Certification Provider: Microsoft
Exam Name: Designing and Deploying Microsoft Exchange Server 2016
Exam Code: 70-345
Official Exam Time: 150 mins
Number of questions in the Official Exam: 40-60 Q&As
Latest update time in our database: September 24,2023
70-345 Official Exam Topics:
  • Topic1 : Plan, Deploy, Manage, and Troubleshoot Mailbox Databases
  • Topic2 :  Identify failure domains; plan a solution that meets SLA requirements around scheduled downtime; plan for software updates and server maintenance; plan for change management; create, configure, and manage Database Availability Groups (DAG); create, configure, and manage DAG networks; create, configure, and manage proper placement of a file share witness (FSW); create and configure mailbox database copies; create, configure, and manage Azure file share witness (FSW); create, configure, and manage Azure DAG members / Plan, deploy, and manage a site-resilient Database Availability Group (DAG)
  • Topic3 :  Monitor mailbox database replication and content indexing; troubleshoot mailbox database replication and replay; troubleshoot mailbox database copy activation; troubleshoot mailbox database performance; troubleshoot database failures (e.g., repair, defrag, recover); resolve quorum issues; troubleshoot data center activation / Plan, deploy, and manage backup and recovery solutions for mailbox databases
  • Topic4 : Plan, Deploy, Manage and Troubleshoot Client Access Services / Plan, deploy, and manage Client Access services
  • Topic5 : Plan, deploy and manage mobility solutions / Plan, deploy, and manage load balancing
  • Topic6 : Plan, Deploy, Manage, and Troubleshoot Transport Services / Plan, deploy, and manage transport services
  • Topic7 :  Plan a solution that meets SLA requirements around message delivery; plan inter-site mail flow; plan inter-org mail flow; plan, deploy and configure redundancy for intra-site scenarios; plan and configure for SafetyNet; plan and configure for shadow redundancy; plan and configure for redundant MX records; plan, create, and configure TLS transport, Edge transport, Send/Receive connectors, transport rules, accepted domains, email address policies and Address Rewriting / Troubleshoot and monitor transport services
  • Topic8 : Plan and configure Active Directory (AD) Domain Services for Exchange and Organizational settings / Plan, deploy, manage, and troubleshoot Role Based Access Control (RBAC)
  • Topic9 : Plan, deploy, manage, and troubleshoot IRM with Active Directory Rights Management Services (AD RMS) or Azure RMS /  Plan and configure Information Rights Management (IRM) in Exchange, create an RMS template, plan and create transport protection rules, plan and create Outlook protection rules, plan and configure journal report decryption, plan and configure IRM for eDiscovery, plan and configure pre-licensing for client access, troubleshoot failed IRM protection
  • Topic10 : Plan, configure, and manage Archiving and Message Records Management (MRM) /  Plan and configure retention policies; plan, create, and configure custom tags; assign policies to users; plan and configure the Managed Folder Assistant; remove and delete tags; plan and configure online archiving (Office 365); plan and create archive policies; plan and configure in-place archiving
  • Topic11 :  Plan and configure mailbox audit logging, plan and configure administrative audit logging, search and interpret all audit logs / Plan, deploy, and troubleshoot coexistence with Office 365 (Exchange Online)
  • Topic12 : Plan, deploy, and troubleshoot on-premises coexistence with earlier supported versions of Exchange /  Plan, create, and configure namespaces for coexistence; plan and configure proxy redirect; plan firewall configuration for coexistence; plan and configure for mail flow requirements; plan for mailbox migrations; troubleshoot transport in coexistence; troubleshoot client access in coexistence
  • Topic13 : Migrate from earlier supported versions of Exchange /

What should you identify?

HOTSPOT

You are designing an Exchange Server 2016 organization. The organization will use a single namespace of mail.contoso.com for all client access protocols. You plan to use load balancers.

You identify the following requirements for the load balancing solution:

• The Edge Transport server log files must contain the original IP address of the SMTP hosts.

• Clients must be able to connect only when they use the approved hostnames and the approved virtual directories.

You need to identify which type of load balancer meets each requirement.

What should you identify? To answer, select the appropriate options in the answer area.

Answer:

What should you add to DNS?

Your company has a data center. The data center contains a server that has Exchange Server 2016 and the Mailbox server role installed. Outlook anywhere clients connect to the Mailbox server by using the name outlook.contoso.com.

The company plans to open a second data center and to provision a database availability group (DAG) that spans both data centers.

You need to ensure that Outlook Anywhere clients can connect if one of the data centers becomes unavailable.

What should you add to DNS?
A . one A record
B . two TXT records
C . two SRV records
D . one MX record

Answer: A

Explanation:

References: https://technet.microsoft.com/en-gb/library/dd638104(v=exchg.150).aspx?f=255&MSPPError=-2147217396

Which load balancing solution should you recommend?

You need to recommend a load balancing solution that meets the availability requirements.

Which load balancing solution should you recommend?
A . a Layer-7 load balancer with a single namespace and without session affinity
B . a Network Load Balancing (NLB) cluster
C . DNS round robin
D . a Layer-4 load balancer with multiple namespaces and without session affinity

Answer: A

Explanation:

From Scenario:

Contoso identifies the following high-availability requirements for the planned deployment: The network load balancer must be able to probe the health of each workload.

Load balancers that work on the Layer 7 of OSI model are intelligent. Layer 7 load balancer is aware of the type of traffic passing through it. This type of load balancer can inspect the content of the traffic between the clients and the Exchange server. From this inspection, it gets that results and uses this information to make its forwarding decisions. For example, it can route traffic based on the virtual directory to which a client is trying to connect, such as /owa, /ecp or /mapi and it can use a different routing logic, depending on the URL the client is connecting to. When using a Layer 7 load balancer, you can also leverage the capabilities of Exchange Server 2016 Managed Availability feature. This built-in feature of Exchange monitors the critical components and services of Exchange server and based on results it can take actions.

Note: Layer 7 load balancer can use this to detect functionality of critical services, and based on that information decide if it will forward client connections to that node. If the load balancer health check receives a 200 status response from health check web page, then the service or protocol is up and running. If the load balancer receives a 403 status code, then it means that Managed Availability has marked that protocol instance down on the Mailbox server.

Although it might look that load balancer actually performs a simple health check against the server nodes in the pool, health check web page provides an information about workload’s health by taking into account multiple internal health check probes performed by Managed Availability.

Incorrect Answers:

D: Load balancers that work on Layer 4 are not aware of the actual traffic content being load balanced.

References: http://dizdarevic.ba/ddamirblog/?p=187

Which two actions should you perform?

You have a computer named Computer1 that runs Windows 10. Computer1 contains a folder named Folder1.

You need to log any users who take ownership of the files in Folder1.

Which two actions should you perform? Each correct answer presents part of the solution. NOTE: Each correct selection is worth one point.
A . Modify the folder attributes of Folder1.
B . Modify the Advanced Security Settings for Folder1.
C . From a Group Policy object (GPO), configure the Audit Sensitive Privilege Use setting.
D . From a Group Policy object (GPO), configure the Audit File System setting.
E . Install the Remote Server Administration Tools (RSAT).

Answer: BD

Explanation:

References:

https://www.netwrix.com/how_to_detect_who_changed_file_or_folder_owner.html

Which two objects should you include in the recommendation?

You need to recommend a solution that meets the security requirements for the tablets.

Which two objects should you include in the recommendation? Each correct answer presents part of the solution.
A . a mobile device mailbox policy
B . an Outlook Web App policy
C . a data loss prevention (DLP) policy
D . a device access rule

Answer: B, D

Explanation:

Scenario: Users must be able to access Outlook on the web internally and externally from their tablet.

Users must be able to configure their tablet to synchronize email by using Autodiscover.

Users must be able to access their mailbox by using Exchange ActiveSync on the company-approved tablets only

Which cmdlet should you use?

You have an Exchange Server 2016 organization. The organization contains 10 mailbox databases. You have a mailbox database named DB4 on a disk that has only 10 percent free disk space. You need to prevent automatic mailbox distribution from selecting DB4 as a target.

Which cmdlet should you use?
A . Set-MailBoxDatabase
B . Set-Mai IboxServer
C . Set-SiteMailboxProvisioningPolicy
D . Set-DatabaseAvailabilityGroup

Answer: A

Explanation:

References:

https://technet.microsoft.com/en-gb/library/ff477621 (v=exchg.150).aspx#Exclude

Which cmdlet should you use?

You have an Exchange Server 2016 organization. The organization contains five

Mailbox servers. The servers are members of a database availability group (DAG).

All of the databases in the DAG are replicated to all of the members.

You plan to perform scheduled maintenance on a Mailbox server named MBX3 that will place the server offline for up to an hour.

You need to ensure that any active databases on MBX3 are activated on other DAG members before performing the maintenance.

Which cmdlet should you use?
A . Set-MailboxDatabaseCopy
B . Stop-DatabaseAvailabilityGroup
C . Resume-MailboxDatabaseCopy
D . Set-MailboxServer

Answer: D

What command should you run?

HOTSPOT

Your company has an Exchange Server 2016 organization.

You plan to allow several users to access the mailboxes of the other group.

You need to ensure that a user named User1 can read and delete the email messages in the mailbox of a user named User2. User1 must add the mailbox of User2 manually to the Microsoft Outlook profile.

What command should you run? To answer, select the appropriate options in the answer area.

Answer: