Halloween Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Question # 4

You need to ensure that Alex Wilber can recover deleted items when using Outlook on the web.

Which two actions should you perform? Each correct answer presents a complete solution.

NOTE: Each correct selection is worth one point.

A.

Assign Sales Policy to Alex Wilbur.

B.

Modify Marketing Policy.

C.

Remove Alex Wilbur from all groups.

D.

Assign Policy2 to Alex Wilbur.

E.

Modify Policy1

Full Access
Question # 5

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Full Access
Question # 6

Which contacts can sign in to and access resources in the adatum.com tenant?

A.

Contact1 only

B.

Contact2 only

C.

Contact1 and Contact3 only

D.

Contact2 and Contact3 only

E.

Contact1, Contact2. and Contact3

Full Access
Question # 7

You need to modify FilesPolicy to prevent users from downloading ASPX files. The solution must meet the technical requirements.

How should you complete the command? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Full Access
Question # 8

You discover that email messages sent to contoso.com are NOT delivered through Contoso Connector.

You need to ensure that all email sent to contoso.com is delivered through Contoso Connector.

Which connector setting should you modify?

A.

Routing

B.

Security restrictions

C.

Use of connector

D.

Status

Full Access
Question # 9

You need to encrypt email between Fabrikam and Litware to support the planned changes.

What should you configure in the Exchange admin center?

A.

a connector

B.

an organization relationship

C.

a sharing policy

D.

a remote domain

Full Access
Question # 10

You need to generate a report for the mobile devices that meets the technical requirements.

Which PowerShell cmdlet should you use?

A.

Get-DevicePolicy

B.

Get-MobileDevice

C.

Get-MobileDeviceStatistics

D.

Get-DeviceTenantPolicy

Full Access
Question # 11

You need to ensure that In-Place Archiving is enabled for the marketing department users.

Which user should perform the change, and which tool should the user use? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Full Access
Question # 12

How many default policy tags (DPTs), retention policy tags (RPTs), and personal tags should you create to meet the retention requirements? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Full Access
Question # 13

You need to perform a remote wipe of the devices of User2 and User3.

You run the following commands.

Clear-MobileDevice -id User2-Device

-NotificationEmailAddress "admin@Fabrikam.com"

Clear-MobileDevice -id User3-Device

-NotificationEmailAddress "admin@Fabrikam.com"

What occurs on each device? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Full Access
Question # 14

User3 leaves the company.

You need to ensure that Admin1 and Admin2 can access the mailbox of User3. The solution must meet the technical requirements.

What should you do?

A.

Migrate the mailbox of User3 to a distribution group.

B.

Migrate the mailbox of User3 to a Microsoft 365 group.

C.

Convert the mailbox of User3 into a resource mailbox.

D.

Convert the mailbox of User3 into a shared mailbox.

Full Access
Question # 15

You need to identify the contents of the FabrikamProject public folder to meet the technical requirements.

Which PowerShell cmdlet should you run?

A.

Get-PublicFolderScaciscics

B.

Get-PublicFolderltemStatistics

C.

Get-PublicFolderMailboxDiagnoscics

D.

Get-PublicFolder

Full Access
Question # 16

You need to identify which users clicked the links in the phishing emails.

What should you do?

A.

Run a message trace and review the results.

B.

Query the mailbox audit log.

C.

Use the URL trace reporting feature.

D.

Review the quarantine mailbox.

Full Access
Question # 17

You need to configure the new smartboard to support the planned changes.

Which three settings should you configure? To answer, select the appropriate settings in the answer area.

NOTE: Each correct selection is worth one point.

Full Access
Question # 18

You have a Microsoft Exchange Online tenant that contains a public folder named PF1 and three users named User1, User2, and User3. Users are assigned public folder permissions to PF1 as shown in the following table.

Which users can read items in PF1, and which users can delete all the items in PF1? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Full Access
Question # 19

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.

Your company has a Microsoft 365 subscription.

Several users in the finance department of the company recently accessed unsafe websites by clicking on links in email messages.

Users in the marketing department of the company report that they must be able to access all the links embedded in email messages.

You need to reduce the likelihood of the finance department users accessing unsafe websites. The solution must affect only the finance department users.

Solution: You create a new safe attachments policy.

Does this meet the goal?

A.

Yes

B.

No

Full Access
Question # 20

You have a Microsoft Exchange Online tenant that uses an email domain named contoso.com.

Your company has a partnership with another company named fabrikam.com.

You need to ensure that all email messages sent to and received by the users at fabrikam.com are encrypted by using TLS.

What should you create in the Exchange admin center?

A.

one connector and one remote domain

B.

one remote domain and one accepted domain

C.

one connector and one accepted domain

D.

two connectors

Full Access
Question # 21

You have a Microsoft Exchange Online tenant that does NOT contain any public folders.

You need to create a new public folder. The solution must ensure that users can create a post by sending an email to the folder.

Which three actions should you perform in sequence? To answer, move the appropriate cmdlets from the list of cmdlets to the answer area and arrange them in the correct order.

Full Access
Question # 22

: 225

Your company has a Microsoft Exchange Online tenant named contoso.com.

The company acquires a company named ADatum Corporation that uses a third-party IMAP email service named adatum.com.

You plan to migrate the mailbox content of adatum.com to contoso.com.

You need to connect Microsoft 365 to the IMAP email service.

What should you create first?

A.

a new organization relationship

B.

a new migration endpoint

C.

a new remote domain

D.

a new staged migration batch

Full Access
Question # 23

You have a Microsoft Exchange Online tenant that contains a user named User1. You need to find email messages that meet the following requirements:

• Contain the word ProjectX

• Are located in the mailbox of User1

The solution must retain all the messages that meet the requirements.

Which three actions should you perform in sequence? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.

Full Access
Question # 24

You need to implement a solution to support the planned changes for the helpdesk users.

What should you do?

A.

Assign the Recipient Policies role to the helpdesk users and a default management scope

B.

Assign the Mail Recipients role to the helpdesk users and use a default management scope

C.

Assign the Mail Recipients role to the helpdesk users and create a custom management scope

D.

Assign the Recipient Policies roles to the helpdesk users and create a custom management scope

Full Access
Question # 25

Your company named Contoso, Ltd. has a Microsoft Exchange Server 2019 organization that contains the mailbox databases shown in the following table.

You need to assign an offline address book (OAB) named Managers to all the users in a group named Managers.

How should you complete the PowerShell script? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Full Access
Question # 26

You need to resolve the issue for the customer service department users.

What should you modify?

A.

a transport rule

B.

the Send connector to the Internet

C.

the tarpit interval

D.

the global throttling policy

Full Access
Question # 27

You need to resolve the issue for the transport department users.

What is the best way to achieve the goal? More than one answer choice may achieve the goal. Select the

BEST answer.

A.

Move the public folder mailbox that contains TransportPF to a server in the main office.

B.

Move TransportPF to a public folder mailbox hosted in the main office.

C.

Modify the default public folder mailbox for all the transport department users.

D.

Instruct the transport department users to add TransportPF to their Favorites list in Outlook.

Full Access
Question # 28

You need to implement a solution that meets the technical requirements for the retention of junk email, sent items, and deleted items.

What is the minimum number of retention policies and retention tags you should use? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Full Access
Question # 29

You need to implement a solution to meet the technical requirements for the SCL.

How should you complete the command? To answer, select the appropriate options in the answer area.

Full Access
Question # 30

You need to configure the required objects for the branch office administrators.

What should you create for each administrator?

A.

a management role assignment policy and a management role group

B.

a management role scope and a management role assignment

C.

a management role scope and a management role group

D.

a management role and a management role assignment policy

Full Access
Question # 31

You need to recommend a solution to retain the items in the public folders. The solution must support the

planned changes.

What should you recommend?

A.

Create an Outlook rule that forwards all the items in each public folder to a compliance mailbox.

B.

Place an In-Place Hold on all the mailboxes of the public folders.

C.

Increase the frequency of the backups.

D.

Modify the public folder permissions.

Full Access
Question # 32

You need to implement a solution to support the planned changes for the branch office administrators.

What should you do?

A.

Assign the Mail Recipients role to the branch office administrators and use a default management scope.

B.

Assign the Mail Recipients role to the branch office administrators and create a custom management scope.

C.

Assign the Recipient Policies role to the branch office administrators and use a default management scope.

D.

Assign the Recipient Policies role to the branch office administrators and create a custom management scope.

Full Access
Question # 33

You need to recommend a procedure for closing the Brussels office that meets the technical requirements.

What should you recommend?

A.

In the main office, deploy an Exchange Server 2016 server that has the Unified Messaging role installed, and then move the mailboxes from the Brussels office to the new server.

B.

Deploy a Microsoft Skype for Business 2019 server to the main office, and then move the mailboxes from the Brussels office to an Exchange Server 2019 server in the main office.

C.

Implement a new mailbox database on an Exchange Server 2019 server in the main office, and then move the mailboxes from the Brussels office to the new mailbox database.

D.

Implement a new database availability group (DAG) that contains the server in the Brussels office and a new Exchange Server 2019 server in the main office, and then create a mailbox database copy on the new server in the main office.

Full Access
Question # 34

You need to recommend a solution that meets the security requirements for protecting users.

What should you recommend?

A.

From the Security & Compliance admin center, create an ATP safe attachments policy.

B.

From the Exchange admin center in Exchange Online, create a spam filter policy.

C.

From the Security & Compliance admin center, create an ATP anti-phishing policy.

D.

From the Security & Compliance admin center, create an ATP Safe Links policy.

Full Access
Question # 35

You need to resolve the email delivery delay issue.

What should you do?

A.

From the Security & Compliance admin center, modify the safe attachments policy

B.

From the Security & Compliance admin center, create a supervision policy.

C.

From the Exchange admin center in Exchange Online, modify the antimalware policy.

D.

From the Exchange admin center in Exchange Online, modify the spam filter policy.

Full Access
Question # 36

You need to configure the environment to support the planned changes for email addresses.

How should you complete the command? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Full Access
Question # 37

You need to recommend an Office 365 solution that meets the technical requirements for email from adatum.com.

Which two components should you recommend configuring from the Exchange admin center in Exchange Online? Each correct presents a complete solution.

NOTE: Each correct selection is worth one point.

A.

DKIM signatures

B.

a spam filter

C.

a malware filter

D.

data loss prevention (DLP) policies

E.

a connection filter

Full Access
Question # 38

You must prevent HelpDeskUser1 from repeating the same mistake.

You need to identify which management role provided HelpDeskUser1 with the necessary permissions to make the mistake identified in the problem statement.

Which two cmdlets should you run? Each correct answer presents part of the solution.

A.

Get-RoleGroup

B.

Get-ManagementRoleEntry

C.

Get-RoleGroupMember

D.

Get-ManagementRoleAssignment

E.

Get-ManagementRole

Full Access
Question # 39

You need to configure the Exchange organization to meet the security requirements for sending email messages to distribution groups.

Which cmdlet should you run?

A.

Set-OrganizationConfig

B.

Set-DistributionGroup

C.

Set-Mailbox

D.

New-PolicyipConfig

Full Access
Question # 40

Use the drop-down menus to select the answer choice that complete each statement based on the information presented in the Exchange Online Connector exhibit.

NOTE: Each correct selection is worth one point.

Full Access
Question # 41

You need to recommend a solution for the public folders that supports the planned changes and meets the technical requirements.

What should you recommend?

A.

Microsoft SharePoint site mailboxes

B.

Office 365 groups

C.

Resource mailboxes

D.

Public folder replicas

Full Access
Question # 42

You need to ensure that Allan Deyoung can create a new public folder for the sales department.

Which two actions should you perform first? Each correct answer presents part of the solution.

NOTE: Each correct selection is worth one point.

A.

Add Allan Deyoung to the Organization Management role group

B.

Create a new public folder mailbox

C.

Add Allan Deyoung to the Recipient Management role group

D.

Create a new shared mailbox

E.

Modify Sales Policy

Full Access
Question # 43

You need to migrate 10 Microsoft Outlook.com users to the adatum.com tenant.

Which type of migration should you perform, and which items can be migrated? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Full Access
Question # 44

Joni Sherman reports that the Microsoft Outlook client on her Windows 10 device fails to start.

You need to troubleshoot the issue.

From the device, you start the Microsoft Remote Connectivity Analyzer.

What should you run next?

A.

the Exchange ActiveSync test

B.

the Outlook Connectivity test

C.

the Service Account Access test

D.

the Microsoft Support and Recovery Assistant for Office 365 client

Full Access