure the transfer of the newsfeeds?

A. No transfer type is necessary.
B. Configure it for both push and pull.
C. Configure it for a push transfer only.
D. Configure it for a pull transfer only.

Ans: D (Someone wrote "Full" when it should be "Pull.")

Q: Two giant corporations in A and B need a long-term coexistence strategy. How could you allow LDAP clients to connect to A and see the directories of both corporations?

A. Directory replication.
B. Anonymous access.
C. Select B as the default LDAP referral for A.
D. Select A as the default LDAP referral for B.

Ans: C (B for A)

Q: How can you restrict anonymous LDAP access to directory properties of recipients, but still allow Web clients with authenticated names to access those properties?

A. Disable HTTP at the site.
B. Disable anonymous access through the LDAP object.
C. Define the Guest account as the anonymous account.
D. Temporarily disable LDAP.

Ans: B

Q: Your network uses IPX as its only network protocol. Your Microsoft Exchange Server has two network adapters. One adapter is connected to the internal LAN and uses IPX. The other adapter is connected to an outside WAN and uses TCP/IP. Users on the internal LAN use Microsoft Outlook to connect to the Microsoft Exchange Server. When these users attempt to connect to the Microsoft Exchange Server, it takes up to 10 minutes to connect and to send mail. What can be done to reduce the time to connect and send mail?

A. Bind TCP/IP to the network adapter of each client computer.
B. Bind TCP/IP to the internal network adapter of the Microsoft Exchange Server.
C. Change the RPC binding order on the Microsoft Exchange Server.
D. Change the RPC binding order on each client computer.

Ans: D

Q: You manage two NT domains named Personnel and Resources. The Personnel domain contains all user accounts, while the Resources domain contains all servers. You will be installing Microsoft Exchange Server into the Resources domain. You would like to use the NT user accounts in the Personnel domain with mailboxes on the Exchange server. What type of trust relationship must be established between the two domains?

A. Personnel domain trusts Resources domain
B. Resources domain trusts Personnel domain
C. No trust relationship is needed

Ans: B

Q: In the Microsoft Outlook Address Book, you want to group Exchange Server users by the building name that has been added to each user's custom attributes. Where should you configure this?

A. Site Addressing.
B. Address Book view.
C. personal address book.
D. e-mail addressing templates.

Ans: A

FIRST & LAST NAMES:

Q: The aliases in your organization are formatted as first initial followed by last name. Management would like the format changed to last name followed by first initial. You also want all new aliases to use this new format. What must you do? (Choose two)

A. Disable autonaming
B. Reset one-off addressing
C. Modify all existing aliases
D. modify alias name generation to be %Last%1First.

Ans: C & D

Q: You configure alias name generation for your Exchange Server computer to be the first letter of the first name and the seven letters of the last name to match your existing Microsoft Windows NT naming conventions. You want the SMTP addresses for all users to be the first letter of the full last name. What should you do?

A. Change Site Addressing for SMTP to use the first letter of the first name and the full last name.
B. Change display name generation for users to be the first letter of the first name and the full last name.
C. Edit each user's SMTP address space to use the first letter of the first name and the full last name.
D. Add users by using a template account that has an SMTP address space of the first letter of the first name and the full last name.

Ans: D (Use template)

BACK UP:

Q: Your company performs a complete backup every weekend. You have been asked to add a plan to also backup the system every weekday evening with all the changes made since the weekend backup. You also want to minimize the time it takes to restore a system from the backups. How would you configure Microsoft Windows NT Backup?

A. Set the weekend backup type to Normal. Set each weekday backup type to Incremental.
B. Set the weekend backup type to Normal. Set each weekday backup type to Differential.
C. Set the weekend backup type to Copy. Set each weekday backup type to Incremental.
D. Set the weekend backup type to Copy. Set each weekday backup type to Differential.

Ans: B (Weekend = Normal ; Weekday = Differential)

Q: A deleted item retention time of 4 days is set. The server is set not to delete deleted items permanenatly until after Private IS store has been backup. User wants to restore an item deleted in the previous day. A ful backup was done on last night. How to restore item?

Ans: From Outlook with Recover Deleted Item Option.

Q: You perform a full backup of your Exchange Server computer every Friday. You do not perform any backups on any other day. You configure the deleted items retention time for mailboxes to be 4 days. Your users do not use personal folder (.pst) files. You want to ensure that users will be able to restore all deleted messages. What else should you do?

A. Disable circular logging.
B. Configure message tracking on the Exchange Server computer.
C. Configure the client profiles so that they do not delete deleted items upon exit.
D. Configure deleted items retention so that items are not deleted until after the information store has been backed up.

Ans: D

INTERNET RELATED:

Q: An Internet Service Provider (ISP) has 500 customers. The ISP can support up to 50 concurrent customer connections. The ISP provides messaging services to its customers and its employees by using two Exchange Server computers. Employees use Microsoft Outlook to send and receive messages. Customers use POP3 client applications and Web browsers to send and receive messages. Mailbox accounts are distributed between the two servers as shown in the following table:

Exchange Server Computers    Number of customer mailboxes    Number of employee mailboxes
Server A                                                250                                                 20
Server B                                                250                                                   0

How many client access licenses must the ISP purchase?

A. 50
B. 120
C. 250
D. 520

Ans: D

Q: You are the administrator of an Exchange Server computer that hosts mailboxes for 500 users. You enable IMAP for all users. Your server is protected from the Internet by a firewall. Your firewall is configured to allow all IP traffic out to the Internet. It is also configured to allow SMTP (port 25), IMAP (port 143), and HTTP (port 80). Your IMAP service is configured as shown in the exhibit (Click the Exhibit button). You want to enable users to access the server from the Internet by user an IMAP client application. Which other IP port must you allow through the firewall?

A. IMAPS (port 993).
B. HTTPS (port 443).
C. NetBIOS (port 137).
D. RPC endmapper (port 135).

Ans: A

DS SITE CONFIGURATION:

Q: Your company's Exchange Server organization consists of multiple sites. Your company has a business division named ATG that does classified work. The ATG division is in its own site and its own Microsoft Windows NT domain. Your company does not want the directory information about ATG employees to be visible to the other connected sites within its Exchange Server organization. However, your company still wants users in each site to be able to send messages to all Exchange Server recipients. The company wants ATG employees to be able to view directory information about all recipients from all other sites. What should you do to accomplish this?

A. Clear all directory replication attributes in the DS Site Configuration object for on the ATG site.
B. Grant permissions for the recipients container to only Exchange Server service accounts in the ATG domain.
C. Use X.400 Connectors to connect all sites. Configure the trust levels of all X.400 Connectors to be lower values than those of the ATG recipients containers.
D. Configure the trust levels for all recipients containers in the ATG site to be higher values than those of all other recipients containers in your organization.

Ans: A (Clear all)

Q: You are configuring security for an Exchange Server site. You want to exchange messages with other sites. You want to replicate only the first and last name of each recipient in the address list with every other site in your organization. You do not want to replicate any other directory information. You use an X.400 Connector for connectivity among sites. What else must you do so that only the first and last name of each recipient is replicated with other sites?

A. Create a unique Exchange Server ‘service account’ for the servers in each site.
B. Hide all of the recipients in your site from the ‘Address Book’.
C. Configure the X.400 MTA for your site so that it requires a password. Do not configure any of the MTAs in the other sites with passwords.
D. In ‘DS site Configuration’, select ‘only first name and last name’ for ‘intersite directory replication’.

Ans: D

MIGRATION:

Q: You are an administrator in an Exchange Server organization. How can you transfer mailboxes from an existing server in a site to a new server in the same site?

A. Use the Move User utility in the Administrator program.
B. On each client computer, enter the new server name in the Exchange Server service.
C. On the new server, create new mailbox accounts that use the same display names as those used on the existing server.
D. Back up the private IS on the existing server, and then restore individual mailbox accounts to the new server.

Ans: D

Q: You want to import employee information into Exchange Server directory. The employee telephone list is available in tab-delimited format from the human resources database. The employee work location list is available in tab-delimited format from the facilities database. You want to import both the employee telephone list and the work location list into the directory. You want to retain the information that is currently in the Exchange Server directory. What should you do?

A. Associate each employee record with the Exchange Server directory alias field. Import each file by using the second step of the ‘Microsoft Mail Migration’ tool.
B. Generate a new alias name from the human resources database. Associate each record in the human resources database and the facilities database with the new alias name. Import each database by using the ‘Import’ utility.
C. Export the Exchange Server directory to a file. Associate each record in the human resources database and the facilities database with the appropriate user in the Exchange Server directory. Import the updated file by using the ‘Import’ utility.
D. Export each database to a comma-delimited file. Associate each telephone number and each work location with the appropriate user in the Exchange Server directory. Import each file by using the ‘Import’ utility.

Ans: D (Could it be C? I think D looks more promising!)

FOLDERS:

Q: You are the administrator of an Exchange Server in multiple servers. When users create new public folders, the folders are created on Server A. After monitoring Server A, you notice that the hard disk on the server is almost full. You move all existing public folders from Server A to Server B. What should you do to ensure that all new public folders are created on Server B?

A. Delete each new replica on Server A as soon as the replica is created.
B. Configure Server B as the public folder server for all recipients on Server A.
C. Use Exchange Performance Optimizer to configure Server A as only a private information store server.
D. Restrict top-level folder creation for all users. Manually create all new public folders on Server B.

Ans: B

MS MAIL VS EXCHANGE:

Q: Your Microsoft Windows NT network has three Microsoft Mail post offices. One of the Microsoft Mail post offices is named Post2. You replace Post2 with an Exchange Server computer that you also name Post2. You then establish directory synchronization. You want to hide certain recipients on the new Exchange Server computer from the Microsoft Mail global address list. You want all recipients to be visible in the Exchange Server global address list. You create two recipients containers named Container A and Container B. You place the recipients that are to be hidden in Container B. You place all other recipients in Container A. How should you configure trust levels?

A. Configure the ‘trust level’ of each container to be a lower value than that of the ‘dirsync requestor’. Configure the ‘trust level’ of Container B to be a lower value than that of Container A.
B. Configure the ‘trust level’ of each container to be a higher value than that of the ‘dirsync requestor’. Configure the ‘trust level’ of Container B to be a lower value than that of Container A.
C. Configure the ‘trust level’ of container A to be a lower value than that of the ‘dirsync requestor’. Configure the ‘trust level’ of Container B to be a higher value than that of the ‘dirsync requestor’.
D. Configure the ‘trust level’ of container A to be a higher value than that of the ‘dirsync requestor’. Configure the ‘trust level’ of Container B to be a lower value than that of the ‘dirsync requestor’.

Ans: C (Users in B will be hidden, so B should have higher trust than DIR SYNC.)

DIAL-UP CONNECTION:

Q: Your Exchange Server computer uses a dial-up connection to connect to an SMTP server. You want to be able to send messages to the SMTP server at all times. How should you configure the dial-up connection to allow messages to be sent at any time?

A. Use the ‘Dynamic RAS’ connector to schedule the connection for ‘Always’
B. Use the ‘Dynamic RAS’ connector to assign an override ‘transfer time-out’ value.
C. Use the ‘Internet Mail Service’ to configure the ‘dial-up connection’ properties.
D. Configure the ‘Internet Mail Service’ to have a retry count of ‘0’.

Ans: C

REPLICATION:

Q: You are configuring security for Exchange Server site. You want to exchange messages with other sites. You want to replicate only the first and last name of each recipient in the address list with every other site in your organization. You do not want to replicate any other directory information. You use an X.400 Connector for connectivity among sites. What else must you do so that only the first and last name of each recipient is replicated with other sites?

A. Create a unique Exchange Server ‘service account’ for the servers in each site.
B. Hide all of the recipients in your site from the ‘Address Book’.
C. Configure the X.400 MTA for your site so that it requires a password. Do not configure any of the MTAs in the other sites with passwords.
D. In ‘DS site Configuration’, select ‘only first name and last name’ for ‘intersite directory replication’.

Ans: D

Q: Your Exchange Server uses custom attributes on a per-site basis. You do not want the custom attributes in your site to replicate to other sites. How should you configure your site?

A. Specify only the ‘custom’ attributes in the ‘DS Site Configuration’object.
B. Specify all attributes except the ‘custom’ attributes in the ‘DS Site Configuration’ object.
C. Configure the permissions on the ‘Directory Replication’ object to be for only the ‘Domain Admins’ group.
D. Configure the trust level of your ‘recipients’ container to be a higher value than that of the other recipients containers in the organization.

Ans: B (All attributes except custom)

Q: You have a laptop computer and a desktop computer. Both computers are configured with Microsoft Outlook. You want to be able to see all messages while using either computer. AutoArchiving is not enabled. The laptop computer does not have a continuous connection to the Exchange Server computer. You want to be able to read and compose messages while using the laptop computer offline. How should you configure your two computers?

A. Configure both computers with personal folder (.pst) files.
B. Configure both computers to access the server-based information store.
C. Configure only the laptop computer with a personal folder (.pst) file. Configure only the desktop computer to access the server-based information store.
D. Configure only the laptop computer with an offline folder (.ost) file. Configure only the desktop computer to access the server-based information store.

Ans: D (Offline folder = OST file. Public Folder = PST file.)

Back to Top

Monitoring and Optimization

Back to Top

Q. Where can you enable message tracking? (choose 3)

A. MTA
B. IS
C. IMS
D. MS-Mail connector
E. MS Exchange CC:Mail connector

Ans: A, B & C (MTA, IS, IMS = MTA train is in Mass.!)

Q: The MS Mail directory synchronization parameter used by a dirsync server to recompile the Global Address List is:

A. T1
B. T2
C. Newsfeed push
D. T3

Ans: B

Q: An Exchange Server recipient has the following default X.400 address:

X.400:c=us;a=;p=beans;o=coffee;s=jackson;g=sue.

What does the "o" field refer to as it relates to the Exchange Server topology?

A. the site name.
B. the organization name.
C. the name of the server.
D. the name of the container that contains the mailbox.

Ans: A (Although "o" stands for organization for X.400, it maps to site of Exchange.)

Q: You monitor the CPU usage on your Exchange Server computer. You notice heavy utilization when messages are sent to large distribution lists. What should you do to reduce the CPU load on your server?

A. Move all recipients to another server.
B. Move all recipients into one container.
C. Specify another computer as an expansion server.
D. Remove the Microsoft Mail address spaces for all recipients.

Ans: C

Q: Your Exchange Server computer exchanges messages with a server in another site over a 64-Kbps connection. You have a Site Connector configured between the two sites. The network experiences high latency and packet loss. Which two actions can you take to optimize performance for this configuration? (Choose two.)

A. Reduce the MTA checkpoint size.
B. Increase the MTA checkpoint size.
C. Increase the MTA message threshold.
D. Use X.400 Connectors between the two sites.
E. Use the Internet Mail Service to connect the two sites.

Ans: A & D (Did someone pick A and C? Sybex sez A & D in chapter 13.)

Back to Top

Scenarios Questions

Back to Top

Goto Exchange Study Guide for more detail.

SCENARIO:
You are formulating a backup strategy for your company. The computer that will be your Exchange server has two hard drives of equal capacity, with one of the drives significantly faster than the other.

Required:
A requirement of the backup strategy is to perform a complete backup every night.

Optional:
1. Restore all files at the moment of failure.
2. Minimize server response times for users.

Proposal:
1.
Place the transaction log files on the second faster hard disk.
2. Place the database files on the first slow hard disk. (Note that splitting the respective database and log files in separate hard disks would meet neither optional result therefore giving answer C.)
3. Enable circular logging. (Disabling circular logging gives answer A).
4. Perform a nightly backup.

SCENARIO:
Your Exchange server is using TCP/IP and is configured with LDAP, HTTP, and POP3. A firewall sits between your network and the Internet. Your Exchange server has its name and IP address entered into a public DNS server on the Internet.

Your network’s firewall prohibits traffic on all ports that are not explicitly allowed. The ports that are open are port 25 (SMTP), port 53 (DNS), port 80 (HTTP), and all ports greater than port 1023.

Required:
Management would like users to be able to connect over the Internet to your Exchange server using Microsoft Outlook and LDAP applications. Policy dictates that passwords be transmitted in a secure manner.

Optional:
1. While not required, management would like to Web clients that do not support Windows NT Challenge/Response authentication to be able to connect to your Exchange server.
2. POP3 clients can connect to the Exchange server and download their messages.

Proposal:
1. Assign port numbers to the Exchange Directory Service and Information Store. Then allow those ports through the firewall.
2. Configure LDAP on the Exchange server to allow anonymous access.
3. Configure the Exchange protocols to use SSL as an authentication method.
4. Allow SSL traffic through the firewall.
5. Allow LDAP traffic (port 389) through the firewall.
6. Allow RPC traffic (port 135) through the firewall
7. All POP3 traffic (port 110) through the firewall.

SCENARIO:

You are establishing a backup strategy for your company's Exchange Server computer. The server has two hard disks that are used to store the Exchange Server data files. The hard disks have the same capacity. One hard disk is significantly faster than the other.

Required result:
1. You must ensure that all directory data and information store data is backed up to tape every night.

Optional Results:
2. You want the most recent Exchange Server database transactions to be recovered if there is a hard disk failure that corrupts the Exchange Server database files.
3. You want to minimize server response time for users.

Proposal:
1. Place the information store database files and the information store transaction log files on the faster hard disk. Place the directory database file and the directory transaction log files on the slower hard disk.
2. Use the Microsoft Windows NT Backup program to perform a full tape backup of the Exchange Server transaction log files and the information store database files every night.
3. Disable circular logging.

SCENARIO:

You are establishing a backup strategy for your company's Exchange Server computer. The server has two hard disks that are used to store the Exchange Server data files. The hard disks have equal capacity. One hard disk is significantly faster than the other.

Required:
1. You must ensure that all directory data and information store data is backed up to tape every night.

Optional:
2. You want the most recent Exchange Server database transactions to be recovered if there is a hard disk failure that corrupts the Exchange Server database files.
3. You want to minimize server response time for users.

Proposal:
A. Place the information store database files and the information store transaction log files on the faster hard disk. Place the directory database file and the directory transaction log files on the slower hard disk.
B. Use the Microsoft Windows NT Backup program to perform a full tape backup of the Exchange Server transaction log files and the information store database files every night.
C. Enable circular logging.

Back to Top

Troubleshooting

Back to Top

Q: An Exchange user, Anita, sends a message through the Internet to another Exchange user named Brooks at Brooks@sprockets.com. anita receives an NDR stating "Recipient not found: SPROCKETS.COM." You confirm that Brook’s mailbox is configured with the email address SMTP:Brooks@sprockets.com. What is the likely problem?

A. Anita’s mailbox is not configured with TCP/IP.
B. Anita has exceeded her mailbox size.
C. Anita’s Internet Mail Service has exceeded its licenses.
D. The host sprockets.com is not entered in DNS.

Ans: D

Q: An IMS server sends mail to a Domain-A and a Domain-B. As IMS administrator, you begin to receive reports that Exchange email attachments sent to Domain-B have been arriving as unreadable text. You investigate and find out that the problem does not exist with attachments sent to Domain-A. You also find out that Domain-A uses MIME while Domain-B uses uuencode. How would you fix this problem?

A. Use the Internet Mail property page and designate UUENCODE as the encoding method for Domain-B.
B. Use the Internet Mail property page and designate MIME as the encoding method for Domain-A.
C. Configure Domain-B as SSL
D. Configure IMS for SASL

Ans: A

Q: You want to use an X.400 Connector to send messages to a foreign mail system (i.e., a mail system not part of your organization). The computer name of your X.400 Connector bridgehead is 16 characters in length. But the foreign mail will only accept names up to 8 characters. What can you do to remedy this situation?

A. There is nothing you can do.
B. Specify a window size of 8.
C. Add a custom recipient to the X.400 Connector.
D. Enter an 8 character name in the Local MTA field on the Override page.

Ans: D

Q: Your company has had problems with Exchange disk drives becoming full and stopping the IS service. What could you do to receive a warning before the IS reaches its limit again?

A. Configure Microsoft Windows NT Performance Monitor to send you an email message when the Push Notification Cache Size has reached 100 percent.
B. Configure Microsoft Windows NT Performance Monitor to send you an email message when the available disk space gets low.
C. Configure Microsoft Windows NT Server Monitor to send you a Microsoft Windows NT alert before the IS service stops.
D. Configure Microsoft Windows NT Server Monitor to send you an email message before the IS service stops.

Ans: B

Q: You have your Exchange server backed up using an offline backup procedure. After a hardware failure of that server, you restore the server using the offline backup tapes. But after the restore is complete, the IS will not start. What do you need to do?

A. Run EDBUTIL.
B. Run EDBUTIL with the consistency option.
C. Run SCANPST on each user’s OST file.
D. Run ISINTEG – Patch.

Ans: D (Repatch IS.)

Q: An IMAP4 client connects to your Exchange server and receives an error message stating that the message size is unknown. Which of the following should you do to fix this problem?

A. Enable MCIS.
B. Increase the Idle-Timeout.
C. Use Plain-Text authentication.
D. Clear the "Enable fast message retrieval" check box.

Ans: D

Q: You use IMAP client to delete a message. How do you recover?

Ans: Recover from Outlook.

Q: You use IMAP client to delete a message. Can you possible recover that message from Outlook?

Ans: Yes, use IMAP client configuration to recover if IMAP deleted it.

Q: A user named Jane uses Microsoft Outlook on both her office computer and her home computer. One night at home, Jane connects to her office server in order to read her mail. The next day at the office when Jane attempts to re-read the previous day’s mail, there are no messages in her inbox. What is the most likely cause of this situation?

A. Jane’s mail was delivered to an OST file on her home computer.
B. Jane’s home computer is still logged on to the server.
C. Jane did not synchronize her mailbox with the server.
D. Jane’s mail was delivered to a PST file on her home computer.

Ans: D

Q: You are the administrator of an Exchange Server computer. Some of the users in your company access their Exchange Server mailboxes by using POP3 client software. These users report that they are unable to send messages by using POP3. However, they are able to receive messages. What should you do so that these users can send messages through the server?

A. Enable IMAP4 at the site level.
B. Enable POP3 at the server level.
C. Configure the ‘Internet Mail Service’ to reroute incoming SMTP mail.
D. Change the POP3 method of authentication to ‘Microsoft Windows NT Challenge/Response’ authentication.

Ans: C

Q: Helene has a laptop computer configured with Microsoft Outlook and an offline folder (.ost) file. She periodically synchronizes her laptop computer with the server. Helene wants  to be able to access the contents of a new public folder while she works offline. When she examines the property page of the public folder, she does not see the Synchronization tab. What must be done to enable synchronization of the public folder?

A. Helene must designate the public folder as a Favorite folder.
B. Helene must create a shortcut for the public folder in the Outlook Bar.
C. The administrator must configure the public folder for synchronization.
D. The owner of the public folder must configure the folder for synchronization

Ans: A

Q: You create a distribution lists on your Exchange Server computer. When users request read receipts for messages they send to the distribution list, they receive receipts only from the list. They do not receive a read receipt from each user on the list. What is the most likely cause of the problem?

A. The distribution list is hidden from the Address Book.
B. The distribution list membership is hidden from the Address Book.
C. The distribution list is configured to report to the message originator.
D. The distribution list is configured to report to the owner of the distribution list.
E. The trust level of the distribution list is set to a higher value than that of each user's recipients container.

Ans: E

Q: You are the administrator of an Exchange Server computer. You configure the server to retain deleted items for seven days. While accessing the server with an IMAP4 client application, Marc deletes messages. While accessing the server with MS Outlook, Marc wants to recover one of the deleted items. Marc does not find the item in the list of possible items to recover. What can you do to recover the item?

A. Recover the item manually from the Priv.edb file by using the Mdbvu32.exe utility.
B. Recover the item by using an IMAP4 client application.
C. Add the DumpsterAlwaysOn key to the registry on your client computer, and then log on to Marc's mailbox to recover the item.
D. Add the DumpsterAlwaysOn key to the registry on your ESC, and then log on to Marc's mailbox to recover the item.

Ans: B

BACKUP:

Q: The information store databases on your Exchange Server computer are located on one disk. The transaction log files are located on another physical disk that uses a separate drive controller. You disable circular logging. The controller on the disk that contains the store databases malfunctions and corrupts the databases. You want to restore the databases from backup media. You made a full backup four days ago. You have made three incremental backups since then. The hardware failure occurred 12 hours after the last incremental backup. Which information can be restored?

A. Only the information stored prior to the last full backup.
B. Only the information stored after the last incremental backup.
C. Only the information stored after the last full backup but prior to the last incremental backup.
D. All information stored prior to the last time at which logs were written.

Ans: D (last logs)

Q: Your organization has an Exchange server with two disk controllers and hard drives. One hard drive contains the IS databases, the other hard drive has the transaction log files. Circular logging is disabled. One day one of the disk controllers malfunctions and corrupts the IS databases. You made a full backup four days ago, and did three incremental backups since then. The hardware failure took place 12 hours after the last incremental backup. What information can be restored?

A. Only the information stored after the last full backup but prior to the last incremental backup.
B. All information stored prior to the last time the logs were updated.
C. Only the information stored prior to the last full backup.
D. Only the information stored after the last incremental backup.

Ans: B (Different wording)

Q: You perform Full backup during weekend and Incremental backup during weekday. If you lose one of the Incremental backups, is it possible to recoever all the following backups for that particular week?

Ans: No. You cannot recreate all Transaction logs. (Similar to above question)

Q: Deleted item retention time of 4 days is set. Server does not permanently delete deleted items until after Private IS store has been backup up. A user wants to restore an item deleted on previous day. A full backup was performed on previous night. How to restore that item ? 

A. Restore from backup
B. Replay from transaction log
C. Recover in Outlook
D. Logon Outlook as administrator and restore item.

Ans: C

Q: You perform an offline backup on an Exchange Server computer. After a hardware failure, you perform a restore operation. However, after you perform the restore operation, the Information Store service will not start. What should you do to start the Information Store service?

A. Run the ‘Isinteg’ utility with the ‘–patch’ switch.
B. Run the ‘Scanpst’ utility on each user's ‘offline folder’ (.ost) file.
C. Run the ‘ESEutil’ utility with the ‘Consistency’ option.
D. Run the ‘ESEutil’ utility with the ‘Recovery’ and ‘Defragmentation’ options.

Ans: A

LDAP:

Q: You configure LDAP to allow anonymous access. Users outside your firewall are unable to access the LDAP directory. What is the most likely cause of the problem?

A. The appropriate port is not open on the firewall.
B. You did not enable clear text authentication on LDAP.
C. You did not stop and restart the Exchange Server directory service.
D. You did not set a value for DisableResolverSearchList in the registry.

Ans: A

Q: You enable LDAP and allow anonymous access. You notice that several directory fields are visible to anonymous users who connect over the Internet. You want these directory fields to be hidden. What should you do to prevent these fields from being visible to Internet users?

A. Set LDAP to allow only initial substring searches.
B. Remove the fields from the definition template for each mailbox.
C. Clear the fields in the attributes of the ‘DS Site Configuration’ object.
D. Configure the trust level for the protocols container to be a lower value than that of the recipients container.

Ans: C

IPX VS TCP/IP:

Q: You use Exchange Server on your company's LAN. The LAN uses IPX as its only network protocol. Your Exchange Server computer is configured with two network adapters. The internal network adapter uses only IPX and is connected only to the LAN. The external network adapter uses only TCP/IP and is connected directly to the Internet. The Internet Mail Service in installed and configured. Users try to connect to the Exchange Server computer from the LAN by using Microsoft Outlook. When these users try to connect to the server, the client software takes up to 10 minutes to connect and to transfer mail or scheduling data. What should you do to reduce the time it takes for the client software to connect to the server and to transfer data?

A. Bind TCP/IP to the network adapter of each client computer.
B. Bind TCP/IP to the internal network adapter of the Exchange Server computer.
C. Change the RPC binding order on each client computer.
D. Change the RPC binding order on the Exchange Server computer.

Ans: C

MS MAIL VS EXCHANGE:

Q: You configure the Microsoft Mail Connector to send and receive mail between Exchange Server and Microsoft Mail. You use the Migration Wizard to migrate Maria's mailbox from Microsoft Mail to ES. After the migration, Maria does not receive mail from Microsoft Mail users, even though mail has been sent. However, she is able to send mail to Microsoft Mail users. What is the most likely cause of the problem?

A. Maria's original Microsoft Mail mailbox was deleted.
B. Maria's original Microsoft Mail mailbox was not deleted.
C. The Microsoft Mail Connector is configured for sending but not for receiving.
D. The Microsoft Mail Connector is not configured to synchronize directories with ES.

Ans: B

Q: Half of your company's users use Exchange Server in one Microsoft Windows NT domain. The other half of your company's users use Microsoft Mail in another Windows NT domain. Trust relationships have not been established between the domains. An Exchange Server user named Peter uses Microsoft Outlook to create an appointment that includes a Microsoft Mail user named Anne. When Peter views the Planner tab, he cannot see Anne's availability. However, Peter is able to send e-mail messages to Anne. What should you do so that Peter can see Anne's availability?

A. Establish a two-way trust relationship between domains.
B. Configure the ‘Microsoft Schedule+ Free/Busy’ Connector.
C. Have Anne grant ‘Reviewer’ permission to Peter for her schedule.
D. Relocate the Microsoft Mail post-office to the same Windows NT Server computer that is running Exchange Server.

Ans: B

Q: Your company is made up of two domains, one includes MS Mail and the other has Exchange. Each domain and its message system has about half the users. There are no trust relationships between the two domains. A Microsoft Exchange recipient named Robert uses Microsoft Schedule+ 7.5 to create an appointment that includes a Microsoft Mail user named Shelley. When Robert views the Planner tab, he cannot see Shelley’s availability. But Robert can send e-mail to Shelley. What do you need to allow Robert to view Shelley’s availability?

A. Establish a two-way trust between the domains.
B. Delete and re-create the Microsoft Schedule+ Free/Busy public folder.
C. Relocate the Microsoft Mail post office to the same machine as the Exchange server.
D. Configure the Microsoft Schedule+ Free/Busy Connector.

Ans: D (Different wording from different wordy people!)

Q: You are migrating users from Microsoft Mail to Exchange Server. You run the Migration Wizard from a Microsoft Windows NT Workstation computer. You notice that you are only able to convert 0.5 MB of mail data per minute. You configure Windows NT Performance Monitor for both the Microsoft Mail server and the Microsoft Exchange Server computer. The processor, logical disk, memory, and network are all at 10 percent capacity for both servers. Overall network utilization is averaging 20 percent. What is the most likely cause of the slow conversion rate?

A. the paging file of the Microsoft Mail server.
B. the paging file of the Exchange Server computer.
C. the processor of the Microsoft Mail server.
D. the processor of the Windows NT Workstation computer.

Ans: B

INTERNET MAIL SERVICE (IMS):

Q: Trey Research removes its UNIX-based POP3 and SMTP server. Trey Research replaces this server with an Exchange Server computer that runs the Internet Mail Service. The new server has the same IP address and DNS host name as the previous server. When users connect to the new server from POP3 client applications, they can retrieve mail. However, the users receive an error message when they try to send messages via the Internet. What is the most likely cause of the problem?

A. The users' POP3 client applications do not support SSL.
B. The users' POP3 client applications do not support Microsoft Windows NT Challenge/Response authentication.
C. The Internet Mail Service is set so that it does not reroute incoming SMTP mail.
D. The Internet Mail Service is set to an SMTP address type rather than to a POP3 address type.

Ans: C

Q: E-mail attachments you send to Arbor Shoes arrive as unreadable text. The Arbor shoes mail server supports only UUENCODE attachments. The attachments you send to other recipients on the Internet arrive intact and readable. All of these other recipients support MIME. What should be done so that attachments sent to both Arbor Shoes and to the other Internet recipients are readable?

A. Configure the Internet Mail Service to use UUENCODE for all attachments.
B. Configure the Internet Mail Service to use MIME for all attachments sent to any domain except Arbor Shoes. Configure the Internet Mail Service to use UUENCODE for all attachments sent to Arbor Shoes.
C. All users who send mail to Arbor Shoes recipients must add those recipients to their personal address books.
D. The users must configure address book properties for Arbor Shoes recipients so that attachments are never sent in MIME format.

Ans: B (I just corrected this one. Used to be A. I think B is right.)

Q: Your Exchange environment uses IMS to send and receive SMTP mail with a company named Sockets & Wrenches. Sockets & Wrenches uses a host-based SMTP mail system. When users on your system send mail to the name of the host at Sockets & Wrenches, it is not delivered. But if those users use an IP address for addressing, the mail is delivered. You are informed that other systems can send mail to S & W using a host name in the addressing. What should you do to enable your users to be able to send mail to S & W using a host name in the addressing? (Select the best answer.)

A. Configure a DNS server in the TCP/IP network configuration on your server.
B. Configure a HOSTS file on each client.
C. Configure an LMHOSTS file on each client.
D. Configure IMS to forward all mail to Sockets & Wrenches.

Ans: A (What is TCP/IP question doing here?!)

PAGING FILES:

Q:  Suzanne is installing Exchange Server for her company. The server has 64 MB of RAM and a 32-MB paging file. Suzanne specifies the Exchange Server domain account to be the service account dedicated for the Exchange Server services. During installation, the Setup program creates the proper directories, copies the installation, asks for the name of the service account, and begins to start the Exchange Server services. The System Attendant service starts, but during the startup of the Directory Store service, Setup fails. What is the most likely cause of the problem?

A. The size of the paging file needs to be increased.
B. The paging file is located on the same logical drive as the Exchange Server information store databases.
C. When Suzanne created the Exchange Server account, she did not grant it the right to log on as a service.
D. When Suzanne created the Exchange Server account, she did make it a member of the Administrators group.

Ans: A (You should know when to increase paging file or run Optimizer.)

DIRSYNC:

Q: Your Microsoft Exchange Server is configured as a dirsync server and has remote dirsync requestors defined. You configure the synchronization time on the Exchange server to Always. Three hours later, you notice that Microsoft Mail recipients have not yet replicated to your Exchange Global Address List. What is the solution to this problem?

A. In Microsoft Mail, set the T1, T2, and T3 times to be the same.
B. Set the T2 time on the Microsoft Exchange Server to be one hour later than the T2 time in Microsoft Mail.
C. Run the REQMAIN utility with the transport option on the Microsoft Mail post office.
D. Run the REQMAIN utility with the Receive option on the Microsoft Exchange Server.

Ans: C (Sometimes it's a bit slow to synch two different servers. Running REQMAIN will immediately update dir replication.)

Q: You are configuring your Exchange Server computer as a dirsync server. You configure a remote dirsync requestor. You configure your Microsoft Mail post-office as a dirsync requestor. You then set the synchronization times on the Exchange Server computer for Always. Three hours later, you notice that Microsoft Mail recipients have not yet appeared in the Exchange Server global address list. What must you do to complete directory synchronization?

A. Run the ‘Reqmain’ utility with the ‘Transmit’ option on the Microsoft Mail post-office.
B. Run the ‘Reqmain’ utility with the ‘Receive’ option on the Exchange Server connector post-office.
C. In Microsoft Mail, set the ‘T1’, ‘T2’ and ‘T3’ times to be the same.
D. Set the ‘T2’ time on the Exchange Server computer to be one hour later than the ‘T2’ time in Microsoft mail.

Ans: A (Different wording from different wordy people!)

INTERNET RELATED:

Q: You are the administrator of an Exchange Server computer that is connected to the Internet. You have configured the Internet Mail Service to reroute incoming SMTP mail. You discover that your Internet Mail Service is being used as a relay host for unsolicited e-mail. You want to stop the relay of the unsolicited mail and still allow rerouting of mail for internal recipients. What should you do?

A. Add a domain value of ‘*’ to the routing table.
B. Build a custom routing program to delete all messages from the originator of the unsolicited mail and route all other mail to the proper host.
C. Add a list of hosts that are not allowed to relay mail through the server to the registry of the Exchange Server computer. Set the registry relay flag to allow all hosts that are not explicitly denied.
D. Create a custom recipient that has the e-mail address of the originator of the unsolicited e-mail. Configure the delivery restrictions in the ‘Internet Mail Service’ to reject all messages from that custom recipient.

Ans: D (Use IMS to reject mail from Internet)

Q: How can you overcome a slow growth of Exchange Server?

Ans: Online maintenance

OFFLINE:

Q: You are the administrator of seven Exchange Server computers. You have configured a server monitor on one of the computers to monitor the system attendant on each of the other six computers. You want to take one of the servers offline for maintenance. You do not want to cause an error in the server monitor. What should you do?

A. Remove the server from the netork before you perform maintenance.
B. Manually stop the ‘System Attendant’ service for the server that you plan to take offline.
C. Run the ‘Administrator’ program with the ‘monitor suspension’ options before you perform maintenance.
D. Remove the server from the ‘server monitor’ before you perform maintenance.

Ans: C (Monitor Suspension)

Back to Top

Initial Publication: 5/3/99
By Sicharlie