Visit http://www.LearnQuick.Com
These are helpful questions about Exchange Server 5.5 TEST when it was not adaptative.
CONTENT:
070-081: Exchange Server 5.5 EXAM
1. Your company is migrating 125 users from Microsoft Mail to Exchange
Server. You want to limit the amount of data that is migrated to 50 MB per
user. You also want to enforce a 50-MB mailbox limit once each user has been
migrated to Exchange Server.
What should you do? (Choose two.)
¨ A. Migrate only e-mail messages for all users.
¨ B. Run the 'Edbutil' utility before you begin the migration.
¨ C. Set the Exchange Server mailbox storage limit to 50 MB.
¨ D. Reduce the size of the Microsoft Mail message store to 50 MB before
migration.
¨ E. Run the Microsoft Mail 'Reqmain' utility before you begin the
migration.
2. You have installed the KM server in your Exchange Server organization.
When employees leave your company, you disable their Exchange Server
mailboxes and revoke their security keys. You leave the mailboxes in your
Exchange Server organization until the key expiration date. As more keys are
revoked, client performance slows down.
Which security key management strategy should you use to improve the
performance of client applications?
¡ A. Extend the expiration dates on security keys.
¡ B. Delete the security file from client computers when user mailboxes are
disabled.
¡ C. Configure a second KM server in your Exchange Server organization.
¡ D. Delete users from the Exchange Server organization instead of revoking
security keys.
3. You want to install Exchange Server for all users in your company's two
main buildings. Building A has 15 users. Building B has 25 users.
The two buildings are connected to one another by dedicated routers and a
33.6 Kbps dial-up connection. Most of the messaging traffic will occur
within each building. Less than 10 percent of the messaging traffic will
occur between the two buildings.
Which configuration should you implement to minimize traffic between the
buildings?
¡ A. Install one Exchange Server computer in Building A.
¡ B. Install two Exchange Server computers in Building B.
Configure the servers as members of the same site.
¡ C. Install one Exchange Server computer in each building.
Configure the servers as members of the same site.
¡ D. Install one Exchange Server computer in each building.
Configure each server as a member of its own site.
4. You want to provide long-term consistency between Exchange Server and
Microsoft Mail. Users will eventually be migrated from Microsoft Mail to ES.
What should you do to create a global distribution list that will be
available to users on both systems?
¡ A. Establish directory synchronization between Exchange Server and
Microsoft Mail.
Create an Exchange Server distribution list that includes all of the users.
¡ B . Establish directory synchronization between Exchange Server and
Microsoft Mail.
Create a Microsoft Mail distribution list that includes all of the users.
¡ C. Establish Internet mail connectivity between Exchange Server and
Microsoft Mail.
Create SMTP-based custom recipients for each Microsoft Mail user.
Create an Exchange Server distribution list that includes all Exchange
Server users and all Microsoft Mail Internet-based custom recipients.
¡ D. Create a Microsoft Mail distribution list that includes all Microsoft
Mail users.
Create an Exchange Server distribution list that includes all Exchange
Server users.
Create an Exchange Server distribution list that includes the Microsoft
Mail distribution list and the Exchange Server distribution list.
5. An Internet Service Provider (ISP) has 500 customers. The ISP can support
up to 50 concurrent customer connections. The ISP provides messaging
services to its customers and its employees by using two Exchange Server
computers.
Employees use Microsoft Outlook to send and receive messages. Customers use
POP3 client applications and Web browsers to send and receive messages.
Mailbox accounts are distributed between the two servers as shown in the
following table:
Exchange Server Computers Number of customer mailboxes Number of employee
mailboxes
Server A 250 20
Server B 250 0
How many client access licenses must the ISP purchase?
¡ A. 50
¡ B. 120
¡ C. 250
¡ D. 520
6. You plan to install an Exchange Server computer. There are 200 client
computers on your LAN. There are also 150 client computers that connect to
the LAN by using an asynchronous dial-up connection. Your LAN is divided
into four segments as shown in the following table. All segments are
connected by a 10/100 Ethernet Switch.
Segment Number of users Ethernet segment speed
A 0 100 megabit
B 125 10 megabit
C 75 10 megabit
D 150 (remote) 10 megabit
On which segment should you place the Exchange Server computer for optimal
client connectivity performance for all client computers?
¡ A. Segment A
¡ B. Segment B
¡ C. Segment C
¡ D. Segment D
7. Your company is migrating from Microsoft Schedule+ 7.5 to Microsoft
Outlook Calendar. You want Microsoft Outlook Calendar users to be able to
read other users' Schedule+ 7.5 calendars.
What must you do?
¡ A. Configure the Schedule+ 7.5 calendar to grant read access to Outlook
users.
¡ B. Install the Schedule+ Free Busy Connector.
¡ C. Install Schedule+ 7.5 on the Outlook users computers.
¡ D. Configure Send As permissions for the Outlook users on the Schedule+
7.5 users' mailboxes.
8. You plan to install Exchange Server on two computers that will belong to
the same organization. You want to install the servers as separate sites.
Each server will be in a different Microsoft Windows NT domain.
You want to connect the sites by using an X.400 connector. You want
administrators to be able to administer only their own sites.
Which trust relationships and account configuration should you use?
¡ A. Establish a full two-way trust relationship.
No account information needs to be shared.
¡ B. Establish a 1-way trust relationship in either direction.
Both accounts must have the same name and the same password.
¡ C. No trust relationships need to be established.
Both accounts must have the same name and the same password.
¡ D. No trust relationships need to be established.
No account information needs to be shared.
9. You perform a full backup of your Exchange Server computer every Friday.
You do not perform any backups on any other day. You configure the deleted
items retention time for mailboxes to be four days. Your users do not use
personal folder (.pst) files.
You want to ensure that users will be able to restore all deleted messages.
What else should you do?
¡ A. Disable circular logging.
¡ B. Configure message tracking on the Exchange Server computer.
¡ C. Configure the client profiles so that they do not delete deleted items
upon exit.
¡ D. Configure deleted items retention so that items are not deleted until
after the information store has been backed up.
10. You are the administrator of an Exchange Server computer that hosts
mailboxes for 500 users. You enable IMAP for all users. Your server is
protected from the Internet by a firewall. Your firewall is configured to
allow all IP traffic out to the Internet. It is also configured to allow
SMTP (port 25), IMAP (port 143), and HTTP (port 80). Your IMAP service is
configured as shown in the exhibit (Click the Exhibit button).
You want to enable users to access the server from the Internet by user an
IMAP client application.
Which other IP port must you allow through the firewall?
¡ A. IMAPS (port 993).
¡ B. HTTPS (port 443).
¡ C. NetBIOS (port 137).
¡ D. RPC endmapper (port 135).
11. You are the administrator of an Exchange Server computer. You want your
users to be able to exchange e-mail messages with users on a Novell
GroupWise computer. The GroupWise computer is configured with a message
handling system (MHS) gateway and full Internet messaging connectivity.
Which two actions should you take so that your users can exchange messages
with the users on the GroupWise computer? (Choose two).
¨ A. Configure a dirsync server on the Exchange Server computer.
¨ B. Schedule directory replication on the Exchange Server computer.
¨ C. Import the GroupWise user mailboxes to the Exchange Server computer.
¨ D. Install and configure the Internet Mail Service on the Exchange Server
Computer.
¨ E. Add the GroupWise users as custom recipients on the Exchange Server
Computer.
Select two answers.
12. You are planning the configuration of an Exchange Server computer that
will route mail to the Internet. You want to minimize cost by limiting the
amount of time your server is connected to the Internet via an Internet
Service provider (ISP).
How should you configure the Internet Mail Service and connectivity to the
Internet to minimize cost?
¡ A. Establish a dedicated connection to the Internet.
Configure the Internet Mail Service to minimize the bandwidth it uses when
sending mail.
¡ B. Establish a dial-up connection to the Internet.
Configure the Internet Mail Service to use ETRN to retrieve mail from the
ISP.
¡ C. Establish a dedicated connection to the Internet.
Configure the Internet Mail Service to use ETRN to retrieve mail from the
ISP.
¡ D. Establish a dial-up connection to the Internet.
Configure the Internet Mail Service to use TURN to retrieve mail from the
ISP.
13. You add 64 MB of RAM to your Exchange Server computer. You want to make
sure that your Exchange Server uses the additional memory.
What should you do?
¡ A. Set foreground application performance to maximum.
¡ B. Run a consistency check on the private information store.
¡ C. Increase the paging file on the Exchange Server computer.
¡ D. Run the Performance Optimizer utility on the Exchange Server computer.
14. Your company's primary Exchange Server computer does not have a tape
backup device. You install a standby Exchange Server computer that performs
a file-based backup of the primary server every night.
You want to create a batch file that will stop the Exchange Server services
on the primary server and copy the necessary files to the backup server.
Which files must you include in the batch copy process? (Choose three).
¨ A. directory file.
¨ B. checkpoint file.
¨ C. transaction log file.
¨ D. public information store file.
¨ E. private information store file.
¨ F. personal information store file.
15. You create a Microsoft Outlook network share on your Exchange Server
computer. You want to predefine the client application settings so that
users will need to provide only the minimum configuration information when
they install their client software.
How should you predefine the client application settings?
¡ A. Edit the Template .prf file.
Copy this file to each user's home directory.
¡ B. Edit the Template .prf file.
Copy this file to the network share.
¡ C. Edit the Default .prf file.
Copy this file to each user's home directory.
¡ D. Edit the Default .prf file.
Copy this file to the network share.
16. You configure alias name generation for your Exchange Server computer to
be the first letter of the first name and the seven letters of the last name
to match your existing Microsoft Windows NT naming conventions.
You want the SMTP addresses for all users to be the first letter of the full
last name.
What should you do?
¡ A. Change Site Addressing for SMTP to use the first letter of the first
name and the full last name.
¡ B. Change the display name generation for users to be the first letter of
the first name and the full last name.
¡ C. Edit each user's SMTP address space to use the first letter of the
first name and the full last name.
¡ D. Add users by using a template account that has an SMTP address space of
the first letter of the first name and the full last name.
17. You want to shut down one of the chat server on your chat network. You
want to make the shutdown transparent to new users who will be connecting to
your collection of chat servers.
What should you do?
¡ A. Disable new connections, and wait for all existing connections to
terminate.
¡ B. Close the portal between the other chat servers on your network.
¡ C. At the command line, type net stop chatsvc.
¡ D. Pause the Workstation service, and wait for all existing connections to
terminate.
18. Helene has a laptop computer configured with Microsoft Outlook and an
offline folder (.ost) file. She periodically synchronizes her laptop
computer with the server. Helene wants to be able to access the contents of
a new public folder while she works offline. When she examines the property
page of the public folder, she does not see the Synchronization tab.
What must be done to enable synchronization of the public folder?
¡ A. Helene must designate the public folder as a Favorite folder.
¡ B. Helene must create a shortcut for the public folder in the Outlook Bar.
¡ C. The administrator must configure the public folder for synchronization.
¡ D. The owner of the public folder must configure the folder for
synchronization
19.
Situation:
You are establishing a backup strategy for your company's Exchange Server
computer. The server has two hard disks that are used to store the Exchange
Server data files. The hard disks have the same capacity. One hard disk is
significantly faster than the other.
Required result:
1) You must ensure that all directory data and information store data is
backed up to tape every night.
Optional desired results:
1) You want the most recent Exchange Server database transactions to be
recovered if there is a hard disk failure that corrupts the Exchange Server
database files.
2) You want to minimize server response time for users.
Proposed solution:
Place the information store database files and the information store
transaction log files on the faster hard disk. Place the directory database
file and the directory transaction log files on the slower hard disk.
Use the Microsoft Windows NT Backup program to perform a full tape backup of
the Exchange Server transaction log files and the information store database
files every night.
Disable circular logging.
Which results does the proposed solution produce?
¡ A. The proposed solution produces the required result and produces both of
the optional desired results.
¡ B. The proposed solution produces the required result and produces only
one of the optional desired results.
¡ C. The proposed solution produces the required result but does not produce
either of the optional desired results.
¡ D. The proposed solution does not produce the required result.
(Select the best answer)
20. You create a distribution lists on your Exchange Server computer. When
users request read receipts for messages they send to the distribution list,
they receive receipts only from the list. They do not receive a read receipt
from each user on the list.
What is the most likely cause of the problem?
¡ A. The distribution list is hidden from the Address Book.
¡ B. The distribution list membership is hidden from the Address Book.
¡ C. The distribution list is configured to report to the message
originator.
¡ D. The distribution list is configured to report to the owner of the
distribution list.
¡ E. The trust level of the distribution list is set to a higher value than
that of each user's recipients container.
21. Your company's Exchange Server organization consists of multiple sites.
Your company has a business division named ATG that does classified work.
The ATG division is in its own site and its own Microsoft Windows NT domain.
Your company does not want the directory information about ATG employees to
be visible to the other connected sites within its Exchange Server
organization. However, your company still wants users in each site to be
able to send messages to all Exchange Server recipients.
The company wants ATG employees to be able to view directory information
about all recipients from all other sites.
What should you do to accomplish this?
¡ A. Clear all directory replication attributes in the DS Site Configuration
object for on the ATG site.
¡ B. Grant permissions for the recipients container to only Exchange Server
service accounts in the ATG domain.
¡ C. Use X.400 Connectors to connect all sites. Configure the trust levels
of all X.400 Connectors to be lower values than those of the ATG recipients
containers.
¡ D. Configure the trust levels for all recipients containers in the ATG
site to be higher values than those of all other recipients containers in
your organization.
22. Franz has configured the backup strategy for his Exchange Server
computer for offline backups. Circular logging is disabled. Last night, a
full backup was performed and completed successfully. This morning, Franz
discovers that his server has stopped functioning.
Franz restores the IS and the directory on the server by using MS Windows NT
Backup.
What should he do next?
¡ A. Run the 'Edbutil' utility with the /r switch.
¡ B. Update the .mdb files and any log files that exist on the Exchange
Server computer.
¡ C. Run the 'Isinteg' utility with the -patch switch.
¡ D. Do nothing. After the files are restored, the backup program will
automatically restart the Exchange Server services.
23. You are the administrator of an Exchange Server computer. You configure
the server to retain deleted items for seven days. While accessing the
server with an IMAP4 client application, Marc deletes messages. While
accessing the server with MS Outlook, Marc wants to recover one of the
deleted items. Marc does not find the item in the list of possible items to
recover.
What can you do to recover the item?
¡ A. Recover the item manually from the Priv.edb file by using the
Mdbvu32.exe utility.
¡ B. Recover the item by using an IMAP4 client application.
¡ C. Add the DumpsterAlwaysOn key to the registry on your client computer,
and then log on to Marc's mailbox to recover the item.
¡ D. Add the DumpsterAlwaysOn key to the registry on your ESC, and then log
on to Marc's mailbox to recover the item.
24. You are an administrator in an Exchange Server organization. How can you
transfer mailboxes from an existing server in a site to a new server in the
same site?
¡ A. Use the Move User utility in the Administrator program.
¡ B. On each client computer, enter the new server name in the Exchange
Server service.
¡ C. On the new server, create new mailbox accounts that use the same
display names as those used on the existing server.
¡ D. Back up the private IS on the existing server, and then restore
individual mailbox accounts to the new server.
25. You install two servers in a Exchange Server site. The two servers are
named ServerA and ServerB. All users in the finance department connect to
ServerA. All users in the marketing department connect to ServerB. Each
department has its own Exchange Server administrator. The site has only one
recipients container.
You want the marketing administrator to be able to add and delete recipients
on both servers. You want the marketing administrator to be able to modify
only objects in the recipients container.
How should you configure security?
¡ A. Add the marketing administrator to the Domain Admins group.
¡ B. Grant the appropriate permissions to the marketing administrator on the
site container.
¡ C. Grant the appropriate permissions to the marketing administrator on the
organization container.
¡ D. Grant the appropriate permissions to the marketing administrator on the
configuration container.
26. Situation:
You are establishing a backup strategy for your company's Exchange Server
computer. The server has two hard disks that are used to store the Exchange
Server data files. The hard disks have equal capacity. One hard disk is
significantly faster than the other.
Required result:
1) You must ensure that all directory data and information store data is
backed up to tape every night.
Optional desired results:
1) You want the most recent Exchange Server database transactions to be
recovered if there is a hard disk failure that corrupts the Exchange Server
database files.
2) You want to minimize server response time for users.
Proposed solution:
Place the information store database files and the information store
transaction log files on the faster hard disk. Place the directory database
file and the directory transaction log files on the slower hard disk.
Use the Microsoft Windows NT Backup program to perform a full tape backup of
the Exchange Server transaction log files and the information store database
files every night.
Enable circular logging.
Which results does the proposed solution produce?
¡ A. The proposed solution produces the required result and produces both of
the optional desired results.
¡ B. The proposed solution produces the required result and produces only
one of the optional desired results.
¡ C. The proposed solution produces the required result but does not produce
either of the optional desired results.
¡ D. The proposed solution does not produce the required result.
27. The information store databases on your Exchange Server computer are
located on one disk. The transaction log files are located on another
physical disk that uses a separate drive controller.
You disable circular logging. The controller on the disk that contains the
store databases malfunctions and corrupts the databases. You want to restore
the databases from backup media.
You made a full backup four days ago. You have made three incremental
backups since then. The hardware failure occurred 12 hours after the last
incremental backup.
Which information can be restored?
¡ A. Only the information stored prior to the last full backup.
¡ B. Only the information stored after the last incremental backup.
¡ C. Only the information stored after the last full backup but prior to the
last incremental backup.
¡ D. All information stored prior to the last time at which logs were
written.
28. You are the administrator of an Exchange Server organization that has
multiple servers. When users create new public folders, the folders are
created on ServerA. After monitoring ServerA, you notice that the hard disk
on the server is almost full. You move all existing public folders from
ServerA to ServerB.
What should you do to ensure that all new public folders are created on
ServerB?
¡ A. Delete each new replica on ServerA as soon as the replica is created.
¡ B. Configure ServerB as the public folder server for all recipients on
ServerA.
¡ C. Use Exchange Performance Optimizer to configure ServerA as only a
private information store server.
¡ D. Restrict top-level folder creation for all users. Manually create all
new public folders on ServerB.
29. You configure LDAP to allow anonymous access. Users outside your
firewall are unable to access the LDAP directory.
What is the most likely cause of the problem?
¡ A. The appropriate port is not open on the firewall.
¡ B. You did not enable clear text authentication on LDAP.
¡ C. You did not stop and restart the Exchange Server directory service.
¡ D. You did not set a value for DisableResolverSearchList in the registry.
30. You use Exchange Server on your company's LAN. The LAN uses IPX as its
only network protocol. Your Exchange Server computer is configured with two
network adapters. The internal network adapter uses only IPX and is
connected only to the LAN. The external network adapter uses only TCP/IP and
is connected directly to the Internet. The Internet Mail Service in
installed and configured.
Users try to connect to the Exchange Server computer from the LAN by using
Microsoft Outlook. When these users try to connect to the server, the client
software takes up to 10 minutes to connect and to transfer mail or
scheduling data.
What should you do to reduce the time it takes for the client software to
connect to the server and to transfer data?
¡ A. Bind TCP/IP to the network adapter of each client computer.
¡ B. Bind TCP/IP to the internal network adapter of the Exchange Server
computer.
¡ C. Change the RPC binding order on each client computer.
¡ D. Change the RPC binding order on the Exchange Server computer.
31. You configure the Microsoft Mail Connector to send and receive mail
between Exchange Server and Microsoft Mail. You use the Migration Wizard to
migrate Maria's mailbox from Microsoft Mail to ES. After the migration,
Maria does not receive mail from Microsoft Mail users, even though mail has
been sent. However, she is able to send mail to Microsoft Mail users.
What is the most likely cause of the problem?
¡ A. Maria's original Microsoft Mail mailbox was deleted.
¡ B. Maria's original Microsoft Mail mailbox was not deleted.
¡ C. The Microsoft Mail Connector is configured for sending but not for
receiving.
¡ D. The Microsoft Mail Connector is not configured to synchronize
directories with ES.
32. Trey Research removes its UNIX-based POP3 and SMTP server.
Trey Research replaces this server with an Exchange Server computer that
runs the Internet Mail Service. The new server has the same IP address and
DNS host name as the previous server.
When users connect to the new server from POP3 client applications, they can
retrieve mail. However, the users receive an error message when they try to
send messages via the Internet.
What is the most likely cause of the problem?
¡ A. The users' POP3 client applications do not support SSL.
¡ B. The users' POP3 client applications do not support Microsoft Windows NT
Challenge/Response authentication.
¡ C. The Internet Mail Service is set so that it does not reroute incoming
SMTP mail.
¡ D. The Internet Mail Service is set to an SMTP address type rather than to
a POP3 address type.
33. E-mail attachments you send to Arbor shoes arrive as unreadable text.
The Arbor shoes mail server supports only uuencoded attachments. The
attachments you send to other recipients on the Internet arrive intact and
readable. All of these other recipients support MIME.
What should be done so that attachments sent to both Arbor Shoes and to the
other Internet recipients are readable?
¡ A. Configure the Internet Mail Service to use uuencode for all
attachments.
¡ B. Configure the Internet Mail Service to use MIME for all attachments
sent to any domain except Arbor Shoes. Configure the Internet Mail Service
to use uuencode for all attachments sent to Arbor Shoes.
¡ C. All users who send mail to Arbor Shoes recipients must add those
recipients to their personal address books.
¡ D. The users must configure address book properties for Arbor Shoes
recipients so that attachments are never sent in MIME format.
34. Suzanne is installing Exchange Server for her company. The server has 64
MB of RAM and a 32-MB paging file. Suzanne specifies the Exchange Server
domain account to be the service account dedicated for the Exchange Server
services. During installation, the Setup program creates the proper
directories, copies the installation, asks for the name of the service
account, and begins to start the Exchange Server services. The System
Attendant service starts, but during the startup of the Directory Store
service, Setup fails.
What is the most likely cause of the problem?
¡ A. The size of the paging file needs to be increased.
¡ B. The paging file is located on the same logical drive as the Exchange
Server information store databases.
¡ C. When Suzanne created the Exchange Server account, she did not grant it
the right to log on as a service.
¡ C. When Suzanne created the Exchange Server account, she did make it a
member of the Administrators group.
35. You perform an offline backup on an Exchange Server computer.
After a hardware failure, you perform a restore operation.
However, after you perform the restore operation, the Information Store
service will not start.
What should you do to start the Information Store service?
¡ A. Run the Isinteg utility with the patch switch.
¡ B. Run the Scanpst utility on each user's offline folder (.ost) file.
¡ C. Run the ESEutil utility with the Consistency option.
¡ D. Run the ESEutil utility with the Recovery and Defragmentation
options.
36. Your Microsoft Windows NT network has three Microsoft Mail postoffices.
One of the Microsoft Mail postoffices is named Post2.
You replace Post2 with an Exchange Server computer that you also name Post2.
You then establish directory synchronization. You want to hide certain
recipients on the new Exchange Server computer from the Microsoft Mail
global address list. You want all recipients to be visible in the Exchange
Server global address list.
You create two recipients containers named Container A and Container B. You
place the recipients that are to be hidden in Container B. You place all
other recipients in
Container A.
How should you configure trust levels?
¡ A. Configure the trust level of each container to be a lower value than
that of the dirsync requestor.
Configure the trust level of Container B to be a lower value than that of
Container A.
¡ B. Configure the trust level of each container to be a higher value than
that of the dirsync requestor.
Configure the trust level of Container B to be a lower value than that of
Container A.
¡ C. Configure the trust level of container A to be a lower value than
that of the dirsync requestor.
Configure the trust level of Container B to be a higher value than that
of the dirsync requestor.
¡ D. Configure the trust level of container A to be a higher value than
that of the dirsync requestor.
Configure the trust level of Container B to be a lower value than that of
the dirsync requestor.
37. You are configuring security for an Exchange Server site. You want to
exchange messages with other sites. You want to replicate only the first and
last name of each recipient in the address list with every other site in
your organization. You do not want to replicate any other directory
information. You use an X.400 Connector for connectivity among sites.
What else must you do so that only the first and last name of each recipient
is replicated with other sites?
¡ A. Create a unique Exchange Server service account for the servers in
each site.
¡ B. Hide all of the recipients in your site from the Address Book.
¡ C. Configure the X.400 MTA for your site so that it requires a password.
Do not configure any of the MTAs in the other sites with passwords.
¡ D. In DS site Configuration, select only first name and last name for
intersite directory replication.
38. Maria is installing Exchange Server for her company. The company has two
separate domains that are named Exec and Sales. Maria does not want to
establish any trust relationships. Maria installs an Exchange Server
computer in each domain. Each server is installed in its own site. Both
sites belong to the same organization. Maria configures a service account
named Msxsrv in each domain. Both service accounts have the same password.
Which two actions must Maria take so that the two servers can communicate
with each other by using a Site Connector? (Choose two).
¨ A. In both sites, configure Site Connectors to use the Msxsrv account
on the override property page.
¨ B. On each server, give the Msxsrv account user rights to log on
locally and log on as a service.
¨ C. On each server, give the Msxsrv account user rights to access the
computer from the network.
¨ D. On each server, make the Msxsrv service account a member of the
Administrators group.
39. You are configuring your Exchange Server computer as a dirsync server.
You configure a remote dirsync requestor. You configure your Microsoft Mail
post-office as a dirsync requestor. You then set the synchronization times
on the Exchange Server computer for Always.
Three hours later, you notice that Microsoft Mail recipients have not yet
appeared in the Exchange Server global address list.
What must you do to complete directory synchronization?
¡ A. Run the Reqmain utility with the Transmit option on the Microsoft
Mail post-office.
¡ B. Run the Reqmain utility with the Receive option on the Exchange
Server connector post-office.
¡ C. In Microsoft Mail, set the T1, T2 and T3 times to be the same.
¡ D. Set the T2 time on the Exchange Server computer to be one hour later
than the T2 time in Microsoft mail.
40. You are the administrator of an Exchange Server computer that is
connected to the Internet. You have configured the Internet Mail Service to
reroute incoming SMTP mail. You discover that your Internet Mail Service is
being used as a relay host for unsolicited e-mail.
You want to stop the relay of the unsolicited mail and still allow rerouting
of mail for internal recipients. What should you do?
¡ A. Add a domain value of * to the routing table.
¡ B. Build a custom routing program to delete all messages from the
originator of the unsolicited mail and route all other mail to the proper
host.
¡ C. Add a list of hosts that are not allowed to relay mail through the
server to the registry of the Exchange Server computer. Set the registry
relay flag to allow all hosts that are not explicitly denied.
¡ D. Create a custom recipient that has the e-mail address of the originator
of the unsolicited e-mail. Configure the delivery restrictions in the
Internet Mail Service to reject all messages from that custom recipient.
41. Your Exchange Server computer uses a dial-up connection to connect to an
SMTP server. You want to be able to send messages to the SMTP server at all
times.
How should you configure the dial-up connection to allow messages to be sent
at any time?
¡ A. Use the Dynamic RAS connector to schedule the connection for Always
.
¡ B. Use the Dynamic RAS connector to assign an override transfer
time-out value.
¡ C. Use the Internet Mail Service to configure the dial-up connection
properties.
¡ D. Configure the Internet Mail Service to have a retry count of 0.
42. In the Microsoft Outlook Address Book, you want to group the Exchange
Server users by the building name that has been added to each user's custom
attributes.
Where should you configure this?
¡ A. Site Addressing.
¡ B. Address Book view.
¡ C. personal address book.
¡ D. e-mail addressing templates.
43. An Exchange Server recipient has the following default X.400 address:
X.400:c=us;a=;p=beans;o=coffee;s=jackson;g=sue.
What does the "o" field refer to as it relates to the Exchange Server
topology?
¡ A. the site name.
¡ B. the organization name.
¡ C. the name of the server.
¡ D. the name of the container that contains the mailbox.
44. You are the administrator of an Exchange Server computer. Some of the
users in your company access their Exchange Server mailboxes by using POP3
client software. These users report that they are unable to send messages by
using POP3. However, they are able to receive messages.
What should you do so that these users can send messages through the server?
¡ A. Enable IMAP4 at the site level.
¡ B. Enable POP3 at the server level.
¡ C. Configure the Internet Mail Service to reroute incoming SMTP mail.
¡ D. Change the POP3 method of authentication to Microsoft Windows NT
Challenge/Response authentication.
45. Your Exchange Server organization uses custom attributes on a per-site
basis. You do not want the custom attributes in your site to replicate to
other sites.
How should you configure your site?
¡ A. Specify only the custom attributes in the DS Site Configuration
object.
¡ B. Specify all attributes except the custom attributes in the DS Site
Configuration object.
¡ C. Configure the permissions on the Directory Replication object to be
for only the Domain Admins group.
¡ D. Configure the trust level of your recipients container to be a higher
value than that of the other recipients containers in the organization.
46. You want to import employee information into the Microsoft Exchange
Server directory.
The employee telephone list is available in tab-delimited format from the
human resources database. The employee work location list is available in
tab-delimited format from the facilities database.
You want to import both the employee telephone list and the work location
list into the directory. You want to retain the information that is
currently in the Exchange Server directory.
What should you do?
¡ A. Associate each employee record with the Exchange Server directory alias
field.
Import each file by using the second step of the Microsoft Mail Migration
tool.
¡ B. Generate a new alias name from the human resources database. Associate
each record in the human resources database and the facilities database with
the new alias name.
Import each database by using the Import utility.
¡ C. Export the Exchange Server directory to a file.
Associate each record in the human resources database and the facilities
database with the appropriate user in the Exchange Server directory. Import
the updated file by using the Import utility.
¡ D. Export each database to a comma-delimited file.
Associate each telephone number and each work location with the appropriate
user in the Exchange Server directory.
Import each file by using the Import utility.
47. You have a laptop computer and a desktop computer. Both computers are
configured with Microsoft Outlook. You want to be able to see all messages
while using either computer.
AutoArchiving is not enabled.
The laptop computer does not have a continuous connection to the Exchange
Server computer. You want to be able to read and compose messages while
using the laptop computer offline.
How should you configure your two computers?
¡ A. Configure both computers with personal folder (.pst) files.
¡ B. Configure both computers to access the server-based information store.
¡ C. Configure only the laptop computer with a personal folder (.pst) file.
Configure only the desktop computer to access the server-based information
store.
¡ D. Configure only the laptop computer with an offline folder (.ost) file.
Configure only the desktop computer to access the server-based information
store.
48. You enable LDAP and allow anonymous access. You notice that several
directory fields are visible to anonymous users who connect over the
Internet. You want these directory fields to be hidden.
What should you do to prevent these fields from being visible to Internet
users?
¡ A. Set LDAP to allow only initial substring searches.
¡ B. Remove the fields from the definition template for each mailbox.
¡ C. Clear the fields in the attributes of the DS Site Configuration
object.
¡ D. Configure the trust level for the protocols container to be a lower
value than that of the recipients container.
49. Half of your company's users use Exchange Server in one Microsoft
Windows NT domain. The other half of your company's users use Microsoft Mail
in another Windows NT domain. Trust relationships have not been established
between the domains.
An Exchange Server user named Peter uses Microsoft Outlook to create an
appointment that includes a Microsoft Mail user named Anne. When Peter views
the Planner tab, he cannot see Anne's availability. However, Peter is able
to send e-mail messages to Anne.
What should you do so that Peter can see Anne's availability?
¡ A. Establish a two-way trust relationship between domains.
¡ B. Configure the Microsoft Schedule+ Free/Busy Connector.
¡ C. Have Anne grant Reviewer permission to Peter for her schedule.
¡ D. Relocate the Microsoft Mail post-office to the same Windows NT Server
computer that is running Exchange Server.
50. Your company uses a single master domain model. You are planning your
Exchange Server environment. You want to require users to enter a password
every time they start Microsoft Outlook.
What should you do so that users are required to enter a password?
¡ A. Install the Exchange Server in a non-trusted domain.
¡ B. Delete the password list file on each client computer.
¡ C. Configure user profiles so that network security is not used during
logon.
¡ D. Configure user profiles to encrypt information when the user connects
to Exchange Server by using the network and Dial-Up Networking.
51. You monitor the CPU usage on your Exchange Server computer. You notice
heavy utilization when messages are sent to large distribution lists.
What should you do to reduce the CPU load on your server?
¡ A. Move all recipients to another server.
¡ B. Move all recipients into one container.
¡ C. Specify another computer as an expansion server.
¡ D. Remove the Microsoft Mail address spaces for all recipients.
52. Your Exchange Server computer exchanges messages with a server in
another site over a 64-Kbps connection. You have a Site Connector configured
between the two sites. The network experiences high latency and packet loss.
Which two actions can you take to optimize performance for this
configuration?
(Choose two.)
¨ A. Reduce the MTA checkpoint size.
¨ B. Increase the MTA checkpoint size.
¨ C. Increase the MTA message threshold.
¨ D. Use X.400 Connectors between the two sites.
¨ E. Use the Internet Mail Service to connect the two sites.
53. You are the administrator of seven Exchange Server computers. You have
configured a server monitor on one of the computers to monitor the system
attendant on each of the other six computers. You want to take one of the
servers offline for maintenance. You do not want to cause an error in the
server monitor.
What should you do?
¡ A. Remove the server from the network before you perform maintenance.
¡ B. Manually stop the System Attendant service for the server that you
plan to take offline.
¡ C. Run the Administrator program with the monitor suspension options
before you perform maintenance.
¡ D. Remove the server from the server monitor before you perform
maintenance.
54. You are migrating users from Microsoft Mail to Exchange Server. You run
the Migration Wizard from a Microsoft Windows NT Workstation computer. You
notice that you are only able to convert 0.5 MB of mail data per minute. You
configure Windows NT Performance Monitor for both the Microsoft Mail server
and the Microsoft Exchange Server computer. The processor, logical disk,
memory, and network are all at 10 percent capacity for both servers. Overall
network utilization is averaging 20 percent.
What is the most likely cause of the slow conversion rate?
¡ A. the paging file of the Microsoft Mail server.
¡ B. the paging file of the Exchange Server computer.
¡ C. the processor of the Microsoft Mail server.
¡ D. the processor of the Windows NT Workstation computer.
THANX, LOX