You need to configure the environment to support the planned changes for email addresses.
How should you complete the command? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
You need to recommend a solution for the public folders that supports the planned changes and meets the technical requirements.
What should you recommend?
You need to recommend an Office 365 solution that meets the technical requirements for email from adatum.com.
Which two components should you recommend configuring from the Exchange admin center in Exchange Online? Each correct presents a complete solution.
NOTE: Each correct selection is worth one point.
You need to resolve the email delivery delay issue.
What should you do?
You must prevent HelpDeskUser1 from repeating the same mistake.
You need to identify which management role provided HelpDeskUser1 with the necessary permissions to make the mistake identified in the problem statement.
Which two cmdlets should you run? Each correct answer presents part of the solution.
Use the drop-down menus to select the answer choice that complete each statement based on the information presented in the Exchange Online Connector exhibit.
NOTE: Each correct selection is worth one point.
You need to configure the Exchange organization to meet the security requirements for sending email messages to distribution groups.
Which cmdlet should you run?
You need to recommend a solution that meets the security requirements for protecting users.
What should you recommend?
You need to resolve the issue for the customer service department users.
What should you modify?
You need to configure the required objects for the branch office administrators.
What should you create for each administrator?
You need to implement a solution to support the planned changes for the helpdesk users.
What should you do?
You need to recommend a procedure for closing the Brussels office that meets the technical requirements.
What should you recommend?
You need to implement a solution that meets the technical requirements for the retention of junk email, sent items, and deleted items.
What is the minimum number of retention policies and retention tags you should use? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
You need to resolve the issue for the transport department users.
What is the best way to achieve the goal? More than one answer choice may achieve the goal. Select the
BEST answer.
You need to recommend a solution to retain the items in the public folders. The solution must support the
planned changes.
What should you recommend?
You need to implement a solution to support the planned changes for the branch office administrators.
What should you do?
Your company named Contoso, Ltd. has a Microsoft Exchange Server 2019 organization that contains the mailbox databases shown in the following table.
You need to assign an offline address book (OAB) named Managers to all the users in a group named Managers.
How should you complete the PowerShell script? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
You need to implement a solution to meet the technical requirements for the SCL.
How should you complete the command? To answer, select the appropriate options in the answer area.
All the users in your company are licensed for Microsoft 365 and connect to their mailbox from client computers that run Windows 10.
The users connect to Outlook on the web by using the following browsers:
You apply restrictions for Outlook on the web sessions by using app protection policies in Microsoft Endpoint Manager, and then you deploy several Outlook Web App policies.
You need to ensure that the users can continue to connect successfully to their mailbox by using Outlook on the web.
What should you do?
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
Your company has a Microsoft 365 subscription.
Several users in the finance department of the company recently accessed unsafe websites by clicking on links in email messages.
Users in the marketing department of the company report that they must be able to access all the links embedded in email messages.
You need to reduce the likelihood of the finance department users accessing unsafe websites. The solution must affect only the finance department users.
Solution: You create a new safe links policy and apply the policy to finance department users.
Does this meet the goal?
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
You have a Microsoft Exchange Server 2019 hybrid deployment. All user mailboxes are hosted in Microsoft 365. All outbound SMTP email is routed through the on-premises Exchange organization.
A corporate security policy requires that you must prevent credit card numbers from being sent to internet recipients by using email.
You need to configure the deployment to meet the security policy requirement.
Solution: From Microsoft 365, you create a supervision policy.
Does this meet the goal?
Your company has a department named Deptl.
You have a Microsoft Exchange Online tenant.
You need to prevent only the users in Deptl from using Outlook on the web to manage their mailbox settings.
Which two actions should you perform? Each correct answer presents part of the solution.
NOTE: Each correct answer is worth one point.
You have a Microsoft Exchange Online tenant.
All users are assigned only an Office 365 Enterprise E3 license.
You need to ensure that the users can use only Microsoft Outlook to connect to their Microsoft 365 mailbox when they connect from an Android device.
What should you create?
You have a Microsoft Exchange Server 2019 organization.
You need to ensure that a user named User1 can prevent mailbox content from being deleted if the content contains the words Fabrikam and Confidential.
What should you do?
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
NOTE: Each correct selection is worth one point.
You need to ensure that Allan Deyoung can create a new public folder for the sales department.
Which two actions should you perform first? Each correct answer presents part of the solution.
NOTE: Each correct selection is worth one point.
You need to email a list of configuration changes to the Exchange Online environment that were recently performed by Allan Deyoung.
What should you do?
Which contacts can sign in to and access resources in the adatum.com tenant?
Allan Deyoung must perform a message trace of the email messages sent by Isaiah Langer and provide a report that contains all the messages sent during the last 30 days.
You need to ensure that Allan Deyoung can perform the message trace.
What should you do?
You discover that email messages sent to contoso.com are NOT delivered through Contoso Connector.
You need to ensure that all email sent to contoso.com is delivered through Contoso Connector.
Which connector setting should you modify?
Lynne Robbins and the users in the sales department plan to collaborate on a project with a partner company named Contoso, Ltd. that has an email domain named contoso.com.
You need to ensure that only the sales department users can share all their calendar free/busy
information with the users in contoso.com.
How should you configure the organization relationship?
You need to ensure that Alex Wilber can recover deleted items when using Outlook on the web.
Which two actions should you perform? Each correct answer presents a complete solution.
NOTE: Each correct selection is worth one point.
Joni Sherman reports that the Microsoft Outlook client on her Windows 10 device fails to start.
You need to troubleshoot the issue.
From the device, you start the Microsoft Remote Connectivity Analyzer.
What should you run next?
You need to migrate 10 Microsoft Outlook.com users to the adatum.com tenant.
Which type of migration should you perform, and which items can be migrated? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
You need to generate a report for the mobile devices that meets the technical requirements.
Which PowerShell cmdlet should you use?
You need to encrypt email between Fabrikam and Litware to support the planned changes.
What should you configure in the Exchange admin center?
You need to perform a remote wipe of the devices of User2 and User3.
You run the following commands.
Clear-MobileDevice -id User2-Device
-NotificationEmailAddress "admin@Fabrikam.com"
Clear-MobileDevice -id User3-Device
-NotificationEmailAddress "admin@Fabrikam.com"
What occurs on each device? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
You need to identify the contents of the FabrikamProject public folder to meet the technical requirements.
Which PowerShell cmdlet should you run?
User3 leaves the company.
You need to ensure that Admin1 and Admin2 can access the mailbox of User3. The solution must meet the technical requirements.
What should you do?
You need to configure the new smartboard to support the planned changes.
Which three settings should you configure? To answer, select the appropriate settings in the answer area.
NOTE: Each correct selection is worth one point.
How many default policy tags (DPTs), retention policy tags (RPTs), and personal tags should you create to meet the retention requirements? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
You need to ensure that In-Place Archiving is enabled for the marketing department users.
Which user should perform the change, and which tool should the user use? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
You need to modify FilesPolicy to prevent users from downloading ASPX files. The solution must meet the technical requirements.
How should you complete the command? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
You need to identify which users clicked the links in the phishing emails.
What should you do?