[2016-New] Microsoft 70-341 Latest Dumps Free Download From GreatExam (1-15)

How to 100% pass 70-341 exam? GreatExam provides the guaranteed 70-341 exam preparation material to boost up your confidence in 70-341 exam. Successful candidates have provided their reviews about our 70-341 dumps. Now GreatExam supplying the new version of 70-341 VCE and PDF dumps. We ensure our 70-341 exam questions are the most complete and authoritative compared with others’, which will ensure your 70-341 exam pass.

QUESTION 1
You have an Exchange Server 2013 organization.
You create two distribution groups named Group1 and Group2.
Group1 and Group2 each contain several hundred users.
Group1 contains a user named User1.
You need to configure moderation for Group2.
The solution must meet the following requirements:
– Email sent from the members of Group1 must NOT be moderated unless the sender is User1.
– All other email must be moderated by a user named Admin1.
Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)

A.    Create a transport rule that has a condition of the recipient is Group2.
Configure the transport rule to have an action of Forward the message for approval to Admin1.
B.    Run Set-DistributionGroup Group2 -Moderated By Admin1 -BypassModerationFromSendersOrMembers Group1-ModerationEnabled $true.
C.    Create a transport rule that has the conditions of the sender is User1 and the recipient is Group2.
Configure the transport rule to have an action of Forward the message for approval to Admin1.
D.    Create a transport rule that has the conditions of the sender is User1 and the recipient is Group1.
Configure the transport rule to have an action of Forward the message for approval to Admin1.

Answer: BC
Explanation:
Moderated Transport
You can require all messages sent to specific recipients be approved by moderators by Using the moderated transport feature in Microsoft Exchange Server 2013.
You can configure any type of recipient as a moderated recipient, and Exchange will ensure that all messages sent to those recipients go through an approval process.
In any type of organization, you may need to restrict access to specific recipients. The most common scenario is the need to control messages sent to large distribution groups.
Depending on your organization’s requirements, you may also need to control the messages sent to executive mailboxes or partner contacts. You can use moderated recipients to accomplish these tasks.
Transport Rules
Using Transport rules, you can look for specific conditions in messages that pass through your organization and take action on them.
Transport rules let you apply messaging policies to email messages, secure messages, protect messaging systems, and prevent information leakage.
Many organizations today are required by law, regulatory requirements, or company policies to apply messaging policies that limit the interaction between recipients and senders, both inside and outside the organization. In addition to limiting interactions among individuals, departmental groups inside the organization, and entities outside the organization, some organizations are also subject to the following messaging policy requirements:
Preventing inappropriate content from entering or leaving the organization Filtering confidential organization information
Tracking or archiving copying messages that are sent to or received from specific individuals
Redirecting inbound and outbound messages for inspection before delivery Applying disclaimers to messages as they pass through the organization As messages go through the Transport pipeline, the Transport rules agent is invoked.
The Transport rules agent is a special Transport agent that processes the Transport rules you create.
The Transport rules agent scans the message, and if the message fits the conditions you specify in a Transport rule, it takes the specified action on that message.
NOT A
This means that all email sent to Group2 will be moderated.
NOT D
Unknown option
B
When you configure a recipient for moderation, all messages sent to that recipient are subject to approval by the designated moderators.
Allow the members of the distribution group named Group1 to bypass moderation.
Combination of this rule and option C allows for only User1 to be affected by the moderator Admin1
C
Need to create a transport rule that identifies User1.

QUESTION 2
You have an Exchange Server 2013 organization that contains one server named exl.contoso.com.
The server has the Mailbox server role and the Client Access server role installed.
You plan to configure users to work from home and to access their email by using the Outlook Anywhere feature.
Upon testing the planned configuration, you discover that the users can connect and synchronize email from home, but they cannot execute the following tasks:
– Set automatic replies for Out of Office.
– Download changes to the offline address book.
– View availability data when scheduling meetings with coworkers.
The users can execute these tasks when they work from the office.
You need to ensure that the users can execute the tasks when they work from home.
Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)

A.    Install a new certificate on exl.contoso.com
B.    Modify the EWS virtual directory.
C.    Create a new Autodiscover virtual directory.
D.    Renew the certificate on exl.contoso.com.
E.    Modify the OAB virtual directory.

Answer: BE
Explanation:
http://blogs.msdn.com/b/mvpawardprogram/archive/2013/03/18/virtual-directories-exchange-2013.aspx
EWS virtual directory (Exchange Web Services)
A virtual directory is used by Internet Information Services (IIS) to allow access to a web applications in Exchange 2013 Autodiscover Service, ECP, EWS, ActiveSync, OWA, OAB, Powershell are the available virtual directories through EAC.
You can manage a variety of virtual directory settings on Exchange 2013 including authentication, security, and reporting settings. I am explaining here, how you can manage the Virtual Directories through Exchange Admin Center. I have also included some example PowerShell cmdltes to show how to manage those resources:
Default settings on Virtual Directories in Exchange Server 2013
http://maybe-i-know-it.blogspot.com.au/2013/05/default-settings-on-virtual-directories.html
Autodiscover
[PS] C:\Windows\system32>get-autodiscovervirtualdirectory exch01\autodiscover* | fl name, internal*, external*, *authentication
Name: Autodiscover (Default Web Site)
InternalAuthenticationMethods : {Basic, Ntlm, WindowsIntegrated, WSSecurity, OAuth} InternalUrl :
ExternalAuthenticationMethods : {Basic, Ntlm, WindowsIntegrated, WSSecurity, OAuth} ExternalUrl :
LiveIdNegotiateAuthentication : False
WSSecurityAuthentication : True
LiveIdBasicAuthentication : False
BasicAuthentication : True
DigestAuthentication : False
WindowsAuthentication : True
OAuthAuthentication : True
AdfsAuthentication : False
IIS FE: Anonymous, Basic, Windows Authentication
IIS BE: Anonymous, Windows Authentication
ECP
[PS] C:\Windows\system32>Get-ecpvirtualDirectory exch01\ecp* | fl name, internal*, external*, *authentication
Name : ecp (Default Web Site)
InternalAuthenticationMethods : {Basic, Fba}
InternalUrl : https://exch01.contoso.com/ecp
ExternalUrl :
ExternalAuthenticationMethods : {Fba}
BasicAuthentication : True
WindowsAuthentication : False
DigestAuthentication : False
FormsAuthentication : True
LiveIdAuthentication : False
AdfsAuthentication : False
IIS FE: Anonymous, Basic
IIS BE: Anonymous, Basic
EWS
[PS] C:\Windows\system32>Get-WebServicesVirtualDirectory exch01\ews* | fl name, internal*, external*,
*authentication
Name : EWS (Default Web Site)
InternalNLBBypassUrl :
InternalAuthenticationMethods : {Ntlm, WindowsIntegrated, WSSecurity, OAuth}
InternalUrl : https://exch01.contoso.com/EWS/Exchange.asmx
ExternalAuthenticationMethods : {Ntlm, WindowsIntegrated, WSSecurity, OAuth}
ExternalUrl :
CertificateAuthentication :
LiveIdNegotiateAuthentication :
WSSecurityAuthentication : True
LiveIdBasicAuthentication : False
BasicAuthentication : False
DigestAuthentication : False
WindowsAuthentication : True
OAuthAuthentication : True
AdfsAuthentication : False
IIS FE: Anonymous, Basic
IIS BE: Anonymous, Basic
Microsoft-Server-ActiveSync
[PS] C:\Windows\system32>Get-activesyncvirtualDirectory exch01\microsoft* | fl name, internal*, external*,
*authentication
Name : Microsoft-Server-ActiveSync (Default Web Site)
InternalUrl : https://exch01.contoso.com/Microsoft-Server-ActiveSync
InternalAuthenticationMethods : {}
ExternalUrl :
ExternalAuthenticationMethods : {}
IIS FE: Basic
IIS FE: Basic
OAB
[PS] C:\Windows\system32>Get-oabVirtualDirectory exch01\oab* | fl name, internal*, external*, *authentication
Name : OAB (Default Web Site)
InternalUrl : https://exch01.contoso.com/OAB
InternalAuthenticationMethods : {WindowsIntegrated}
ExternalUrl :
ExternalAuthenticationMethods : {WindowsIntegrated}
BasicAuthentication : False
WindowsAuthentication : True
IIS FE: Windows Authentication
IIS FE: Windows Authentication
OWA
[PS] C:\Windows\system32>Get-OwaVirtualDirectory exch01\owa* | fl name, internal*, external*,
*authentication Name : owa (Default Web Site)
InternalAuthenticationMethods : {Basic, Fba}
InternalUrl : https://exch01.contoso.com/owa
ExternalUrl :
ExternalAuthenticationMethods : {Fba}
BasicAuthentication : True
WindowsAuthentication : False
DigestAuthentication : False
FormsAuthentication : True
LiveIdAuthentication : False
AdfsAuthentication : False
IIS FE: Basic
IIS BE: Anonymous, Windows Authentication
PowerShell
[PS] C:\Windows\system32>Get-powershellvirtualDirectory exch01\powershell* | fl name, internal*, external*,
*authentication Name : PowerShell (Default Web Site)
InternalAuthenticationMethods : {}
InternalUrl : http://exch01.contoso.com/powershell
ExternalAuthenticationMethods : {}
ExternalUrl :
CertificateAuthentication : True
LiveIdNegotiateAuthentication : False
WSSecurityAuthentication : False
LiveIdBasicAuthentication : False
BasicAuthentication : False
DigestAuthentication : False
WindowsAuthentication : False
OAuthAuthentication : False
AdfsAuthentication : False
IIS FE: None
IIS BE: Windows Authentication
RPC
[PS] C:\>Get-outlookanywhere exch01\rpc* | fl name, internal*, external*, *authentication Name : Rpc (Default Web Site)
InternalHostname : exch01.contoso.com
InternalClientAuthenticationMethod : Ntlm
InternalClientsRequireSsl : False
ExternalHostname :
ExternalClientAuthenticationMethod : Negotiate
ExternalClientsRequireSsl : False
IIS FE: Basic, Windows Authentication
IIS FE: Windows Authentication
NOT A D
Not related to a certificate issue
NOT C
You may create a new Autodiscover site if your organization has multiple e-mail domains and each requires its own Autodiscover site and corresponding virtual directory, use the New-AutodiscoverVirtualDirectory cmdlet to create a new Autodiscover virtual directory under a new Web site.
Not required in this scenario.
If you were going to create a new Autodiscover site then you would have to delete the old one first.
B
Need to modify the EWS virtual directory in order to create the external URL.
E
Need to modify the OAB virtual directory to create the External URL
http://technet.microsoft.com/en-us/library/bb123710(v=exchg.150).aspx
http://technet.microsoft.com/en-us/library/bb232155(v=exchg.150).aspx
http://technet.microsoft.com/en-us/library/bb125170(v=exchg.150).aspx

QUESTION 3
Drag and Drop Question
Your network contains an Active Directory forest.
The forest contains a single domain named fabrikam.com.
You have an Exchange Server organization that contains four servers.
The servers are configured as shown in the following table.
31
You plan to enable Outlook Anywhere for all users.
You plan to configure the users to connect to the name oa.fabrikam.com.
The IP address of oa.fabrikam.com points to EX3.
You need to ensure that users on EX2 and EX4 can access their mailbox by using Outlook Anywhere, Which command should you run on EX1 and EX3? (To answer, drag the appropriate cmdlets to the correct servers. Each cmdlet may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.)
32
Answer:
33

QUESTION 4
You have an Exchange Server 2013 organization named adatum.com.
The organization contains two servers named EX1 and EX2 that are configured as shown in the table.
Both servers are members of a database availability group (DAG).
EX1 has the active copy of a database named Database1.
Several users who have mailboxes in Database1 discover that all of their outbound email messages remain in their Drafts folder when they use Outlook Web App.
You need to ensure that the email messages are delivered.
What should you do?
41

A.    On EX2, retry the message queues.
B.    On EX1, start the Microsoft Exchange Mailbox Transport Submission service.
C.    On EX2, start the Microsoft Exchange Mailbox Transport Submission service.
D.    On EX1, retry the message queues.

Answer: B
Explanation:
In Microsoft Exchange Server 2013, mail flow occurs through the transport pipeline. The transport pipeline is a collection of services, connections, components, and queues that work together to route all messages to the categorizer in the Transport service on a Mailbox server inside the organization.
The Transport service on a Mailbox server
Every message that’s sent or received in an Exchange 2013 organization must be categorized in the Transport service on a Mailbox server before it can be routed and delivered. After a message has been categorized, it’s put in a delivery queue for delivery to the destination mailbox database, the destination database availability group (DAG), Active Directory site, or Active Directory forest, or to the destination domain outside the organization.
The Transport service on a Mailbox server consists of the following components and processes:
SMTP Receive When messages are received by the Transport service, message content inspection is performed, transport rules are applied, and anti-spam and anti-malware inspection is performed if they are enabled. The SMTP session has a series of events that work together in a specific order to validate the contents of a message before it’s accepted. After a message has passed completely through SMTP Receive and isn’t rejected by receive events, or by an anti-spam and anti-malware agent, it’s put in the Submission queue.
Submission Submission is the process of putting messages into the Submission queue.
The categorizer picks up one message at a time for categorization. Submission happens in three ways: Through an SMTP Receive connector.
Through the Pickup directory or the Replay directory. These directories exist on the Mailbox server. Correctly formatted message files that are copied into the Pickup directory or the Replay directory are put directly into the Submission queue.
Through a transport agent.
Categorizer The categorizer picks up one message at a time from the Submission queue.
The categorizer completes the following steps:
Recipient resolution, which includes top-level addressing, expansion, and bifurcation.
Routing resolution.
Content conversion.
Additionally, mail flow rules that are defined by the organization are applied. After messages have been categorized, they’re put into a delivery queue that’s based on the destination of the message. Messages are queued by the destination mailbox database, DAG, Active Directory site, Active Directory forest or external domain.
SMTP Send How messages are routed from the Transport service depends on the location of the message recipients relative to the Mailbox server where categorization occurred. The message could be routed to the Mailbox Transport service on the same Mailbox server, the Mailbox Transport service on a different Mailbox server that’s part of the same DAG, the Transport service on a Mailbox server in a different DAG, Active Directory site, or Active Directory forest, or to the Front End Transport service on a Client Access server for delivery to the Internet.
Retry a Message Queue
When a transport server can’t connect to the next hop, the delivery queue is put in a status of Retry.
When you retry a delivery queue by using Queue Viewer or the Shell, you force an immediate connection attempt and override the next scheduled retry time.
If the connection isn’t successful, the retry interval timer is reset. The delivery queue must be in a status of Retry for this action to have any effect. Use Queue Viewer in the Exchange Toolbox to retry a queue Click Start > All Programs > Microsoft Exchange 2013 > Exchange Toolbox.
In the Mail flow tools section, double-click Queue Viewer to open the tool in a new window. In Queue Viewer, click the Queues tab. A list of all queues on the server to which you’re connected is displayed.
Click Create Filter, and enter your filter expression as follows:
Select Status from the queue property drop-down list.
Select Equals from the comparison operator drop-down list.
Select Retry from the value drop-down list.
Click Apply Filter. All queues that currently have a Retry status are displayed.
Select one or more queues from the list. Right-click, and then select Retry Queue. If the connection attempt is successful, the queue status changes to Active. If no connection can be made, the queue remains in a status of Retry and the next retry time is updated.
Resubmit messages in queues
Resubmitting a queue is similar to retrying a queue, except the messages are sent back to the Submission queue for the categorizer to reprocess.
You can resubmit messages that have the following status:
Delivery queues that have the status of Retry. The messages in the queues can’t be in the Suspended state.
Messages in the Unreachable queue that aren’t in the Suspended state.
Messages in the poison message queue.
OWA DRAFTS FOLDER
http://thoughtsofanidlemind.wordpress.com/2013/03/25/exchange-2013-dns-stuck-messages/
OWA clients automatically capture copies of messages as they are being composed and store them in the Drafts folder. When the user issues a sent command, the Mailbox submit agent (running within the Store driver) takes over and processes the outbound message by giving it to either the Transport service running on the same mailbox server or to the Transport server running on another mailbox server. The connection is made via SMTP.
Messages stay in the Drafts folder until they are successfully sent by being processed by the transport service.
At this point, items are moved into the Sent Items folder. OWA 2013 behaves in the same way as OWA 2010 -nothing has changed in the way that messages are held in the Drafts folder until dispatch. What might account for user descriptions of items being “stuck” is when a problem occurs somewhere in the transport pipeline that prevents outbound messages being processed.
For instance, items will remain in the Drafts folder if the Store cannot pass them to the transport system. If the transport service is not running on any available server or the mailbox transport service is not running on the mailbox server that hosts the active database for the user’s mailbox, items will stay in the Drafts folder until the services come online and Exchange is able to process outbound items.
NOT A C
Active copy of a database named Database1 (EX1) not on EX2
NOT D
Messages stay in the Drafts folder until they are successfully sent by being processed by the transport service
B
Resubmitting a queue is similar to retrying a queue, except the messages are sent back to the Submission queue for the categorizer to reprocess.
Messages stay in the Drafts folder until they are successfully sent by being processed by the transport service If the transport service is not running on any available server or the mailbox transport service is not running on the mailbox server that hosts the active database for the user’s mailbox, items will stay in the Drafts folder until the services come online and Exchange is able to process outbound items.

QUESTION 5
Hotspot Question
You have an Exchange Server 2013 organization that contains three servers.
The servers are configured as shown in the following table.
51
All of the servers are part of a database availability group (DAG) named DAG1.
The databases are configured as shown in the following table.
52
All of the databases replicate between all the members of DAG1.
You plan to move all mailboxes from DB1 to DB2.
You need to ensure that the passive copies of DB1 are in a healthy state before you move the mailboxes.
Which command should you run? (To answer, select the appropriate options in the dialog box in the answer area.)
53
Answer:
54
Explanation:
SECTION1
NOT Set-MailboxServer
Use the Set-MailboxServer cmdlet to modify attributes on a computer running Microsoft Exchange with the
Mailbox server role installed.
Not required in this scenario.
Set-MailboxDatabase
Use the Set-MailboxDatabase cmdlet to configure a variety of properties for a mailbox database.
EXAMPLE 1
This example sets the length of time that deleted items are retained.
If a specific mailbox has its own item retention set, that value is used instead of this value, which is set on the mailbox database. Set-MailboxDatabase “Mailbox Database01” -DeletedItemRetention 7.00:00:00 NOT Set-MailboxDatabaseCopy
Use the Set-MailboxDatabaseCopy cmdlet to configure the properties of a database copy.
EXAMPLE 1
This example configures the replay lag time with a value of 3 days for a copy of the database DB2 hosted on the Mailbox server MBX1.
Set-MailboxDatabaseCopy -Identity DB2\MBX1 -ReplayLagTime 3.0:0:0 EXAMPLE 2
This example configures an activation preference of 3 for the copy of the database DB1 hosted on the Mailbox server MBX2.Set-MailboxDatabaseCopy -Identity DB1\MBX2 -ActivationPreference 3 NOT Set-DatabaseAvailabilityGroup
Use the Set-DatabaseAvailabilityGroup cmdlet to configure some of the properties of a database availability group (DAG). The Set-DatabaseAvailabilityGroup cmdlet enables you to manage DAG properties that can’t be managed from the Exchange Management Console, such as enabling and disabling cross-site RPC client access, configuring network discovery, selecting the TCP port used for replication, and enabling datacenter activation coordination (DAC) mode.
SECTION2
Need to identify the name of the mailbox database. (DB1) SECTION3
The DataMoveReplicationConstraint parameter specifies the throttling behavior for high availability mailbox moves. The possible values include:
None Moves shouldn’t be throttled to ensure high availability. Use this setting if the database isn’t part of a database availability group (DAG).
SecondCopy At least one passive mailbox database copy must have the most recent changes synchronized.
This is the default value. Use this setting to indicate that the database is replicated to one or more mailbox database copies.
SecondDatacenter At least one passive mailbox database copy in another Active Directory site must have the most recent changes replicated. Use this setting to indicate that the database is replicated to database copies in multiple Active Directory sites. AllDatacenters At least one passive mailbox database copy in each Active Directory site must have the most recent changes replicated. Use this setting to indicate that the database is replicated to database copies in multiple Active Directory sites.
AllCopies All copies of the database must have the most recent changes replicated. Use this setting to indicate that the database is replicated to one or more mailbox database copies. The database is replicated to database copies in multiple Active Directory sites so eliminate SecondCopy.
Unsure of why -AllDatacenters is the final choice but there are 3 Active Directory sites in this scenario.

QUESTION 6
Drag and Drop Question
Your network contains an internal network and a perimeter network.
You have an Exchange Server 2010 organization that contains an Edge Transport server named EX3.
You plan to upgrade the organization to Exchange Server 2013.
You plan to replace EX3 and its functionalities with a new server named EX6 that has Exchange Server 2013 installed. EX6 will be used to send all email messages to and receive all email messages from the Internet and to filter spam.
You need to recommend which steps are required to install EX6. EX6 must have the least number of Exchange Server roles installed.
Which three actions should you recommend performing on EX6 in sequence? (To answer, move the appropriate three actions from the list of actions to the answer area and arrange them in the correct order.)
61
Answer:
62
Explanation:
Run the following command to install the Anti-Spame Agents &
$env:ExchangeInstallPath\Scripts\Install-AntiSpamAgents.ps1
Run the Restart-Service
MSExchange Transport command
Need to run this command
Once the Install-AntiSpamAgents.ps1 script has run, if the anti-spam agents were successfully installed then exchange will ask you to restart the Microsoft Exchange Transport service. Use the Restart-Service MSExchange Transport command to do this.
Run the Update-MalwareFilteringServer.ps1 script.
Malware not mentioned in this scenario. No need to run. In order to retrieve a Microsoft engine update when you did not enable the antimalware feature on install or had it enabled but subsequently disabled it via the “Disable-AntimalwareScanning.ps1” script you will need to execute the script below which will initiate a Microsoft engine update:
Update-MalwareFilteringServer.ps1 -identity %ServerName% Answer Options
Install the Client Access server role or the Mailbox server role first EX6 will be used to send all email messages to and receive all email messages from the Internet and to filter spam.
An organization must have at least one Mailbox role and at least one Client Access server role installed.
CAS Exchange role does 3 things and only those things:
1. The CAS authenticates the connection made by the user so that it can determine who is trying to connect.
2. Once authenticated it will locate the user’s mailbox and find out on which mailbox server that mailbox is currently active
3. It then proxies the connection from that user to his or hers mailbox on the mailbox server and maintains that connection or redirects it to the appropriate CAS server.
http://technet.microsoft.com/en-us/library/bb124778(v=exchg.150).aspx
Each organization requires at a minimum one Client Access server and one Mailbox server in the Active Directory forest. Additionally, each Active Directory site that contains a Mailbox server must also contain at least one Client Access server.
If you’re separating your server roles, we recommend installing the Mailbox server role first. In the context of the question given that we have only 3 choices and the anti-spam installation will take up 2 of these choices , the Client Access Server is the server that sends all messages to and from the internet, therefore we need to install a Client Access server Then Install-AntiSpamAgents.ps1 as the anti-spam agents are required in this scenario Then run the Restart-Service MSExchange Transport command as required after the install-AntiSpamAgents.ps1 has been run

Case Study 1: Contoso Ltd (QUESTION 7 ~ QUESTION 14)
Overview
General Overview
Contoso, Ltd., is a scientific research and supply company that has offices along the east coast of North America. The company recently completed an upgrade to Exchange Server 2013.
Physical Locations
The company has three sales offices and a research office.
The sales offices are located in Atlanta, New York, and Montreal.
The research office is located in Miami.
Existing Environment
Active Directory Environment
The network contains one Active Directory forest named contoso.com. The Miami office has its own domain named research.contoso.com. Each office is configured as an Active Directory site. Each site contains two domain controllers that run Windows Server 2008 R2 x64. All of the FSMO roles for contoso.com are owned by a domain controller in the New York site. All of the FSMO roles for the research.contoso.com domain are owned by a domain controller in the Miami site. One domain controller in each site is configured as a global catalog server. All of the domain controllers are configured as DNS servers. The functional level of the forest and domains is Windows Server 2008 R2.
Network Infrastructure
All client computers are configured to connect to the DNS servers in their respective office only. Contoso.com has a standalone certification authority (CA) on a server that runs Windows Server 2008 R2. All offices connect to the New York office by using a high-speed WAN link.
Email Infrastructure
The Exchange Server 2013 organization contains four servers in the New York office.
The servers are configured as shown in the following table.
All external access for the contoso.com organization is provided through an Internet link at the New York office. Load balancing is provided by using DNS round robin. All inbound and outbound email for the domain is routed through a mail appliance in the New York office.
The Exchange Server 2013 organization contains four servers in the Atlanta office.
The servers are configured as shown in the following table.
The file share witness for NY-DAG is on a file server in the Atlanta office.
The Exchange Server 2013 organization contains two servers in the Montreal office and two servers in the Miami office.
The servers are configured as shown the following table.
All external access to the organization of the research.contoso.com domain is provided through the Internet link at the Miami office. Load balancing is provided by using DNS round robin. All inbound and outbound email for the domain goes through an email appliance in the Miami office. All Exchange Server 2013 servers run Windows Server 2012 Standard. All users have Windows Phone devices that connect to the Exchange organization by using Exchange ActiveSync.
User Issues
You discover the following user issues:
– Some users report that, intermittently, they fail to connect to their email from their Windows Phone device.
– Some users from the New York office report that some searches from Outlook Web App return incomplete results.
– Some of the users in each office report that they fail to access their mailbox during the maintenance period of the Active Directory domain controllers.
You verify that all of the remote users can connect to the network successfully by using a VPN connection, and can then launch Outlook successfully.
Partnerships
Contoso recently entered into a partnership with a company named A. Datum Corporation. A. Datum has a main office and four branch offices. The main office is located in Toronto.
A. Datum has a messaging infrastructure configured as shown in the following table.
Requirements
Planned Changes
Contoso plans to deploy a hardware load balancer in the New York office. The load balancer must bridge all SSL connections to the Exchange servers. You plan to deploy two new Exchange Server 2013 servers in a virtual server environment in the Miami office. The servers will host a few mailboxes as part of an evaluation of resource utilization for virtualized Exchange servers. You also plan to deploy a high availability solution for Mailbox servers in the You plan to replace the email appliance in New York because of recent power outages.
Business Requirements
Contoso identifies the following business requirements:
– Minimize the hardware costs required for a load balancing solution.
– Minimize the software costs required for a load balancing solution.
– Minimize user interruptions if a service fails on a Mailbox server.
– Minimize user interruptions if a service fails on a Client Access server.

QUESTION 7
You need to identify which business requirement will be met by implementing the planned hardware load balancer.
Which business requirement should you identify?

A.    Minimize the hardware costs required for a load balancing solution.
B.    Minimize the software costs required for a load balancing solution.
C.    Minimize user interruptions if a service fails on a Client Access server.
D.    Minimize user interruptions if a service fails on a Mailbox server.

Answer: C
Explanation:
NOT A
Introducing a load balancing solution will not minimize hardware costs
NOT B
Introducing a hardware load balancing solution will not minimize software costs
NOT D
A hardware load balancer connects to the Client Access servers not the Mailbox servers.
C
A hardware load balancer connects to the Client Access servers not the Mailbox servers AND is designed to minimize user interruptions

QUESTION 8
You need to resolve the search issue reported by the users in the New York office.
You restart the Microsoft Exchange Search service and discover that the active copy of the mailbox database has a content indexing status of Unknown.
What should you do next?

A.    Rebuild the content index.
B.    Run the Update-MailboxDatabaseCopy cmdlet and specify the -manualresume parameter.
C.    Restart the Microsoft Exchange Mailbox Replication service.
D.    Run the Update-MailboxDatabaseCopy cmdlet and specify the -catalogonly parameter.

Answer: A
Explanation:
Content Indexing also known as CI is a great feature to speed up item searching through mailboxes.
Microsoft Exchange Search service
Exchange 2013 introduces the following changes to Exchange Search:
The underlying content indexing engine has been replaced with Microsoft Search Foundation, which provides performance and functionality improvements and serves as the common underlying content indexing engine in Exchange and SharePoint. The management interface, however, remain the same.
By default, the Search Foundation handles the most common file formats in email attachments. You no longer need to install Microsoft Office Filter Packs for Exchange Search. For a list of the file formats handled by
Exchange Search, see File Formats Indexed By Exchange Search. You can add support for any additional file formats by install IFilters, as in Exchange 2010. Content indexing is more efficient because it now processes messages in the transport pipeline. As a result, messages addressed to multiple recipients or distribution groups are processed only once.
An annotation stream is attached to the message, significantly speeding up content indexing while consuming fewer resources.
A
One of the first actions most Exchange Administrators generally take when troubleshooting suspected problems with Exchange Content Indexing will be to rebuild the impacted Mailbox Database’s content index files (either manually or by using the ResetSearchIndex.ps1 script found in the \Exchange Server\Scripts directory).
Makes sure that Exchange content index always remain healthy.
NOT B
Not a database replication issue
If the content index catalog for a mailbox database copy gets corrupted, you may need to reseed the catalog.
Seeding is also known as updating.
Use the Update-MailboxDatabaseCopy cmdlet to seed or reseed a mailbox database copy.
EXAMPLE 1
This example seeds a copy of the database DB1 on the Mailbox server MBX1.
Update-MailboxDatabaseCopy -Identity DB1\MBX1
The ManualResume switch specifies whether to automatically resume replication on the database copy. With this parameter, you can manually resume replication to the database copy.
NOT C
Not related to an indexing issue.
In Exchange 2013, the Microsoft Exchange Replication service periodically monitors the health of all mounted databases. In addition, it also monitors the Extensible Storage Engine (ESE) for any I/O errors or failures. When the service detects a failure, it notifies Active Manager. Active Manager then determines which database copy should be mounted and what it requires to mount that database. In addition, it tracks the active copy of a mailbox database (based on the last mounted copy of the database) and provides the tracking results information to the Client Access server to which the client is connected.
NOT D
Content index needs to be rebuilt
If the content index catalog for a mailbox database copy gets corrupted, you may need to reseed the catalog.
Seeding is also known as updating.
Use the Update-MailboxDatabaseCopy cmdlet to seed or reseed a mailbox database copy.
EXAMPLE 1
This example seeds a copy of the database DB1 on the Mailbox server MBX1.
Update-MailboxDatabaseCopy -Identity DB1\MBX1
The CatalogOnly parameter specifies that only the content index catalog for the database copy should be seeded.

QUESTION 9
You need to ensure that all of the email messages sent from the Internet to adatum.com are routed through the contoso.com organization.
What should you create in contoso.com? (Each corrects answer presents part of the solution. Choose all that apply.)

A.    a contact object for each adatum.com recipient
B.    an internal relay accepted domain for adatum.com
C.    a Send connector that is configured to point to the contoso.com transport servers
D.    a Send connector that is configured to point to the adatum.com transport servers
E.    an authoritative accepted domain for adatum.com

Answer: BD
Explanation:
Internal Relay Domain
You can configure a relay domain as an internal relay domain or as an external relay domain. These two relay domain types are described in the following sections.
When you configure an internal relay domain, some or all of the recipients in this domain don’t have mailboxes in this Exchange organization. Mail from the Internet is relayed for this domain through Transport servers in this Exchange organization. This configuration is used in the scenarios that are described in this section.
An organization may have to share the same SMTP address space between two or more different messaging systems. For example, you may have to share the SMTP address space between Exchange and a third-party messaging system, or between Exchange environments that are configured in different Active Directory forests. In these scenarios, users in each email system have the same domain suffix as part of their email addresses.
To support these scenarios, you need to create an accepted domain that’s configured as an internal relay domain. You also need to add a Send connector that’s sourced on a Mailbox server and configured to send email to the shared address space. If an accepted domain is configured as authoritative and a recipient isn’t found in Active Directory, a non-delivery report (NDR) is returned to the sender. The accepted domain that’s configured as an internal relay domain first tries to deliver to a recipient in the Exchange organization. If the recipient isn’t found, the message is routed to the Send connector that has the closest address space match.
If an organization contains more than one forest and has configured global address list (GAL) synchronization, the SMTP domain for one forest may be configured as an internal relay domain in a second forest. Messages from the Internet that are addressed to recipients in internal relay domains are relayed to the Mailbox servers in the same organization. The receiving Mailbox servers then route the messages to the Mailbox servers in the recipient forest. You configure the SMTP domain as an internal relay domain to make sure that email that’s addressed to that domain is accepted by the Exchange organization. The connector configuration of your organization determines how messages are routed.
B
An accepted domain is any SMTP namespace for which a Microsoft Exchange Server 2013 organization sends or receives email.
Accepted domains include those domains for which the Exchange organization is authoritative. An Exchange organization is authoritative when it handles mail delivery for recipients in the accepted domain.
Accepted domains also include domains for which the Exchange organization receives mail and then relays it to an email server that’s outside the organization for delivery to the recipient.
D
2nd part of establishing an internal relay domain is to establish a Send Connector that is configured to point to the other organization’s mail servers (a datum)
NOT A
Better to establish an internal relay domain.
A mail-enabled Active Directory contact that contains information about people or organizations that exist outside the Exchange organization. Each mail contact has an external email address. All messages sent to the mail contact are routed to this external email address.
NOT C
Need to establish a Send connector to adatum.com not contoso.com
NOT E
Need to establish an internal relay domain not an authorative accepted domain for adatum.com

QUESTION 10
You need to prevent several users in the Miami office from establishing more than two concurrent Exchange ActiveSync connections to the Exchange Server organization.
The solution must affect only the users in the Miami office.
Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)

A.    Create a new throttling policy that has the Organization scope.
B.    Create a new throttling policy that has the Global scope.
C.    Create a new throttling policy that has the Regular scope.
D.    Run the Set-ThrottlingPolicyAssociation cmdlet.
E.    Run the Set-ThrottlingPolicy cmdlet.
F.    Remove the default throttling policy.

Answer: CD
Explanation:
New-ThrottlingPolicy
Use the New-ThrottlingPolicy cmdlet to create a non-default user throttling policy.
EXAMPLE 1
This example creates a non-default user throttling policy that can be associated with specific users. Any parameters that you omit inherit the values from the default throttling policy GlobalThrottlingPolicy_<GUID>.
After you create this policy, you must associate it with specific users.
New-ThrottlingPolicy -Name ITUserPolicy -EwsMaxConcurrency 4 -ThrottlingPolicyScope Regular
The ThrottlingPolicyScope parameter specifies the scope of the throttling policy. You can use the following values.
Regular Specifies a custom policy that applies to specific users.
Organization Specifies a custom policy that applies to all users in your organization.
Global Reserved for the default throttling policy.
C
Need to establish a New Throttling policy to limit the Exchange ActiveSync connections and that has a regular scope to associate with specific users.
D
Use the Set-ThrottlingPolicyAssociation cmdlet to associate a throttling policy with a specific object. The object can be a user with a mailbox, a user without a mailbox, a contact, or a computer account.
EXAMPLE 1
This example associates a user with a user name of tonysmith to the throttling policy ITStaffPolicy that has higher limits.
Set-ThrottlingPolicyAssociation -Identity tonysmith -ThrottlingPolicy ITStaffPolicy
NOT A
Need a regular scope
NOT B
Need a regular scope
NOT E
Need to associate the new thottling policy with respective users.
Use the Set-ThrottlingPolicy cmdlet to modify the settings for a user throttling policy.
EXAMPLE 1
This example modifies a throttling policy so that users associated with this policy can have a maximum of four concurrent requests running in Exchange Web Services.
$a = Get-ThrottlingPolicy RemoteSiteUserPolicy
$a | Set-ThrottlingPolicy -EwsMaxConcurrency 4
NOT F
Need to create a new throttling policy

QUESTION 11
You need to recommend a temporary solution to reroute all of the outbound email messages through the Miami mail appliance during the planned replacement of the New York mail appliance.
What are three possible ways to achieve the goal? (Each correct answer presents a complete solution. Choose three.)

A.    Modify the value of the SmartHost of the Send connector in the New York office.
B.    Increase the cost of the Send connector in the Miami office.
C.    Increase the cost of the Send connector in the New York office.
D.    Decrease the cost of the Send connector in the New York office,
E.    Modify the value of the SmartHost of the Send connector in the Miami office.
F.    Disable the Send connector in the New York office.

Answer: ACF
Explanation:
Both Miami and New York have external connections to the internet with Client Access Servers
In Microsoft Exchange Server 2013, a Send connector controls the flow of outbound messages to the receiving server
Internal Send connectors send e-mail to servers in your Exchange organization. This connector is configured to route e-mail to your internal Exchange servers as smart hosts. A smart host (also known as a relay host) is a server that redirects outbound mail. Send connectors send e-mail to the Internet. This connector is configured to use Domain Name System (DNS)
MX records to route e-mail.
The cost is important if there is more than one connector that can be used, where the lower the cost the more preferred the route.
This is useful if you have two Internet connections, and only want to use the slower one when the faster is down. Like weights in SRV records, the values are arbitrary. 1 vs 10 is no different than 1 vs 2, as long as there are no others you want to squeeze between them.
Smart Host
In some situations you may want to route email through a third-party smart host, such as in an instance where you have a network appliance that you want to perform policy checks on outbound messages.
A smart host is a type of email message transfer agent which allows an SMTP server to route email to an intermediate mailserver rather than directly to the recipient’s server. Often this smart host requires authentication from the sender to verify that the sender has privileges to have mail forwarded through the smart host. This is an important distinction from an open mail relay that will forward mail from the sender without authentication. Common authentication techniques include SMTP Authentication and POP before SMTP.
When configured to be a backup mail server (not the primary MX record), a smart host configuration will accept mail on behalf of the primary mail server if it were to go offline. When the primary mail server comes back online, mail is subsequently delivered via the smart host.
Some ISPs, in an effort to reduce email spam originating at their customer’s IP addresses, will not allow their customers to communicate directly with the recipient’s mail server via the default SMTP port number 25. In this case the customer has no choice but to use the smart host provided by the ISP.
When a host runs its own local mail server, a smart host is often used to transmit all mail to other systems through a central mail server. This is used to ease the management of a single mail server with aliases, security, and Internet access rather than maintaining numerous local mail servers.
NOT B
Need to increase the cost of the Send Connect in the New York Office
NOT D
Need to increase the cost not decrease the cost of the Send Connector in the New York Office
NOT E
Need to modify the value of the SmartHost of the Send connector in the New York office
A
Modify the value of the SmartHost of the Send connector in the New York office to point to the smart host in the Miami office.
C
Increasing the cost of a Send Connector in the New York Office will make the Miami connection to the internet the most preferred outbound connection.
F
Disabling the Send connector in the New York Office will make the Miami connection to the internet the only outbound connection.

QUESTION 12
Hotspot Question
You are evaluating a DAG design for the New York and Atlanta offices.
You need to ensure that all of the users in the New York and Atlanta offices can access their mailbox if the WAN link fails.
Which DAG design should you deploy? To answer, select the appropriate DAG design in the answer area.
121
Answer:
122

QUESTION 13
Hotspot Question
You discover that one of the Client Access servers in the New York office does not trust the standalone CA.
You need to ensure that all of the users who have Windows Phone devices can connect successfully to their mailbox.
In which node should you install the root CA certificate? To answer, select the appropriate node in the answer area.
131
Answer:
132

QUESTION 14
You plan to deploy an Exchange Server 2013 organization.
You need to recommend a solution to ensure that a user named User1 can access email messages by using Exchange ActiveSync on an Android device.
The solution must prevent all other users from using Android devices to access email by using Exchange ActiveSync.
What should you recommend doing first?

A.    Run the Set-CasMailbox cmdlet.
B.    Create a device access rule.
C.    Modify the Quarantine Notification settings.
D.    Create a mobile device mailbox policy.

Answer: B
Explanation:
Access the Allow/Block/Quarantine rules
NOT A
Use the Set-CASMailbox cmdlet to set attributes related to client access for Microsoft Exchange ActiveSync, Microsoft Office Outlook Web App, POP3, and IMAP4 for a specified user.
The Set-CASMailbox cmdlet operates on one mailbox at a time. You can configure properties for Outlook Web App, Exchange ActiveSync, POP3, and IMAP4 by using this cmdlet.
You can configure a single property or multiple properties by using one statement.
Need to create a rule to allow a particular user to use Exchange ActiveSync on an Android device.
NOT C
Can allow or block access for all users.
Quarantine all uses and then selectively allow the users access.
A new device rule is a better way of managing the problem.
NOT D
Need a policy for a single user.
In Microsoft Exchange Server 2013, you can create mobile device mailbox policies to apply a common set of policies or security settings to a collection of users. After you deploy Exchange ActiveSync in your Exchange 2013 organization, you can create new mobile device mailbox policies or modify existing policies. When you install Exchange 2013, a default mobile device mailbox policy is created. All users are automatically assigned this default mobile device mailbox policy.

Case Study 2: Litware, Inc (QUESTION 15 ~ QUESTION 21)
Overview
Litware, Inc., is a manufacturing company located in North America.
The company has a main office and two branch offices.
The main office is located in Chicago.
The branch offices are located in Baltimore and Los Angeles.
Existing Environment
Active Directory Environment
The network contains one Active Directory forest named litwareinc.com. Each office is configured as an Active Directory site. All domain controllers in the Los Angeles office run Windows Server 2008 R2. All domain controllers in the Chicago office run Windows Server 2003 Service Pack 1 (SP1). All domain controllers in the Baltimore office run Windows Server 2012. All of the FSMO roles are located on a domain controller in the Baltimore office. All of the domain controllers are configured as global catalog servers. You have a distribution group for each department. The distribution groups contain all of the users in each respective department.
Network Infrastructure
The servers in each office are configured as shown in the following table.
The Baltimore and Chicago offices have independent Internet connections. Internet connectivity for the Los Angeles office is provided through Chicago. Users frequently send large email messages to other users in the company. Recently, you increased the maximum message size to 50 MB.
Planned Changes
The company plans to deploy a new Exchange Server 2013 infrastructure that will contain two Clients Access servers and two Mailbox servers in the Chicago office.
The servers will be configured as shown in the following table.
All client connections to the Exchange Server organization will be routed through a hardware load balancer. The name client.litwareinc.com will point to the virtual IP address of the hardware load balancer. Once the transition to Exchange Server 2013 in the Chicago office is complete, all mail flow to and from the Internet will be managed centrally through that office by using a Send connector that has the following configurations:
– Connector name: CH-to-Internet
– Address space: *
– Source servers: CH-EX2, CH-EX3
– Cost: 10

QUESTION 15
You need to recommend changes to the network to ensure that you can deploy the planned Exchange Server 2013 infrastructure.
What should you recommend?

A.    Transfer of the FSMO roles to a domain controller in the Chicago office.
B.    Change the forest functional level.
C.    Change the domain functional level.
D.    Change the operating system on one of the domain controllers in the Chicago office

Answer: D
Explanation:
DIFFICULT QUESTION
FSMO ( Flexible Single Master Operations )
In a forest, there are five FSMO roles that are assigned to one or more domain controllers.
The five FSMO roles are:
Schema Master:
The schema master domain controller controls all updates and modifications to the schema. Once the Schema update is complete, it is replicated from the schema master to all other DCs in the directory. To update the schema of a forest, you must have access to the schema master. There can be only one schema master in the whole forest.
Domain naming master:
The domain naming master domain controller controls the addition or removal of domains in the forest. This DC is the only one that can add or remove a domain from the directory. It can also add or remove cross references to domains in external directories. There can be only one domain naming master in the whole forest.
Infrastructure Master:
When an object in one domain is referenced by another object in another domain, it represents the reference by the GUID, the SID (for references to security principals), and the DN of the object being referenced. The infrastructure FSMO role holder is the DC responsible for updating an object’s SID and distinguished name in a cross-domain object reference. At any one time, there can be only one domain controller acting as the infrastructure master in each domain.
Note: The Infrastructure Master (IM) role should be held by a domain controller that is not a Global Catalog server (GC). If the Infrastructure Master runs on a Global Catalog server it will stop updating object information because it does not contain any references to objects that it does not hold. This is because a Global Catalog server holds a partial replica of every object in the forest. As a result, cross-domain object references in that domain will not be updated and a warning to that effect will be logged on that DC’s event log. If all the domain controllers in a domain also host the global catalog, all the domain controllers have the current data, and it is not important which domain controller holds the infrastructure master role.
Relative ID (RID) Master:
The RID master is responsible for processing RID pool requests from all domain controllers in a particular domain. When a DC creates a security principal object such as a user or group, it attaches a unique Security ID (SID) to the object. This SID consists of a domain SID (the same for all SIDs created in a domain), and a relative ID (RID) that is unique for each security principal SID created in a domain. Each DC in a domain is allocated a pool of RIDs that it is allowed to assign to the security principals it creates. When a DC’s allocated RID pool falls below a threshold, that DC issues a request for additional RIDs to the domain’s RID master. The domain RID master responds to the request by retrieving RIDs from the domain’s unallocated RID pool and assigns them to the pool of the requesting DC. At any one time, there can be only one domain controller acting as the RID master in the domain.
PDC Emulator:
The PDC emulator is necessary to synchronize time in an enterprise.
The PDC emulator of a domain is authoritative for the domain. The PDC emulator at the root of the forest becomes authoritative for the enterprise, and should be configured to gather the time from an external source.
All PDC FSMO role holders follow the hierarchy of domains in the selection of their in-bound time partner.
NOT A
All of the FSMO roles are located on a domain controller in the Baltimore Office. All of the domain controllers are configured as a global catalog server
No need to transfer all of these roles to the chicago domain controller as the question suggests.
NOT B
Apparently no need to change the forest functional level http://technet.microsoft.com/en-us/library/cc771294.aspx
Forest functional levels enable features across all the domains in your forest. The following table lists the forest functional levels and their corresponding supported domain controllers.
NOT C
Apparently no need to change the domain functional level http://technet.microsoft.com/en-us/library/cc771294.aspx
For all domain controllers to function accordingly in the domain the domain functional level would have to be set to Windows Server 2003
All domain controllers in the Chicago office run Windows Server 2003 Service Pack 1.
(SP1)
All domain controllers in the Los Angeles office run Windows Server 2008 R2.
All domain controllers in the Baltimore office run Windows Server 2012
Domain functional levels
Domain functionality enables features that affect the entire domain and that domain only.
The following table lists the domain functional levels and their corresponding supported domain controllers:
D
http://technet.microsoft.com/en-us/library/ff728623(v=exchg.150).aspx
Mixture of exchange 2007,2010 and 2013 environment
Exchange 2007/2010/2013 can operate in a Windows Server 2003/2008/2012 domain functional level Exchange 2007/2010/2013 can operate in a Windows Server 2003/2008/2012 forest functional level However to operate appropriately the min spec for Exchange 2013 is for an AD environment of Server 2003 SP2
Currently all of the chicago domain controllers are 2003 SP1
Need to upgrade a chicago domain controller which will house Exchange 2013

The Microsoft 70-341 questions and answers from GreatExam are the most reliable guide for Microsoft exam. We offer the latest 70-341 PDF and VCE dumps with new version VCE player for free download, and the newest 70-341 practice test ensures your exam 100% pass. A large number of successful candidates have shown a lot of faith in our 70-341 exam dumps. If you want pass the Microsoft 70-341 exam, please choose GreatExam.

http://www.greatexam.com/70-341-exam-questions.html