|
Question |
Rating |
View Answer |
|
One of your colleagues has read that the value in the % Processor Time counter should not exceed 85 percent. She has therefore configured an alert to trigger when the counter reaches or exceeds that value. The alert triggers frequently. What conclusion should you draw? A. Your colleague has not understood processor usage. B. Your colleague has not set up the counter correctly. C. You need to install a faster processor. D. You need to install another processor to enable multiprocessing.
|
|
View Answer |
|
You have a System Center Operations Manager 2007 environment. You need to schedule a regular export of your unsealed management packs. What should you do? A. Create a scheduled task that uses the momcertimport.exe tool. B. Create a scheduled task that uses the get-management pack Power Shell command let. C. Create a scheduled task that uses the mpexport.exe tool. D. Create a scheduled task that uses the mpseal.exe tool.
|
|
View Answer |
|
How long does it take to set up the initial team Web site? |
|
View Answer |
|
You deploy System Center Operations Manager 2007 at your company. The company has three Microsoft Exchange Server 2003 computers. You need to ensure that the Exchange administrators are able only to override the configuration of rules and monitors. What should you do? A. Create a user role that is based on the Author profile. Add the Exchange administrators to this new role. B. Create a user role that is based on the Advanced Operator profile. Add the Exchange administrators to this new role. C. Add the Exchange administrators to the Operations Manager Operators user role. D. Add the Exchange administrators to the Operations Manager Administrators user role.
|
|
View Answer |
|
You have just finished installing a NetWare 6.5 server named WIDGET1 into a new eDirectory tree named WIDGET-TREE. The server's context is .SLC.WIDGET. The Admin user for this tree has been created in .CORP.WIDGET. During installation, Admin was automatically made an explicit trustee of and granted the Supervisor right to which object in the tree? A. O=WIDGET B. The tree root C. OU=SLC.O=WIDGET D. OU=CORP.O=WIDGET E. CN=WIDGET1.OU=SLC.O=WIDGET
|
|
View Answer |
|
Microsoft Exchange Server 2007 provides built-in protection technologies to help keep the e-mail system up and running and better protected from outside threats while allowing employees to work from wherever they are using a variety of clients including Microsoft Outlook, Outlook Web Access, and mobile devices. You are a network technician for Company Ltd. How to configure your Exchange Server 2007 computer so that a specific distribution group will allow out-of-office responses from the mailboxes of members of the distribution group? A. On the distribution group properties, enable out-of-office responses to be sent to message senders. B. Re-create the distribution group as a security group. C. On the distribution group properties, enable delivery reports to be sent to message senders. D. On the default remote domain policy, enable out-of-office responses.
|
|
View Answer |
|
You have a System Center Configuration Manager 2007 environment. You need to be able to query Configuration Manager 2007 to display registry values for a custom application for each client computer. Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.) A. Configure hardware inventory. B. Edit SMS_Def.MOF on each site to query for the registry values. C. Edit the sitectrl.ct0 file at the central site to query for the registry values. D. Configure and assign a desired configuration baseline at the central site.
|
|
View Answer |
|
Your company has an office in San Francisco and an office in Rome. You install Office Communications Server 2007 Enterprise Edition mediation servers in both locations. You create a location profile for the San Francisco office. You successfully install and test the server in the San Francisco office. You need to configure the mediation server in Rome for voice dialing. What should you do? A. Create a new location profile to use in both offices that includes local area codes and rules for international dialing. B. Copy and rename the location profile from the San Francisco mediation server to the Rome mediation server. Change the international dial codes. C. Copy and rename the location profile from the San Francisco mediation server to the Rome mediation server. Change the local area codes. D. Create a new location profile in Rome that includes local area codes and rules for international dialing.
|
|
View Answer |
|
Your company is upgrading from Microsoft Office Communicator 2005 to Microsoft Office Communicator 2007. The company wants all of the user settings from the Communicator 2005 installation to be applied to the new Communicator 2007 installation. You need to ensure that user settings are migrated when the client computers are upgraded. What should you do? A. Upgrade Communicator 2005 to Communicator 2007. B. Use the LCScmd.exe command to extract the user settings. Then uninstall Communicator 2005 and install Communicator 2007. C. Delete the Communicator 2005 Galcontacts.db file. Then uninstall Communicator 2005 and install Communicator 2007. D. Uninstall Communicator 2005, install Communicator 2007, and manually configure the Communicator 2007 settings to be the same as the Communicator 2005 settings.
|
|
View Answer |
|
You increase the anti-spam restrictions for your Exchange Server 2007 organization. You inform your company s partners that they should forward any e-mail messages that are being blocked by the content filters to [email protected]. The forwarded messages will be reviewed so that modifications can be made to Safe Senders Lists to prevent the blocking problem in the future. External users are forwarding e-mail messages to [email protected], but you discover that no messages from external users are in the anti-spam mailbox. You need to allow the anti-spam mailbox to receive e-mail messages that are classified as spam. Which cmdlet should you run? A. Set- RecipientFilterConfig - RecipientValidationEnabled $false B. Set- ContentFilterConfig - BypassedRecipients [email protected] C. Set- ContentFilterConfig - BypassedSenders [email protected] D. Set- RecipientFilterConfig - BlockListEnabled $falsE. BlockedRecipients [email protected]
|
|
View Answer |
|
Can I get domain name for my Web site to use SharePoint Services? |
|
View Answer |
|
An inappropriate message that has the subject line of Exchange is sent to all users on the Exchange Server 2007 Mailbox server named Exch1. You need to delete this message from all mailboxes. What should you do? A. On Exch1, find the message ID of the original message and then run the Remove-Message – Identity <IDnumber> cmdlet. B. On Exch1, find the message ID of the original message and then run the Export-Message – Identity <IDnumber> c: emp cmdlet. Delete all of the messages in the directory. C. Create a new mailbox named TempMailbox that has a folder named Export. Run the Get- Mailbox -Server Exch1 | Export-Mailbox -TargetMailbox TempMailbox -TargetFolder Export – SubjectKeywords “Exchange” -DeleteContent cmdlet. D. From the Exchange Management Console, create a new transport rule named Exchange delete. Set the condition to “when the Subject field contains Exchange”. Set the action to “silently drop the message”.
|
|
View Answer |
|
Your Exchange Server 2007 organization has a single Edge Transport server, which is configured with a spam quarantine mailbox. You need to reduce the amount of spam that reaches user in boxes. You also need to be able to review marked messages and to monitor them for false positives. What should you do? A. Increase the spam confidence level (SCL) threshold value for deleting e-mail. B. Increase the spam confidence level (SCL) threshold value for quarantining e-mail. C. Reduce the spam confidence level (SCL) threshold value for rejecting e-mail. D. Reduce the spam confidence level (SCL) threshold value for quarantining e-mail.
|
|
View Answer |
|
You install a new Exchange Server 2007 computer with the Edge Transport server role. You need to create a backup of the Edge Transport server role. What should you do? A. In the Microsoft Windows Backup utility, select Microsoft Exchange Server. B. In the Microsoft Windows Backup utility, select the file system location TransportRolesdata*. C. Run the ExportEdgeConfig.ps1 script with thE.CloneConfigData parameter. D. Run the ExportEdgeConfig.ps1 script with thE.CloneConfigAnswer parameter.
|
|
View Answer |
|
You want to create a performance counter log that records the total number of recipients that have received a message since start-up, the total number of messages delivered to all recipients since start-up, the rate that recipients receive messages, the rate that messages are delivered to all recipients, the total number of messages sent to transport since start-up, and the rate that messages are sent to the transport. What MSExhangeIS Mailbox counters do you add to the log? (Choose all that apply.) A. Local Deliveries B. Local Delivery Rate C. Message Recipients Delivered D. Message Recipients Delivered/Sec E. Messages Delivered F. Messages Delivered/Sec G. Logon Operations/Sec H. Messages Sent I. Messages Sent/Sec
|
|
View Answer |
|
Your company maintains a hot standby server named ExchDR1. An Exchange Server 2007 computer named Exch1 fails. You perform the following actions. 1. On Exch1, take the Exch1.edb database offline. 2. On ExchDR1, create a new storage group named ExchDR and a database named ExchDR1.edb. 3. Copy the Exch1.edb database from Exch1 to ExchDR1. 4. On ExchDR1, rename the copied database from Exch1.edb to ExchDR1.edb. Your attempt to mount the database is unsuccessful You need to ensure that the copied database mounts on the new server. What should you do? A. Rename ExchDR1 to Exch1. B. Rename the database on ExchDR1 to Exch1 .edb. C. Set the This database can be overwritten by restore attribute on the database properties. D. Run the Move-Mailbox -ConfigurationOnly -TargetDatabase ExchDR1.edb cmdlet.
|
|
View Answer |
|
Your company wants to enable federation. Company policy forbids publication of the root certificate. You need to directly federate with another company. What should you do? A. Install public IM connectivity (PIC) on the Access Edge Server. B. Install the root certificate from the other company on the Access Edge Server. C. Install internal private certificates on the Access Edge Server. D. Install external public certificates on the Access Edge Server.
|
|
View Answer |
|
A senior manager at your company is under suspicion of forwarding sensitive information to a competitor. The chief executive officer (CEO) wants to be provided with a copy of all messages that the senior manager sends but does not want the senior manager to be aware that he is under surveillance. Which of the following actions would you configure when setting up a transport rule to screen the senior manager's messages? A. Blind carbon copy (Bcc) the message to addresses B. Add a recipient in the To field addresses C. Redirect the message To addresses D. Silently drop the message
|
|
View Answer |
|
You have a System Center Operations Manager 2007 environment. You create a custom management pack that monitors server temperature. You need to automatically shut down a server if it exceeds a specific temperature. What should you do? A. Modify the monitor properties for the server temperature to create a threshold override For all objects of type: temperature. B. Modify the monitor properties for the server temperature to create a recovery task that runs the shutdown.exe /s command. C. Create an event alert that monitors server temperature. Create an agent task that runs the shutdown.exe /s command. D. Create an event alert that monitors server temperature. Create a console task that runs the shutdown.exe /s command.
|
|
View Answer |
|
Your native Exchange Server 2007 organization contains 10 Exchange servers. The roles on these servers are configured as shown in the following table. You need to generate a single report that indicates the number of disconnected mailboxes in your environment and how much storage space these mailboxes consume. You need to export the report to a file. What should you do? A. Run the Get-MailboxServer | Get-MailboxStatistics | Where {$_.DisconnectDatE.ne $null} | Export-Csv -Path c: mpdisconnect.csv cmdlet. B. Run the Get-Mailbox | Get-MailboxStatistics | Where {$_.DisconnectDatE.ne $null} | Export- Csv -Path c: mpdisconnect.csv cmdlet. C. Run the Get-Recipient -RecipientType MailboxUser | Export-Csv -Path c: mpdisconnect.csv cmdlet. Then, open disconnect.csv and remove all entries for active mailboxes. D. In the Exchange Management Console, expand the Recipient Configuration work center and select the Disconnected Mailbox node.
|
|
View Answer |