Being tormented to get well prepared for your 70-342 exam? Don’t worry! PassLeader now offer the first-hand 70-342 exam dumps, you will pass 70-342 exam for your first try with PassLeader’s latest real 155q 70-342 exam questions. We offer you the newest 70-342 exam study guide with VCE test engine or PDF format braindumps, you can get the basic knowledge and all details about exam 70-342. Do not hesitate to try our high quality 155q 70-342 practice tests!
keywords: 70-342 exam,155q 70-342 exam dumps,155q 70-342 exam questions,70-342 pdf dumps,70-342 vce dumps,70-342 vce test software,70-342 practice test,Microsoft Advanced Solutions of Microsoft Exchange Server 2013
You have an organization that has Exchange Server 2010 and Exchange Server 2013 deployed. Half of the mailboxes are on Exchange Server 2010 servers and the other half are on Exchange Server 2013 servers. You plan to implement Kerberos authentication for all mailbox access. You need to identify which Service Principal Names (SPNs) to associate with each version of Exchange Server. In the table below identify which SPNs to associate with each Exchange Server version. NOTE: Make only one selection in each row.
You have an Exchange Server 2013 organization. All users access their mailbox by using Outlook Web Access. Users can view .xml files from Outlook Web Access. You need to meet the following compliance requirements:
– Audit the mailbox for a specific user.
– Email the mailbox audit log to a compliance officer.
Which cmdlet should you use? To answer, select the appropriate options in the answer area.
You have an Exchange Server 2013 organization that is integrated with Microsoft Lync Server 2013. You need to get a list of all the calls received and placed by a user named Userl during the last 90 days. Which cmdlet should you use?
The Get-UMCallDataRecord cmdlet displays UM call data records for the last 90 days for a UM-enabled mailbox that you specify. Each UM call data record provides detailed information about all calls either placed to or received by the specified user.
This example displays the UM call data records for the UM-enabled user Tony.
Get-UMCallDataRecord -Mailbox [email protected]
You have an Exchange Server 2013 organization. A distribution group named Sales_Reports is used to distribute confidential information to all of the senior managers in your company. You need to recommend a solution to ensure that all unencrypted messages sent to the Sales_Reports group are encrypted on the server automatically before they are stored in the mailboxes of the managers. Which two technologies should you include in the recommendation? Each correct answer presents part of the solution.
A. A transport rule
C. Active Directory Certificate Services (AD CS)
D. Active Directory Rights Management Services (AD RMS)
A: As an administrator, you can create transport rules to enable Microsoft Office 365 Message Encryption. This service lets you encrypt outgoing email messages and remove encryption from incoming encrypted replies to those messages, depending on conditions defined in the rule.
B: Encrypted e-mail messages. Messages that are encrypted using S/MIME. Transport rules can access envelope headers contained in encrypted messages and process messages based on predicates that inspect them. Rules with predicates that require inspection of message content, or actions that modify content, can’t be processed.
You have an Exchange Server 2013 organization. The human resources (HR) department has a custom form used to enter the personal information of employees. The form uses the Microsoft Word format. You need to prevent users in the HR department from sending any completed forms to users outside of the organization. Which two of the following should you create? Each correct answer presents part of the solution.
A. A transport rule
B. A DLP policy template
C. A Send connector of the Partner type
D. A document fingerprint
E. A Policy Tip
First create a document fingerprint then create a Transport Rule to take action on the fingerprinted document.
Note: Information workers in your organization handle many kinds of sensitive information during a typical day. Document Fingerprinting makes it easier for you to protect this information by identifying standard forms that are used throughout your organization. Document Fingerprinting is a Data Loss Prevention (DLP) feature that converts a standard form into a sensitive information type, which you can use to define transport rules and DLP policies.
You have an Exchange Server 2013 organization. You are deploying Unified Messaging (UM) services on an Exchange server named EX1. You need to ensure that EX1 accepts encrypted and unencrypted VoIP traffic. What command should you run? To answer, select the appropriate options in the answer area.