CoolInterview.com - World's Largest Collection of Interview Questions & Answers, FAQs, queries, sample papers, exam papers, dumps, what, why, how, where, when questions
Our Services
Get 9,000 Interview Questions & Answers in an eBook.




Get it now !!
Send your Resume to 6000 Companies
Advertisements
Microsoft Certification Exams Interview Questions

Below we have listed all the Microsoft Certification Exams Interview Questions and answers. Feel free to comment on any Microsoft Certification Exams Interview Questions or answer by the comment feature available on the page.

To buy an eBook containing 30,000 Interview Questions, with Answers, Click Here.
View All Microsoft Certification Exams Interview Questions & Answers - Exam Mode / Learning Mode

Microsoft Certifications are professional certifications verifying demonstrated proficiency with Microsoft products. They exist in the categories of Server, Desktop, Applications, Database, and Developer with a variety of tiers of proficiency certified, including Solutions Associate (MCSA), Solutions Expert (MCSE), and Solutions Developer (MCSD). They are bestowed on people who pass one or more exams. MCP-qualifying exams include all of the exams required in the Microsoft Certified Solutions Associate (MCSA), MCSE, MCSD, and Microsoft Specialist certifications. Microsoft Technology Associate (MTA) exams and Microsoft Office Specialist (MOS) exams do not qualify for MCP certification.

Highly Recommended, Hand Picked Microsoft Certification Exams Books


Subcategories for Microsoft Certification Exams Interview Questions & Answers :-

Following are sub categories for which Interview Questions & Answers are available under Microsoft Certification Exams Interview Questions & Answers. Please select the appropriate sub-category:-

MCDBA Certification Exam Interview Questions & Answers (0) Exam Mode | Learning Mode

MCPD Certification Exam Interview Questions & Answers (0) Exam Mode | Learning Mode

MCSD .Net Certification Exam Interview Questions & Answers (0) Exam Mode | Learning Mode

MCSE Certification Exam Interview Questions & Answers (58) Exam Mode | Learning Mode

MCTS .Net Certification Exam Interview Questions & Answers (1) Exam Mode | Learning Mode

MSCE 2003 Certification Exam Interview Questions & Answers (1) Exam Mode | Learning Mode

Previous 1 2 3 4 5 6 Next

Sort By : Latest First | Oldest First | By Rating

Question
Rating
View Answer
A senior manager at your company is under suspicion of forwarding sensitive information to a
competitor. The chief executive officer (CEO) wants to be provided with a copy of all messages
that the senior manager sends but does not want the senior manager to be aware that he is
under surveillance. Which of the following actions would you configure when setting up a
transport rule to screen the senior manager's messages?
A. Blind carbon copy (Bcc) the message to addresses
B. Add a recipient in the To field addresses
C. Redirect the message To addresses
D. Silently drop the message
0.2 Rating
View Answer
The Company??s Exchange Server 2007 organization has a mail-enabled public folder named
Monitoring which is configured to receive automated alerts from this company??s external
monitoring system. Each corporate user is able to send e-mail to this public folder. Mail from the
monitoring system is being returned with a non-delivery report (NDR). How to make sure that the
monitoring alerts are to be received in the Monitoring public folder?
A. Use Microsoft Office Outlook to assign anonymous users the permission to create items in the
Monitoring public folder.
B. Perform the Add-PublicFolderClientPermission -AccessRights: EditOwnedItems cmdlet for
anonymous users for the Monitoring public folder.
C. Use Microsoft Office Outlook to assign default users the permission to create items in the
Monitoring public folder.
D. Perform the Set-MailPublicFolder -RequireSenderAuthenticationEnabled: $true cmdlet for the
Monitoring public folder.
0.2 Rating
View Answer
Your companies Microsoft ActiveSync policy is configured to require inactive users to provide
their password every 10 minutes. A company executive requests that her mobile device be
exempt from the inactivity timer. You need to exempt the executives mobile device from the
timeout policy while maintaining the other corporate policy settings. What should you do?
A. Remove the corporate ActiveSync policy from the executives mailbox.
B. Create a new ActiveSync policy that has the required settings, and apply it to the executives
mailbox.
C. Change the password setting on the executives mobile device to override the ActiveSync
policy.
D. Reconfigure the executives mobile device for ActiveSync, and do not apply the corporate
ActiveSync policy.
0.3 Rating
View Answer
You have forgotten a "share name". You need to locate a file in that share. How can you quickly see a list of all shares on your system?

A. Browse to your system through Network Neighborhood and you will see all of the shares.
B. Using the computer management tool in the Administrative tools group in Control Panel, you will find a tab to view shared folders under system tools.
C. Using the computer management tool in the Administrative tools group in Control Panel, you will find a tab to view shared folders under Storage
D. Using Windows Explorer, choose shared folders from the view menu.

0.2 Rating
View Answer
You need to identify the Exchange Server 2007 server role that must be installed on a stand-
alone server. Which server role should you identity?
A. ClientAccess
B. Edge Transport
C. Hub Transport
D. Mailbox
0.2 Rating
View Answer
You need to configure the minimum permissions necessary for a new administrator so that she
can prepare Active Directory for Exchange Server 2007. Which two actions should you perform?
(Each correct answer presents part of the solution. Choose two.)
A. Add the new administrator as an Exchange Full Administrator at the organization level.
B. Add the new administrators user account to the Exchange Enterprise Servers group.
C. Add the new administrators user account to the Domain Admins group.
D. Add the new administrators user account to the Enterprise Admins group.
E. Add the new administrators user account to the Schema Admins group.
0.3 Rating
View Answer
Question: 37
You want to gather information about user connectivity on an Exchange Server 2007 Mailbox
server named Exch1. You need to generate a report of all Exch1 mailboxes that displays the
latest user logon time. What should you do?
A. In Performance Monitor, add the Active Client Logons counter with _Total instances from the
MSExchangelS Mailbox object.
B. Run the Get-Mailbox -Server Exch1 cmdlet.
C. Run the Get-MailboxStatistics -Server Exch1 cmdlet.
D. Run the Get-LogonStatistics -Server Exch1 cmdlet.
0.3 Rating
View Answer
You are creating a cluster continuous replication (CCR) cluster. You create a failover cluster and
you install the Mailbox server role named ExchMB1 on the active node. You need to install the
Mailbox server role on the passive node. What are two possible ways to achieve this goal? (Each
correct answer presents a complete solution. Choose two.)
A. Run the Enable-StorageGroupCopy -Identity ExchMB1SG1 command.
B. Run the Setup /roles:Mailbox command.
C. Run the Setup /newcms /CMSname:ExchMB1 command.
D. Select the Passive Clustered Mailbox Role check box in the Exchange Server 2007 Setup
0.2 Rating
View Answer
A new virus is discovered in your Exchange Server 2007 organization. The file extension is .ext
for this virus. The current settings for attachment filtering are configured to delete specified
attachments and allow the message to be delivered. However the virus files are not being filtered.
You must stop the spread of this new virus. Neither the attachment nor the e-mail message
should reach the e-mail recipient. The message that contains the virus should not generate a
non-delivery report (NDR). You need to add a filter for the file extension of the virus. Which two
cmdlets should you run? (Each correct answer presents part of the solution. Choose two.)
A. Add- AttachmentFilterEntry -Name *.ext -type ContentType
B. Add- AttachmentFilterEntry -Name *.ext -type FileName
C. Set- AttachmentFilterListConfig -Action Reject - RejectMessage ?None?
D. Set- AttachmentFilterListConfig -Action SilentDelete
0.3 Rating
View Answer
Your native Exchange Server 2007 organization has a single Edge Transport server named Exch
Edge1. Exch Edge1 has an Edge Subscription established with a Hub Transport server named
Exch Hub1. The network connection from Exch Edge1 to the Internet is interrupted for an
extended period of time. After the network connection is restored, no messages are being
delivered. You need to restore message flow immediately. What should you do?
A. On ExchHub1, run the Resume-Queue cmdlet.
B. On ExchHub1, run the Retry-Queue cmdlet.
C. On ExchEdge1, run the Resume-Queue cmdlet.
D. On ExchEdge1, run the Retry-Queue cmdlet.
0.3 Rating
View Answer
You install an Exchange Server 2007 Edge Transport server role and Hub Transport server role.
The server that has the Hub Transport server role is located in an Active Directory site named
Chicago. You need to synchronize your companys Active Directory information to the server that
has the Edge Transport server role. Which two actions should you perform? (Each correct answer
presents part of the solution. Choose two.)
A. Run the New- EdgeSubscription - FileName ?c:EdgeserverSubscription.xml ? cmdlet on the
server that has the Edge Transport server role.
B. Run the New-EdgeSubscription -FileName ?c:EdgeServerSubscription.xml? ?site ?Chicago?
cmdlet on the server that has the Hub Transport server role.
C. Run the ADAMSync command on the server that has the Edge Transport server role.
D. Run the ExportEdgeConfig -CloneConfigData ?C:CloneConfigData.xml? command on the
server that has the Edge Transport server role.
E. Run the ImportEdgeConfig - CloneConfigData ? C:CloneConfigData.xml ? command on the
0.3 Rating
View Answer
You have configured attachment filtering on your organization's edge transport servers. Because
some senders are transmitting files that are not harmful, you want to allow hem to be informed
that the message containing the attachment has been rejected by your organization.
Which of the following configuration settings should you make?
A. Configure the attachment filtering behavior action to Strip
B. Configure the attachment filtering behavior action to SilentDelete
C. Configure the attachment filtering behavior action to Reject
D. Configure a ConnectorException
0.2 Rating
View Answer
Windows NT 4.0 is currently installed on the system you are using on an NTFS partition. You want to install Windows 2000 Professional and dual boot NT 4.0 and 2000 professional. What do you need to do?

A. Install Windows 2000 on the same folder that Windows NT is installed in
B. Install Windows 2000 on a separate partition from Windows NT 4.0
C. Upgrade Windows NT 4.0 to SP4 or later then install Windows 2000.
D. This cannot be accomplished

0.3 Rating
View Answer
ActiveSync is a data synchronization program developed by Microsoft for use with its Microsoft
Windows line of operating systems. Originally released under the name "Handheld PC Explorer"
in 1996, it provides users of Microsoft Windows a way to transport documents, calendars, contact
lists and email between their desktop computer and a mobile device, such as a Handheld PC,
mobile phone, or any other portable devices that support the ActiveSync protocol. Company?s MS
ActiveSync policy requires inactive users to provide their password each 15 minutes. Mr. Moore
is the CEO of Company Ltd., his mobile device should be exempted from the inactivity timer. Now
you have to exempt Moore'S mobile device from the timeout policy while maintaining the other
corporate policy settings. What should you do?
A. Remove the corporate ActiveSync policy from Mr. Moore's mailbox.
B. Create a new ActiveSync policy that has the required settings, and apply it to the executives
mailbox.
C. Reset Mr. Moore's mobile device and refuse the corporate ActiveSync policy.
D. Change the password setting on Mr. Moore's mobile device to take precedence of the
ActiveSync policy.
0.3 Rating
View Answer
Your company uses the Volume Shadow Copy Service (VSS) to perform full backups of the
Exchange Server 2007 mailbox databases every night.
There is a backup window between 20:00 and 24:00 each week night and a backup window
between 19:00 and 24:00 on Saturdays and Sundays
The full backups currently take five hours to complete.
Management requests that you modify the backup configuration to meet the following
requirements.
At least one full backup must be performed per week.
Logs must be truncated more often than once per week.
Backups must be performed within the current backup windows
Database restores must require no more than two backup files.
You need to configure the backups for the mailbox databases to meet the requirements.
What should you do?
A. Configure differential backups on week nights and full backups on Saturdays and Sundays.
B. Configure incremental backups on week nights and full backups on Saturdays and Sundays.
C. Configure daily full backups, and throttle the database checksum.
D. Configure daily copy backups, and throttle the database checksum.
0.3 Rating
View Answer
You need to install the necessary components prior to installing Exchange Server 2007 on a new
server. Which three components should you install? (Each correct answer presents part of the
solution. Choose three.)
A. Windows PowerShell 1.0
B. Network News Transfer Protocol (NNTP)
C. Simple Mail Transfer Protocol (SMTP)
D. Microsoft Management Console (MMC) 3.0
E. Microsoft .NET Framework 1.1
F. Microsoft .NET Framework 2.0
0.2 Rating
View Answer
Your Exchange Server 2007 organization contains two Exchange servers named Exch1 and
Exch2. Exch1 fails and cannot be restored to service. You need to move all mailboxes from
Exch1 to Exch2. Which cmdlet should you run?
A. Get-Mailbox -Server Exch1 | Move-Mailbox - IgnorePolicyMatch - TargetDatabase
?Exch2First Storage GroupMailbox Database?
B. Get-Mailbox -Server Exch1 | Move-Mailbox - IgnoreRuleLimitErrors - TargetDatabase
?Exch2First Storage GroupMailbox Database?
C. Get-Mailbox -Server Exch1 | Move-Mailbox - ValidateOnly - TargetDatabase ?Exch2First
Storage GroupMailbox Database?
D. Get-Mailbox -Server Exch1 | Move-Mailbox - ConfigurationOnly - TargetDatabase
?Exch2First Storage GroupMailbox Database?
0.3 Rating
View Answer
You are preparing to configure e-mail retention on three managed custom folders for all
mailboxes on an Exchange Server 2007 computer named Exch1.
You perform the following actions.
Create three managed custom folders.
Create managed content settings for each folder, and configure the required retention settings.
Create a new managed folder mailbox policy named MailRet.
Add each managed custom folder to the MailRet policy.
Configure the managed folder assistant for Exch1.
You need to finish configuring the messaging records management (MRM) retention settings so
that the three folders are available for the mailboxes on Exch1.
What should you do?
A. For each mailbox on Exch1, select the Enable retention hold for items in this mailbox check
box.
B. For each mailbox on Exch1, add the MailRet policy.
C. Add managed content settings to the three managed custom folders.
D. Create a new managed folder mailbox policy for each of the three managed custom folders.
0.2 Rating
View Answer
Question: 38
You need to find out the total size of a users mailbox. What should you do?
A. Run the Database Troubleshooter in the Exchange Troubleshooting Assistant.
B. Run the Get-MailboxDatabase cmdlet.
.C. Run the Get-MailboxStatistics cmdlet
D. Run the Get-Mailbox cmdlet.
0.3 Rating
View Answer
Your companys Active Directory structure contains a root domain in site A and a single child
domain in site B. You are preparing to install Exchange Server 2007 in the child domain. In the
root domain, you run the Setup /PrepareAD command. You need to ensure that you can install
Exchange in the child domain. What are two possible ways to achieve this goal? (Each correct
answer presents a complete solution. Choose two.)
A. In the child domain, run the Setup /DomainPrep command.
B. In the child domain, run the Setup /PrepareDomain command.
C. In the root domain, run the Setup /ForestPrep command.
D. In the root domain, run the Setup /PrepareDomain command.
E. In the root domain, run the Setup /PrepareAllDomains command.
0.2 Rating
View Answer

Previous 1 2 3 4 5 6 Next

India News Network
Latest 20 Questions
Payment of time- barred debt is: (a) Valid (b) Void (c) Illegal (d) Voidable
Consideration is defined in the Indian Contract Act,1872 in: (a) Section 2(f) (b) Section 2(e) (c) Section 2(g) (d) Section 2(d)
Which of the following is not an exception to the rule, "No consideration, No contract": (a) Natural love and affection (b) Compensation for involuntary services (c) Completed gift (d) Agency
Consideration must move at the desire of: (a) The promisor (b) The promisee (c) The promisor or any other party (d) Both the promisor and the promisee
An offer which is open for acceptance over a period of time is: (a) Cross Offer (b) Counter Offer (c) Standing Offer (d) Implied Offer
Specific offer can be communicated to__________ (a) All the parties of contract (b) General public in universe (c) Specific person (d) None of the above
_________ amounts to rejection of the original offer. (a) Cross offer (b) Special offer (c) Standing offer (d) Counter offer
A advertises to sell his old car by advertising in a newspaper. This offer is caleed: (a) General Offer (b) Special Offer (c) Continuing Offer (d) None of the above
In case a counter offer is made, the original offer stands: (a) Rejected (b) Accepted automatically (c) Accepted subject to certain modifications and variations (d) None of the above
In case of unenforceable contract having some technical defect, parties (a) Can sue upon it (b) Cannot sue upon it (c) Should consider it to be illegal (d) None of the above
If entire specified goods is perished before entering into contract of sale, the contract is (a) Valid (b) Void (c) Voidable (d) Cancelled
______________ contracts are also caled contracts with executed consideration. (a) Unilateral (b) Completed (c) Bilateral (d) Executory
A offers B to supply books @ Rs 100 each but B accepts the same with condition of 10% discount. This is a case of (a) Counter Offer (b) Cross Offer (c) Specific Offer (d) General Offer
_____________ is a game of chance. (a) Conditional Contract (b) Contingent Contract (c) Wagering Contract (d) Quasi Contract
There is no binding contract in case of _______ as one's offer cannot be constructed as acceptance (a) Cross Offer (b) Standing Offer (c) Counter Offer (d) Special Offer
An offer is made with an intention to have negotiation from other party. This type of offer is: (a) Invitation to offer (b) Valid offer (c) Voidable (d) None of the above
When an offer is made to the world at large, it is ____________ offer. (a) Counter (b) Special (c) General (d) None of the above
Implied contract even if not in writing or express words is perfectly _______________ if all the conditions are satisfied:- (a) Void (b) Voidable (c) Valid (d) Illegal
A specific offer can be accepted by ___________. (a) Any person (b) Any friend to offeror (c) The person to whom it is made (d) Any friend of offeree
An agreement toput a fire on a person's car is a ______: (a) Legal (b) Voidable (c) Valid (d) Illegal
Cache = 0.03125 Seconds