Your success in Microsoft 70-342 is our sole target and we develop all our 70-342 braindumps in a way that facilitates the attainment of this target. Not only is our 70-342 study material the best you can find, it is also the most detailed and the most updated. 70-342 Practice Exams for Microsoft MCSE 70-342 are written to the highest standards of technical accuracy.


♥♥ 2021 NEW RECOMMEND ♥♥

Free VCE & PDF File for Microsoft 70-342 Real Exam (Full Version!)

★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions

Free Instant Download NEW 70-342 Exam Dumps (PDF & VCE):
Available on: http://www.surepassexam.com/70-342-exam-dumps.html

Q1. DRAG DROP - (Topic 1) 

The security department implements a new firewall between the IP-PBX system and the servers in the Tampa office. 

You discover that SIP sessions cannot be established between the IP-PBX and EX1. 

You need to identify which ports must be opened between the IP-PBX and the Exchange Server 2013 servers. 

Which ports should you identify? 

To answer, drag the appropriate port or ports to the correct group of servers in the answer area. Each port or ports may be used once, more than once, or not at all. Additionally, you may need to drag the split bar between panes or scroll to view content. 

Answer: 


Q2. HOTSPOT - (Topic 6) 

You run the Get-ExchangeCertificate –Server Ex2 | fl and you receive the following output. 

Use the drop-down area to select the appropriate answers. 

Answer: 


Q3.  (Topic 5) 

You need to resolve the content filtering issue for the Office 365 pilot users. 

What should you do? 

A. Run the Set-Mailbox cmdlet and specify the -MaxBlockedSenders and the -MicrosoftOnlineServicesID parameters. 

B. Run the Microsoft Online Services Directory Synchronization Configuration Wizard and select Enable Exchange hybrid deployment. 

C. Modify the default content filter policy from the Office 365 portal. 

D. Run the Set-Mailbox cmdlet and specify the -MaxSafeSenders and the -MicrosoftOnlineServicesID parameters. 

Answer:

Explanation: 

* Scenario: 

/ The pilot users report that entries added to their Safe Senders list and their Blocked 

Senders list fail to work. 

/ For the pilot mailboxes, all inbound email messages from the Internet are delivered to the 

Exchange Server organization, and then forwarded to Office 365. 

* Hybrid Configuration wizard Exchange 2013 includes the Hybrid Configuration wizard which provides you with a streamlined process to configure a hybrid deployment between on-premises Exchange and Exchange Online organizations. 

Reference: Exchange Server 2013 Hybrid Deployments 


Q4.  (Topic 6) 

You have a hybrid deployment of Exchange Server 2013 and Microsoft Office 365. The Exchange Server organization has a mailbox size limit of 2 GB. 

You need to provide engineers with the ability to retain certain email messages indefinitely. The solution must meet the following requirements: 

. Ensure that the engineers can access the retained email messages by using Outlook Web App. 

. Ensure that the retained email messages do not apply to the mailbox size limit of the engineers. 

. Minimize the storage requirements of the on-premises servers. 

Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.) 

A. From Office 365, create Archive mailboxes. 

B. Instruct the engineers to create a personal folder. 

C. Create a retention policy. 

D. From the on-premises Exchange Server 2013 organization, create Archive mailboxes. 

E. Create a data loss prevention (DLP) policy. 

Answer: A,C 

Explanation: 

C: 

A: 

In Exchange Server an archive mailbox is a second mailbox provisioned for a user that is 

separate to their primary user mailbox. 


Q5.  (Topic 6) 

You plan to deploy 20 Client Access servers that will have Exchange Server 2013 installed. 

You need to prepare the certificate required for the planned deployment. The solution must ensure that the same certificate can be used on all of the Client Access servers. 

What should you do first? 

A. On one of the Client Access servers, run the New-ExchangeCertificate cmdlet and specify the PrivateKeyExportable parameter. 

B. On all of the Client Access servers, run the Get-ExchangeCertificate cmdlet. 

C. On one of the Client Access servers, run the New-ExchangeCertificate cmdlet and specify the BinaryEncoding parameter. 

D. On one of the Client Access servers, start the Certificates console and run the Certificate Import Wizard. 

Answer:

Explanation: 

We need to create a new certificate. We make it exportable. 

Note: 

Use the New-ExchangeCertificate cmdlet to create a self-signed certificate, renew an 

existing self-signed certificate, or generate a new certificate request for obtaining a 

certificate from a certification authority (CA). 


Q6.  (Topic 6) 

You have an Exchange Server 2013 organization. 

You plan to use document fingerprinting. 

You need to identify which file type cannot be used as a template for document fingerprinting. 

Which document type should you identify? 

A. .pptx 

B. .doc 

C. .txt 

D. .dotx 

Answer:

Explanation: 

Document Fingerprinting supports the same file types that are supported in transport rules. One quick note about file types: neither transport rules nor Document Fingerprinting supports the .dotx file type, which can be confusing because that’s a template file in Word. When you see the word “template” in this and other Document Fingerprinting topics, it refers to a document that you have established as a standard form, not the template file type. 

Reference: Document Fingerprinting 

https://technet.microsoft.com/en-us/library/dn635176(v=exchg.150).aspx 


Q7.  (Topic 6) 

You have an Exchange Server 2013 organization. 

You need to prevent a user named User1 from permanently deleting an email message in 

his mailbox. 

What should you do on the mailbox of User1? 

A. Implement a retention policy. 

B. Configure a retention hold. 

C. Implement a data loss prevention (DLP) policy. 

D. Configure an in-place hold. 

Answer:

Explanation: 

In Exchange 2013, you can use In-Place Hold to accomplish the following goals: Place user mailboxes on hold and preserve mailbox items immutably Preserve mailbox items deleted by users or automatic deletion processes such as MRM Use query-based In-Place Hold to search for and retain items matching specified criteria Preserve items indefinitely or for a specific duration Place a user on multiple holds for different cases or investigations Keep In-Place Hold transparent from the user by not having to suspend MRM Enable In-Place eDiscovery searches of items placed on hold 


Q8. DRAG DROP - (Topic 3) 

You need to implement a solution to meet the security requirement for the temporary employees. 

You deploy an Active Directory Rights Management Services (AD RMS) cluster, and then you run the Set-IRMConfiguration cmdlet. 

Which three actions should you perform? 

To answer, move the three appropriate actions from the list of actions to the answer area and arrange them in the correct order. 

Answer: 


Q9.  (Topic 6) 

You have an Exchange Server 2010 organization that contains three servers. The servers are configured as shown in the following table. 

Microsoft Outlook is configured to connect to an FQDN of mail.adatum.com. Mail.adatum.com resolves to the IP address of a Layer 7 hardware load balancer. The hardware load balancer is configured to send traffic to EX2 and EX3. 

You deploy an Exchange Server 2013 Mailbox server named EX4 and an Exchange Server 2013 Client Access server named EX5. 

You plan to migrate all mailboxes to Exchange Server 2013. 

You need to recommend a solution to ensure that users can access their mailbox on EX1 or EX4 during the migration. 

What should you do? 

A. Create a Client Access server array that contains EX1 and EX5. 

B. Modify the autodiscover.contoso.com resource record to point to EX5. 

C. Modify the properties of the hardware load balancer to point to EX5. 

D. Create a DNS record named legacy.contoso.com in the internal DNS zone. 

Answer:

Explanation: 

Note: So what is the Client Access server in Exchange 2013? The Client Access server role is comprised of three components, client protocols, SMTP, and a UM Call Router. The CAS role is a thin, protocol session stateless server that is organized into a load balanced configuration. Unlike previous versions, session affinity is not required at the load balancer (but you still want a load balancer to handle connection management policies and health checking). This is because logic now exists in CAS to authenticate the request, and then route the request to the Mailbox server that hosts the active copy of the mailbox database. 

The Mailbox server role now hosts all the components and/or protocols that process, render and store the data. No clients will ever connect directly to the Mailbox server role; all client connections are handled by the Client Access server role. 

Reference: Exchange 2013 Server Role Architecture 


Q10.  (Topic 6) 

You have an Exchange Server 2013 organization that contains the servers configured as shown in the following table. 

All of the Exchange servers run Windows Server 2012 R2 and are members of a database 

availability group (DAG) named DAG1. Each server has a copy of all the mailbox databases. 

DAG1 is configured to have a cluster administrative access point. The file share witness is located in Site A. 

You need to identify the maximum number of Mailbox servers that can fail simultaneously without affecting the mailbox access of the users. 

How many servers should you identify? 

A. 2 

B. 3 

C. 4 

D. 5 

Answer:

Explanation: 

Example: Quorum requires a majority of voters to be able to communicate with each other. Consider a DAG that has four members. Because this DAG has an even number of members, an external witness server is used to provide one of the cluster members with a fifth, tie-breaking vote. To maintain a majority of voters (and therefore quorum), at least three voters must be able to communicate with each other. At any time, a maximum of two voters can be offline without disrupting service and data access. If three or more voters are offline, the DAG loses quorum, and service and data access will be disrupted until you resolve the problem. 

Reference: Database availability groups 

https://technet.microsoft.com/en-us/library/dd979799%28v=exchg.150%29.aspx