Official 2014 Latest Free Microsoft 70-341 Dump Download(101-110)!

QUESTION 101
You have an Exchange Server 2013 organization that contains 20 Mailbox servers. You plan to create 10 mailbox databases on each Mailbox server. You need to create a naming convention for all mailbox databases.
What should you include in your naming convention?

A.    For each mailbox database, provide a database name that is unique within the organization.
B.    For each mailbox database, provide a database name that is unique within the Mailbox server.
C.    For each mailbox database file, provide a file name that is unique within the organization.
D.    For each mailbox database file, provide a file name that is unique within the Mailbox server.

Answer: A

QUESTION 102
You have an Exchange Server organization that contains three servers that have Exchange Server 2013 installed and one server that has Exchange Server 2010 installed. You create the custom RBAC roles shown in the following table.

clip_image001
The Seattle help desk manages all of the users in an organizational unit (OU) named Seattle. The Miami help desk manages all of the users in an OU named Miami. The IT Administrators manage all of the users in the forest. You need to recommend which commands must be run to prevent only the members of both help desks from modifying the properties of users who have a department attribute value of Manager. Which three commands should you run? (Each correct answer presents part of the solution. Choose three.)

A.    new-managementscope “executive users exclusive scope”
-recipientrestrictionfilter { department -eq “manager” } -exclusive sorce
B.    new-managementroleassignment -name “managers” -securitygroup “managers”
-role “mail recipients” -exclusiverecipientwritescope “executive users exclusive scope”
C.    new-roleassignmentpolicy -name “limited end user policy” -roles “mypersonalinformation”.
D.    new-rolegroup -name “managers” -roles “mail recipients” -members admins
E.    new-rolegroup -name “help desk” -roles “mail recipients” -members admins

Answer: ABD
Explanation:
Note:
* (A) Use the New-ManagementScope cmdlet to create a regular or exclusive management scope. After you create a regular or exclusive scope, you need to associate the scope with a management role assignment.
To associate a scope with a role assignment, use the New- ManagementRoleAssignment cmdlet.
* (B) Use the New-ManagementRoleAssignment cmdlet to assign a management role to a management role group, management role assignment policy, user, or universal security group (USG).

QUESTION 103
You have an Exchange Server 2007 organization.
You recently deployed a server that has Exchange Server 2013 installed. The Exchange Server organization contains three servers. The servers are configured as shown in the following table.

clip_image001[4]
Server2 contains a mailbox for a user named User1. You move the mailbox of User1 to Server3. After the move, User1 fails to access his mailbox by using Outlook Web App. Users who have mailboxes on Server1 and Server2 can access their mailboxes by using Outlook Web Access. You need to ensure that User1 can access his mailbox from the Internet by using Outlook Web App at https://mail.contoso.com. The solution must ensure that users who have mailboxes on Server1 and Server2 can continue to use Outlook Web Access. Which three actions should you perform? (Each correct answer presents part of the solution. Choose three.)

A.    Export the certificate on Server1 and import the certificate to Server 3.
B.    On all of the Exchange servers, install a new certificate that contains the mail.contoso.com and
legacy.contoso.com names.
C.    Redirect all of the traffic from the Internet for mail.contoso.com to Server3.
D.    On all of the Exchange servers, install a new certificate that contains the Server1.contoso.com,
server2.contoso.com, server3.contoso.com, and legacy.contoso.com names.
E.    Create a host (A) record named legacy.contoso.com that points to Server1.

Answer: BCE

QUESTION 104
You host Exchange Server 2013 organizations for several hundred tenants. The infrastructure contains several custom transport agents. You need to prevent the transport agents from overloading the processors on one of the Exchange servers. Which cmdlet should you run?

A.    Set-WorkloadPolicy
B.    Set-ResourcePolicy
C.    Set-TransportAgent
D.    Set-ThrottlingPolicy

Answer: B

QUESTION 105
Drag and Drop Question
You have an Exchange Server 2013 organization that contains a server named EX1. You have a user named User1 in the marketing department. You need to prevent User1 from submitting more than 50 email messages per minute to the Exchange Server organization by using Microsoft Outlook.
Which three commands should you run?
To answer, move the three appropriate commands from the list of commands to the answer area and arrange them in the correct order.

clip_image002
Answer:
Box 1:

clip_image001[6]
Box 2:

clip_image001[8]
Box 3:

clip_image001[10]
Explanation:
Note:
Box 1:
* Use the New-ThrottlingPolicy cmdlet to create a non-default user throttling policy.
* The MessageRateLimit parameter specifies the number of messages per minute that can be submitted to transport.
Box 3:
* Use the Set-Mailbox cmdlet to modify the settings of an existing mailbox. You can use this cmdlet for one mailbox at a time.
/ parameter: ThrottlingPolicy
Microsoft.Exchange.Configuration.Tasks.ThrottlingPolicyIdParameter

QUESTION 106
Drag and Drop Question
You have an Exchange Server 2013 organization that contains four servers named EX1, EX2, EX3, and EX4. All of the servers are members of a database availability group (DAG) named DAG1. Each server has a copy of a mailbox database named DB1. DB1 has the following characteristics:
– The replay lag time on Ex4 is set to 14 days.
– Single item recovery on all of the servers is set to 14 days.
– None of the servers have Volume Shadow Copy Service (VSS) backups.
Ex4 has a folder named F:\RDB that is used to store database files during restore operations. Twenty days ago, a user named User1 deleted an email message that had a subject of “Sales Report”.
You need to restore the deleted email message to the mailbox of User1. You copy the lagged database and the log files that are older than 20 days to F:\RDB.
Which three actions should you perform?
To answer, move the three appropriate actions from the list of actions to the answer area and arrange them in the correct order.

clip_image002[4]
Answer:

clip_image002[6]

QUESTION 107
Your company has three offices. Each office is configured as an Active Directory site. You have three servers that have Exchange Server 2013 installed named EX1, EX2 and EX3. All three servers have the Client Access server role and the Mailbox server role installed. The Active Directory site links and costs are configured as shown in the exhibit. (Click the Exhibit button.)

clip_image002[8]
Site B is designated as a hub site. EX2 fails. You discover that all email messages sent from the users in Site A to the users in Site C are queued on a server in Site A. You need to ensure that the email messages are sent to Site C as quickly as possible. What should you do first?

A.    Modify the Active Directory site link costs.
B.    Configure Site A as a hub site.
C.    Modify the Exchange-specific site link cost.
D.    Remove the hub site.

Answer: D

QUESTION 108
Your network contains an internal network and a perimeter network. The internal network contains four offices. The perimeter network is located in a separate office. Each internal office has a direct WAN link to all other internal offices. Each of the four offices that make up the internal network is configured as an Active Directory site. The Active Directory sites and site links are configured as shown in the exhibit. (Click the Exhibit button.)

clip_image001[12]
Your company has an Exchange Server 2013 organization. Each site contains two servers that have the Mailbox server role and the Client Access server role installed. To the perimeter network, you deploy two servers that have Exchange Server 2010 Service Pack 2 (SP2) and the Edge Transport server role installed. You configure an Edge Subscription to Site1. You deploy a new email notification application to Site4. The application will send 25,000 email messages daily to external recipients. You need to identify which WAN links will have increased traffic from the new email application. Which WAN link or links should you identify? (Each answer presents part of the solution. Choose all that apply.)

A.    The WAN link between Site4 and the perimeter network
B.    The WAN link between Site4 and Site3
C.    The WAN link between Site1 and the perimeter network
D.    The WAN link between Site4 and Site1
E.    The WAN link between Site4 and Site2

Answer: CE
Explanation:
C: the traffic will increase on the single WAN link on the perimeter network.
E: The traffic will increase between Site4 and Site2 since the cost of this link (5) plus the cost of the link between Site2 and Site1 (1) is lower the cost on the direct link between Site4 and Site1 (10).
Incorrect answers:
Not A: There is no WAN link between Site4 and the perimeter network. Not B: The cost of the WAN link between site3 and site3 is high (10). This path will not be chosen.
Not D: There is no WAN link between Site4 and Site1.

QUESTION 109
You have network contoso.com. contoso.com consist of AD DS Domain contoso.com. All Servers running Windows Server 2012 and all Clients running Windows 8 Pro. Server1 runs Mailbox Server Role and Client Access Server Role. You are configuring Anti-Spam Filtering on Server1. You need to ensure that all emails with words “Free Credit Check” are rejected unless the email is sent to Finance Distribution Group. You also need to ensure that all emails from partner company Domain name adatum.com bypass the Anti-Spam Filter. You run the Add-ContentFilterPhrase and add the words “Free Credit Check” What should you do next?

A.    Run the Set-TransportConfig and Set-ContentFilterConfig
B.    Run the Set-SenderReputationConfig and Set-TransportConfig
C.    Run the Set-ContentFilterConfig and Set-RecipientFilterConfig
D.    Run the Set-SenderFilterConfig and Set-RecipientFilterConfig

Answer: C
Explanation:
COURTESY OF DNS53 FROM UNITED STATES
NOT A
Set-TransportConfig not required in this scenario
Use the Set-TransportConfig cmdlet to modify the transport configuration settings for the whole Exchange organization.
NOT B
Set-TransportConfig not required in this scenario
Use the Set-TransportConfig cmdlet to modify the transport configuration settings for the whole Exchange organization.
Use the Set-SenderReputationConfig cmdlet to modify the sender reputation configuration on a Mailbox server or an Edge Transport server.
EXAMPLE 1
This example makes the following modifications to the sender reputation configuration:
It sets the sender reputation action to block all senders whose sender reputation level (SRL) rating exceeds the SRL threshold.
It sets the SRL blocking threshold to 6.
It sets the number of hours that senders are put on the blocked senders list to 36 hours.
Set-SenderReputationConfig -SenderBlockingEnabled $true -SrlBlockThreshold
6 – SenderBlockingPeriod 36
NOT D
Who sent the emails is not required in this scenario
Use the Set-SenderFilterConfig cmdlet to modify the Sender Filter agent configuration.
EXAMPLE 1
This example makes the following modifications to the Sender Filter agent configuration:
It enables blocking of blank senders.
It blocks messages from lucernepublishing.com and all subdomains. It adds user1@contoso.com and user2@contoso.com to the blocked senders list without affecting any existing entries.
Set-SenderFilterConfig -BlankSenderBlockingEnabled $true -BlockedDomainsAndSubdomains
lucernepublishing.com -BlockedSenders @{Add=”user1@contoso.com”,”user2@contoso.com”} C
Use the Set-ContentFilterConfig cmdlet to modify the content filter configuration on a Mailbox server or an Edge Transport server.
EXAMPLE 1
This example specifies the sender domain woodgrovebank.com as a bypassed domain. Messages received from that domain bypass the Content Filter agent. Set-ContentFilterConfig -BypassedSenderDomains woodgrovebank.com Use the Set-RecipientFilterConfig cmdlet to enable and configure the Recipient Filter agent.
EXAMPLE 2
This example makes the following changes to the Recipient Filter agent configuration:
Enables the Blocked Recipients list.
Adds two users to the Blocked Recipients list.
Set-RecipientFilterConfig -BlockListEnabled $true -BlockedRecipients
user1@contoso.com,user2@contoso.com

QUESTION 110
You are evaluating the implementation of a Database Availability Group (DAG). You need to recommend changes to the planned implementation to minimize the loss of large email messages if a single DAG member fails. What should you recommend changing?

A.    The preference of the mail exchanger (MX) records
B.    The duration of single item recovery
C.    The intervals of shadow redundancy
D.    The size of the transport dumpster

Answer: D
Explanation:
A database availability group (DAG) is the base component of the high availability and site resilience framework built into Microsoft Exchange Server 2013.
A DAG is a group of up to 16 Mailbox servers that hosts a set of databases and provides automatic databaselevel recovery from failures that affect individual servers or databases. A DAG is a boundary for mailbox database replication, database and server switchovers, failovers, and an internal component called Active Manager. Active Manager, which runs on every server in a DAG, manages switchovers and failovers.
NOT A
Not relevant to this scenario
NOT B
Not relevant to this scenario
Single item recovery provides an additional layer of protection so that you can recover items that were accidentally deleted by a user or by automated processes such as the Managed Folder Assistant.
Single item recovery simplifies recovery and reduces recovery time because you can recover items without recovering an entire mailbox or mailbox database from backup media. To learn more, see “Single item recovery” in Recoverable Items Folder.

If you want to pass the Microsoft 70-341 Exam sucessfully, recommend to read latest Microsoft 70-341 Dump full version.