Visit http://www.LearnQuick.Com

These are helpful questions about Exchange Server 5.5 TEST when it was not adaptative.

CONTENT:

070-081: Exchange Server 5.5 EXAM

1. Your company is migrating 125 users from Microsoft Mail to Exchange

Server. You want to limit the amount of data that is migrated to 50 MB per

user. You also want to enforce a 50-MB mailbox limit once each user has been

migrated to Exchange Server.

What should you do? (Choose two.)

¨ A. Migrate only e-mail messages for all users.

¨ B. Run the 'Edbutil' utility before you begin the migration.

¨ C. Set the Exchange Server mailbox storage limit to 50 MB.

¨ D. Reduce the size of the Microsoft Mail message store to 50 MB before

migration.

¨ E. Run the Microsoft Mail 'Reqmain' utility before you begin the

migration.

 

2. You have installed the KM server in your Exchange Server organization.

When employees leave your company, you disable their Exchange Server

mailboxes and revoke their security keys. You leave the mailboxes in your

Exchange Server organization until the key expiration date. As more keys are

revoked, client performance slows down.

Which security key management strategy should you use to improve the

performance of client applications?

¡ A. Extend the expiration dates on security keys.

¡ B. Delete the security file from client computers when user mailboxes are

disabled.

¡ C. Configure a second KM server in your Exchange Server organization.

¡ D. Delete users from the Exchange Server organization instead of revoking

security keys.

 

3. You want to install Exchange Server for all users in your company's two

main buildings. Building A has 15 users. Building B has 25 users.

The two buildings are connected to one another by dedicated routers and a

33.6 Kbps dial-up connection. Most of the messaging traffic will occur

within each building. Less than 10 percent of the messaging traffic will

occur between the two buildings.

Which configuration should you implement to minimize traffic between the

buildings?

¡ A. Install one Exchange Server computer in Building A.

¡ B. Install two Exchange Server computers in Building B.

Configure the servers as members of the same site.

¡ C. Install one Exchange Server computer in each building.

Configure the servers as members of the same site.

¡ D. Install one Exchange Server computer in each building.

Configure each server as a member of its own site.

 

 

4. You want to provide long-term consistency between Exchange Server and

Microsoft Mail. Users will eventually be migrated from Microsoft Mail to ES.

What should you do to create a global distribution list that will be

available to users on both systems?

¡ A. Establish directory synchronization between Exchange Server and

Microsoft Mail.

Create an Exchange Server distribution list that includes all of the users.

¡ B . Establish directory synchronization between Exchange Server and

Microsoft Mail.

Create a Microsoft Mail distribution list that includes all of the users.

¡ C. Establish Internet mail connectivity between Exchange Server and

Microsoft Mail.

Create SMTP-based custom recipients for each Microsoft Mail user.

Create an Exchange Server distribution list that includes all Exchange

Server users and all Microsoft Mail Internet-based custom recipients.

¡ D. Create a Microsoft Mail distribution list that includes all Microsoft

Mail users.

Create an Exchange Server distribution list that includes all Exchange

Server users.

Create an Exchange Server distribution list that includes the Microsoft

Mail distribution list and the Exchange Server distribution list.

 

5. An Internet Service Provider (ISP) has 500 customers. The ISP can support

up to 50 concurrent customer connections. The ISP provides messaging

services to its customers and its employees by using two Exchange Server

computers.

Employees use Microsoft Outlook to send and receive messages. Customers use

POP3 client applications and Web browsers to send and receive messages.

Mailbox accounts are distributed between the two servers as shown in the

following table:

Exchange Server Computers Number of customer mailboxes Number of employee

mailboxes

Server A 250 20

Server B 250 0

How many client access licenses must the ISP purchase?

¡ A. 50

¡ B. 120

¡ C. 250

¡ D. 520

 

6. You plan to install an Exchange Server computer. There are 200 client

computers on your LAN. There are also 150 client computers that connect to

the LAN by using an asynchronous dial-up connection. Your LAN is divided

into four segments as shown in the following table. All segments are

connected by a 10/100 Ethernet Switch.

Segment Number of users Ethernet segment speed

A 0 100 megabit

B 125 10 megabit

C 75 10 megabit

D 150 (remote) 10 megabit

On which segment should you place the Exchange Server computer for optimal

client connectivity performance for all client computers?

¡ A. Segment A

¡ B. Segment B

¡ C. Segment C

¡ D. Segment D

7. Your company is migrating from Microsoft Schedule+ 7.5 to Microsoft

Outlook Calendar. You want Microsoft Outlook Calendar users to be able to

read other users' Schedule+ 7.5 calendars.

What must you do?

¡ A. Configure the Schedule+ 7.5 calendar to grant read access to Outlook

users.

¡ B. Install the Schedule+ Free Busy Connector.

¡ C. Install Schedule+ 7.5 on the Outlook users computers.

¡ D. Configure Send As permissions for the Outlook users on the Schedule+

7.5 users' mailboxes.

 

8. You plan to install Exchange Server on two computers that will belong to

the same organization. You want to install the servers as separate sites.

Each server will be in a different Microsoft Windows NT domain.

You want to connect the sites by using an X.400 connector. You want

administrators to be able to administer only their own sites.

Which trust relationships and account configuration should you use?

¡ A. Establish a full two-way trust relationship.

No account information needs to be shared.

¡ B. Establish a 1-way trust relationship in either direction.

Both accounts must have the same name and the same password.

¡ C. No trust relationships need to be established.

Both accounts must have the same name and the same password.

¡ D. No trust relationships need to be established.

No account information needs to be shared.

 

9. You perform a full backup of your Exchange Server computer every Friday.

You do not perform any backups on any other day. You configure the deleted

items retention time for mailboxes to be four days. Your users do not use

personal folder (.pst) files.

You want to ensure that users will be able to restore all deleted messages.

What else should you do?

¡ A. Disable circular logging.

¡ B. Configure message tracking on the Exchange Server computer.

¡ C. Configure the client profiles so that they do not delete deleted items

upon exit.

¡ D. Configure deleted items retention so that items are not deleted until

after the information store has been backed up.

 

10. You are the administrator of an Exchange Server computer that hosts

mailboxes for 500 users. You enable IMAP for all users. Your server is

protected from the Internet by a firewall. Your firewall is configured to

allow all IP traffic out to the Internet. It is also configured to allow

SMTP (port 25), IMAP (port 143), and HTTP (port 80). Your IMAP service is

configured as shown in the exhibit (Click the Exhibit button).

You want to enable users to access the server from the Internet by user an

IMAP client application.

Which other IP port must you allow through the firewall?

¡ A. IMAPS (port 993).

¡ B. HTTPS (port 443).

¡ C. NetBIOS (port 137).

¡ D. RPC endmapper (port 135).

 

11. You are the administrator of an Exchange Server computer. You want your

users to be able to exchange e-mail messages with users on a Novell

GroupWise computer. The GroupWise computer is configured with a message

handling system (MHS) gateway and full Internet messaging connectivity.

Which two actions should you take so that your users can exchange messages

with the users on the GroupWise computer? (Choose two).

¨ A. Configure a dirsync server on the Exchange Server computer.

¨ B. Schedule directory replication on the Exchange Server computer.

¨ C. Import the GroupWise user mailboxes to the Exchange Server computer.

¨ D. Install and configure the Internet Mail Service on the Exchange Server

Computer.

¨ E. Add the GroupWise users as custom recipients on the Exchange Server

Computer.

Select two answers.

 

12. You are planning the configuration of an Exchange Server computer that

will route mail to the Internet. You want to minimize cost by limiting the

amount of time your server is connected to the Internet via an Internet

Service provider (ISP).

How should you configure the Internet Mail Service and connectivity to the

Internet to minimize cost?

¡ A. Establish a dedicated connection to the Internet.

Configure the Internet Mail Service to minimize the bandwidth it uses when

sending mail.

¡ B. Establish a dial-up connection to the Internet.

Configure the Internet Mail Service to use ETRN to retrieve mail from the

ISP.

¡ C. Establish a dedicated connection to the Internet.

Configure the Internet Mail Service to use ETRN to retrieve mail from the

ISP.

¡ D. Establish a dial-up connection to the Internet.

Configure the Internet Mail Service to use TURN to retrieve mail from the

ISP.

13. You add 64 MB of RAM to your Exchange Server computer. You want to make

sure that your Exchange Server uses the additional memory.

What should you do?

¡ A. Set foreground application performance to maximum.

¡ B. Run a consistency check on the private information store.

¡ C. Increase the paging file on the Exchange Server computer.

¡ D. Run the Performance Optimizer utility on the Exchange Server computer.

 

14. Your company's primary Exchange Server computer does not have a tape

backup device. You install a standby Exchange Server computer that performs

a file-based backup of the primary server every night.

You want to create a batch file that will stop the Exchange Server services

on the primary server and copy the necessary files to the backup server.

Which files must you include in the batch copy process? (Choose three).

¨ A. directory file.

¨ B. checkpoint file.

¨ C. transaction log file.

¨ D. public information store file.

¨ E. private information store file.

¨ F. personal information store file.

 

15. You create a Microsoft Outlook network share on your Exchange Server

computer. You want to predefine the client application settings so that

users will need to provide only the minimum configuration information when

they install their client software.

How should you predefine the client application settings?

¡ A. Edit the Template .prf file.

Copy this file to each user's home directory.

¡ B. Edit the Template .prf file.

Copy this file to the network share.

¡ C. Edit the Default .prf file.

Copy this file to each user's home directory.

¡ D. Edit the Default .prf file.

Copy this file to the network share.

 

16. You configure alias name generation for your Exchange Server computer to

be the first letter of the first name and the seven letters of the last name

to match your existing Microsoft Windows NT naming conventions.

You want the SMTP addresses for all users to be the first letter of the full

last name.

What should you do?

¡ A. Change Site Addressing for SMTP to use the first letter of the first

name and the full last name.

¡ B. Change the display name generation for users to be the first letter of

the first name and the full last name.

¡ C. Edit each user's SMTP address space to use the first letter of the

first name and the full last name.

¡ D. Add users by using a template account that has an SMTP address space of

the first letter of the first name and the full last name.

 

17. You want to shut down one of the chat server on your chat network. You

want to make the shutdown transparent to new users who will be connecting to

your collection of chat servers.

What should you do?

¡ A. Disable new connections, and wait for all existing connections to

terminate.

¡ B. Close the portal between the other chat servers on your network.

¡ C. At the command line, type net stop chatsvc.

¡ D. Pause the Workstation service, and wait for all existing connections to

terminate.

 

18. Helene has a laptop computer configured with Microsoft Outlook and an

offline folder (.ost) file. She periodically synchronizes her laptop

computer with the server. Helene wants to be able to access the contents of

a new public folder while she works offline. When she examines the property

page of the public folder, she does not see the Synchronization tab.

What must be done to enable synchronization of the public folder?

¡ A. Helene must designate the public folder as a Favorite folder.

¡ B. Helene must create a shortcut for the public folder in the Outlook Bar.

¡ C. The administrator must configure the public folder for synchronization.

¡ D. The owner of the public folder must configure the folder for

synchronization

 

19.

Situation:

You are establishing a backup strategy for your company's Exchange Server

computer. The server has two hard disks that are used to store the Exchange

Server data files. The hard disks have the same capacity. One hard disk is

significantly faster than the other.

Required result:

1) You must ensure that all directory data and information store data is

backed up to tape every night.

Optional desired results:

1) You want the most recent Exchange Server database transactions to be

recovered if there is a hard disk failure that corrupts the Exchange Server

database files.

2) You want to minimize server response time for users.

Proposed solution:

Place the information store database files and the information store

transaction log files on the faster hard disk. Place the directory database

file and the directory transaction log files on the slower hard disk.

Use the Microsoft Windows NT Backup program to perform a full tape backup of

the Exchange Server transaction log files and the information store database

files every night.

Disable circular logging.

Which results does the proposed solution produce?

¡ A. The proposed solution produces the required result and produces both of

the optional desired results.

¡ B. The proposed solution produces the required result and produces only

one of the optional desired results.

¡ C. The proposed solution produces the required result but does not produce

either of the optional desired results.

¡ D. The proposed solution does not produce the required result.

(Select the best answer)

 

20. You create a distribution lists on your Exchange Server computer. When

users request read receipts for messages they send to the distribution list,

they receive receipts only from the list. They do not receive a read receipt

from each user on the list.

What is the most likely cause of the problem?

¡ A. The distribution list is hidden from the Address Book.

¡ B. The distribution list membership is hidden from the Address Book.

¡ C. The distribution list is configured to report to the message

originator.

¡ D. The distribution list is configured to report to the owner of the

distribution list.

¡ E. The trust level of the distribution list is set to a higher value than

that of each user's recipients container.

 

21. Your company's Exchange Server organization consists of multiple sites.

Your company has a business division named ATG that does classified work.

The ATG division is in its own site and its own Microsoft Windows NT domain.

Your company does not want the directory information about ATG employees to

be visible to the other connected sites within its Exchange Server

organization. However, your company still wants users in each site to be

able to send messages to all Exchange Server recipients.

The company wants ATG employees to be able to view directory information

about all recipients from all other sites.

What should you do to accomplish this?

¡ A. Clear all directory replication attributes in the DS Site Configuration

object for on the ATG site.

¡ B. Grant permissions for the recipients container to only Exchange Server

service accounts in the ATG domain.

¡ C. Use X.400 Connectors to connect all sites. Configure the trust levels

of all X.400 Connectors to be lower values than those of the ATG recipients

containers.

¡ D. Configure the trust levels for all recipients containers in the ATG

site to be higher values than those of all other recipients containers in

your organization.

 

22. Franz has configured the backup strategy for his Exchange Server

computer for offline backups. Circular logging is disabled. Last night, a

full backup was performed and completed successfully. This morning, Franz

discovers that his server has stopped functioning.

Franz restores the IS and the directory on the server by using MS Windows NT

Backup.

What should he do next?

¡ A. Run the 'Edbutil' utility with the /r switch.

¡ B. Update the .mdb files and any log files that exist on the Exchange

Server computer.

¡ C. Run the 'Isinteg' utility with the -patch switch.

¡ D. Do nothing. After the files are restored, the backup program will

automatically restart the Exchange Server services.

 

23. You are the administrator of an Exchange Server computer. You configure

the server to retain deleted items for seven days. While accessing the

server with an IMAP4 client application, Marc deletes messages. While

accessing the server with MS Outlook, Marc wants to recover one of the

deleted items. Marc does not find the item in the list of possible items to

recover.

What can you do to recover the item?

¡ A. Recover the item manually from the Priv.edb file by using the

Mdbvu32.exe utility.

¡ B. Recover the item by using an IMAP4 client application.

¡ C. Add the DumpsterAlwaysOn key to the registry on your client computer,

and then log on to Marc's mailbox to recover the item.

¡ D. Add the DumpsterAlwaysOn key to the registry on your ESC, and then log

on to Marc's mailbox to recover the item.

 

24. You are an administrator in an Exchange Server organization. How can you

transfer mailboxes from an existing server in a site to a new server in the

same site?

¡ A. Use the Move User utility in the Administrator program.

¡ B. On each client computer, enter the new server name in the Exchange

Server service.

¡ C. On the new server, create new mailbox accounts that use the same

display names as those used on the existing server.

¡ D. Back up the private IS on the existing server, and then restore

individual mailbox accounts to the new server.

 

25. You install two servers in a Exchange Server site. The two servers are

named ServerA and ServerB. All users in the finance department connect to

ServerA. All users in the marketing department connect to ServerB. Each

department has its own Exchange Server administrator. The site has only one

recipients container.

You want the marketing administrator to be able to add and delete recipients

on both servers. You want the marketing administrator to be able to modify

only objects in the recipients container.

How should you configure security?

¡ A. Add the marketing administrator to the Domain Admins group.

¡ B. Grant the appropriate permissions to the marketing administrator on the

site container.

¡ C. Grant the appropriate permissions to the marketing administrator on the

organization container.

¡ D. Grant the appropriate permissions to the marketing administrator on the

configuration container.

 

26. Situation:

You are establishing a backup strategy for your company's Exchange Server

computer. The server has two hard disks that are used to store the Exchange

Server data files. The hard disks have equal capacity. One hard disk is

significantly faster than the other.

Required result:

1) You must ensure that all directory data and information store data is

backed up to tape every night.

Optional desired results:

1) You want the most recent Exchange Server database transactions to be

recovered if there is a hard disk failure that corrupts the Exchange Server

database files.

2) You want to minimize server response time for users.

Proposed solution:

Place the information store database files and the information store

transaction log files on the faster hard disk. Place the directory database

file and the directory transaction log files on the slower hard disk.

Use the Microsoft Windows NT Backup program to perform a full tape backup of

the Exchange Server transaction log files and the information store database

files every night.

Enable circular logging.

Which results does the proposed solution produce?

¡ A. The proposed solution produces the required result and produces both of

the optional desired results.

¡ B. The proposed solution produces the required result and produces only

one of the optional desired results.

¡ C. The proposed solution produces the required result but does not produce

either of the optional desired results.

¡ D. The proposed solution does not produce the required result.

 

27. The information store databases on your Exchange Server computer are

located on one disk. The transaction log files are located on another

physical disk that uses a separate drive controller.

You disable circular logging. The controller on the disk that contains the

store databases malfunctions and corrupts the databases. You want to restore

the databases from backup media.

You made a full backup four days ago. You have made three incremental

backups since then. The hardware failure occurred 12 hours after the last

incremental backup.

Which information can be restored?

¡ A. Only the information stored prior to the last full backup.

¡ B. Only the information stored after the last incremental backup.

¡ C. Only the information stored after the last full backup but prior to the

last incremental backup.

¡ D. All information stored prior to the last time at which logs were

written.

 

28. You are the administrator of an Exchange Server organization that has

multiple servers. When users create new public folders, the folders are

created on ServerA. After monitoring ServerA, you notice that the hard disk

on the server is almost full. You move all existing public folders from

ServerA to ServerB.

What should you do to ensure that all new public folders are created on

ServerB?

¡ A. Delete each new replica on ServerA as soon as the replica is created.

¡ B. Configure ServerB as the public folder server for all recipients on

ServerA.

¡ C. Use Exchange Performance Optimizer to configure ServerA as only a

private information store server.

¡ D. Restrict top-level folder creation for all users. Manually create all

new public folders on ServerB.

29. You configure LDAP to allow anonymous access. Users outside your

firewall are unable to access the LDAP directory.

What is the most likely cause of the problem?

¡ A. The appropriate port is not open on the firewall.

¡ B. You did not enable clear text authentication on LDAP.

¡ C. You did not stop and restart the Exchange Server directory service.

¡ D. You did not set a value for DisableResolverSearchList in the registry.

 

30. You use Exchange Server on your company's LAN. The LAN uses IPX as its

only network protocol. Your Exchange Server computer is configured with two

network adapters. The internal network adapter uses only IPX and is

connected only to the LAN. The external network adapter uses only TCP/IP and

is connected directly to the Internet. The Internet Mail Service in

installed and configured.

Users try to connect to the Exchange Server computer from the LAN by using

Microsoft Outlook. When these users try to connect to the server, the client

software takes up to 10 minutes to connect and to transfer mail or

scheduling data.

What should you do to reduce the time it takes for the client software to

connect to the server and to transfer data?

¡ A. Bind TCP/IP to the network adapter of each client computer.

¡ B. Bind TCP/IP to the internal network adapter of the Exchange Server

computer.

¡ C. Change the RPC binding order on each client computer.

¡ D. Change the RPC binding order on the Exchange Server computer.

 

31. You configure the Microsoft Mail Connector to send and receive mail

between Exchange Server and Microsoft Mail. You use the Migration Wizard to

migrate Maria's mailbox from Microsoft Mail to ES. After the migration,

Maria does not receive mail from Microsoft Mail users, even though mail has

been sent. However, she is able to send mail to Microsoft Mail users.

What is the most likely cause of the problem?

¡ A. Maria's original Microsoft Mail mailbox was deleted.

¡ B. Maria's original Microsoft Mail mailbox was not deleted.

¡ C. The Microsoft Mail Connector is configured for sending but not for

receiving.

¡ D. The Microsoft Mail Connector is not configured to synchronize

directories with ES.

 

32. Trey Research removes its UNIX-based POP3 and SMTP server.

Trey Research replaces this server with an Exchange Server computer that

runs the Internet Mail Service. The new server has the same IP address and

DNS host name as the previous server.

When users connect to the new server from POP3 client applications, they can

retrieve mail. However, the users receive an error message when they try to

send messages via the Internet.

What is the most likely cause of the problem?

¡ A. The users' POP3 client applications do not support SSL.

¡ B. The users' POP3 client applications do not support Microsoft Windows NT

Challenge/Response authentication.

¡ C. The Internet Mail Service is set so that it does not reroute incoming

SMTP mail.

¡ D. The Internet Mail Service is set to an SMTP address type rather than to

a POP3 address type.

33. E-mail attachments you send to Arbor shoes arrive as unreadable text.

The Arbor shoes mail server supports only uuencoded attachments. The

attachments you send to other recipients on the Internet arrive intact and

readable. All of these other recipients support MIME.

What should be done so that attachments sent to both Arbor Shoes and to the

other Internet recipients are readable?

¡ A. Configure the Internet Mail Service to use uuencode for all

attachments.

¡ B. Configure the Internet Mail Service to use MIME for all attachments

sent to any domain except Arbor Shoes. Configure the Internet Mail Service

to use uuencode for all attachments sent to Arbor Shoes.

¡ C. All users who send mail to Arbor Shoes recipients must add those

recipients to their personal address books.

¡ D. The users must configure address book properties for Arbor Shoes

recipients so that attachments are never sent in MIME format.

 

34. Suzanne is installing Exchange Server for her company. The server has 64

MB of RAM and a 32-MB paging file. Suzanne specifies the Exchange Server

domain account to be the service account dedicated for the Exchange Server

services. During installation, the Setup program creates the proper

directories, copies the installation, asks for the name of the service

account, and begins to start the Exchange Server services. The System

Attendant service starts, but during the startup of the Directory Store

service, Setup fails.

What is the most likely cause of the problem?

¡ A. The size of the paging file needs to be increased.

¡ B. The paging file is located on the same logical drive as the Exchange

Server information store databases.

¡ C. When Suzanne created the Exchange Server account, she did not grant it

the right to log on as a service.

¡ C. When Suzanne created the Exchange Server account, she did make it a

member of the Administrators group.

 

35. You perform an offline backup on an Exchange Server computer.

After a hardware failure, you perform a restore operation.

However, after you perform the restore operation, the Information Store

service will not start.

What should you do to start the Information Store service?

¡ A. Run the ‘Isinteg’ utility with the ‘–patch’ switch.

¡ B. Run the ‘Scanpst’ utility on each user's ‘offline folder’ (.ost) file.

¡ C. Run the ‘ESEutil’ utility with the ‘Consistency’ option.

¡ D. Run the ‘ESEutil’ utility with the ‘Recovery’ and ‘Defragmentation’

options.

 

36. Your Microsoft Windows NT network has three Microsoft Mail postoffices.

One of the Microsoft Mail postoffices is named Post2.

You replace Post2 with an Exchange Server computer that you also name Post2.

You then establish directory synchronization. You want to hide certain

recipients on the new Exchange Server computer from the Microsoft Mail

global address list. You want all recipients to be visible in the Exchange

Server global address list.

You create two recipients containers named Container A and Container B. You

place the recipients that are to be hidden in Container B. You place all

other recipients in

Container A.

How should you configure trust levels?

¡ A. Configure the ‘trust level’ of each container to be a lower value than

that of the ‘dirsync requestor’.

Configure the ‘trust level’ of Container B to be a lower value than that of

Container A.

¡ B. Configure the ‘trust level’ of each container to be a higher value than

that of the ‘dirsync requestor’.

Configure the ‘trust level’ of Container B to be a lower value than that of

Container A.

¡ C. Configure the ‘trust level’ of container A to be a lower value than

that of the ‘dirsync requestor’.

Configure the ‘trust level’ of Container B to be a higher value than that

of the ‘dirsync requestor’.

¡ D. Configure the ‘trust level’ of container A to be a higher value than

that of the ‘dirsync requestor’.

Configure the ‘trust level’ of Container B to be a lower value than that of

the ‘dirsync requestor’.

 

37. You are configuring security for an Exchange Server site. You want to

exchange messages with other sites. You want to replicate only the first and

last name of each recipient in the address list with every other site in

your organization. You do not want to replicate any other directory

information. You use an X.400 Connector for connectivity among sites.

What else must you do so that only the first and last name of each recipient

is replicated with other sites?

¡ A. Create a unique Exchange Server ‘service account’ for the servers in

each site.

¡ B. Hide all of the recipients in your site from the ‘Address Book’.

¡ C. Configure the X.400 MTA for your site so that it requires a password.

Do not configure any of the MTAs in the other sites with passwords.

¡ D. In ‘DS site Configuration’, select ‘only first name and last name’ for

‘intersite directory replication’.

 

38. Maria is installing Exchange Server for her company. The company has two

separate domains that are named Exec and Sales. Maria does not want to

establish any trust relationships. Maria installs an Exchange Server

computer in each domain. Each server is installed in its own site. Both

sites belong to the same organization. Maria configures a service account

named Msxsrv in each domain. Both service accounts have the same password.

Which two actions must Maria take so that the two servers can communicate

with each other by using a Site Connector? (Choose two).

¨ A. In both sites, configure ‘Site Connectors’ to use the ‘Msxsrv account’

on the ‘override property’ page.

¨ B. On each server, give the ‘Msxsrv account’ user rights to ‘log on

locally’ and ‘log on as a service’.

¨ C. On each server, give the ‘Msxsrv account’ user rights to ‘access the

computer from the network’.

¨ D. On each server, make the ‘Msxsrv service account’ a member of the

‘Administrators’ group.

 

39. You are configuring your Exchange Server computer as a dirsync server.

You configure a remote dirsync requestor. You configure your Microsoft Mail

post-office as a dirsync requestor. You then set the synchronization times

on the Exchange Server computer for Always.

Three hours later, you notice that Microsoft Mail recipients have not yet

appeared in the Exchange Server global address list.

What must you do to complete directory synchronization?

¡ A. Run the ‘Reqmain’ utility with the ‘Transmit’ option on the Microsoft

Mail post-office.

¡ B. Run the ‘Reqmain’ utility with the ‘Receive’ option on the Exchange

Server connector post-office.

¡ C. In Microsoft Mail, set the ‘T1’, ‘T2’ and ‘T3’ times to be the same.

¡ D. Set the ‘T2’ time on the Exchange Server computer to be one hour later

than the ‘T2’ time in Microsoft mail.

 

40. You are the administrator of an Exchange Server computer that is

connected to the Internet. You have configured the Internet Mail Service to

reroute incoming SMTP mail. You discover that your Internet Mail Service is

being used as a relay host for unsolicited e-mail.

You want to stop the relay of the unsolicited mail and still allow rerouting

of mail for internal recipients. What should you do?

¡ A. Add a domain value of ‘*’ to the routing table.

¡ B. Build a custom routing program to delete all messages from the

originator of the unsolicited mail and route all other mail to the proper

host.

¡ C. Add a list of hosts that are not allowed to relay mail through the

server to the registry of the Exchange Server computer. Set the registry

relay flag to allow all hosts that are not explicitly denied.

¡ D. Create a custom recipient that has the e-mail address of the originator

of the unsolicited e-mail. Configure the delivery restrictions in the

‘Internet Mail Service’ to reject all messages from that custom recipient.

 

41. Your Exchange Server computer uses a dial-up connection to connect to an

SMTP server. You want to be able to send messages to the SMTP server at all

times.

How should you configure the dial-up connection to allow messages to be sent

at any time?

¡ A. Use the ‘Dynamic RAS’ connector to schedule the connection for ‘Always’

.

¡ B. Use the ‘Dynamic RAS’ connector to assign an override ‘transfer

time-out’ value.

¡ C. Use the ‘Internet Mail Service’ to configure the ‘dial-up connection’

properties.

¡ D. Configure the ‘Internet Mail Service’ to have a retry count of ‘0’.

 

42. In the Microsoft Outlook Address Book, you want to group the Exchange

Server users by the building name that has been added to each user's custom

attributes.

Where should you configure this?

¡ A. Site Addressing.

¡ B. Address Book view.

¡ C. personal address book.

¡ D. e-mail addressing templates.

 

43. An Exchange Server recipient has the following default X.400 address:

X.400:c=us;a=;p=beans;o=coffee;s=jackson;g=sue.

What does the "o" field refer to as it relates to the Exchange Server

topology?

¡ A. the site name.

¡ B. the organization name.

¡ C. the name of the server.

¡ D. the name of the container that contains the mailbox.

 

44. You are the administrator of an Exchange Server computer. Some of the

users in your company access their Exchange Server mailboxes by using POP3

client software. These users report that they are unable to send messages by

using POP3. However, they are able to receive messages.

What should you do so that these users can send messages through the server?

¡ A. Enable IMAP4 at the site level.

¡ B. Enable POP3 at the server level.

¡ C. Configure the ‘Internet Mail Service’ to reroute incoming SMTP mail.

¡ D. Change the POP3 method of authentication to ‘Microsoft Windows NT

Challenge/Response’ authentication.

 

45. Your Exchange Server organization uses custom attributes on a per-site

basis. You do not want the custom attributes in your site to replicate to

other sites.

How should you configure your site?

¡ A. Specify only the ‘custom’ attributes in the ‘DS Site Configuration’

object.

¡ B. Specify all attributes except the ‘custom’ attributes in the ‘DS Site

Configuration’ object.

¡ C. Configure the permissions on the ‘Directory Replication’ object to be

for only the ‘Domain Admins’ group.

¡ D. Configure the trust level of your ‘recipients’ container to be a higher

value than that of the other recipients containers in the organization.

 

46. You want to import employee information into the Microsoft Exchange

Server directory.

The employee telephone list is available in tab-delimited format from the

human resources database. The employee work location list is available in

tab-delimited format from the facilities database.

You want to import both the employee telephone list and the work location

list into the directory. You want to retain the information that is

currently in the Exchange Server directory.

What should you do?

¡ A. Associate each employee record with the Exchange Server directory alias

field.

Import each file by using the second step of the ‘Microsoft Mail Migration’

tool.

¡ B. Generate a new alias name from the human resources database. Associate

each record in the human resources database and the facilities database with

the new alias name.

Import each database by using the ‘Import’ utility.

¡ C. Export the Exchange Server directory to a file.

Associate each record in the human resources database and the facilities

database with the appropriate user in the Exchange Server directory. Import

the updated file by using the ‘Import’ utility.

¡ D. Export each database to a comma-delimited file.

Associate each telephone number and each work location with the appropriate

user in the Exchange Server directory.

Import each file by using the ‘Import’ utility.

 

47. You have a laptop computer and a desktop computer. Both computers are

configured with Microsoft Outlook. You want to be able to see all messages

while using either computer.

AutoArchiving is not enabled.

The laptop computer does not have a continuous connection to the Exchange

Server computer. You want to be able to read and compose messages while

using the laptop computer offline.

How should you configure your two computers?

¡ A. Configure both computers with personal folder (.pst) files.

¡ B. Configure both computers to access the server-based information store.

¡ C. Configure only the laptop computer with a personal folder (.pst) file.

Configure only the desktop computer to access the server-based information

store.

¡ D. Configure only the laptop computer with an offline folder (.ost) file.

Configure only the desktop computer to access the server-based information

store.

 

48. You enable LDAP and allow anonymous access. You notice that several

directory fields are visible to anonymous users who connect over the

Internet. You want these directory fields to be hidden.

What should you do to prevent these fields from being visible to Internet

users?

¡ A. Set LDAP to allow only initial substring searches.

¡ B. Remove the fields from the definition template for each mailbox.

¡ C. Clear the fields in the attributes of the ‘DS Site Configuration’

object.

¡ D. Configure the trust level for the protocols container to be a lower

value than that of the recipients container.

 

49. Half of your company's users use Exchange Server in one Microsoft

Windows NT domain. The other half of your company's users use Microsoft Mail

in another Windows NT domain. Trust relationships have not been established

between the domains.

An Exchange Server user named Peter uses Microsoft Outlook to create an

appointment that includes a Microsoft Mail user named Anne. When Peter views

the Planner tab, he cannot see Anne's availability. However, Peter is able

to send e-mail messages to Anne.

What should you do so that Peter can see Anne's availability?

¡ A. Establish a two-way trust relationship between domains.

¡ B. Configure the ‘Microsoft Schedule+ Free/Busy’ Connector.

¡ C. Have Anne grant ‘Reviewer’ permission to Peter for her schedule.

¡ D. Relocate the Microsoft Mail post-office to the same Windows NT Server

computer that is running Exchange Server.

 

50. Your company uses a single master domain model. You are planning your

Exchange Server environment. You want to require users to enter a password

every time they start Microsoft Outlook.

What should you do so that users are required to enter a password?

¡ A. Install the Exchange Server in a non-trusted domain.

¡ B. Delete the password list file on each client computer.

¡ C. Configure user profiles so that network security is not used during

logon.

¡ D. Configure user profiles to encrypt information when the user connects

to Exchange Server by using the network and Dial-Up Networking.

 

51. You monitor the CPU usage on your Exchange Server computer. You notice

heavy utilization when messages are sent to large distribution lists.

What should you do to reduce the CPU load on your server?

¡ A. Move all recipients to another server.

¡ B. Move all recipients into one container.

¡ C. Specify another computer as an expansion server.

¡ D. Remove the Microsoft Mail address spaces for all recipients.

 

52. Your Exchange Server computer exchanges messages with a server in

another site over a 64-Kbps connection. You have a Site Connector configured

between the two sites. The network experiences high latency and packet loss.

Which two actions can you take to optimize performance for this

configuration?

(Choose two.)

¨ A. Reduce the MTA checkpoint size.

¨ B. Increase the MTA checkpoint size.

¨ C. Increase the MTA message threshold.

¨ D. Use X.400 Connectors between the two sites.

¨ E. Use the Internet Mail Service to connect the two sites.

 

53. You are the administrator of seven Exchange Server computers. You have

configured a server monitor on one of the computers to monitor the system

attendant on each of the other six computers. You want to take one of the

servers offline for maintenance. You do not want to cause an error in the

server monitor.

What should you do?

¡ A. Remove the server from the network before you perform maintenance.

¡ B. Manually stop the ‘System Attendant’ service for the server that you

plan to take offline.

¡ C. Run the ‘Administrator’ program with the ‘monitor suspension’ options

before you perform maintenance.

¡ D. Remove the server from the ‘server monitor’ before you perform

maintenance.

 

54. You are migrating users from Microsoft Mail to Exchange Server. You run

the Migration Wizard from a Microsoft Windows NT Workstation computer. You

notice that you are only able to convert 0.5 MB of mail data per minute. You

configure Windows NT Performance Monitor for both the Microsoft Mail server

and the Microsoft Exchange Server computer. The processor, logical disk,

memory, and network are all at 10 percent capacity for both servers. Overall

network utilization is averaging 20 percent.

What is the most likely cause of the slow conversion rate?

¡ A. the paging file of the Microsoft Mail server.

¡ B. the paging file of the Exchange Server computer.

¡ C. the processor of the Microsoft Mail server.

¡ D. the processor of the Windows NT Workstation computer.

 

 

THANX, LOX