3 Months Free Update
3 Months Free Update
3 Months Free Update
You must prevent HelpDeskUser1 from repeating the same mistake.
You need to identify which management role provided HelpDeskUser1 with the necessary permissions to make the mistake identified in the problem statement.
Which two cmdlets should you run? Each correct answer presents part of the solution.
Joni Sherman reports that the Microsoft Outlook client on her Windows 10 device fails to start.
You need to troubleshoot the issue.
From the device, you start the Microsoft Remote Connectivity Analyzer.
What should you run next?
You need to email a list of configuration changes to the Exchange Online environment that were recently performed by Allan Deyoung.
What should you do?
Lynne Robbins and the users in the sales department plan to collaborate on a project with a partner company named Contoso, Ltd. that has an email domain named contoso.com.
You need to ensure that only the sales department users can share all their calendar free/busy
information with the users in contoso.com.
How should you configure the organization relationship?
You need to ensure that Allan Deyoung can create a new public folder for the sales department.
Which two actions should you perform first? Each correct answer presents part of the solution.
NOTE: Each correct selection is worth one point.
You need to implement a solution to support the planned changes for the branch office administrators.
What should you do?
You need to migrate 10 Microsoft Outlook.com users to the adatum.com tenant.
Which type of migration should you perform, and which items can be migrated? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
You need to resolve the issue for the transport department users.
What is the best way to achieve the goal? More than one answer choice may achieve the goal. Select the
BEST answer.
You need to recommend a procedure for closing the Brussels office that meets the technical requirements.
What should you recommend?
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
NOTE: Each correct selection is worth one point.
You need to identify the contents of the FabrikamProject public folder to meet the technical requirements.
Which PowerShell cmdlet should you run?
You need to configure the required objects for the branch office administrators.
What should you create for each administrator?
You discover that email messages sent to contoso.com are NOT delivered through Contoso Connector.
You need to ensure that all email sent to contoso.com is delivered through Contoso Connector.
Which connector setting should you modify?
Allan Deyoung must perform a message trace of the email messages sent by Isaiah Langer and provide a report that contains all the messages sent during the last 30 days.
You need to ensure that Allan Deyoung can perform the message trace.
What should you do?
You need to resolve the issue for the customer service department users.
What should you modify?
You need to implement a solution that meets the technical requirements for the retention of junk email, sent items, and deleted items.
What is the minimum number of retention policies and retention tags you should use? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
You need to implement a solution to support the planned changes for the helpdesk users.
What should you do?
You need to recommend a solution to retain the items in the public folders. The solution must support the
planned changes.
What should you recommend?
You need to configure the Exchange organization to meet the security requirements for sending email messages to distribution groups.
Which cmdlet should you run?
You need to ensure that In-Place Archiving is enabled for the marketing department users.
Which user should perform the change, and which tool should the user use? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
You need to modify FilesPolicy to prevent users from downloading ASPX files. The solution must meet the technical requirements.
How should you complete the command? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
You need to configure the new smartboard to support the planned changes.
Which three settings should you configure? To answer, select the appropriate settings in the answer area.
NOTE: Each correct selection is worth one point.
You need to identify which users clicked the links in the phishing emails.
What should you do?
User3 leaves the company.
You need to ensure that Admin1 and Admin2 can access the mailbox of User3. The solution must meet the technical requirements.
What should you do?
You need to encrypt email between Fabrikam and Litware to support the planned changes.
What should you configure in the Exchange admin center?
You need to generate a report for the mobile devices that meets the technical requirements.
Which PowerShell cmdlet should you use?
How many default policy tags (DPTs), retention policy tags (RPTs), and personal tags should you create to meet the retention requirements? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
You need to perform a remote wipe of the devices of User2 and User3.
You run the following commands.
Clear-MobileDevice -id User2-Device
-NotificationEmailAddress "admin@Fabrikam.com"
Clear-MobileDevice -id User3-Device
-NotificationEmailAddress "admin@Fabrikam.com"
What occurs on each device? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
You need to implement a solution to meet the technical requirements for the SCL.
How should you complete the command? To answer, select the appropriate options in the answer area.
SIMULATION
Please wait while the virtual machine loads. Once loaded, you may proceed to the lab section. This may take a few minutes, and the wait time will not be deducted from your overall test time.
When the Next button is available, click it to access the lab section. In this section, you will perform a set of tasks in a live environment. While most functionality will be available to you as it would be in a live environment, some functionality (e.g., copy and paste, ability to navigate to external websites) will not be possible by design.
Scoring is based on the outcome of performing the tasks stated in the lab. In other words, it doesn't matter how you accomplish the task, if you successfully perform it, you will earn credit for that task.
Labs are not timed separately, and this exam may have more than one lab that you must complete. You can use as much time as you would like to complete each lab. But, you should manage your time appropriately to ensure that you are able to complete the lab(s) and all other sections of the exam in the time provided.
Please note that once you submit your work by clicking the Next button within a lab, you will NOT be able to return to the lab.
Use the following login credentials as needed:
To enter your username, place your cursor in the Sign in box and click on the username below.
To enter your password, place your cursor in the Enter password box and click on the password below.
Microsoft 365 Username: admin@abc.com
Microsoft 365 Password: xxxxxx
If the Microsoft 365 portal does not load successfully in the browser, press CTRL-K to reload the portal in a new browser tab.
The following information is for technical support purposes only.
Lab Instance: XXXXXX
You need to ensure that a user named Lee Gu can view all the Exchange Online configurations of your organization. The solution must use the principle of least privilege.
To complete this task, sign in to the Microsoft 365 admin center.
You have a Microsoft Exchange Server 2019 organization.
You need to ensure that all email is retained for one year, and then moved to an archive mailbox.
What should you use?
You have a Microsoft Exchange Online tenant.
You need to ensure that all new mailboxes can send and receive messages that are up to a maximum of 50 MB.
What should you do in the Exchange admin center?
You have a Microsoft Exchange Online tenant named contoso.com.
Email messages from a remote domain named fabrikam.com are received from a server that uses a wildcard certificate for fabrikam.com and are encrypted by using TLS.
Fabrikam.com is switching to a third-party cloud filtering service for inbound and outbound email. The IP address used by the third-party service is 131.107.200.10.
You need to reconfigure the connector to only accept messages from fabrikam.com that are encrypted and received from the third-party service.
Which two settings should you modify for the connector? To answer, select the appropriate settings in the answer area.
NOTE: Each correct selection is worth one point.
You have an on-premises Microsoft Exchange Server 2019 organization that contains a server named Server! and uses an email address of contoso.com. You purchase a Microsoft 365 subscription.
You plan to use the Hybrid Configuration wizard to configure a hybrid deployment between Exchange Online and the on-premises Exchange organization. You need to configure a certificate request from a public certification authority (CA).
How should you configure the values of the subject name and the subject alternative name (SAN) for the certificate? To answer, select the appropriate options in the
answer area.
NOTE: Each correct selection is worth one point.
You have a Microsoft Exchange Server 2019 organization.
You have the Address Book Policies (ABP) and address lists in the following table.
You have the users in the following table.
You assign ABP1 to User1 and User2.
User3 is NOT assigned to an Address Book Policy.
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
NOTE: Each correct selection is worth one point.
You have a Microsoft Exchange Online tenant that contains a user named Used.
User1 leaves your company.
You need to convert the mailbox of User1 into an inactive mailbox before deleting the user account
Which type of policy should you assign to the mailbox?
You have a Microsoft Exchange Server 2019 hybrid deployment.
You are migrating mailboxes from the on-premises organization to Exchange Online.
From the Exchange admin center, you create a new migration batch that includes 25 mailboxes, and then you select Manual Complete the batch.
Later, you must complete the migration of a mailbox named user1@litware.com in the batch as soon as possible. You discover that the status of the migration batch is Syncing, but the status of the move request for user1@litware.com is Synced.
You need to complete the migration of the user1@litware.com mailbox to Exchange Online as soon as possible.
How should you complete the command? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
You have a Microsoft Exchange Online tenant.
A user reports that an expected email message from an internet recipient was never delivered, and the sender never received a non-delivery report (NDR).
You need to troubleshoot inbound message delivery to meet the following requirements:
• Verify DNS and MX connectivity for the target domain.
• Verify whether the message was quarantined.
What should you use for each requirement? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point.
Your company has a Microsoft Exchange Server 2019 hybrid deployment.
Users in the advertising department and the editorial department of the company have mailboxes in Exchange Online.
A company policy requires that the advertising department users and the editorial department users be
segmented based on the following requirements:
You need to recommend a solution that meets the requirements and minimize costs and effort.
What should you recommend?
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
Your company has a Microsoft 365 subscription.
Several users in the finance department of the company recently accessed unsafe websites by clicking on links in email messages.
Users in the marketing department of the company report that they must be able to access all the links embedded in email messages.
You need to reduce the likelihood of the finance department users accessing unsafe websites. The solution must affect only the finance department users.
Solution: You modify the Global Settings Safe Links policy.
Does this meet the goal?
Please wait while the virtual machine loads. Once loaded, you may proceed to the lab section. This may take a few minutes, and the wait time will not be deducted from your overall test time.
When the Next button is available, click it to access the lab section. In this section, you will perform a set of tasks in a live environment. While most functionality will be available to you as it would be in a live environment, some functionality (e.g., copy and paste, ability to navigate to external websites) will not be possible by design.
Scoring is based on the outcome of performing the tasks stated in the lab. In other words, it doesn't matter how you accomplish the task, if you successfully perform it, you will earn credit for that task.
Labs are not timed separately, and this exam may have more than one lab that you must complete. You can use as much time as you would like to complete each lab. But, you should manage your time appropriately to ensure that you are able to complete the lab(s) and all other sections of the exam in the time provided.
Please note that once you submit your work by clicking the Next button within a lab, you will NOT be able to return to the lab.
Use the following login credentials as needed:
To enter your username, place your cursor in the Sign in box and click on the username below.
To enter your password, place your cursor in the Enter password box and click on the password below.
Microsoft 365 Username: admin@abc.com
Microsoft 365 Password: xxxxxx
If the Microsoft 365 portal does not load successfully in the browser, press CTRL-K to reload the portal in a new browser tab.
The following information is for technical support purposes only.
Lab Instance: XXXXXX
You need to reduce the likelihood that malicious links contained in emails received by mailboxes in @lab.CloudCredential(1).TenantName are opened.
To complete this task, sign in to the Exchange admin center.
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
Your company has a Microsoft 365 subscription.
Several users in the finance department of the company recently accessed unsafe websites by clicking on links in email messages.
Users in the marketing department of the company report that they must be able to access all the links embedded in email messages.
You need to reduce the likelihood of the finance department users accessing unsafe websites. The solution must affect only the finance department users.
Solution: You modify the content filtering settings.
Does this meet the goal?
Please wait while the virtual machine loads. Once loaded, you may proceed to the lab section. This may take a few minutes, and the wait time will not be deducted from your overall test time.
When the Next button is available, click it to access the lab section. In this section, you will perform a set of tasks in a live environment. While most functionality will be available to you as it would be in a live environment, some functionality (e.g., copy and paste, ability to navigate to external websites) will not be possible by design.
Scoring is based on the outcome of performing the tasks stated in the lab. In other words, it doesn't matter how you accomplish the task, if you successfully perform it, you will earn credit for that task.
Labs are not timed separately, and this exam may have more than one lab that you must complete. You can use as much time as you would like to complete each lab. But, you should manage your time appropriately to ensure that you are able to complete the lab(s) and all other sections of the exam in the time provided.
Please note that once you submit your work by clicking the Next button within a lab, you will NOT be able to return to the lab.
Use the following login credentials as needed:
To enter your username, place your cursor in the Sign in box and click on the username below.
To enter your password, place your cursor in the Enter password box and click on the password below.
Microsoft 365 Username: admin@abc.com
Microsoft 365 Password: xxxxxx
If the Microsoft 365 portal does not load successfully in the browser, press CTRL-K to reload the portal in a new browser tab.
The following information is for technical support purposes only.
Lab Instance: XXXXXX
You need to ensure that all email messages received from an organization named contoso.com are encrypted by using TLS.
To complete this task, sign in to the Microsoft 365 admin center.