70-345 Designing and Deploying Microsoft Exchange Server 2016 exam is a hot Microsoft certification exam, Exam4Training offers you the latest free online 70-345 dumps to practice. You can get online training in the following questions, all these questions are verified by Microsoft experts. If this exam changed, we will share new update questions.
Certification Provider: Microsoft Exam Name: Designing and Deploying Microsoft Exchange Server 2016 Exam Code: 70-345 Official Exam Time: 150 mins Number of questions in the Official Exam: 40-60 Q&As Latest update time in our database: September 24,2023 70-345 Official Exam Topics:
Topic1 : Plan, Deploy, Manage, and Troubleshoot Mailbox Databases
Topic2 : Identify failure domains; plan a solution that meets SLA requirements around scheduled downtime; plan for software updates and server maintenance; plan for change management; create, configure, and manage Database Availability Groups (DAG); create, configure, and manage DAG networks; create, configure, and manage proper placement of a file share witness (FSW); create and configure mailbox database copies; create, configure, and manage Azure file share witness (FSW); create, configure, and manage Azure DAG members / Plan, deploy, and manage a site-resilient Database Availability Group (DAG)
Topic3 : Monitor mailbox database replication and content indexing; troubleshoot mailbox database replication and replay; troubleshoot mailbox database copy activation; troubleshoot mailbox database performance; troubleshoot database failures (e.g., repair, defrag, recover); resolve quorum issues; troubleshoot data center activation / Plan, deploy, and manage backup and recovery solutions for mailbox databases
Topic4 : Plan, Deploy, Manage and Troubleshoot Client Access Services / Plan, deploy, and manage Client Access services
Topic5 : Plan, deploy and manage mobility solutions / Plan, deploy, and manage load balancing
Topic6 : Plan, Deploy, Manage, and Troubleshoot Transport Services / Plan, deploy, and manage transport services
Topic7 : Plan a solution that meets SLA requirements around message delivery; plan inter-site mail flow; plan inter-org mail flow; plan, deploy and configure redundancy for intra-site scenarios; plan and configure for SafetyNet; plan and configure for shadow redundancy; plan and configure for redundant MX records; plan, create, and configure TLS transport, Edge transport, Send/Receive connectors, transport rules, accepted domains, email address policies and Address Rewriting / Troubleshoot and monitor transport services
Topic8 : Plan and configure Active Directory (AD) Domain Services for Exchange and Organizational settings / Plan, deploy, manage, and troubleshoot Role Based Access Control (RBAC)
Topic9 : Plan, deploy, manage, and troubleshoot IRM with Active Directory Rights Management Services (AD RMS) or Azure RMS / Plan and configure Information Rights Management (IRM) in Exchange, create an RMS template, plan and create transport protection rules, plan and create Outlook protection rules, plan and configure journal report decryption, plan and configure IRM for eDiscovery, plan and configure pre-licensing for client access, troubleshoot failed IRM protection
Topic10 : Plan, configure, and manage Archiving and Message Records Management (MRM) / Plan and configure retention policies; plan, create, and configure custom tags; assign policies to users; plan and configure the Managed Folder Assistant; remove and delete tags; plan and configure online archiving (Office 365); plan and create archive policies; plan and configure in-place archiving
Topic11 : Plan and configure mailbox audit logging, plan and configure administrative audit logging, search and interpret all audit logs / Plan, deploy, and troubleshoot coexistence with Office 365 (Exchange Online)
Topic12 : Plan, deploy, and troubleshoot on-premises coexistence with earlier supported versions of Exchange / Plan, create, and configure namespaces for coexistence; plan and configure proxy redirect; plan firewall configuration for coexistence; plan and configure for mail flow requirements; plan for mailbox migrations; troubleshoot transport in coexistence; troubleshoot client access in coexistence
Topic13 : Migrate from earlier supported versions of Exchange /
You are designing an Exchange Server 2016 organization. The organization will use a single namespace of mail.contoso.com for all client access protocols. You plan to use load balancers.
You identify the following requirements for the load balancing solution:
• The Edge Transport server log files must contain the original IP address of the SMTP hosts.
• Clients must be able to connect only when they use the approved hostnames and the approved virtual directories.
You need to identify which type of load balancer meets each requirement.
What should you identify? To answer, select the appropriate options in the answer area.
Your company has a data center. The data center contains a server that has Exchange Server 2016 and the Mailbox server role installed. Outlook anywhere clients connect to the Mailbox server by using the name outlook.contoso.com.
The company plans to open a second data center and to provision a database availability group (DAG) that spans both data centers.
You need to ensure that Outlook Anywhere clients can connect if one of the data centers becomes unavailable.
What should you add to DNS? A . one A record B . two TXT records C . two SRV records D . one MX record
You need to recommend a load balancing solution that meets the availability requirements.
Which load balancing solution should you recommend? A . a Layer-7 load balancer with a single namespace and without session affinity B . a Network Load Balancing (NLB) cluster C . DNS round robin D . a Layer-4 load balancer with multiple namespaces and without session affinity
Answer: A
Explanation:
From Scenario:
Contoso identifies the following high-availability requirements for the planned deployment: The network load balancer must be able to probe the health of each workload.
Load balancers that work on the Layer 7 of OSI model are intelligent. Layer 7 load balancer is aware of the type of traffic passing through it. This type of load balancer can inspect the content of the traffic between the clients and the Exchange server. From this inspection, it gets that results and uses this information to make its forwarding decisions. For example, it can route traffic based on the virtual directory to which a client is trying to connect, such as /owa, /ecp or /mapi and it can use a different routing logic, depending on the URL the client is connecting to. When using a Layer 7 load balancer, you can also leverage the capabilities of Exchange Server 2016 Managed Availability feature. This built-in feature of Exchange monitors the critical components and services of Exchange server and based on results it can take actions.
Note: Layer 7 load balancer can use this to detect functionality of critical services, and based on that information decide if it will forward client connections to that node. If the load balancer health check receives a 200 status response from health check web page, then the service or protocol is up and running. If the load balancer receives a 403 status code, then it means that Managed Availability has marked that protocol instance down on the Mailbox server.
Although it might look that load balancer actually performs a simple health check against the server nodes in the pool, health check web page provides an information about workload’s health by taking into account multiple internal health check probes performed by Managed Availability.
Incorrect Answers:
D: Load balancers that work on Layer 4 are not aware of the actual traffic content being load balanced.
You need to configure the Exchange Server organization to support the security requirements for Calendar sharing.
Which three actions should you perform in sequence? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.
You have a computer named Computer1 that runs Windows 10. Computer1 contains a folder named Folder1.
You need to log any users who take ownership of the files in Folder1.
Which two actions should you perform? Each correct answer presents part of the solution. NOTE: Each correct selection is worth one point. A . Modify the folder attributes of Folder1. B . Modify the Advanced Security Settings for Folder1. C . From a Group Policy object (GPO), configure the Audit Sensitive Privilege Use setting. D . From a Group Policy object (GPO), configure the Audit File System setting. E . Install the Remote Server Administration Tools (RSAT).
You need to recommend a solution that meets the security requirements for the tablets.
Which two objects should you include in the recommendation? Each correct answer presents part of the solution. A . a mobile device mailbox policy B . an Outlook Web App policy C . a data loss prevention (DLP) policy D . a device access rule
Answer: B, D
Explanation:
Scenario: Users must be able to access Outlook on the web internally and externally from their tablet.
Users must be able to configure their tablet to synchronize email by using Autodiscover.
Users must be able to access their mailbox by using Exchange ActiveSync on the company-approved tablets only
You have an Exchange Server 2016 organization. The organization contains 10 mailbox databases. You have a mailbox database named DB4 on a disk that has only 10 percent free disk space. You need to prevent automatic mailbox distribution from selecting DB4 as a target.
Which cmdlet should you use? A . Set-MailBoxDatabase B . Set-Mai IboxServer C . Set-SiteMailboxProvisioningPolicy D . Set-DatabaseAvailabilityGroup
Your company has an Exchange Server 2016 organization.
You plan to allow several users to access the mailboxes of the other group.
You need to ensure that a user named User1 can read and delete the email messages in the mailbox of a user named User2. User1 must add the mailbox of User2 manually to the Microsoft Outlook profile.
What command should you run? To answer, select the appropriate options in the answer area.
You need to configure the health probes to meet the availability requirements.
Which URL should you configure for the probe? A . https://mail.litware.com/owa/probe.htm B . https://mail.litware.com/owa/healthcheck.htm C . http://litware.com/owa/healthcheck.htm D . http://litware/owa/probe.htm