The answers to these questions are best guesses of the contributor and may not be correct

Q. 25 client licenses. 25 employees with outlook on the LAN. You hire 10 more who connect remotely. Your modem support only 5 connections.
5 using POP3, 5 using HTTP. Hoe many additional licenses ?
A. 5

---------------------------
Q. Enabled IMAP4 on the server. Some users get an error "message size is unknown".
How can all IMAP4 users connect to the server?
A. Clear "Enable fast message retrieval in IMAP4 properties"

---------------------------
Q. You have some chat servers. You want to shutdown one of them and make this transparent to new users. How?
*1. Disable new connections
2. Close the portal between the server and the other servers.
3. type NET STOP CHATSVC
4. Pause the Workstation service

---------------------------
Q. You have a server with 64mb RAM and 32mb paging file. During installation the DS setup fails. The SA installation succeeded. How can you fix?
*1. Increase the paging file size
2. The page file is on the same drive as the IS
3. Exchsvc account don't have the right to log on as a service
4. Exchsvc account don't have the right to the administrators group

---------------------------
Q. You have multiple sites. ATG devision has its own site & NT domain. You don't want directory infomation to be visible to other sites but users should be able to send messages to all the recipients. ATG should be able to view directory information on all recipients. How to do it?
1. Clear directory replication in the DS for ATG
*2. Grant recipient container to Exsvr service account in the ATG domain
3. Use X.400, set the trust of all X.400 connectors lower than the ATG recipients
4. Set the trust so that ATG is higer than other

---------------------------
Q. You don't have a backup tape on your Exchange server. You backup the server with filecopy to another computer. Which files to include (choose 3)?
*1. Directory file
2. Checkpoint file
3. Transaction log
*4. Public IS
*5. Private IS
6. Personal IS

---------------------------
Q. Exchange server with IMS installed. Users can retrieve mail with POP3 but cannot send mail. What sems to cause the problem?
*1. IMS is set to "not reroute incoming SMTP mail"
2. IMS is set to SMTP type rather than to POP3

---------------------------
Q. The retention on the server is set to four days. Just when IS is backedup the item is deleted. Item was deleted in outlook the previeous day. A full backup was the previeous night. How to restore?
1. From backup
2. Replay from logs
*3. Recover from outlook
4. Recover from outlook as the administrator

---------------------------
Q. A user uses an .OST file on his outlook. He wants the folder to syncronize but there is no sync tab for that folder. How can he sync this folder?
A. The owner of that folder must enable it for syncronization

---------------------------
Q. Want to add an Exchange server to an existing MS-Mail system. You don't want to change the dirsync scema on that site. How to connect the Exchange to the MS-Mail? (choose 2)
A. MS-Mail connector
+One more option i can't remember???

---------------------------
Q. You have 3 domains attached with X.400 connectors. You want each domain admin to admin only his domain. Each domain is in a seperate site.
A. No trust relationship between the domains.
No account information shared

---------------------------
Q. What happen to items when deleted from the mailbox, when item retention is enabled?
1. Moved to Temp.EDB
*2. Become hidden in the IS

---------------------------
Q. Where can you enable message tracking? (choose 3)
*1. MTA
*2. IS
*3. IMS
4. MS-Mail connector
5. MS Exchange CC:Mail connector

Note: Had a little problem with that question. Altough you must choose only three answers there are actually 4 choices that meets the requirement.
The MTA (see Q148963 from TechNet)
The IS (see Q148963 from TechNet)
The IMS (see Q164175 from TechNet)
The CC:Mail (see the CC:Mail connector properties page)
I choose the "*" ones. But what is the right answer when CC:Mail is right too?
Well, even after diging at the TechNet-land i hav'nt come with a determined conclusion.

---------------------------
Q. What does the "o=" field refers to in an X.400 address?
A. o=Organization
Don't get confused with the site name. This answer is based on Microsoft's TechNet (Article: "X.400 Concepts and Terminology" , Section: "o/r address filds").
I've pasted the following from that article:
Attribute Type    Abbreviation    Label     Length
Given Name    Given name    G    16
Initials    Initials    I    5
Surname    Surname    S    40
Generation Qualifier    Generation    Q    3
Common Name    Common Name    CN    32
X.121 Address    X.121    X.121    15
User Agent Numeric ID    N-ID    N-ID    32
Terminal Type    T-TY    T-TY    3
Terminal Identifier    T-ID    T-ID    24
Organization    Organization    O    64 <---- <----
Organizational Unit 1    Org.Unit.1    OU1     32
Organizational Unit 2    Org.Unit.2    OU2     32
Organizational Unit 3    Org.Unit.3    OU3     32
Organizational Unit 4    Org.Unit.4    OU4     32
Private Management Domain    PRMD    P    16
Administration Management Domain    ADMD    A     16
Country    Country    C    2
Domain Defined Attribute    DDA    DDA     8,128

---------------------------
Q. You perform an offline backup. After hardware failure you restore but the IS will not start. How to restart it?
*1. ISINTEG -Patch
2. EseUtil + consistency option
3. EseUtil + recovery + defragmentation options (/r + /d)

+ You are deploying a mixed Exchange-MSMail environment, and you will eventually migrate MSMail users to Exchange in the future. You want a distribution list with all of the users from both of the mailing systems. So what?
- Configure MSMail Connector and Directory Synchronization, and put the DL with all the users from Exchange and MSMail on the Exchange server.    (Know the MSMail connector and Dirsync very well, there's a lot of questions about that!)

+ You want to prevent certain fields for users in your site to appear when replicated to
other sites. What should you do?
- Configure this in your DS Site Configuration - Intersite replication (it should be
in the Advanced tab).

+ You have an Exchange server with 64 MB RAM and 32 MB paging file size. The System Attendant starts, but the Information Store service doesn't start. What should you do?
- Increase the paging file size.  (Remember that Exchange needs 125 MB + RAM for the paging file, 189 MB in this case)

+ Maria works with Outlook on two PCs, one at the office and one at home (she probably has nothing better to do at home!). On Monday morning she reads her e-mail at the office, and on Monday evening she can work on the same items at home. On Tuesday morning she can't read anymore the same stuff at the office PC!! What's happened?
- She downloaded her e-mail in a local personal folder at home

+ Your network is split into 4 segments, one at 100 Mbit with no users on it, the second at 10 Mbit with 100 users, the 3rd at 10 Mbit with 25 users, the 4th I can't remember (but worse than the others). Where would you put your Exchange Server?
- In the 100 Mbit segment (this is a real-life situation!)

+ You want to configure replication between two sites using an X.400 Connector, keeping the administration of one site separate from each other. What kind of trust relationship do you need?
- No trust relationships at all. Both of the administrators configure the connector at their own side (and site!).

+ The Users domain need to access their mailboxes in the Resources domain. What's the trust needed?
- The Resources domain must trust the Users domain.

+ Your Exchange server crashes attempting to start the Information store service. What should you do?
- Run "Isinteg -patch".

+ Two (almost identical) situation questions about firewalls. They had  very tricky TCP port configurations and lots of requirements, including secure LDAP access, but both of them didn't satisfy the required result (one allowing anonymous access and the other LDAP access through port 389 instead of LDAP+SSL port)

+ Some disaster recovery questions, you should know the different types of backup very well. Remember that if you do a Normal (Full) backup during the weekend and Incremental daily backups during the week, if you lose one of these (e.g. on Tuesday), then you can't use all the following for that week because you can't keep track of the Transaction log.

You manage two NT domains named Personnel and Resources. The Personnel domain contains all user accounts, while the Resources domain contains all servers. You will be installing Microsoft Exchange Server into the Resources domain. You would like to use the NT user accounts in the Personnel domain with mailboxes on the Exchange server. What type of trust relationship must be established between the two domains?

  1. Personnel domain trusts Resources domain
  2. Resources domain trusts Personnel domain
  3. No trust relationship is needed <answer>

A user named Bill leaves your company due to scandals. Management would like a user named Al to assume his responsibilities. What could you do so that Al can receive Bill’s e-mail messages?

  1. Make Al’s mailbox an alternate recipient for Bill’s mailbox. <answer>
  2. Disable Bill’s user account and give Al profile permission to access Bill’s mailbox.
  3. Delete Bill’s mailbox and forward all undeliverable messages to Al.
  4. Create a rule in Bill’s mailbox to forward all of Bill’s mail to Al.

The aliases in your organization are formatted as first initial followed by last name. Management would like the format changed to last name followed by first initial. You also want all new aliases to use this new format. What must you do? (Choose two)

  1. disable autonaming
  2. reset one-off addressing
  3. modify all existing aliases <answer>
  4. modify alias name generation to be %Last%1First. <answer>

You are using the import utility of Microsoft Exchange Admin to modify a large number of existing mailboxes. You want to add an area code to the Telephone-Office2 field of each of these mailboxes. The export information of one of these recipients is listed below:

Obj-Class, Alias Name, Display Name, Telephone-Office1, Telephone-Office2

Mailbox, Mpeterson, Mary Peterson, 801-333-4343, 333-5654

Which field or fields must you include in your import file in order to add an area code to the Telephone-Office2 field? (Choose all that apply)

  1. Mode
  2. Obj-Class
  3. Alias name
  4. Display Name
  5. Telephone-Office1
  6. Telephone-Office2

Answer is A, B, C, F

You have created a Microsoft Exchange client network installation point on one of your servers. You want to predetermine the client settings in order to create a standard installation. What do you need to do predefine the user settings of the Exchange client?

  1. edit DEFAULT.PRF and copy this file to the installation share point. <answer>
  2. edit DEFAULT.PRF and copy this file to each user’s home directory.
  3. Edit TEMPLATE.PRF and copy this file to the installation share point.
  4. Edit TEMPLATE.PRF and copy this file to each user’s home directory.

Clients on your network use both ipx and tcpip. But for your MS Outlook installation for 32-bit clients, you want them to only use IPX. What file would you have to modify?

  1. outlook.prf
  2. default.prf
  3. exchng.stf
  4. outlook.stf <answer>

Your network has hundreds of users. You have just installed Microsoft Exchange Server on five servers. You would like clients to connect to this one server and perform an over-the-network installation. But you would like the clients to have the option during their installations to select any of the five Exchange servers. How would you do that?

  1. Leave the Exchange Server field blank in DEFAULT.PRF.
  2. Enter "any" in the Exchange Server field in DEFAULT.PRF.
  3. Delete the Exchange Server field in DEFAULT.PRF.
  4. Configure separate shares for each server and set the default in DEFAULT.PRF accordingly. <answer>

If you wanted all new client installations to be configured to use ipx and not use tcp/ip, you would perform which action?

  1. Use Setup Editor to remove tcp/ip from the RPC binding order. <answer>
  2. Do nothing, that is already the default.
  3. This can not be done.
  4. Run SETUP.EXE /A

A user named Jane uses Microsoft Outlook on both her office computer and her home computer. One night at home, Jane connects to her office server in order to read her mail. The next day at the office when Jane attempts to re-read the previous day’s mail, there are no messages in her inbox. What is the most likely cause of this situation?

  1. Jane’s mail was delivered to an OST file on her home computer.
  2. Jane’s home computer is still logged on to the server.
  3. Jane did not synchronize her mailbox with the server.
  4. Jane’s mail was delivered to a PST file on her home computer. <answer>

When adding a Microsoft Exchange Server to an existing site, which two pieces of information do you need to know?

  1. The name of an existing Exchange Server in that site and the password for the site service account in that site. <answer>
  2. Organization name and site name.
  3. Site name and administrator’s user account.
  4. Organization name and administrator’s user account.

Patty has a laptop computer that she uses both at the office and when out of office doing work. Her laptop is configured with an OST file. She routinely synchronizes her laptop computer with the office server. Patty has identified a public folder that she would like to designate as an offline folder, but she does not see the Synchronization tab among the property pages of that public folder. What does she have to do to enable synchronization with that public folder?

  1. The administrator must configure that public for synchronization.
  2. The owner of the folder must configure it for synchronization.
  3. Patty must designate the public folder as a Favorite folder. <answer>
  4. Patty must logoff the server, and the folder will synchronize.

You will be using a scripted installation to setup a number of Microsoft Exchange Client applications. You will use Setup Editor to modify EXCHNG.STF. Even though all workstations use both TCP/IP and IPX, you want clients to use only IPX when connection to their Microsoft Exchange servers. What should you do to accomplish that configuration?

 

  1. Remove TCP/IP from the RPC binding order in the installation script. <answer>
  2. Remove TCP/IP from all workstations.
  3. Unbind TCP/IP from workstation network adapters.
  4. Unbind TCP/IP from the Microsoft Exchange server network adapter.

 

Your network uses IPX as its only network protocol. Your Microsoft Exchange Server has two network adapters. One adapter is connected to the internal LAN and uses IPX. The other adapter is connected to an outside WAN and uses TCP/IP. Users on the internal LAN use Microsoft Outlook to connect to the Microsoft Exchange Server. When these users attempt to connect to the Microsoft Exchange Server, it takes up to 10 minutes to connect and to send mail. What can be done to reduce the time to connect and send mail?

 

  1. Bind TCP/IP to the network adapter of each client computer.
  2. Bind TCP/IP to the internal network adapter of the Microsoft Exchange Server.
  3. Change the RPC binding order on the Microsoft Exchange Server.
  4. Change the RPC binding order on each client computer. <answer>

 

An IMAP4 client connects to your Exchange server and receives an error message stating that the message size is unknown. Which of the following should you do to fix this problem?

 

  1. Enable MCIS.
  2. Increase the Idle-Timeout.
  3. Use Plain-Text authentication.
  4. Clear the "Enable fast message retrieval" check box. <answer>

 

Your organization contains two interconnected networks and corresponding Exchange sites named Accounting and Research. Both networks use IPX and TCP/IP. The X.400 Connector is used to connect two sites. No directory replication is configured between the sites. Your Exchange servers have LDAP enabled. The users in the Accounting site report that they cannot access the LDAP directory. You find out that all the users in the Accounting network use only IPX. What can be done to allow the Accounting users to access the LDAP directory?

 

  1. Configure directory replication.
  2. Configure the Site Connector.
  3. Install TCP/IP on all the Exchange servers in the Accounting site.
  4. Install TCP/IP on all the client computers in the Accounting site. <answer>

 

 

How can you restrict anonymous LDAP access to directory properties of recipients, but still allow Web clients with authenticated names to access those properties?

 

  1. Disable HTTP at the site.
  2. Disable anonymous access through the LDAP object. <answer>
  3. Define the Guest account as the anonymous account.
  4. Temporarily disable LDAP.

 

Two organizations, Organization A and Organization B, need a long-term coexistence strategy. How could you allow LDAP clients to connect to Organization A and see the directories of both Organization A and Organization B?

 

  1. Directory replication.
  2. Anonymous access.
  3. Select Organization B as the default LDAP referral for Organization A. <answer>
  4. Select Organization A as the default LDAP referral for Organization B.

 

Management has decided to allow company access to various newsgroups. Your Internet Service Provider can provide full newsgroup access, but they do not configure newsfeeds on a customer-by-customer basis. How would you configure the transfer of the newsfeeds?

 

  1. No transfer type is necessary.
  2. Configure it for both push and pull.
  3. Configure it for a push transfer only.
  4. Configure it for a full transfer only. <answer>

 

Your Exchange server is using TCP/IP and is configured with LDAP, HTTP, and POP3. A firewall sits between your network and the Internet. Your Exchange server has its name and IP address entered into a public DNS server on the Internet.

 

Your network’s firewall prohibits traffic on all ports that are not explicitly allowed. The ports that are open are port 25 (SMTP), port 53 (DNS), port 80 (HTTP), and all ports greater than port 1023.

 

Management would like users to be able to connect over the Internet to your Exchange server using Microsoft Outlook and LDAP applications. Policy dictates that passwords be transmitted in a secure manner.

 

 

Optional Results

While not required, management would like to Web clients that do not support Windows NT Challenge/Response authentication to be able to connect to your Exchange server. Another wish is that POP3 clients could connect to the Exchange server and download their messages.

 

 

Proposed Course of Action

  1. Assign port numbers to the Exchange Directory Service and Information Store. Then allow those ports through the firewall.
  2. Configure LDAP on the Exchange server to allow anonymous access.
  3. Configure the Exchange protocols to use SSL as an authentication method.
  4. Allow SSL traffic through the firewall.
  5. Allow LDAP traffic (port 389) through the firewall.
  6. Allow RPC traffic (port 135) through the firewall
  7. All POP3 traffic (port 110) through the firewall.

 

What result does the proposed solution produce?

 

  1. The proposed solution produces the required results and the optional results. <answer>
  2. The proposed solution produces the required results and produces only one of the optional results.
  3. The proposed solution produces the required results but does not produce either of the optional results.
  4. The proposed solution does not produce the required results.

 

If you wanted to prevent anonymous users using LDAP from seeing a particular Exchange attribute, like telephone numbers, where in the Exchange hierarchy would you have to go to prevent this?

  1. Information Store Site Configuration.
  2. Encryption object.
  3. Directory Replication object
  4. DS Site Configuration. <answer>

 

If you wanted to reject certain IP address of Web clients from accessing your Exchange server, what program would you use?

 

  1. Microsoft Exchange Administrator
  2. Network applet in Control Panel
  3. Internet Service Manager <answer>
  4. Link Monitor

 

You have been asked as the Exchange administrator to set the default display names to LastName FirstName, such as Smith John. Where do you configure that setting?

 

  1. The properties of each object.
  2. Only on the properties of individual mailboxes.
  3. Organization properties.
  4. Auto Naming property page of the Exchange Administrator program. <answer>

 

Your organization has multiple Exchange servers. Currently, when users create public folders, they are placed on Server A. After monitoring that server, you notice that its hard disks is almost full. You move all those public folders to Server B. How can you ensure that all future folders will be created on Server B?

 

  1. Delete all new replicas on Server A
  2. Configure Server B as the public folder server for all recipients on Server A. <answer>
  3. Use Microsoft Exchange Performance Optimizer to configure Server A as only a private information store server.
  4. Restrict top-level folder creation on Server A.

 

Deleted Item Retention is enabled on a mailbox. What happens to items when they are deleted?

 

  1. They become hidden objects in the IS. <answer>
  2. They are placed in TEMP.EDB.
  3. They go to the Recycle bin on the local computer.
  4. They are placed in a Personal folder on the local computer.

 

You have your Exchange server backed up using an offline backup procedure. After a hardware failure of that server, you restore the server using the offline backup tapes. But after the restore is complete, the IS will not start. What do you need to do?

 

  1. Run EDBUTIL.
  2. Run EDBUTIL with the consistency option.
  3. Run SCANPST on each user’s OST file.
  4. Run ISINTEG – Patch. <answer>

 

Your organization has an Exchange server with two disk controllers and hard drives. One hard drive contains the IS databases, the other hard drive has the transaction log files. Circular logging is disabled. One day one of the disk controllers malfunctions and corrupts the IS databases. You made a full backup four days ago, and did three incremental backups since then. The hardware failure took place 12 hours after the last incremental backup. What information can be restored?

 

  1. Only the information stored after the last full backup but prior to the last incremental backup.
  2. All information stored prior to the last time the logs were updated. <answer>
  3. Only the information stored prior to the last full backup.
  4. Only the information stored after the last incremental backup.

 

Your organization performs a complete backup every weekend. You have been asked to add a plan to also backup the system every weekday evening with all the changes made since the weekend backup. You also want to minimize the time it takes to restore a system from the backups. How would you configure Microsoft Windows NT Backup?

 

  1. Set the weekend backup type to Normal. Set each weekday backup type to Incremental.
  2. Set the weekend backup type to Normal. Set each weekday backup type to Differential. <answer>
  3. Set the weekend backup type to Copy. Set each weekday backup type to Incremental.
  4. Set the weekend backup type to Copy. Set each weekday backup type to Differential.

 

You are formulating a backup strategy for your company. The computer that will be your Exchange server has two hard drives of equal capacity, with one of the drives significantly faster than the other.

 

 

Required result: A requirement of the backup strategy is to perform a complete backup every night.

 

 

Optional Result 1: Restore all files at the moment of failure.

 

Optional Result 2: Minimize server response times for users.

 

 

Proposed Solution:

 

What results does this strategy produce?

  1. The required result and both optional results (this is the answer if circular logging is disabled)
  2. The required result and only one of the optional results. <answer>
  3. The required result and neither of the optional results.
  4. Does not produce the required result.

 

Your company has had problems with Exchange disk drives becoming full and stopping the IS service. What could you do to receive a warning before the IS reaches its limit again?

  1. Configure Microsoft Windows NT Performance Monitor to send you an email message when the Push Notification Cache Size has reached 100 percent.
  2. Configure Microsoft Windows NT Performance Monitor to send you an email message when the available disk space gets low. <answer>
  3. Configure Microsoft Windows NT Server Monitor to send you a Microsoft Windows NT alert before the IS service stops.
  4. Configure Microsoft Windows NT Server Monitor to send you an email message before the IS service stops.

 

You want to use an X.400 Connector to send messages to a foreign mail system (i.e., a mail system not part of your organization). The computer name of your X.400 Connector bridgehead is 16 characters in length. But the foreign mail will only accept names up to 8 characters. What can you do to remedy this situation?

  1. There is nothing you can do.
  2. Specify a window size of 8.
  3. Add a custom recipient to the X.400 Connector.
  4. Enter an 8 character name in the Local MTA field on the Override page. <answer>

 

Your Exchange site uses custom attributes that should not be replicated to other sites. How would you configure your site to accomplish that?

  1. Specify only the custom attributes in the DS Site Configuration object.
  2. Configure the trust level of your recipients container to be higher than the recipient containers in the other sites.
  3. Configure the permissions on the Directory Replication Connector to be only for the Domain Admins group.
  4. Specify all attributes except the custom attributes in the DS Site Configuration object. <answer>

 

 

You will be installing two Exchange sites that will be connected with the X.400 Connector. You do not want administrators from one site to be able to administer the other site. What type of trust relationship, if any would have to be established and what amount of account information exchanged between the two sites?

  1. Establish a two-way trust relationship. No account information needs to be exchanged.
  2. Establish a one-way trust relationship in either direction. Both accounts must have the same name and password.
  3. No trust relationship is needed. No account information needs to be exchanged. <answer>
  4. No trust relationship is needed. Account and password information needs to be exchanged.

 

Your organization is made up of five Exchange sites. The five sites are connected using a mesh topology. X.400 Connectors are used to connect the sites. Each site also has an Internet Mail Service running. You want to make sure that all outgoing SMTP messages are only sent out of their sites through the IMS server, and not the X.400 Connector. Which of the following would accomplish this?

 

  1. Create an SMTP address space on each X.400 Connector. Assign a cost of 100 to each SMTP address space. <answer>
  2. Create an X.400 address space on each IMS. Assign a cost of 1 to each X.400 address space.
  3. Create an X.400 address space on each IMS. Assign a cost of 100 to each X.400 address space.
  4. Replace the existing address space on each IMS with SMTP address space. Assign a cost of 100 to each SMTP address space.

 

An IMS server sends mail to a Domain-A and a Domain-B. As IMS administrator, you begin to receive reports that Exchange email attachments sent to Domain-B have been arriving as unreadable text. You investigate and find out that the problem does not exist with attachments sent to Domain-A. You also find out that Domain-A uses MIME while Domain-B uses uuencode. How would you fix this problem?

  1. Use the Internet Mail property page and designate uuencode as the encoding method for Domain-B. <answer>
  2. Use the Internet Mail property page and designate MIME as the encoding method for Domain-A.
  3. Configure Domain-B as SSL
  4. Configure IMS for SASL.

 

Your Exchange environment uses IMS to send and receive SMTP mail with a company named Sockets & Wrenches. Sockets & Wrenches uses a host-based SMTP mail system. When users on your system send mail to the name of the host at Sockets & Wrenches, it is not delivered. But if those users use an IP address for addressing, the mail is delivered. You are informed that other systems can send mail to S & W using a host name in the addressing. What should you do to enable your users to be able to send mail to S & W using a host name in the addressing? (Select the best answer.)

 

  1. Configure a DNS server in the TCP/IP network configuration on your server. <answer>
  2. Configure a HOSTS file on each client.
  3. Configure an LMHOSTS file on each client.
  4. Configure IMS to forward all mail to Sockets & Wrenches.

An Exchange user, Anita, sends a message through the Internet to another Exchange user named Brooks at Brooks@sprockets.com. anita receives an NDR stating "Recipient not found: SPROCKETS.COM." You confirm that Brook’s mailbox is configured with the email address SMTP:Brooks@sprockets.com. What is the likely problem?

  1. Anita’s mailbox is not configured with TCP/IP.
  2. Anita has exceeded her mailbox size.
  3. Anita’s Internet Mail Service has exceeded its licenses.
  4. The host sprockets.com is not entered in DNS. <answer>

Your company has both Microsoft Exchange Server and MS Mail. There will eventually be a migration from Mail to Exchange, but right now you need to come up with a coexistence strategy. Part of that strategy is to make a global distribution list available that contains recipients from both systems. How could you do that?

  1. Create both an MS Mail distribution list that includes all MS Mail users and an Exchange distribution list that includes all Exchange users. Create an Exchange distribution list that includes the both the MS Mail DL and the Exchange DL. <answer>
  2. Create Internet Mail Connectivity between the two systems. Create SMTP custom recipients for each Microsoft Mail user. Create a DL that includes Exchange users and SMTP custom recipients.
  3. Configure directory synchronization between the two systems. After synchronization has taken place, create a master distribution list on the MS Mail post office.
  4. Configure directory synchronization between the two systems. After synchronization has taken place, create a master distribution list on the Exchange Server.

Your company currently uses Microsoft Mail. You have just added an Exchange server to the network. Management would like both systems to coexist and be able to exchange both messages and directory information. Management would also like to keep the current dirsync strategy. You consequently configure the Exchange server as a dirsync requestor. What other stop must you do on the Exchange server?

  1. Create a dirsync server on the Exchange Server.
  2. Configure the Microsoft Mail Connector on the Exchange Server. <answer>
  3. Create a directory replication bridgehead server.
  4. Reinstall MTA.

Your company is made up of two domains, one includes MS Mail and the other has Exchange. Each domain and its message system has about half the users. There are no trust relationships between the two domains. A Microsoft Exchange recipient named Robert uses Microsoft Schedule+ 7.5 to create an appointment that includes a Microsoft Mail user named Shelley. When Robert views the Planner tab, he cannot see Shelley’s availability. But Robert can send e-mail to Shelley. What do you need to allow Robert to view Shelley’s availability?

  1. Establish a two-way trust between the domains.
  2. Delete and re-create the Microsoft Schedule+ Free/Busy public folder.
  3. Relocate the Microsoft Mail post office to the same machine as the Exchange server.
  4. Configure the Microsoft Schedule+ Free/Busy Connector. <answer>

Your Microsoft Exchange Server is configured as a dirsync server and has remote dirsync requestors defined. You configure the synchronization time on the Exchange server to Always. Three hours later, you notice that Microsoft Mail recipients have not yet replicated to your Exchange Global Address List. What is the solution to this problem?

  1. In Microsoft Mail, set the T1, T2, and T3 times to be the same.
  2. Set the T2 time on the Microsoft Exchange Server to be one hour later than the T2 time in Microsoft Mail.
  3. Run the REQMAIN utility with the transport option on the Microsoft Mail post office. <answer>
  4. Run the REQMAIN utility with the Receive option on the Microsoft Exchange Server.

The MS Mail directory synchronization parameter used by a dirsync server to recompile the Global Address List is:

  1. T1
  2. T2 (answer)
  3. Newsfeed push
  4. T3

You are implementing a migration from Microsoft Mail to Microsoft Exchange. You have just completed the first step in a two-step migration. If you wanted to modify the existing naming convention during the second step in the migration, what file would you have to modify?

  1. Packing list file.
  2. Primary file
  3. Secondary file
  4. Migration log file

The first step in a two-step migration has already taken place. The csv file contains directory information on 2200 users. What would be the most efficient way to modify all of the recipient display names?

  1. Complete the migration, and then use the Microsoft Exchange Administrator to modify the display names.
  2. Edit the CSV file, and then continue with the second phase of the migration. <answer>
  3. Run the first step of the Migration Wizard again and this time modify the names.
  4. Run the second step of the Migration Wizard and modify the names during that process.

Which of the following can be used to modify a large number of Exchange recipients in a bulk manner?

  1. Performance Monitor
  2. User Manager for Domains
  3. Directory Import and Export <answer>
  4. Event Viewer

You will be installing a Microsoft Exchange Server and must decide what network segment to place it on. There are four network segments (A, B, C, D), all backboned on an Ethernet switch. Segment A is at 100 Mbps and has zero users. Segment B is at 10Mbps and has 125 users. Segment C is at 10Mbps and has 75 users. Segment D is at 10Mbps and has 150 remote users. What segment would you place the Exchange server on?

  1. Segment A <answer>
  2. Segment B
  3. Segment C
  4. Segment D
1