Term
What are the four types of address lists? |
|
Definition
- Default
- Global
- Offline
- Custom
|
|
|
Term
What are two ways to move mailboxes? |
|
Definition
- Using Exchange Task Wizard
- Using Exchange Merge Wizard (exmerge.exe)
|
|
|
Term
What are three ways to configure storage limits? |
|
Definition
- On individual mailboxes
- On individual mailbox stores
- Using mailbox store policy
|
|
|
Term
What are the three levels of thresholds for storage limits? |
|
Definition
- Issue warning at (KB)
- Prohibit send at (KB)
- Prohibit send and receive at (KB)
|
|
|
Term
What are the four types of Exchange recipients? |
|
Definition
- Users
- Contact
- Group
- Public Folders
|
|
|
Term
What kind of user has an authentication account in Microsoft Windows and an external email address associated with it but no Exchange mailbox? |
|
Definition
|
|
Term
What kind of user has an account in Active Directory, an Exchange mailbox and email address? |
|
Definition
|
|
Term
What are the two ways to force address lists to be updated? |
|
Definition
|
|
Term
What are the two types of Exchange users? |
|
Definition
- Mail-enabled
- Mailbox-enabled
|
|
|
Term
What are Exchange servers connected over permanent networks? |
|
Definition
|
|
Term
What is the main source of errors in public folders? |
|
Definition
Incorrectly configured permissions |
|
|
Term
The frequency of public folder replication depends on: |
|
Definition
- The contents of the folder
- Network traffic
- The business needs of the users
|
|
|
Term
Public Folder replication is an ____________ process. |
|
Definition
|
|
Term
What are the two types of Public Folder trees? |
|
Definition
- Default Public Folder tree
- General Purpose Public Folder tree
|
|
|
Term
What are the three authentication methods supported by Exchange? |
|
Definition
- Anonymous Authentication
- Basic Authentication
- Integrated Windows Authentication
|
|
|
Term
What tools are used to identify problematic email domains? |
|
Definition
|
|
Term
Which authentication method is the strongest? |
|
Definition
Integrated Windows Authentication |
|
|
Term
When an attacker impersonates a trusted host by using its IP address in an attempt to gain unauthorized access to a computer network is called what? |
|
Definition
|
|
Term
Which authentication method is the weakest? |
|
Definition
|
|
Term
What is the process of ensuring that users are who they claim to be? |
|
Definition
|
|
Term
What connector supports large file transfer? |
|
Definition
|
|
Term
What are the three connectors supported by Exchange? |
|
Definition
- Routing Group Connectors
- SMTP Connectors
- X.400 Connectors
|
|
|
Term
When do you use just one routing group? |
|
Definition
- Have permanent and reliable connections
- Belong to same Active Directory Forest
- Connect consistently and reliably to the Routing Group Master
|
|
|
Term
When may multiple Routing Groups be required? |
|
Definition
- Network connections are slow or intermittent
- Network is unreliable
- Message transmission is complex and indirect (multiple hops)
- Message transmission must be scheduled
- Routing Group structure is created to prevent users from accessing Public Folder replicas
|
|
|
Term
What Exchange server is responsible for tracking and maintaining routing, such as routing path availability, for all the servers in the routing group? |
|
Definition
|
|
Term
What is the difference between Online and Offline backups? |
|
Definition
- Online - while services are running
- Offline - dismount stores and backup manually, does not check database for corruption
|
|
|
Term
What are the two methods of restoration? |
|
Definition
- Point-in-time (Hard recovery)
- Roll-forward (Soft recovery)
|
|
|
Term
What provides opportunities, cues, and information that allows you to address major risks before they adversely affect the business of your organization? |
|
Definition
|
|
Term
What are examples of dynamic data? |
|
Definition
- Exchange Server database and log files
- Active Directory data
- Microsoft Certificate service data
- Site replication service databases
- System State data
|
|
|
Term
What are examples of static data? |
|
Definition
- OS software
- Packaged application data
- Backup management software
- User application software
|
|
|
Term
What are additional files created in Exchange directories? |
|
Definition
|
|
Term
What is the name of the First Storage Group checkpoint file and its size? |
|
Definition
|
|
Term
What size are all Transaction log files? |
|
Definition
|
|
Term
What are the ACID Properties? |
|
Definition
- Atomicity
- Consistency
- Isolation
- Durability
|
|
|
Term
What are the heart of Exchange's functionality? |
|
Definition
|
|
Term
What service provides monitoring, maintenance, and Active Directory lookup services? |
|
Definition
Microsoft Exchange System Attendant |
|
|
Term
What command-line utility searches an offline information store for integrity weaknesses and repairs detected issues? |
|
Definition
|
|
Term
When using eseutil, what do the /d, /r, and /g switches do? |
|
Definition
- /d - offline compaction of database
- /r - recovery and brings all databases to a consistent state
- /g - verifies integrity of database
|
|
|
Term
What command-line utility is used to defragment the Mailbox and Public Folder Stores in Exchange? |
|
Definition
|
|
Term
What is the default and secure port for SMTP? |
|
Definition
|
|
Term
What is the default and secure port for NNTP? |
|
Definition
|
|
Term
What is the default and secure port for HTTP? |
|
Definition
|
|
Term
What is the default and secure port for IMAP4? |
|
Definition
|
|
Term
What is the default and secure port for POP3? |
|
Definition
|
|
Term
What is the difference between Static data and Dynamic data? |
|
Definition
- Static - data either does not change, or does not change very often
- Dynamic - data changes frequently
|
|
|
Term
Why should you use multiple databases and storage groups? |
|
Definition
- Reduce backup and restore times
- Different backup schedules
- Mailbox stores can be restored individually
- Independent circular logging setings
|
|
|
Term
What is the fifth storage group only supported with Enterprise Edition? |
|
Definition
|
|
Term
What is a collection of mailbox stores and public folder stores? |
|
Definition
|
|
Term
What is an exchange database that houses data such as email addresses and documents? |
|
Definition
|
|
Term
What do you need to check to verify the success of your backup procedures? |
|
Definition
- Windows Server Backup Log
- Event Viewer
|
|
|
Term
What are the names of the two files that each Exchange database contains? |
|
Definition
Rich-text (edb) and streaming (stm) |
|
|
Term
What database structure does Exchange Server use to store data? |
|
Definition
ESE (Extensible Storage Engine) |
|
|
Term
Exchange Server 2003 Enterprise Edition can support up to ___ storage groups per server, with each storage group containing up to ___ databases. |
|
Definition
|
|
Term
_______ is a feature that allows log files to be overwritten by new log files after the transactions in the original log file have been committed to the database. |
|
Definition
|
|
Term
Virtual memory should not fall below ______ free on an Exchange server for any length of time. |
|
Definition
|
|
Term
Why should you enable message tracking? |
|
Definition
- Troubleshoot message delivery problems
- Monitor messages to or from users defined in organization and to or from connectors, such as SMTP connector
|
|
|
Term
As part of ACID, what does Atomicity mean? |
|
Definition
All transaction data is either committed to the database or rolled back. |
|
|
Term
As part of ACID, what does Consistency mean? |
|
Definition
The database is always transformed from one known, valid state, to another. |
|
|
Term
As part of ACID, what does Isolation mean? |
|
Definition
Prevents simultaneous activity from interfering with any specific transaction. |
|
|
Term
As part of ACID, what does Durability mean? |
|
Definition
Keeps transactions permanent and capable of surviving system failures. |
|
|
Term
What is a place marker that points to a location in the log files? |
|
Definition
|
|
Term
(T/F) Each server must be able to query Active Directory for logon authentication and information about configuration and mail-enabled objects. |
|
Definition
|
|
Term
What utility performs diagnostic functions that help ensure the NetLogon service finds Domain Controllers and Global Catalog Servers? |
|
Definition
|
|
Term
What objects can be added to a new Administrative Group? |
|
Definition
- System Policy objects
- Routing Group objects
- Public Folder Tree objects
- Server objects
|
|
|
Term
What are the three roles supported by Exchange Administrative Delegation Wizard? |
|
Definition
- Exchange Full Administrator
- Exchange Administrator
- Exchange View Only Administrator
|
|
|
Term
What does event ID 9582 identify? |
|
Definition
Low or fragmented virtual memory |
|
|
Term
What does the Monitoring and Status utility monitor by default? |
|
Definition
|
|
Term
A loss of service due to inadequate or improper configuration can result in what? |
|
Definition
- Security breach
- Denial-of-Service
- Virus outbreak
|
|
|
Term
What two services are dependent on Microsoft Exchange System Attendant? |
|
Definition
- Microsoft Exchange Information Store
- Microsoft Exchange MTA Stacks
|
|
|
Term
What service provides topology and routing information to Exchange Server 2003? |
|
Definition
Microsoft Exchange Routing Engine |
|
|
Term
What does the First Storage Group contain? |
|
Definition
- Mailbox Store
- Public Folder Store
|
|
|
Term
When should you use circular logging? |
|
Definition
When data is not critical and recovery is not important |
|
|
Term
What backup copies the database files, transaction log files, and deletes the transaction log files that have been committed to the database? |
|
Definition
|
|
Term
What is the file name for the current transaction log? |
|
Definition
|
|
Term
Why is the Offline Backup method not recommended? |
|
Definition
- You need to stop database services so that users cannot access their mailboxes
- Transaction log files are not purged
- The database is not checked for corruption
- The chance of data loss increases
|
|
|
Term
What runs regularly (by default during the night) as part of normal background maintenance. |
|
Definition
|
|
Term
What is a command-line diagnostic utility analyzes the state of domain controllers in a forest and reports any problems? |
|
Definition
|
|
Term
What is a list of domain names and Internet Protocol (IP) addresses that send unsolicited commercial email? |
|
Definition
|
|
Term
What is a collection of Exchange 2000 and 2003 objects that are grouped together for the purpose of managing and delegating permissions? |
|
Definition
|
|
Term
Indexing is provided by what service? |
|
Definition
|
|
Term
In order for the index to be created, updated, or deleted, what services must be running? |
|
Definition
- Information Store Service
- Search Service
|
|
|
Term
What are Copy backups used for? |
|
Definition
To move data between systems or archive data at a point in time without disrupting standard backup procedures. |
|
|
Term
What does an error like DNS code 5.1.4 indicate? |
|
Definition
Two recipients in the directory have the same SMTP address. |
|
|
Term
What are the three Exchange group types? |
|
Definition
- Security
- Distribution
- Query-based
|
|
|
Term
Query-based groups can only be used at what mode? |
|
Definition
|
|
Term
What are components used to link routing groups together so messages can reliably and efficiently travel between groups? |
|
Definition
|
|
Term
_____ means you bring a store online? |
|
Definition
|
|
Term
_____ means you take a store offline? |
|
Definition
|
|
Term
Where is the NLTEST utility found? |
|
Definition
Windows Support Tools on the Windows Server 2003 CD |
|
|
Term
Why should you implement multiple virtual servers for a single protocol? |
|
Definition
- To supply different encryption methods for local and remote clients
- To segregate traffic for the same protocol over different ports
|
|
|
Term
What allows users to perform full-text searches across both messages and attachments within messages? |
|
Definition
Full-text indexing (also known as context indexing) |
|
|
Term
What must be granted to users if they are to access public folders in the default public folder tree? |
|
Definition
|
|
Term
What type of restore method must be used if you have circular logging enabled? |
|
Definition
|
|
Term
What is a feature that provides detailed information about the commands received by supported Internet protocols. |
|
Definition
|
|
Term
What are DNS records that tell other computers your email server IP address and name so that your can receive SMTP email. |
|
Definition
MX records (Mail Exchange) |
|
|