Archive for the ‘MCTS’ Category

70-643: Windows Server 2008 Applications Infrastructure, Configuring


QUESTION 1
You work as the network administrator at ABC.com. The ABC.com network has a domain named
ABC.com. All servers on the ABC.com network run Windows Server 2008 and all client computers
run Windows Vista.
ABC.com recently entered into partnership with Weyland Industries.
You create user accounts in the ABC.com domain for some employees of Weyland Industries.
You place the user accounts into a global security group named WeySecure.
You want to provide members of the WeySecure group access to parts of the ABC.com network
via a Terminal Services Gateway server named ABC-TS01.
What do you need to do to ensure that the WeySecure group is able to access ABC-TS01?

A. You need to configure a Remote Access Policy.
B. You need to create and configure a Connection Authorization Policy.
C. You need to configure Device redirection.
D. You need to configure a Network Access Protection Policy.

Answer: B

Explanation: To provide a security group access to ABC-TS02, you need to create and configure
a Connection Authorization Policy.
A connection authorization policy (CAP) allows you to control who can connect to the Terminal
Server through the Terminal Services Gateway. You can configure what groups can access the
Terminal Server through the TS Gateway.
Reference: Configuring the Windows Server 2008 Terminal Services Gateway (Part 2) / Create a
Terminal Services Gateway CAP

http://www.windowsecurity.com/articles/Configuring-Windows-Server-2008-Terminal-Services-

Gateway-Part2.html


QUESTION 2
You work as a network administrator for ABC.com. The ABC.com network consists of a domain
named ABC.com. All servers on the ABC.com network either run Windows Server 2008 or
Windows Server 2003.
The ABC.com network contains a Windows Server 2003 server named ABC-SR05 and a Windows
Server 2008 server named ABC-SR06. ABC-SR05 has Microsoft SQL Server 2005 and Microsoft
Windows SharePoint Services (WSS) 2.0 installed.
You receive instruction to uABCrade Windows SharePoint Services (WSS) 2.0 to Windows
SharePoint Services (WSS) 3.0 and have it run on ABC-SR06. You need to have Windows
SharePoint Services (WSS) 3.0 retain the content and settings from Windows SharePoint Services
(WSS) 2.0.
Which of the following steps would be the best way to accomplish this task? (Choose multiple
answers).

A. You should back up the SharePoint configuration as well as the content from ABC-SR05.
B. You should back up the SQL Server 2005 configuration as well as the Microsoft Windows
SharePoint Services (WSS) databases from ABC-SR05.
C. You should uABCrade ABC-SR05 to Windows Server 2008.
D. You should install Microsoft Windows SharePoint Services (WSS) 3.0 on ABC-SR06.
E. You should install Microsoft Windows SharePoint Services (WSS) 2.0 on ABC-SR06.
F. You should restore the backup from ABC-SR05 to ABC-SR06.
G. You should uABCrade Windows SharePoint Services (WSS) 2.0 to Windows SharePoint
Services (WSS) 3.0 on ABC-SR06.

Answer: A,E,F,G

Explanation: In order to migrate to SharePoint Services (WSS) 3.0 from ABC-SR05 to ABC-SR06
with all the configuration and content, you need to install WSS 2.0 on ABC-SR06. You need to
back up the WSS 2.0 configuration and content from ABC-SR05. Then the backup can be restored
from ABC-SR05 to ABC-SR06. Lastly an in-place uABCrade of WSS 2.0 to WSS 3.0 can be
executed on ABC-SR06.
When you run an in-place uABCrade, all content and configuration data is uABCraded in-place, at
one time. When you start the in-place uABCrade process, the Web server and Web sites remain
offline until the uABCrade has been installed. In-place uABCrades are best for a stand-alone
server and small installations as in this case
Reference: Install and configure Office SharePoint Server for an in-place uABCrade

http://technet.microsoft.com/en-us/library/cc263212(TechNet.10).aspx

Determine uABCrade approach (Office SharePoint Server)

http://technet.microsoft.com/en-us/library/cc263447(TechNet.10).aspx


QUESTION 3
You work as the network administrator at ABC.com. The ABC.com network consists of a domain
named ABC.com. ABC.com has headquarters in London and branch office in Paris. All servers on
the ABC.com network run Windows Server 2008 and all client computers run Windows Vista.
The ABC.com network contains a member server named ABC-SR01. ABC-SR01 is configured as
the Key Management Service (KMS) server.
You are planning to roll out 20 new Windows Server 2008 computers on the network.
After installing Windows Server 2008 on three of the computers you discover that the servers are
unable to activate using ABC-SR01.
How can you ensure that the new computers are able to activate using ABC-SR01?

A. You should ensure that the new servers have a connection to the internet.
B. You should install the Key Management Service (KMS) on a dedicated Windows Server 2008
computer.
C. You should phone Microsoft Licensing House to Activate the servers by telephone.
D. You should install Windows Server 2008 on at least 7 of the remaining computers.

Answer: D

Explanation: To activate the new server through KMS server, you should complete the installation
of at least 10 servers. The Key Management Service is a Windows service. KMS is a trusted
mechanism that, once the KMS host is activated, allows volume client computers within the
enterprise to activate themselves without any interactions with Microsoft. KMS activation of
Windows Server 2008 follows a hierarchical structure. Each successive product group can activate
all the groups below it, and the KMS can be hosted on any edition that it can activate.


QUESTION 4
You are the network administrator at ABC.com. The ABC.com network consists of a domain
named ABC.com. All servers on the ABC.com network run Windows Server 2008 and all client
computers run Windows XP Professional. ABC.com currently makes use of two computers named
ABC-TS01 and ABC-TS02 which runs the Terminal Server Session Broker role.
ABC.com recently entered into partnership with Weyland Industries who make use of two
computers named WEYLAND-TS01 and WEYLAND-TS02. During the course of the day you
receive instruction from ABC.com and Weyland Industries to configure their Terminal servers for
load balancing whilst ensuring ABC-TS02 is configured as the preferred server.
What program would you use to configure the load balancing?

A. You should use the Terminal Services Resource Authorization policy (RAP).
B. You should use the Terminal Services Configuration utility.
C. You should use the Terminal Services Connection Authorization policy (CAP).
D. You should use the Group Policy Manager utility.

Answer: B

Explanation: In order to configure load balancing for the four terminal servers you need to make
use of the Terminal Services Configuration utility. This will also make ABC-TS02 the preferred
server for TS sessions. Using NLB with Terminal Services provide increased availability,
scalability, and load-balancing performance, as well as the ability to distribute a large number of
Terminal Services clients over a group of terminal servers.


MCTS Training, MCITP Trainnig

Best Microsoft MCTS Server 2008 Certification, MCTS 70-643 Training at certkingdom.com

Availing the MCTS Certification

The MCTS Certification is one of the most advanced and important career oriented IT program that is currently being pursued by thousands of candidates all over the world. Since, this is a tough exam, it is necessary for the individuals to study very hard and put all efforts to qualify the exam. Hence, the preparation needs to be adequate and the skills derived from the program should be sound and appropriate, so that they can be put to good use at the time of the work.

Studying for the MCTS training program
It is necessary for the candidates to give enough time for studying and preparing for the MCTS exam. They need to undergo frequent practice tests, to ensure that they have a proper understanding of the different topics covered in the MCTS course and to ensure that they are ready to undergo the certification examination. This will not only help them to build immense confidence, but also provide them the much needed boost to their existing skills and knowledge. Therefore, preparation for the exam should be adequate and plenty of research needs to be done by the candidate, to ensure better grades. The Knowledge Academy professionals are well versed with the different types of topics that are covered in the course. This is because, they are provided with adequate training in the MCTS program and taken through various practical sessions, for giving them a better and clear understanding of the program.

MCTS course for facing challenges
It is important for the candidates to undergo the program seriously and sincerely, since, it would give them proper exposure on the MCTS Certification and help them to acquire the necessary skills that would be required for implementing in the work place. The exam presents the candidate with a chance to challenge their acquired knowledge and to understand how well they have learnt the program. Presently, the candidates are provided with three different formats, which include case study formats that would challenge their analytical skills, virtual labs and simulations for testing their knowledge and skills within the real setting.

The MCTS training program also presents the candidate with a chance to have a wonderful career change, in case they are finding their present one to be not quite rewarding. It has been noticed that candidates, who have successfully completed the program are presented with plenty of job opportunities and are provided with better positions and wonderful pay package. Moreover, the MCTS program also prepares the candidates to get a proper career change and to get a lucrative and rewarding career. A good MCTS training program is sure to include the study kits, audio and video presentations, preparation labs, mock test questions, study guides, self-study training kits and an access to a qualified and trained instructor, who would make all the difference to the entire MCTS course. This is sure to improve the knowledge of the individuals and help them to ascertain a better and rewarding career. Also, the candidates are sure to enjoy their training program and gain plenty of knowledge from it.


MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

 

 

70-284: Implementing and Managing Microsoft Exchange Server 2003

QUESTION 1
You work as the Exchange administrator at ABC.com. The ABC.com network has an Active
Directory domain named ABC.com.
The ABC.com Exchange organization contains two Exchange Server 2003 computers named
ABC-SR11 and ABC-SR12 respectively. ABC-SR11 is configured as the mailbox server and ABCSR12
is configured as the front-end server. ABC-SR12 has Microsoft Outlook Web Access over
SSL installed to allow ABC.com employees to access their e-mail.
The ABC.com intranet is connected to the Internet via a firewall. When several employees
complain that they are unable to access ABC-SR12, you investigate the issue and find that
employees are able to access Outlook Web Access using HTTP or HTTPS.
You have been instructed to make sure that the ABC.com employees are only able to use HTTPS
to access Outlook Web Access.
Which of the following actions should you take?

A. You should reconfigure the firewall to allow ABC.com employees to access port 443 on ABCSR12,
and then configure the default Web site on ABC-SR12 to require SSL connections.
B. You should reconfigure the firewall to allow ABC.com employees to access port 80 on ABCSR12,
and then configure the default Web site on ABC-SR12 to use port 443 for SSL connections.
C. You should reconfigure the firewall to allow ABC.com employees to access port 993 on ABCSR12,
and then configure the default Web site on ABC-SR12 to require SSL connections and 128-
bit encryption.
D. You should reconfigure the firewall to allow ABC.com employees to access port 143 on ABCSR12,
and then configure the Exchange HTTP virtual server on ABC-SR12 to enable forms-based
authentication for Outlook Web Access.

Answer: A

Explanation: SSL utilizes port 443. The external firewall does not currently allow traffic on port
443 to pass. Opening up this port will take care of that issue. The default OWA site is currently not
correctly setup to use HTTPS. This is why internal clients can connect to OWA using HTTP.
Modifying the security on the OWA web site will solve this problem.
Reference:
MS white paper Exchange Server 2003 RPC over HTTP Deployment Scenarios
MS white paper Exchange Server 2003 Client Access Guide
MS white paper Exchange 2003 Front-End Back-End Topology


QUESTION 2
You work as the network Exchange administrator at ABC.com, who has their headquarters located
in Miami. The ABC.com network has an Active Directory domain named ABC.com. All servers on
the ABC.com network run Windows Server 2003 and all client computers run Windows XP Professional.
The ABC.com network includes a server named ABC-EX01, which runs Microsoft Exchange Server 2003.
ABC.com recently entered into partnership with Weyland Industries, who has their office located in
Toronto. Part of the network in the Toronto office is configured as an Active Directory site within
the ABC.com domain. A server named ABC-EX02 is configured to run Microsoft Exchange Server
2003 and located in the Toronto office. The two Exchange servers are configured in separate
routing groups connected via a routing group connector. The Toronto and Miami offices are
connected to each other via a leased line connection.
You receive instruction from ABC.com to configure an ISDN-dialup connection as a backup
connection in the event that the leased line connection becomes unavailable.
During the course of your maintenance you discover that the ISDN dial-up connection is not used
as a backup connection, but is used exclusively by the routing group connector.
ABC.com wants you to make sure that the leased line connection is used as the primary
connection, and that the ISDN connection is used only if the leased line connection fails.
Which of the following actions should you take?

A. You should configure ABC-EX01 and ABC-EX02 to be in the same Active Directory site.
B. You should configure ABC-EX01 and ABC-EX02 to be in the same routing group.
C. You should have a lower IP route cost assigned to the ISDN link and a higher link cost to the leased line link.
D. You should configure ABC-EX02 to use ABC-EX01 as a smart host.
E. You should have a lower IP route cost assigned to the leased line link and a higher link cost to the ISDN link.

Answer: E

Explanation: It is possible that the administrator reversed the values of the cost on the
connections because IP route costs are used to set the preference levels between two routes to
the same destination.


QUESTION 3
You work as the Exchange administrator at ABC.com. The ABC.com network has an Active
Directory domain named ABC.com. ABC.com employs Exchange Server 2003 as its messaging
system. All servers on the ABC.com network run Windows Sever 2003 and all Exchange servers
run Exchange Server 2003.
The Exchange organization contains an Exchange server named ABC-SR31, which is used to
pass SMTP e-mail messages between ABC.com and the Internet and also stores the mailboxes of
all ABC.com’s employees. The intranet is connected to the Internet via a firewall.
When several employees complain that they continuously receive numerous unwanted e-mail
messages, you investigate the issue and find that the unwanted e-mail messages received by
ABC.com’s employees are the same. You also notice that the messages are being sent to a
universal distribution group in the ABC.com domain.
You must configure the network so that distribution groups are prevented from sending e-mail
messages from the Internet to the ABC.com users. Your solution must enable the ABC.com users
to continue to send and receive legitimate e-mail messages.
Which of the following is the best solution?

A. You should consider having the universal distribution groups converted to Domain Local Distribution groups.
B. You should consider having the Exchange Attributes removed from the universal distribution groups.
C. You should consider having the distribution groups configured to only permit e-mail messages from authenticated users.
D. You should consider having the membership of the universal distribution groups hidden.

Answer: C

Explanation: Your best option in this scenario would be to select Option C. The universal group is
used for mail distribution in your organization. You can configure the distribution group to accept
mail from authenticate users only to stop receiving spam.
Incorrect answers
A: Converting the universal groups to domain local security groups on its own will not protect you
against unsolicited mail. The security groups will still receive email
B: Removing the Exchange Attributes will remove the email address which would prevent
ABC.com users from sending email to the groups.
D: Hiding the group membership will not protect you against unsolicited mail. The groups will still
receive email.
Reference:
MS white paper Exchange Server 2003 RPC over HTTP Deployment Scenarios
MS white paper Exchange Server 2003 Client Access Guide
MS white paper Exchange 2003 Front-End Back-End Topology
MS white paper Exchange Server 2003 Message Security Guide
MS white paper Microsoft Exchange Intelligent Message Filter Deployment Guide


QUESTION 4
You work as the network Exchange administrator at ABC.com. The ABC.com network has an
Active Directory domain named ABC.com. All servers on the ABC.com network have Windows
Server 2003 installed and all workstations have Windows XP Professional installed.
The ABC.com network contains an Exchange 2003 server named ABC-EX01, which hosts
thousands of mailboxes in a single storage group. ABC-EX01 is equipped with a single RAID-5
device, which is configured as a single logical drive. ABC-EX01 is additionally equipped with a
high-end CPU and has a 2GB of RAM.
During the course of the day the ABC.com network users with mailboxes hosted on ABC-EX01
complain that at times of peak usage their email-services become considerably slower and it takes
longer for messages to be sent and opened using Microsoft Outlook. You have recently received
instruction from the ABC.com network CIO to monitor the performance and you receive the values
shown in the following exhibit:

You are required to improve the performance of e-mail for the network Exchange users on ABCEX01.
What should you do?

A. You should consider having a full-text index created on the mailbox store
B. You should consider having a new volume created on the existing RAID-5 device and move the
Exchange transaction logs to the new volume
C. You should consider having a new RAID device added and the Exchange transaction logs
moved to the new device
D. You should consider installing additional RAM
E. You should consider installing an additional processor

Answer: C

Explanation: The performance results indicate that the hard disk usage is very high and the other
counter values are within acceptable limits. All changes to the Exchange databases are recorded
first in the transaction logs.


QUESTION 5
You work as the Exchange administrator at ABC.com. The ABC.com Exchange organization has
includes a solitary server named ABC-EX01 that has Exchange Server 2003 installed. All
ABC.com users make use of Microsoft Outlook to send and receive e-mail messages.
ABC-EX01 is equipped with dual CPUs and 2 GB Random Access Memory (RAM). ABC-EX01 is
configured to host a storage group that contains one mailbox store.
You receive reports that opening Outlook takes too long, and that every e-mail message being
sent or opened takes too long. You monitor the ABC-EX01 and find that the inadequate RAM
results in the primary bottleneck, which then results in sluggish performance. You, therefore,
increase ABC-EX01’s RAM to 4 GB RAM. However, the ABC.com users continue to report
sluggish Outlook performance.
Which of the following actions should you take to improve ABC-EX01’s performance?

A. You should increase the size of the virtual memory to 6GB.
B. You should place an additional switch that increases user mode memory usage to the Boot.ini
file in the mailbox servers.
C. You should increase the priority of the store.exe process in Task Manager.
D. You should set up an additional mailbox store on the server. Then divide the existing mailboxes
between the old and the new mailbox store.

Answer: B

Explanation: If you have more than 1 GB of physical memory installed on a server that is running
Exchange Server 2003, you must make sure that Exchange Server 2003 can make efficient use of that memory.
If you are running Exchange Server 2003 on a Windows Server 2003-based computer, and if the
/3GB switch is set, Microsoft recommends that you set the /USERVA=3030 parameter in the
Boot.ini file. This configuration option increases the virtual address space.


MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

70-236: Configuring Exchange Server 2007

QUESTION 1
You work as the Exchange Administrator at ABC.com. The ABC.com network has an Exchange
Server 2007 infrastructure.
The network contains a mailbox named TestResources. At present all users are able to diarize
appointments for TestResources. A new company policy states that only Kara Lang and Mia
Hamm are permitted to diarize appointments for TestResources.
What actions must you take to comply with the ABC.com policy?

A. You should run the following cmdlet:
Set- MailboxCalendarSettings – Identity”TestResources” – MonthCalendar calendar = new
MonthCalendar(); KaraLang , MiaHamm.
B. You should run the following cmdlet:
Set-MailboxCalendarSettings – Identity ” TestResources” – BookInPolicy KaraLang , MiaHamm -
AllBookInPolicy $false cmdlet.
C. You should run the following cmdlet:
Set – MonthCalendar calendar = new MonthCalendar(); “host.KaraLang , MiaHamm = calendar ”
this.Content = host;.
D. You should run the following cmdlet:
Set – MonthCalendar calendar = new MonthCalendar();
HwndSource source = HwndSource.FromHwnd(calendar.Handle);
this.Content = calendar;Delegates KaraLang , MiaHamm.

Answer: B

Explanation:


QUESTION 2
You work as the Exchange Administrator at ABC.com. The ABC.com network has an Exchange
Server 2007 environment. ABC.com has headquarters in London and branch offices in Paris and
Berlin. The marketing department is located at the Paris office. The personnel in Paris connect to
the network through the Internet and use Outlook Anywhere on their laptops. To ensure
productivity management wants you to make sure that the marketing personnel have access to the
companies’ mailboxes.
What actions must you take?

A. You should utilize the Test- MAPIConnectivity and the Test- WebServicesConnectivity cmdlet.
B. You should utilize Get- Recipient – Filter cmdlet.
C. You should utilize Show-MailboxStatistics cmdlet.
D. You should utilize List-Mailbox cmdlet.

Answer: A

Explanation:


QUESTION 3
You work as the Exchange administrator at ABC.com. The ABC.com network has an Exchange
Server 2007 environment. The ABC.com network has an Exchange Server 2007 environment.
The Edge Transport Server role is installed on a server named ABC-EX01. Due to this server
failure, you have decided to install a new Microsoft Windows Server 2003 server named ABCEX03
on the network with the reinstallation of the Edge Transport Server role. However, the
address rewrites that was functional on ABC-EX01 did not in operation on ABC-EX03. This
functionality is needed.
What actions must you take?

A. You should use the ImportEdgeConfig.ps1 on ABC-EX03.
B. You should use the iiscnfg/enable: application name check version.
C. You should use the Transaction Logs for sp_configure configuration.
D. You should use create a new Send connector on ABC-EX03.

Answer: A

Explanation:


QUESTION 4
You work as the Exchange administrator at ABC.com. ABC.com has headquarters in London and
a branch office in Paris. The Exchange Server 2007 server in the London office is named ABCEX07
and the Exchange Server 2003 server in the London office is named ABC-EX08. You need
to transfer the mailbox from ABC-EX07 to ABC-EX08.
What actions must you take?

A. You should include the IgnoreRuleLimitErrors parameter when using the Move-Mailbox cmdlet.
B. You should use the System configuration data collector.
C. You should create a mapping schema definition.
D. You should enable the Windows Remote Management (WinRM).

Answer: A

Explanation:


MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

70-162: TS: Forefront Protection for Endpoints and Applications, Configuring

QUESTION 1
You work as a Security Administrator at ABC.com. The network consists of a single Active
Directory Domain Services (AD DS) domain with servers running Windows Server 2008 and client
computers running Windows 7 Professional.
A pool of Windows 2008 Servers hosts the Microsoft Exchange Server 2007 environment.
You have recently implemented Forefront Protection for Exchange Server (FPE) 2010 to improve
the security of the Microsoft Exchange Server 2007 environment.
You discover that some mailboxes have been infected by malware. However there are no
malware infection notifications in the Forefront Protection for Exchange Server Console.
You need to immediately check specific mailboxes to see if they are infected by the malware.
What should you do?

A. You should run a Forefront Client Security scan on the client computers.
B. You should use Forefront Protection for Exchange to perform a real-time scan of the mailboxes.
C. You should use Forefront Protection for Exchange to perform an on-demand scan of the
mailboxes.
D. You should install Microsoft Security Essentials on client computers.

Answer: C

Explanation:


QUESTION 2
You work as a Network Administrator at ABC.com. Your responsibilities include the security of the
computers in the network. The network consists of a single Active Directory Domain Services (AD
DS) domain with servers running Windows Server 2008 and client computers running Windows 7
Professional.
A pool of Windows 2008 Servers hosts the Microsoft Exchange Server 2007 environment.
You have recently implemented Forefront Protection for Exchange Server (FPE) 2010 to improve
the security of the Microsoft Exchange Server 2007 environment.
How would you configure FPE to enable spam filtering?

A. By using the Forefront Management Shell to run the Set-FSEScheduledScan cmdlet.
B. By using the Forefront Management Shell to run Set-FseSpamFiltering the cmdlet.
C. By using the Forefront Management Shell to run the Set-FseSpamContentCheck cmdlet.
D. By using the Forefront Management Shell to run the Set-FSERealtimeScan cmdlet.

Answer: B

Explanation:


QUESTION 3
You are responsible for the security of the ABC.com network. The network consists of a single
Active Directory Domain Services (AD DS) domain with servers running Windows Server 2008
and client computers running Windows 7 Professional.
The company uses Forefront Protection for Exchange Server (FPE) 2010 to protect the Microsoft
Exchange Server 2007 environment.
While monitoring the logs in the FPE console, you discover that users in the company have
received spam emails.
The subject line in each of the emails is: “Free access to our new online tournament!” You note
that the sender email address is spoofed to appear to be from a different domain for each email.
How can you block this spam attack in future?

A. You should configure an allowed sender custom filter in FPE.
B. You should configure a file filtering custom filter in FPE.
C. You should configure a keyword filtering custom filter in FPE.
D. You should configure a sender-domain custom filter in FPE.
E. You should configure a subject line filtering custom filter in FPE.

Answer: E

Explanation:


QUESTION 4
You work as a Network Administrator at ABC.com. Your responsibilities include the security of the
computers in the network. The network consists of a single Active Directory Domain Services (AD
DS) domain named ABC.com and includes servers running Windows Server 2008 and client
computers running Windows 7 Professional.
Four servers running Windows 2008 Server host the Microsoft Exchange Server 2007
environment.
Two servers named ABC-Edge1 and ABC-Edge2 are configured as Microsoft Exchange Edge
Transport servers.
Two servers named ABC-Mbox1 and ABC-Mbox2 are configured as Microsoft Exchange Mailbox
Servers and also run the Microsoft Exchange Hub Transport server roles.
You have recently implemented Forefront Protection for Exchange Server (FPE) 2010 to improve
the security of the Microsoft Exchange Server 2007 environment.
You need to configure email scanning in Forefront Protection for Exchange Server (FPE) 2010.
How should you configure FPE to scan all emails sent from within the ABC.com domain to email
recipients in the ABC.com domain?

A. You should configure FPE to perform Internal scanning on ABC-Mbox1 and ABC-Mbox2.
B. You should configure FPE to perform Internal scanning on ABC-Edge1 and ABC-Edge2.
C. You should configure FPE to perform Inbound scanning on ABC-Mbox1 and ABC-Mbox2.
D. You should configure FPE to perform Inbound scanning on ABC-Edge1 and ABC-Edge2.
E. You should configure FPE to perform Outbound scanning on ABC-Edge1 and ABC-Edge2.

Answer: A

Explanation:


MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

70-162 – TS: Forefront Protection for Endpoints and Applications, Configuring

QUESTION 1
You work as a Security Administrator at ABC.com. The network consists of a single Active
Directory Domain Services (AD DS) domain with servers running Windows Server 2008 and client
computers running Windows 7 Professional.
A pool of Windows 2008 Servers hosts the Microsoft Exchange Server 2007 environment.
You have recently implemented Forefront Protection for Exchange Server (FPE) 2010 to improve
the security of the Microsoft Exchange Server 2007 environment.
You discover that some mailboxes have been infected by malware. However there are no
malware infection notifications in the Forefront Protection for Exchange Server Console.
You need to immediately check specific mailboxes to see if they are infected by the malware.
What should you do?

A. You should run a Forefront Client Security scan on the client computers.
B. You should use Forefront Protection for Exchange to perform a real-time scan of the mailboxes.
C. You should use Forefront Protection for Exchange to perform an on-demand scan of the mailboxes.
D. You should install Microsoft Security Essentials on client computers.

Answer: C

Explanation:


QUESTION 2
You work as a Network Administrator at ABC.com. Your responsibilities include the security of the
computers in the network. The network consists of a single Active Directory Domain Services (AD
DS) domain with servers running Windows Server 2008 and client computers running Windows 7
Professional.
A pool of Windows 2008 Servers hosts the Microsoft Exchange Server 2007 environment.
You have recently implemented Forefront Protection for Exchange Server (FPE) 2010 to improve
the security of the Microsoft Exchange Server 2007 environment.
How would you configure FPE to enable spam filtering?

A. By using the Forefront Management Shell to run the Set-FSEScheduledScan cmdlet.
B. By using the Forefront Management Shell to run Set-FseSpamFiltering the cmdlet.
C. By using the Forefront Management Shell to run the Set-FseSpamContentCheck cmdlet.
D. By using the Forefront Management Shell to run the Set-FSERealtimeScan cmdlet.

Answer: B

Explanation:


QUESTION 3
You are responsible for the security of the ABC.com network. The network consists of a single
Active Directory Domain Services (AD DS) domain with servers running Windows Server 2008
and client computers running Windows 7 Professional.
The company uses Forefront Protection for Exchange Server (FPE) 2010 to protect the Microsoft
Exchange Server 2007 environment.
While monitoring the logs in the FPE console, you discover that users in the company have
received spam emails.
The subject line in each of the emails is: “Free access to our new online tournament!” You note
that the sender email address is spoofed to appear to be from a different domain for each email.
How can you block this spam attack in future?

A. You should configure an allowed sender custom filter in FPE.
B. You should configure a file filtering custom filter in FPE.
C. You should configure a keyword filtering custom filter in FPE.
D. You should configure a sender-domain custom filter in FPE.
E. You should configure a subject line filtering custom filter in FPE.

Answer: E

Explanation:


QUESTION 4
You work as a Network Administrator at ABC.com. Your responsibilities include the security of the
computers in the network. The network consists of a single Active Directory Domain Services (AD
DS) domain named ABC.com and includes servers running Windows Server 2008 and client
computers running Windows 7 Professional.
Four servers running Windows 2008 Server host the Microsoft Exchange Server 2007
environment.
Two servers named ABC-Edge1 and ABC-Edge2 are configured as Microsoft Exchange Edge
Transport servers.
Two servers named ABC-Mbox1 and ABC-Mbox2 are configured as Microsoft Exchange Mailbox
Servers and also run the Microsoft Exchange Hub Transport server roles.
You have recently implemented Forefront Protection for Exchange Server (FPE) 2010 to improve
the security of the Microsoft Exchange Server 2007 environment.
You need to configure email scanning in Forefront Protection for Exchange Server (FPE) 2010.
How should you configure FPE to scan all emails sent from within the ABC.com domain to email
recipients in the ABC.com domain?

A. You should configure FPE to perform Internal scanning on ABC-Mbox1 and ABC-Mbox2.
B. You should configure FPE to perform Internal scanning on ABC-Edge1 and ABC-Edge2.
C. You should configure FPE to perform Inbound scanning on ABC-Mbox1 and ABC-Mbox2.
D. You should configure FPE to perform Inbound scanning on ABC-Edge1 and ABC-Edge2.
E. You should configure FPE to perform Outbound scanning on ABC-Edge1 and ABC-Edge2.

Answer: A

Explanation:


MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

70-630 – TS:Microsoft Office SharePoint Server 2007, Configuring

QUESTION 1
You work as a SharePoint Server administrator at ABC.com. You have just the completed the
insertion of new content in the root site. However, later that day the users complained that the new
content is not added in the search results when they run searches on the root site. You need to
make sure that the relevent content is included in query results.
What actions should you take to perform this task?

A. The best option is to set the Complete Through constraint.
B. The best option is to reset the crawled content and start a full crawl.
C. The best option is to set the Resource Center view.
D. The best option is to edit the CSS style sheet to include the new content.

Answer: B

Explanation:


QUESTION 2
You work as a SharePoint Server administrator at ABC.com. One of ABC.com branch offices
consists of a Windows Server 2003 Active Directory domain. You have received instructions from
the CIO to extend SharePoint user profiles to include the userID property from the users’ domain
accounts.
What actions should you take to perform this task?

A. The best option is to add a Microsoft Operations Manager (MOM) server.
B. The best option is to create a custom Microsoft Management Console that can access the
branch office.
C. The best option is to create a new user profile property that is configured with import mapping.
D. The best option is to run the SharePoint Products and Technologies Configuration.

Answer: C

Explanation:


QUESTION 3
You work as a SharePoint Server administrator at ABC.com. The ABC.com network contains a
SharePoint Portal Server 2003 server named ABC-SR44. ABC-SR44 hosts a SharePoint portal
that is accessed through a hyperlink on the users’ client computers. The hyperlink points to

http://www.ABC.com/ms/certifications.

You want to migrate ABC-SR44 to Microsoft Office SharePoint Server (MOSS) 2007. You need to
ensure that the SharePoint portal will be accessible after the migration.
What actions should you take to perform this task?

A. By running the stsadm command with the osearch operator.
B. By editing the hyperlink so it will point to the new URL of the migrated content.
C. By running the stsadm command with the enumsites operator.
D. By enabling the Shared Services Provider Synchronizing job.

Answer: B

Explanation:


QUESTION 4
You work as a SharePoint Server administrator at ABC.com. ABC.com contains a Microsoft
Content Management Server 2002 computer named ABC-SR11. You have received instructions
from the CIO to uABCrade ABC-SR11 to Microsoft Office SharePoint Server (MOSS) 2007.
What actions should you take to perform this task?

A. The best option is to run the stsadm command with the addwppack operator.
B. The best option is to run the stsadm command with the installfeature operator.
C. The best option is to run the CMS Assessment utility on ABC-SR11.
D. The best option is to run the Optimize HTML command in SharePoint Designer.

Answer: C

Explanation:


QUESTION 5
You work as a SharePoint Server administrator at ABC.com. ABC.com has a Development
department with a database server named ABC-DB02. ABC-DB02 hosts a database named
CkdProducts. ABC.com has implemented a Web application in the SharePoint site that must
access data in CkdProducts.
What actions should you take?

A. The best option is to obtain and install an application definition file from the Development
department.
B. The best option is to enable the Save for Sharing option, then save CkdProducts in the
Development department.
C. The best option is to save CkdProducts as a Microsoft Excel 2007 worksheet.
D. The best option is to create a custom group in the Site Settings page to the trusted file locations
list.

Answer: A

Explanation:


 

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

70-236 Microsoft Exchange Server 2012

Contents
Preface xvii
Foreword xxi
1 Introduction 1
1.1 A decade and counting of Exchange deployments 1
1.1.1 The way we were 2
1.1.2 The protocol wars 2
1.1.3 Ever increasing mobility 4
1.1.4 Third-party products and management 6
1.1.5 Some interesting projects 6
1.1.6 The not so good points 7
1.1.7 Exchange’s connection with the Active Directory 10
1.1.8 Reviewing predictions made in 1996 11
1.2 Microsoft’s themes for Exchange 2007 12
1.2.1 The happy prospect of a migration 18
1.3 Preparing for Exchange 2007 20
1.4 Installing Exchange 2007 22
1.4.1 Modifying and removing servers 27
1.4.2 Validating the installation 27
1.4.3 Third-party software 28
1.5 Server roles 28
1.5.1 Services 32
1.6 Licensing 36
1.6.1 Version numbers 40
1.6.2 32-bit Exchange 2007? 41
1.7 Support 42
1.8 Challenges for Exchange 2007 42
1.9 Into the future 45
vi Contents
2 Exchange, Windows, and the Active Directory 47
2.1 Active Directory and Exchange 47
2.1.1 Domain Designs 48
2.2 Active Directory replication 50
2.2.1 Replication basics 51
2.2.2 When Active Directory replication happens 53
2.2.3 Active Directory naming contexts 55
2.2.4 Transforming Domain controllers into
Global Catalogs 58
2.2.5 USNs and replication 60
2.2.6 Urgent replication 64
2.2.7 Intrasite and Intersite replication 65
2.2.8 High-watermark vector and up-to-date vector tables 68
2.2.9 Changes in Active Directory replication in Windows 2003 70
2.3 Exchange’s Active Directory Topology service 71
2.3.1 DSAccess (or ADAccess) 72
2.3.2 How many Global Catalog servers do I need? 75
2.3.3 Where are my Global Catalogs? 76
2.4 Recovering deleted Active Directory accounts 78
2.5 Exchange and the Active Directory schema 80
2.5.1 Updating the schema with an installation 80
2.5.2 Changing the schema 82
2.5.3 Active Directory custom attributes for Exchange 85
2.5.4 Updating the schema to allow Ambiguous
Name Resolution 86
2.5.5 Exchange-specific permissions 87
2.5.6 Exchange property sets 88
2.6 Longhorn and Exchange 2007 90
2.7 The very important LegacyExchangeDN attribute 91
2.8 Brain surgery for the Active Directory: ADSIEDIT 93
2.8.1 LDP and LDIFDE 96
2.8.2 Active Directory for Exchange 98
3 The Basics of Managing Exchange 2007 99
3.1 Exchange Management Console 100
3.1.1 The importance of filters 104
3.1.2 Managing mixed organizations 109
3.1.3 Running EMC remotely or on a workstation 112
3.1.4 No more AD Users and Computers 113
3.1.5 Changing columns 115
Contents vii
Contents
3.1.6 Visual effects 116
3.2 Why some options have disappeared from EMC 118
3.2.1 Coping with change 122
3.3 Changes in the Exchange delegation model 124
3.4 Customized Recipient Management 128
3.4.1 Adieu RUS 130
3.4.2 Recipient types 132
3.5 Moving users 133
3.5.1 Moving mailboxes 134
3.5.2 Logging mailbox moves 138
3.6 Using distribution groups 140
3.6.1 Forming groups 142
3.6.2 Group changes in Exchange 2007 145
3.6.3 Expanding distribution lists 147
3.6.4 How many objects can I have in a group? 148
3.6.5 Managing group membership 149
3.6.6 Protected groups (and users) 152
3.7 Using groups for permissions 154
3.7.1 Managing distribution groups from Outlook 154
3.8 Dynamic distribution groups 156
3.8.1 Changing filters and conditions for dynamic
distribution groups 157
3.8.2 A note on OPATH 159
3.8.3 A new UI for dynamic groups 160
3.8.4 Creating New dynamic groups 162
3.8.5 Using dynamic Distribution groups 167
3.9 Mailbox quotas 168
3.9.1 Setting mailbox quotas 170
3.10 Email address policies 173
3.10.1 Mailbox moves and email address policies 178
3.10.2 Queries that drive email address policies 178
3.11 Address lists 183
3.11.1 Upgrading Address Lists to Exchange 2007 format 187
3.12 User naming conventions 188
3.13 Server naming conventions 192
3.14 Moving from the basics 194
4 The Exchange Management Shell 195
4.1 EMS: Exchange’s management shell 197
4.1.1 Working with PowerShell commands 199
4.1.2 Exchange shell commands 204
viii Contents
4.1.3 Command editing 208
4.1.4 Getting at more information about something 210
4.1.5 Using common and user-defined variables 214
4.1.6 Identities 217
4.1.7 Working in a multi-domain forest 219
4.1.8 Profiles 221
4.1.9 PowerShell in batch 223
4.1.10 Execution policies 224
4.1.11 Sending email from the shell 226
4.2 Learning from EMC 229
4.3 Using EMS to work with mailboxes 232
4.3.1 Creating a new mailbox with a template 232
4.3.2 Setting and retrieving mailbox properties 234
4.3.3 Other ways of interacting with mailboxes 244
4.3.4 Get-Recipient 245
4.3.5 Moving mailboxes 245
4.3.6 Accessing another user’s mailbox 249
4.3.7 Different commands and different properties 251
4.3.8 Contacts 252
4.4 Working with distribution groups 253
4.4.1 Working with dynamic distribution groups 257
4.4.2 Advanced group properties 262
4.5 Delegation through the shell 265
4.6 Creating efficient filters 267
4.7 Bulk updates 270
4.7.1 Creating sets of mailboxes 273
4.8 Reporting mailbox data 275
4.8.1 Special properties 282
4.9 Using the shell for other management tasks 284
4.10 Command validation 287
4.11 Working with remote servers 290
4.12 Working with non-Exchange 2007 servers 291
4.13 Testing Exchange 2007 292
4.13.1 Client connections 294
4.13.2 Mail Flow 295
4.13.3 Miscellaneous test commands 297
4.14 PowerShell for Exchange administrators 297
5 The Store 301
5.1 Introducing the Store 301
5.2 Differences in the Exchange 2007 Store 306
Contents ix
Contents
5.2.1 Are 64 bits that important? 307
5.2.2 Trading memory for I/O 312
5.2.3 The decrease in storage costs 317
5.3 No more streaming database 318
5.4 Tables and items 320
5.5 Storage groups 323
5.5.1 Creating a new storage group and database 327
5.5.2 Working with storage groups and databases 329
5.6 Transaction logs 331
5.6.1 Circular logging 335
5.6.2 Creating new transaction logs 337
5.6.3 Reserved logs 338
5.6.4 Transactions, buffers, and commitment 339
5.6.5 Transaction log I/O 341
5.6.6 Protecting transaction logs 341
5.6.7 Transaction log checksum 342
5.6.8 Maximum database size 343
5.7 Database portability 345
5.7.1 Zero database pages 349
5.8 MAPI connections and logons 349
5.9 The Deleted Items cache 350
5.9.1 Cleaning the Deleted Items cache 356
5.9.2 Recovering items and mailboxes 357
5.10 Background maintenance 360
5.10.1 Background tasks 364
5.10.2 Tracking background maintenance 367
5.11 Fixing failed databases 368
5.12 Exchange 2007 content indexing 375
5.12.1 Using content indexing 380
5.13 Public folders 383
5.13.1 Public folders and Exchange 2007 384
5.13.2 Changes in public folders administration since
Exchange 2003 386
5.13.3 Calming replication storms 388
5.13.4 Managing public folders with Exchange 2007 392
5.13.5 Permissions on top-level folders 405
5.13.6 Referrals 405
5.13.7 Migrating public folder content 406
5.14 Removing database size limits 408
5.15 Backups 408
5.15.1 NTBackup 410
x Contents
5.15.2 Other commercial backup products 410
5.15.3 Creating a backup strategy 413
5.15.4 Backups and storage groups 415
5.15.5 Checkpoint file 421
5.15.6 The future of streaming backups 426
5.16 Moving from the Store 427
6 Exchange Transport and Routing 429
6.1 The evolution of routing 429
6.2 Change through experience 430
6.2.1 Hidden administrative and routing groups 433
6.3 Exchange 2007 transport architecture 435
6.3.1 The critical role of hub transport servers 438
6.3.2 Receive connectors 440
6.3.3 Send connectors 447
6.3.4 Linking Exchange 2003 and Exchange 2007 453
6.3.5 Multiple routes into Exchange 2003 458
6.3.6 Decommissioning Exchange 2003 routing groups 458
6.3.7 Handling Exchange 2003 link state updates
during migration 458
6.3.8 Foreign connectors 459
6.3.9 Authorization 460
6.3.10 Accepted domains 460
6.3.11 Transport storage 461
6.4 Routing ABC 464
6.4.1 Resolving multiple paths 467
6.4.2 Most specific connector 467
6.4.3 Connector cost 469
6.4.4 Closest proximity 469
6.4.5 The role of hub routing sites 470
6.4.6 Site link costs versus routing costs 471
6.4.7 Instructing mailbox servers 472
6.4.8 Bypassing some connections 472
6.4.9 Protocol logging 473
6.4.10 X.400 support 474
6.4.11 Bifurcation 475
6.4.12 Header firewalls 476
6.5 Transport configuration 476
6.5.1 Transport configuration file 481
6.5.2 Routing logs 483
6.6 Queues 485
Contents xi
Contents
6.6.1 The Queue Viewer 488
6.6.2 The Unreachable queue 491
6.6.3 Poison messages 493
6.7 Back Pressure 494
6.8 Delivery Status Notifications 496
6.8.1 Customizing DSNs 501
6.8.2 Postmaster addresses 504
6.9 Transport agents 505
6.10 Transport summary 506
6.11 Edge servers 506
6.11.1 Edge or hub? 508
6.11.2 Basic Edge 510
6.11.3 Edge Synchronization 511
6.11.4 Basic Edge security 518
6.11.5 Fighting spam and email viruses 518
6.11.6 Defense in depth 522
6.11.7 Microsoft’s approach to mail hygiene 523
6.11.8 Forefront for Exchange 528
6.11.9 Mail Hygiene Agents 533
6.11.10 Agent logs 535
6.11.11 Connection filtering 536
6.11.12 Sender filtering 538
6.11.13 Address Rewrite agent 539
6.11.14 Sender ID agent 541
6.11.15 Content filtering 547
6.11.16 Content Filter updates 550
6.11.17 Per-user SCL processing 553
6.11.18 Safelist Aggregation 554
6.11.19 Sender reputation 557
6.11.20 Recipient filtering 559
6.11.21 Blocking file attachments 560
6.11.22 Attachment filtering 562
6.11.23 Edge transport rules 563
6.11.24 Available Edge 565
6.12 Client-side spam suppression 567
6.12.1 Outlook’s Junk Mail Filter 568
6.12.2 Postmarks 573
6.12.3 Restricting OOF and other notifications 574
6.13 Routing onwards 580
xii Contents
7 Clients 581
7.1 Outlook 583
7.1.1 Outlook web services 585
7.1.2 Understanding Outlook’s relationship with Exchange 591
7.1.3 Deploying cached Exchange mode 596
7.1.4 Address caching 599
7.1.5 MAPI compression and buffers 600
7.1.6 Conflict resolution 602
7.1.7 Preventing MAPI clients from connecting 603
7.1.8 Outlook 2007 and Exchange 5.5 607
7.2 Offline and personal Stores 608
7.2.1 Personal folders 609
7.2.2 Mail delivery to personal folders 611
7.2.3 Configuring PSTs 615
7.2.4 PST archiving 617
7.3 Offline folder files 619
7.3.1 OST synchronization 621
7.3.2 When things go wrong with your OST 623
7.4 Out of Office changes 624
7.4.1 The big question: Is Outlook 2007 worth the upgrade? 625
7.5 The Offline Address Book (OAB) 626
7.5.1 Downloading the OAB 627
7.5.2 OAB files on the PC 628
7.5.3 The evolving OAB format 630
7.5.4 OAB and cached Exchange mode 632
7.5.5 OAB generation and distribution 634
7.5.6 Creating a customized OAB 640
7.5.7 Allocating OABs to users 642
7.6 Outlook Anywhere 645
7.7 Outlook Web Access 650
7.7.1 New features in Outlook Web Access 2007 652
7.7.2 Outlook Web Access Light 658
7.7.3 International versions 662
7.7.4 Accessing legacy data 664
7.7.5 Managing Outlook Web Access 666
7.7.6 Authentication 667
7.7.7 Segmentation 671
7.7.8 Notifications 675
7.7.9 Controlling attachments 677
7.7.10 Themes 680
7.7.11 Client settings 684
Contents xiii
Contents
7.8 Internet client access protocols 684
7.8.1 IMAP4 685
7.8.2 The Exchange 2007 IMAP server 689
7.9 Mobile clients 694
7.9.1 Selecting mobile devices 696
7.9.2 Server-based ActiveSync 698
7.10 Windows Mobile 6.0 and Exchange 2007 702
7.10.1 ActiveSync policies 706
7.10.2 Managing mobile devices through EMC 711
7.10.3 Moving mailboxes to Exchange 2007 and ActiveSync 713
7.10.4 Estimating network traffic for mobile devices 715
7.10.5 Analyzing ActiveSync logs 717
7.10.6 Wiping mobile devices 719
7.10.7 Debugging synchronization 721
7.11 Comparing Windows Mobile and BlackBerry 723
7.11.1 Processing the mail 725
7.11.2 Other messaging options for Windows Mobile 730
7.11.3 Power management 731
7.11.4 Input flexibility 732
7.12 Unified Communications 735
7.13 Unified Messaging 737
7.13.1 Client Access to voicemail 741
7.13.2 Dealing with voicemail 745
7.13.3 Voice synthesis 747
7.13.4 Pure voicemail 748
7.13.5 The magic of SIP 749
7.13.6 Speech Grammars 752
7.13.7 Phonetic names 754
7.13.8 Cross-forest UM 756
7.14 Special mailboxes 756
7.15 Clients and users 759
8 Managing Users 761
8.1 Room and equipment mailboxes 762
8.1.1 Managing properties of room and equipment mailboxes 765
8.1.2 Converting old mailboxes to rooms 770
8.2 Helping users to use email better 771
8.2.1 Eliminating bad habits 771
8.2.2 Disclaimers 779
8.2.3 Out-of-Office Notifications 781
8.2.4 The last few bad email habits 781
xiv Contents
8.3 Customizing display templates 782
8.4 Exchange 2007 and compliance 787
8.4.1 The growing need for compliance 789
8.4.2 Transport rules 792
8.4.3 Using a rule to add disclaimer text to outgoing messages 794
8.4.4 Capturing selected messages 795
8.4.5 Becoming more complicated 797
8.4.6 Creating an ethical firewall 800
8.4.7 Transport rule storage 803
8.4.8 Rules and the shell 804
8.4.9 Journal rules 808
8.5 Messaging Record Management 815
8.5.1 Managing default folders 818
8.5.2 Managing custom folders 824
8.5.3 Allocating managed folders with policies 826
8.5.4 Applying policies to users 827
8.5.5 The Managed Folder Assistant 829
8.5.6 Logging Managed Folder activity 831
8.5.7 Using Managed Folders 833
8.5.8 Harvesting information from managed folders 835
8.6 Message classifications 837
8.6.1 Adding intelligence to classification through rules 844
8.7 Copying user mailboxes 848
8.7.1 Auditing 853
8.8 Free and busy 853
8.8.1 Looking at free and busy data 855
8.8.2 Free and busy in Exchange 2007 861
8.8.3 Changes in Outlook 2007 863
8.8.4 Cross-forest free and busy 866
9 Hardware and Performance 867
9.1 Moving toward 64-bit Exchange 867
9.2 Buying servers for Exchange 2007 870
9.3 The storage question 876
9.4 RPC pop-ups 881
9.5 Clusters and Exchange 882
9.6 Continuous replication and Exchange 2007 888
9.6.1 Concepts 889
9.7 Deploying Local Continuous Replication (LCR) 892
9.7.1 How LCR works 897
9.7.2 LCR operations 900
Contents xv
Contents
9.7.3 LCR restrictions 903
9.7.4 LCR database transition 904
9.8 Deploying Cluster Continuous Replication (CCR) 906
9.8.1 Comparing CCR and traditional clusters 910
9.8.2 CCR in practice 912
9.8.3 CCR failovers 915
9.8.4 Lost Log Resilience 919
9.8.5 The transport dumpster 921
9.8.6 Standby Continuous Replication 924
9.9 Continuous Log Replication: Good or bad? 924
9.10 Virtual Exchange 925
10 More useful things to Know about Exchange 929
10.1 Automated analysis 929
10.1.1 SSCP 932
10.1.2 Microsoft’s Release to Web (RTW) strategy 933
10.2 The Exchange Toolbox 935
10.2.1 Updates 936
10.2.2 Database Recovery Management 937
10.2.3 Database Troubleshooter 942
10.2.4 Mail Flow Troubleshooter 943
10.3 Messaging tracking logs 945
10.3.1 Generating message tracking logs 947
10.3.2 Log sizes and ages 950
10.3.3 Keeping track of message subjects 951
10.3.4 Accessing message tracking logs 951
10.3.5 Using the Troubleshooting Assistant to track messages 952
10.3.6 Tracking messages with EMS 956
10.3.7 Message delivery latency 959
10.4 Management frameworks 959
10.5 Utilities 963
10.5.1 Performance testing 963
10.5.2 The MFCMAPI utility 965
10.5.3 MDBVU32 968
10.5.4 ExMon—Exchange User Monitor 968
10.5.5 PFDavAdmin 971
10.5.6 LogParser 973
10.5.7 Outlook Spy 978
10.6 Bits and pieces 978
10.6.1 Where the Exchange team hangs out 978
10.6.2 Online Forums 979
xvi Contents
10.7 Conferences 979
10.7.1 Magazines 980
10.7.2 How Exchange uses registry keys 980
10.8 Good reference books 981
A Appendix 983
A.1 Message Tracking Log Format 983
A.2 Events noted in Message Tracking Logs 985
B Important Exchange PowerShell commands 987
B.1 Recipient management commands 987
B.2 Exchange server administrative Commands 990
B.3 Databases and Storage Groups 993
B.4 Address Lists and Email Policies 995
B.5 Queues and Messages 995
B.6 Edge Synchronization 996
B.7 Routing 997
B.8 ActiveSync 998
B.9 Public folders 999
B.10 Transport and journal rules 1000
B.11 IMAP and POP 1001
B.12 Active Directory commands 1002
B.13 Testing Exchange 2007 1003
B.14 Basic PowerShell 1004
B.15 PowerShell control commands 1005

Preface

By their very nature, every book that seeks to describe how technology works face challenges during its creation. Dealing with beta software and attempting to resolve the difference between how the software works and how the developers say it will work in the final version is a problem faced by any author, which is one reason why it is often best to wait to finalize text after you have a chance to work with released software. Looking back at this project, in some ways, this has been the hardest book of the seven that I have written about Exchange. I think that there are four reasons why this might be so. First, Exchange 2007 marks the boundary for substantial architectural change within the product, so it is similar to the degree of change that we experienced when we moved from Exchange 5.5 to Exchange 2000. Second, the nature of software is that it becomes more complex over time as the developers add new features and this is certainly true of Exchange 2007. The new features have to be considered, probed, and documented, all of which takes time. Third, the Exchange development team has done an excellent job since 2004 to document all aspects of Exchange in a more comprehensive manner than ever before.

The Exchange 2007 help file, TechNet, MSDN, and the excellent Exchange team blog at http://msexchangeteam.com/ default.aspx are interesting and productive hoards of information for authors to mine. Unfortunately, there is often too much material (a good complaint to have) and the material needs to be interpreted and analyzed in the light of your own experience with Exchange. Engineers write great blogs, but the scourge of cognitive dissonance often means that they omit some detail that makes all the difference to a newcomer in understanding why a component works the way that it does. Last but not least, you should not underestimate the degree of cultural change that Microsoft has incorporated into Exchange 2007 in the transition from a predominantly GUI-centric approach to server management to the use of the PowerShell scripting language as the basis of many management operations. The need to understand and appreciate the change has to occur before you can adequately document and describe the benefits and this increases the effort required to write the book. I must admit that it took me time to realize the full benefit of interacting with Exchange through the shell, but now I am at the point where I wonder why Microsoft never provided such a powerful interface in the past! The degree of change that exists in Exchange 2007 means that it is diffi- cult to cover everything in one book. I have therefore elected to cover the parts of Exchange that I think are of most interest to the majority of administrators and have left other components for you to discover through the material that Microsoft publishes or perhaps another book, written by me or someone else. Please accept my apology if I have not covered something that you think is important and treat this as a challenge and opportunity for you to write about the topic yourself. There are many magazines, blogs, and other ways of spreading information about Exchange. From time to time, I wander back down the path to consider some aspect of Exchange 2003. While this book is firmly focused on Exchange 2007, the vast majority of companies that will deploy Exchange 2007 will do so by migrating from Exchange 2003 and will therefore run both products alongside each other for some period. For large organizations, the period might extend to a year or more as it is unlikely that few will complete their migration to a pure Exchange 2007 environment quickly. With this in mind, it is fair and reasonable to document how things work with Exchange 2003, especially when these servers operate with Exchange 2007. So what is in the book? To set the context, Chapter 1 starts with an overview of the development of Exchange from 4.0 to 2007 and then describes the themes that Microsoft employed to focus the development priorities for Exchange 2007 and some of the changes that occur in this release. All successful deployments of Exchange since Exchange 2000 operate on a solid Active Directory foundation, so Chapter 2 reviews some of the critical intersection points between Exchange and the Active Directory including replication, the schema, and Global Catalogs. Chapter 3 goes into the basics of managing Exchange 2007 through the Exchange Management Console. Chapter 4 takes the management topic further by exploring the ins and outs of the new Exchange Management Shell, perhaps the most fundamental change to the product that Microsoft has made in Exchange 2007. Chapter 5 goes to the heart of Exchange and reviews how the Store works including topics such as databases, storage groups, and transaction logs to content indexing and backups. Chapter 6 looks at how the new transport system routes messages and includes topics such as the Edge server and anti-spam protection. Chapter 7 explains how clients from Outlook to Outlook Web Access to mobile devices allow users to work with their mailboxes. Chapter 8 then moves on to consider some elements of user management, including the important topic of compliance and records management. Chapter 9 addresses one of the more


MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

 

 

70-483 Q&A / Study Guide / Videos / Testing Engine


QUESTION 1
You work as a senior developer at Certkingdom.com. The Certkingdom.com network consists of a single domain named Certkingdom.com.
You are running a training exercise for junior developers. You are currently discussing the use of
the Queue <T> collection type.
Which of the following is TRUE with regards to the Queue <T>collection type?

A. It represents a first in, first out (FIFO) collection of objects.
B. It represents a last in, first out (LIFO) collection of objects.
C. It represents a collection of key/value pairs that are sorted by key based on the associated
IComparer<T> implementation.
D. It represents a list of objects that can be accessed by index.

Answer: A

Explanation:


QUESTION 2
You work as a developer at Certkingdom.com. The Certkingdom.com network consists of a single domain named Certkingdom.com.
You have written the following code segment:
int[] filteredEmployeeIds = employeeIds.Distinct().Where(value => value !=
employeeIdToRemove).OrderByDescending(x => x).ToArray();
Which of the following describes reasons for writing this code? (Choose two.)

A. To sort the array in order from the highest value to the lowest value.
B. To sort the array in order from the lowest value to the highest value.
C. To remove duplicate integers from the employeeIds array.
D. To remove all integers from the employeeIds array.

Answer: A,C

Explanation:


QUESTION 3
You work as a senior developer at Certkingdom.com. The Certkingdom.com network consists of a single domain
named Certkingdom.com.
You are running a training exercise for junior developers. You are currently discussing the use of a
method that moves the SqlDataReader on to the subsequent record.
Which of the following is the SqlDataReader method that allows for this?

A. The Read method.
B. The Next method.
C. The Result method.
D. The NextResult method.

Answer: A

Explanation:


QUESTION 4
You work as a developer at Certkingdom.com. The Certkingdom.com network consists of a single domain named Certkingdom.com.
You have received instructions to create a custom collection for Certkingdom.com. Objects in the
collection must be processed via a foreach loop.
Which of the following is TRUE with regards to the required code?

A. The code should implement the ICollection interface.
B. The code should implement the IComparer interface.
C. The code should implement the IEnumerable interface.
D. The code should implement the IEnumerator interface.

Answer: C

Explanation:


QUESTION 5
You work as a senior developer at Certkingdom.com. The Certkingdom.com network consists of a single domain named Certkingdom.com.
You are running a training exercise for junior developers. You are currently discussing the use of LINQ queries.
Which of the following is NOT considered a distinct action of a LINQ query?

A. Creating the query.
B. Obtaining the data source.
C. Creating the data source.
D. Executing the query.

Answer: C

Explanation:


MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

70-417 Q&A / Study Guide / Testing Engine / Videos


QUESTION 1
You work as a Network Administrator at Certkingdom.com. The network contains a single Active Directory
Domain Services (AD DS) domain named Certkingdom.com. The network includes servers that run
Windows Server 2008 R2 Service Pack 1 (SP1) and Windows Server 2012.
All servers in the network have Windows Remote Management (WinRM) enabled.
You use a Windows 7 Enterprise client computer named Certkingdom-Admin1.
You are currently logged in to Certkingdom-Admin1. From your client computer, you want to obtain the IP
address of a Windows Server 2012 member server named Certkingdom-File1.
Which command or commands should you use?

A. Telnet Certkingdom-File1 ipconfig.
B. NSLookup > Server Certkingdom-File1 > ipconfig
C. WinRM –r:Certkingdom-File1 ipconfig
D. WinRS –r:Certkingdom-File1 ipconfig

Answer: D

Explanation:


QUESTION 2
Your role of Network Administrator at Certkingdom.com includes the management of the Active Directory
Domain Services (AD DS) domain named Certkingdom.com. The network includes servers that run
Windows Server 2008 R2 Service Pack 1 (SP1) and Windows Server 2012.
A server named Certkingdom-Win12Admin runs Windows Server 2012. You use Certkingdom-Win12Admin to
administer the Windows Server 2012 servers in the domain.
A newly installed domain member server named Certkingdom-SRV06 runs a Server Core Installation of
Windows Server 2012.
You need to configure Certkingdom-SRV06 to enable you to use the Server Manager console on CertkingdomWin12Admin
to manage Certkingdom-Win12Admin.
How should you configure Certkingdom-SRV06?

A. You should install the Remote Server Administration Tools on Certkingdom-SRV06.
B. You should install the Server Manager console on Certkingdom-SRV06.
C. You should enable Windows Remote Management (WinRM) on Certkingdom-SRV06.
D. You should use the Enable-NetFirewallRule cmdlet to configure the firewall on Certkingdom-SRV06.

Answer: D

Explanation:


QUESTION 3
Your role of Network Administrator at Certkingdom.com includes the management of the Active Directory
Domain Services (AD DS) domain named Certkingdom.com. The network includes servers that run
Windows Server 2008 R2 Service Pack 1 (SP1) and Windows Server 2012.
A server named Certkingdom-Win12Admin runs Windows Server 2012. You use Certkingdom-Win12Admin to
administer the Windows Server 2012 servers in the domain.
You want to use Server Manager on Certkingdom-Win12Admin to manage the Window Server 2008 R2
SP1 servers in the domain.
What should you do?

A. You should run the Configure-SMRemoting.exe –Enable cmdlet on the Windows Server 2008 R2 SP1 servers.
B. You should add the computer account for Certkingdom-Win12Admin to the RAS and IAS Servers group in Active Directory.
C. You should install the Microsoft .NET Framework 4.0 and Windows Management Framework 3.0 on the Windows Server 2008 R2 SP1 servers.
D. You should install the Remote Server Administration Tools on Certkingdom-Win12Admin.

Answer: C

Explanation:


QUESTION 4
Your role of Network Administrator at Certkingdom.com includes the management of the Active Directory
Domain Services (AD DS) domain named Certkingdom.com. The network includes servers that run
Windows Server 2008 R2 Service Pack 1 (SP1) and Windows Server 2012.
A server named Certkingdom-File1 runs the File and Storage Services server role. Certkingdom-File1 hosts
shared folders on the D: drive. Users access the shared folders from their Windows 7 client
computers.
A user attempts to recover a previous version of a file in a shared folder on Certkingdom-File1 but
discovers that there is no previous versions option.
How can you ensure that users can recover files using the Previous Versions function?

A. By modifying the Share Properties of each shared folder.
B. By enabling Shadow Copies on the D: drive of Certkingdom-File1.
C. By adding a condition to the shared folders on Certkingdom-File1.
D. By modifying the settings of the Recycle Bin on Certkingdom-File1.

Answer: B

Explanation:


QUESTION 5
You work for a company named Certkingdom.com. Your role of Network Administrator includes the
management of the company’s physical and virtual infrastructure.
The network includes servers running Windows Server 2008 R2 Service Pack 1 (SP1) and
Windows Server 2012.
Virtual machines (VMs) are hosted on Windows Server 2012 servers running the Hyper-V role.
You install a new Windows Server 2012 Hyper-V host server named Certkingdom-HVHost12. CertkingdomHVHost12
has four Fiber Channel host bus adapters (HBAs) and connects to two Fiber Channel
SANs using two HBAs per SAN.
You plan to create VMs on Certkingdom-HVHost12 that will need to access one of the SANs.
How should you configure Certkingdom-HVHost12?

A. By creating a Virtual Switch in Hyper-V.
B. By installing an additional host bus adapter (HBA).
C. By creating a virtual Fiber Channel SAN in Hyper-V.
D. By creating a virtual iSCSI SAN in Hyper-V.

Answer: C

Explanation:


MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com