Term
Which protocols are used by the Mail Transfer Agent when relaying email? |
|
Definition
|
|
Term
T/F POP3 and IMAP4 are protocols that are used to send email? |
|
Definition
False, they are only used to receive email |
|
|
Term
Which protocol allows a user to view their email without deleting it from the server? |
|
Definition
|
|
Term
The command to determine the use of ESMTP is? |
|
Definition
|
|
Term
This mail client is otherwise known as RPC over HTTP |
|
Definition
|
|
Term
T/F When MX records compete, the MX record with the lowest priority takes precedence |
|
Definition
|
|
Term
When there are several MX records that have the same priority, how is the 'winner' selected? |
|
Definition
The MX records rotate in a round-robin fashion |
|
|
Term
Anti spamming and anti virus programs can be setup on the Edge server or a ____ _____ |
|
Definition
|
|
Term
How do you setup nslookup to query mx records? |
|
Definition
|
|
Term
T/F Mailbox role servers can be set up on the same server that hosts the Edge role? |
|
Definition
False; Edge roles must stand alone |
|
|
Term
This client side protocol establishes a persistant connection to the email server |
|
Definition
|
|
Term
T?F Enterprise edition allows you to create up to 50 databases and 50 storage groups per server |
|
Definition
|
|
Term
T/F The Hub and the Edge role are integrated with AD |
|
Definition
False; only the Hub is integrated with AD. Edge is separate from AD and uses EdgeSync to communicate with the Hub |
|
|
Term
Where are send connectors stored?? |
|
Definition
|
|
Term
Where are Receive Connectors stored? |
|
Definition
|
|
Term
Edge and Hub role Receive Connectors must be configured to accept permissions from which group, in order to receive mail from the internet? |
|
Definition
|
|
Term
In order to install ES2007, you must meet software prerequisites. Which of the following are examples of those? a. PS 1.0+ b. .Net Framework 2.0+ c. MMC v3.0+ |
|
Definition
|
|
Term
Prior to installing ES2007, the DC that is hosting the Schema Master must be used to do what to the schema? |
|
Definition
|
|
Term
To create a new AD user as well as an associated mailbox through the Shell, you would use which command? Enable-Mailbox New-Mailbox |
|
Definition
|
|
Term
T/F Send connectors are automatically installed on Hub Servers for internet communication |
|
Definition
False; Send Connectors are not automatically installed on Hubs, however there are hidden Send Connectors included in Exchange 2007 that allow Hubs to relay between other Hubs in the same organization. |
|
|
Term
The Edge role automatically has two Send connectors created after they subscribe to the Hub. What is there purpose? |
|
Definition
The first one created allows email to be relayed anywhere on the internet. The second allows relay to the Hub. |
|
|
Term
Which protocol is used to replicate Send Connectors from AD via the Hub to Edge role? |
|
Definition
|
|
Term
What can you specify in the Network tab, in Send connector properties? |
|
Definition
A forwarding address for Smart Hosts |
|
|
Term
Dynamic Distribution Groups use ____ and ______ to determine the correct group members |
|
Definition
|
|
Term
Automatic Booking/Calendar Attendant These features belong to which Recipient Object? |
|
Definition
|
|
Term
This recipient object has a disabled user account in the Exchange Resource Forest and allows access to mailboxes in a cross forest trust relationship. |
|
Definition
|
|
Term
What is the major difference between Send As and Full Access Permissions? |
|
Definition
Send As does not allow you to view emails within the assumed identity, while Full Access does. |
|
|
Term
Send As Permissions cannot be assigned to which to Recipient Objects? |
|
Definition
Mail User and Mail Contact |
|
|
Term
Which Resource Booking policy allows a user to request a resource but reuquires an approval by a delegate? |
|
Definition
|
|
Term
Which Resource Booking Policy is completely delegate free? |
|
Definition
|
|
Term
What effect will removing a mailbox user have on AD? |
|
Definition
It removes the Mailbox Users account |
|
|
Term
What effect will disabling a mailbox user have on AD? |
|
Definition
|
|
Term
Moving a mailbox requires that you be a member of the Exchange Recipient Admin role as well as a member of the Exhange Server Admin AND ___ ____ ____ on the source and target Mailbox Role Server. |
|
Definition
|
|
Term
The only tool that works to move mailboxes to a different forest is the |
|
Definition
|
|
Term
Which default Address List cannot be modified? |
|
Definition
Default Global Address List (GAL) |
|
|
Term
What is the default format for Email Address Policies? |
|
Definition
|
|
Term
The New-EmailAddressPolicy cmdlet uses variables such as %m, which indicates the use of an alias. What are the variables for last name, first name, and middle initial? |
|
Definition
%i=Initial %s=Surname %g=Given name |
|
|
Term
Which type of journaling archives all emails sent to or from the mailbox database and is available on all editions of Exchange? |
|
Definition
|
|
Term
Which type of journaling would you configure on an Enterprise ed. of Eschange in order to archive emails that involve specific users? |
|
Definition
|
|
Term
T/F Items stored in a managed custom folder can be deleted manually to conserve space. |
|
Definition
False; items in a managed custom folder will be deleted automatically after they have exhausted their preconfigured expiration date |
|
|
Term
What provides a flexible means of storing email, journal, calendar, note, post, form, and task items within your organization for access by Outlook, Entourage, and OWA mailbox users? |
|
Definition
|
|
Term
Public Folder Permissions (Client) What permission allows you to create items in a folder, but not view or delete any items in the same folder? |
|
Definition
|
|
Term
Public Folder Permissions (Client) Which permission allows a user to view and create items and delete items that they have created? |
|
Definition
|
|
Term
A Public Folder becomes a Recipient Object when you ___ ___ it? |
|
Definition
|
|
Term
T/F Mail Enabled Public Folders can be added to mail enabled groups |
|
Definition
|
|
Term
Which service allows client computers to easily discover and configure the appropriate email account on their email client programs? |
|
Definition
|
|
Term
What can be used on Edge and Hub role servers to filter inappropriate content and/or add legal disclaimers? |
|
Definition
|
|
Term
Where are Transport Rules for Hub role servers stored? |
|
Definition
|
|
Term
Where are Transport rules for Edge role servers stored? |
|
Definition
|
|
Term
In order to create and manage transport roles on a Hub, you must be a member of which role/group? On the Edge? |
|
Definition
Exchange Organization Administrator - HUB local Admin Group on the Edge server - EDGE |
|
|
Term
In order to create and manage transport roles on a Hub, you must be a member of which role/group? On the Edge? |
|
Definition
Exchange Organization Administrator - HUB local Admin Group on the Edge server - EDGE |
|
|
Term
These three components make up Transport Rules: ____, Exceptions, and Actions |
|
Definition
|
|
Term
Restricting access to email systems using a combination of security methods such as a biometric thumbprint + credentials is known as |
|
Definition
Multifactor Authentication |
|
|
Term
Where is the best place to install antivirus programs within your organization? |
|
Definition
On the Edge or a Smart Host |
|
|
Term
What uses several different virus scanning engines from different companies in order to minimize the chance of an undetected virus? |
|
Definition
Forefront Security for Exchange (FSE) |
|
|
Term
What does FSE scan when it installed on Mailbox Role server? |
|
Definition
Public folders and Mailbox databases |
|
|
Term
You have FSE setup on your Edge, Hub, and Mailbox role servers. How many times will an email be scanned that is coming from the internet? |
|
Definition
Once, it is scanned and then tagged as being scanned. |
|
|
Term
Which type of FSE scan takes place on a Mailbox role server and scans emails automatically as they are placed into the database? |
|
Definition
|
|
Term
Transport Scans take place on which role server(s)? |
|
Definition
|
|
Term
What determines how thorough a virus scan will be? |
|
Definition
|
|
Term
Which Bias setting takes the most processing power? Max Certainty Favor Certainty Neutral Favor Performance Max Performance |
|
Definition
|
|
Term
A provider that maintains a list of well known IP addresses for SPAMmers is known as ? |
|
Definition
Realtime Blocking List (RBL) |
|
|
Term
The likelihood that a message is SPAM is measured by a value based on the header info of the email. What is this referred to as? |
|
Definition
Purported Responsible Address (PRA) |
|
|
Term
Port 143 and 993 are used by |
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
What kind of traffic goes through ports 110 and 995 |
|
Definition
|
|
Term
Hub and Edge role servers relay email using SMTP on tcp port __ |
|
Definition
|
|
Term
POP3 and IMAP4 clients send email to Hubs using SMTP. They go through port 25 or ____ |
|
Definition
|
|
Term
What protocols use port 587? |
|
Definition
|
|
Term
How long will an authenticated POP3/IMAP4 session survive inactivity? |
|
Definition
1,800 seconds (15 minutes) |
|
|
Term
How long will an unauthenticated POP3/IMAP 4 session survive inactivity? |
|
Definition
|
|
Term
3 authentication methods for email protocols are basic authentication, Integrated Windows Authentication, and Digest Authentication. How does Digest work? |
|
Definition
Uses a digital hash to protect the password when sending the credentials to the CAS role server |
|
|
Term
How does Integrated Windows Authentication work? |
|
Definition
Passes credentials to the CAS role server using an NTLM hash or Kerberos, as well as requires the client be joined to the same domain as the CAS |
|
|
Term
Which authentication method for email protocols uses the NTLM hash? |
|
Definition
Integrated Windows Authentication |
|
|