Tuesday, May 25, 2010

Some interview Questions



Answers are in bold 


1)    Your company is currently running the Novell GroupWise messaging system. Your department is the first department to migrate to Exchange Server 2003. You must maintain connectivity to Novell GroupWise users, and you must be able to share calendar information with users on both systems. What options should you choose during Setup on the Exchange 2003 computer to accomplish these goals? Choose all that apply.
a. Microsoft Exchange Messaging and Collaboration Services.
b. Microsoft Exchange Connector for Novell GroupWise.
c. Microsoft Exchange Calendar Connector.
d. Microsoft Exchange System Management Tools.

2)  You are running Windows Server 2003, Enterprise Edition, on an eight-node cluster. What is the maximum number of Exchange virtual servers that you can have in your clustered environment? Choose the best answer.
a. One
b. Three
c. Four
d. Seven
e. Eight

3) You are attempting to install Exchange 2003 on your cluster but are receiving an error that you have insufficient permissions. This is not the first Exchange 2003 server in your organization. What permission must you have to install Exchange 2003 on the cluster? Choose all that apply.
a. You must be a member of the local administrators group on each cluster node.
b. You must have Exchange Full Administrator permissions on the organization object.
c. You must have Exchange Full Administrator permissions on the administrative group object.
d. You must be a member of the Schema Admins group.

4)    You want to configure your Exchange server to transmit SMTP data over the Internet securely to your branch offices. However, you want to continue to be able to receive standard SMTP messages from unknown senders on the Internet. What should you do? Choose the best answer.
a. Create a secondary SMTP virtual server. Configure this virtual server to encrypt data sent outbound, and require incoming messages to be encrypted. Use the connection control dialog box to identify the hosts at your branch offices that you want to communicate securely with.
b. Modify the default SMTP virtual server so that it will encrypt data sent outbound by using Transport Layer Security (TLS), and require incoming messages to be encrypted.
c. Create a secondary Hypertext Transfer Protocol (HTTP) virtual server. Configure this virtual server to encrypt data sent outbound by using TLS, and require incoming messages to be encrypted. Use the connection control dialog box to identify the hosts at your branch offices that you want to communicate with in a secure manner.

5)    One of your company's mailboxes was recently compromised. The user who owns the mailbox has been absent from work for several weeks, and you suspect that the attacker somehow knew this. What can you do to minimize the likelihood of an attacker discovering whether a user is absent? Choose all that apply.
a. Use dedicated Simple Mail Transfer Protocol (SMTP) virtual servers to connect to servers that are located in remote offices.
b. Configure default SMTP virtual servers and SMTP connectors to not reply to or forward out-of-office messages to the Internet.
c. Instruct users to not configure out-of-office messages.
d. Configure the firewall to block outbound messages over port 25.

6)    Although you have a block list service provider configured, you continue to receive unsolicited commercial e-mail from several senders. You would like to block messages coming from these troublesome domains. How can you accomplish this? Choose the best answer.
a. On the default SMTP virtual server, add the offending domain to the Connection properties of the Access tab.
b. Configure a sender filter that includes the sender's e-mail address for each sender from whom you are receiving unsolicited commercial e-mail.
c. On the Organization object, add the offending domain to the Incoming properties of the Messaging tab.
d. Configure a connection filter that includes the sender's e-mail address for each sender from whom you are receiving unsolicited commercial e-mail.

7)    Your users need to be able to encrypt messages that are sent to each other. You need to enable this encryption capability. What actions should you take? Choose the best answer.
a. Install an enterprise CA and configure it to enable key recovery. Create and configure appropriate certificate templates for auto-enrollment. Configure Outlook to digitally sign and encrypt e-mail.
b. Install an enterprise CA and configure it to connect to Exchange Key Management Service. Create and configure appropriate certificate templates for auto-enrollment. Configure Outlook to digitally sign and encrypt e-mail.
c. Install Exchange 2003 Key Management Service. Create user keys and e-mail the keys to the users. Configure Outlook to digitally sign and encrypt e-mail.
d. Install Exchange 2000 Key Management Service. Create user keys and e-mail the keys to the users. Configure Outlook to digitally sign and encrypt e-mail.

8)    Your company uses Exchange Server 2003. You have an administrative group already configured, and you would like the new administrative groups that are created to have different default permissions from the first administrative group. You know that you need to configure advanced security to allow this. How should you go about configuring advanced security? Choose the best answer.
a. Use Adsiedit to configure permissions on the Administrative Groups container. Configure the permissions to apply to This object and all child objects.
b. Use Adsiedit to configure permissions on the Administrative Groups container. Configure the permissions to apply to This object only.
c. Configure the registry to display the Security tab for all objects. Use the Security tab of the Administrative Groups container to configure permissions.
d. Configure the registry to display the Security tab for all objects. Use the Security tab of the Organization container to configure permissions.

9)    You are a new messaging administrator. You observe your coworker type the following command at a command prompt:
csvde -i -f import.csv -k -j c:\logs
What does this command do? Choose all that apply.
a. Imports the file Import.csv into Active Directory.
b. Exports the file Import.csv into Active Directory.
c. Displays status information about the CSVDE process.
d. Ignores errors encountered during the CSVDE process.
e. Logs all status information to a log file located at C:\logs.
f. Omits paged searches.

10)    A user complains that he receives a non-delivery report each time he sends an e-mail message to the Management mail-enabled group even though he can send messages to and receive messages from his coworkers and managers. What might be the cause of this? Choose the best answer.
a. The Management mail-enabled group is hidden from Exchange address lists.
b. The secondary SMTP address for the Management mail-enabled group is not configured correctly.
c. The user is exceeding his storage limits.
d. The Management mail-enabled group is configured to only allow certain users to send messages to it. This user is not on the list of authorized users.

11)    Which of the following statements about public folders are true? Choose all that apply.
a. Public folder information can be accessed by both Hypertext Transfer Protocol (HTTP) and Network News Transfer Protocol (NNTP) clients.
b. Public folders can be used to store e-mail messages and documents.
c. Public folder contents can only be accessed by authenticated users who are within the same Microsoft® Exchange organization.
d. Public folders can be created only from Microsoft Outlook®.
  1. Folders created at the root of a public folder tree are called top-level folders.
  2. Public folders can be managed only from Exchange System Manager.
12)    One of your fellow administrators needs permission to manage replication for a series of public folders. What type of permissions must be granted to the administrator to accomplish this? Choose the best answer.
a. Client permissions
b. Directory rights
c. Administrative rights

13)    A user calls you and complains that she recently discovered that confidential information that is stored in a public folder is visible to employees who should not have access to it. What should you do? Choose the best answer.
a. Add the user to the Administrative Rights permissions on the folder.
b. Change the default Client Permissions on the folder to Reviewer.
c. Change the default Client Permissions on the folder to None.
d. Stop replicating the folder to the server that contains the employees that should not have access to it.

14)    You need to allow all users in your organization to use a custom contact form that you recently created. How can you enable users to use this custom form? Choose the best answer.
a. E-mail the form to all users, and have them publish the form to their own Outlook folders.
b. Publish the form to the Exchange Store.
c. Publish the form to the Organizational Forms Library.
d. E-mail the form to all users, and have them publish the form to their own Personal Forms Library.

15)    You have just finished installing Exchange, and you notice that display names are generated first name middle initial last_name. You need to change this so that names are created as first name last name. What should you do? Choose the best answer.
a. Use Active Directory Service Interface (ADSI) Edit to modify the createDialog property of the user-Display object.
b. Use Exchange System Manager to modify the Create Display Name property of the organization object.
c. Use Active Directory Users and Computers to modify the Create Full Name property of the forest object.
d. Use Active Directory Users and Computers to modify the Create Display Name property of the forest object.

16)    You are configuring the storage limit settings on your Microsoft® Exchange mailbox stores, and you are not sure whether the other servers in your organization will have information about the storage limits on your local server. In which Microsoft Active Directory® directory service partition does Exchange store this information? Choose the best answer.
a. Domain partition
b. Configuration partition
c. Schema partition
d. System partition

17)    You have four servers in a single routing group. ServerA and ServerB are in Birmingham, ServerC and ServerD are in Montgomery. The network connection between Birmingham and Montgomery is between ServerB and ServerC. A user sends a message from ServerA to a recipient with a mailbox on ServerD. The intended recipient reports that the message was not received. You determine that the network between ServerB and ServerC is down. You need to locate the lost message. Which server has the lost message? Choose the best answer.
a. ServerA
b. ServerB
c. ServerC
d. ServerD

18)    You receive a call that messages are not being delivered between two of your Exchange servers that are in different routing groups. How do you determine whether the cause is service failure or network failure? Choose the best answer.
a. Use Event Viewer on each server to determine the cause of the failure.
b. Use Notifications in Exchange System Manager to configure Exchange to send you information about the failure.
c. Use message tracking logs to view information about the failure.
d. Use Status in Exchange System Manager to view the connectors and servers and to determine status.

19)    Messages that your users send to recipients in a particular remote domain are repeatedly returned as non-deliverable. What tools can you use to help troubleshoot this problem? Choose all that apply.
a. Nslookup
b. IPSec
c. Telnet
d. RPCPing

20)    A new administrator has recently been hired in your messaging support group. The protocol logging for all supported protocol logs has been enabled, and the new administrator has been asked to monitor all messaging-related protocol logs. The new administrator asks you to explain what protocol logs should be monitored. What should you tell this new administrator? Choose all that apply.
a. Simple Mail Transfer Protocol (SMTP)
b. Hypertext Transfer Protocol (HTTP)
c. Network News Transfer Protocol (NNTP)
d. Remote procedure calls (RPC)
e. Transmission Control Protocol/Internet Protocol (TCP/IP)




No comments:

Post a Comment