Term
What kind of user has an account in Active Directory, an Exchange mailbox and email address? |
|
Definition
|
|
Term
What kind of user has an authentication account in Microsoft Windows and an external email address associated with it but no Exchange mailbox? |
|
Definition
|
|
Term
You can create a mailbox for a user by using ______ if the default has been overridden or if you are installing Exchange into an existing Active Directory forest. |
|
Definition
|
|
Term
(T/F) When you delete a mailbox, by default, the mailbox is disconnected but not immediately deleted. |
|
Definition
|
|
Term
By default, a _____ is disconnected for 30 days, during which time it is flagged for deletion unless you choose to purge the mailbox manually. |
|
Definition
|
|
Term
An ______ is a collection of recipient objects that require objects that are using a Lightweight Directory Access Protocol (LDAP) query and based on attributes in Active Directory. |
|
Definition
|
|
Term
A(n) ______ contains all Exchange recipients in the organization. |
|
Definition
|
|
Term
A(n) _____ is a collection of address lists that are available to Exchange users when they are working offline. |
|
Definition
|
|
Term
You can use a _____ to configure an e-mail address policy, a mailbox management policy, or both. |
|
Definition
|
|
Term
What are the four types of Exchange recipients? |
|
Definition
- Users
- Contact
- Group
- Public Folders
|
|
|
Term
What are the advantages of Query-based distribution groups? |
|
Definition
- Dynamic membership
- Reduces administrative overhead
|
|
|
Term
What are the disadvantages of Query-based distribution groups? |
|
Definition
- Higher performance cost on server resources
- Can only be created in Native Mode Topology for Exchange Server 2003
|
|
|
Term
What can be done with Exchange Task Wizard? |
|
Definition
- Create or delete mailbox
- Establish or delete an email address
- Move a mailbox
- Hide or unhide group membership
- Configure exchange features
- Remove exchange attributes
|
|
|
Term
What is the default mailbox retention limit? |
|
Definition
|
|
Term
What notification messages are sent to mailbox owners who reach the storage limit defined for their mailboxes? |
|
Definition
|
|
Term
What are the three levels of thresholds for storage limits? |
|
Definition
- Issue warning at (KB)
- Prohibit send at (KB)
- Prohibit send and receive at (KB)
|
|
|
Term
What are three ways to configure storage limits? |
|
Definition
- On individual mailboxes
- On individual mailbox stores
- Using mailbox store policy
|
|
|
Term
What is the difference between "Send on behalf" and "Send as" permissions? |
|
Definition
- Send on behalf shows "From: DelegatedUser on behalf of MailboxOwner
- Send as shows "From: MailboxOwner"
|
|
|
Term
What are two ways to move mailboxes? |
|
Definition
- Using Exchange Task Wizard
- Using Exchange Merge Wizard (exmerge.exe)
|
|
|
Term
When should you use exmerge.exe instead of Exchange Task Wizard? |
|
Definition
If you must move mailboxes across Exchange organizations. |
|
|
Term
(T/F) You should only mail-enable Universal groups and not Domain Local or Global groups if you have multiple domains in the environment? |
|
Definition
|
|
Term
What are the four types of address lists? |
|
Definition
- Default
- Global
- Offline
- Custom
|
|
|
Term
What are the five types of Default address lists? |
|
Definition
- All Contacts
- All Groups
- All Users
- Public Folders
- Default GAL
|
|
|
Term
To create filter rules, you must define _____, ______, and ______. |
|
Definition
|
|
Term
What service builds and maintains address lists, polls Active Directory for updated recipient info? |
|
Definition
RUS (Recipient Update Service) |
|
|
Term
|
Definition
Exchange System Manager, Recipients, RUS |
|
|
Term
(T/F) All GALs will be shown in outlook address book if multiple GALs are provided. |
|
Definition
|
|
Term
What permissions must you have to run ForestPrep? |
|
Definition
- Enterprise Admin
- Schema Admin
- Domain Admin
- Local Admin
|
|
|
Term
What permissions must you have to run DomainPrep? |
|
Definition
|
|
Term
What policy always has the lowest priority? |
|
Definition
|
|
Term
What are the two ways to force address lists to be updated? |
|
Definition
|
|
Term
What are the two types of Exchange users? |
|
Definition
- Mail-enabled
- Mailbox-enabled
|
|
|
Term
Transferring messages between servers is called _____. |
|
Definition
|
|
Term
Name the three different connectors that are supported by Exchange Server. |
|
Definition
- Routing Group Connectors
- SMTP Connectors
- X.400 Connectors
|
|
|
Term
What is the name of the first routing group automatically created by Exchange when you install the first server that runs Exchange into an administrative group? |
|
Definition
|
|
Term
What is the Monitoring and Status tool? |
|
Definition
An administrative tool built into Exchange System Manager that is used to monitor the status and performance of Servers, Connectors, and Resources. |
|
|
Term
When an Exchange host communicates with another host, it sends ________ over TCP port 25 to communicate with the host. |
|
Definition
|
|
Term
|
Definition
A protocol that extends SMTP functionality by providing additional capabilities, such as delivery notifications and TLS. |
|
|
Term
|
Definition
A DNS record that tells other computers your Email Server IP address and name so that the user can receive email. |
|
|
Term
What is a pull relationship? |
|
Definition
When one computer queues messages and the other computer pulls them by using TURN or ETRN commands. |
|
|
Term
What indicates if you can ping by IP address but not by host name? |
|
Definition
Name resolution problem and possibly a problem with DNS. |
|
|
Term
The _______ diagnostic utility is used to isolate networking and connectivity problems by performing a series of tests to determine the state of your server. |
|
Definition
|
|
Term
|
Definition
A repository for different types of information (multimedia files, email messages, and text documents) which can be shared with users in an Exchange organization as well as with NNTP and HTTP users outside of Exchange organization. |
|
|
Term
What is a top-level folder? |
|
Definition
A public folder that is created at the root of a Public Folder tree. |
|
|
Term
How can users in an Exchange Organization access public folders? |
|
Definition
|
|
Term
What are public folder permissions? |
|
Definition
The permissions that control the creation, management, and use of public folders and their contents. |
|
|
Term
(T/F) A public folder inherits its permissions from a parent object. |
|
Definition
|
|
Term
What are Exchange servers connected over permanent networks? |
|
Definition
|
|
Term
What Exchange server is responsible for tracking and maintaining routing, such as routing path availability, for all the servers in the routing group? |
|
Definition
|
|
Term
When do you use just one routing group? |
|
Definition
- Have permanent and reliable connections
- Belong to same Active Directory Forest
- Connect consistently and reliably to the Routing Group Master
|
|
|
Term
When may multiple Routing Groups be required? |
|
Definition
- Network connections are slow or intermittent
- Network is unreliable
- Message transmission is complex and indirect (multiple hops)
- Message transmission must be scheduled
- Routing Group structure is created to prevent users from accessing Public Folder replicas
|
|
|
Term
What are the three connectors supported by Exchange? |
|
Definition
- Routing Group Connectors
- SMTP Connectors
- X.400 Connectors
|
|
|
Term
What connector supports large file transfer? |
|
Definition
|
|
Term
What are the two Monitoring and Status components? |
|
Definition
|
|
Term
What are the four possible statuses that apply to servers? |
|
Definition
- Available
- Unavailable
- In Maintenance Mode
- Unknown
|
|
|
Term
When a host initiates a TCP connection through port 25, what is the response from the server? |
|
Definition
|
|
Term
When a host sends a HELO command, initiates the sender using mail from and the receipient using receipt to, what is the response from the server? |
|
Definition
|
|
Term
What is the process of ensuring that users are who they claim to be? |
|
Definition
|
|
Term
What is a technique where the contents of an email message are scrambled into a code that can only be read by a person who has the key to decode it on his/her computer? |
|
Definition
|
|
Term
What are the three authentication methods supported by Exchange? |
|
Definition
- Anonymous Authentication
- Basic Authentication
- Integrated Windows Authentication
|
|
|
Term
Which authentication method is the weakest? |
|
Definition
|
|
Term
Which authentication method is the strongest? |
|
Definition
Integrated Windows Authentication |
|
|
Term
When an attacker impersonates a trusted host by using its IP address in an attempt to gain unauthorized access to a computer network is called what? |
|
Definition
|
|
Term
How do you prevent IP Spoofing? |
|
Definition
|
|
Term
When you set your computers to use the sender's SMTP domain name to carry out a DNS lookup to confirm the IP address is from the same network that is registered in DNS? |
|
Definition
|
|
Term
What tools are used to identify problematic email domains? |
|
Definition
|
|
Term
What is the syntax for using Nslookup to identify problematic email domains? |
|
Definition
nslookup -querytype=mx domainname |
|
|
Term
What are the three permission categories for public folders? |
|
Definition
- Client permissions
- Directory rights
- Admin rights
|
|
|
Term
What are the client permissions of public folders? |
|
Definition
- Owner
- Author
- Reviewer
- Editor
|
|
|
Term
By default, what permissions do all users have to Public folders? |
|
Definition
|
|
Term
By default, who are directory rights granted to? |
|
Definition
- Administrators
- Enterprise Admins
- Exchange Domain Servers
- Exchange Enterprise Servers
|
|
|
Term
By default, what tree is replicated to all Public Folder Servers? |
|
Definition
|
|
Term
What are the two types of Public Folder trees? |
|
Definition
- Default Public Folder tree
- General Purpose Public Folder tree
|
|
|
Term
What are multiple copies of public folders known as? |
|
Definition
|
|
Term
Public Folder replication is an ____________ process. |
|
Definition
|
|
Term
(T/F) Public Folders are mail-enabled by default. |
|
Definition
|
|
Term
How are client permissions configured for Public Folders? |
|
Definition
- Exchange System Manager for any Public Folder
- Outlook for folders in the Default Public folder
|
|
|
Term
The frequency of public folder replication depends on: |
|
Definition
- The contents of the folder
- Network traffic
- The business needs of the users
|
|
|
Term
What is the main source of errors in public folders? |
|
Definition
Incorrectly configured permissions |
|
|
Term
Virtual memory should not fall below ______ free on an Exchange server for any length of time. |
|
Definition
|
|
Term
|
Definition
Messages or scripts that Exchange System Manager directs Exchange to send out to notify when something is wrong. |
|
|
Term
Name five of the maintenance tasks that you should perform daily. |
|
Definition
- Monitor Event Viewer
- Check Monitoring and Status
- Check Queue Viewer
- Check logs
- Check for available disk space
- Monitor Exchange and Network services
- Monitor server performance
- Monitor cluster resources
- Verify replication
- Examine Exchange Storage Stats
|
|
|
Term
What information can you obtain from an antivirus log? |
|
Definition
When last scan was performed, what was scanned, and what results were. |
|
|
Term
Typically, the first indication about incorrect configuration of Windows services is through _____. |
|
Definition
|
|
Term
Name three abnormal event numbers. |
|
Definition
- 2064 and 2069
- 9582
- 1018, 1019, and 1022
|
|
|
Term
You can use the ____ to display messages in the queue or to search for messages by specifying search criteria, such as the sender or recipient and the message state. |
|
Definition
Find Messages in Queue Viewer |
|
|
Term
_______ defragmentation creates a new defragmented database and reduces database size. |
|
Definition
|
|
Term
With _______ you can identify the types of frames that are being transmitted or received by any computer, determine if a computer is excessively loaded, and analyze the traffic that is loading it. |
|
Definition
|
|
Term
System Attendant service is tightly integrated with _____ to retrieve information about recipients and address lists. |
|
Definition
|
|
Term
How does a multi-user database work? |
|
Definition
All clients read and write directly to database files |
|
|
Term
|
Definition
A sequence of operations that are treated as a single unit. |
|
|
Term
What does a database do to ensure consistency during an ACID test? |
|
Definition
The database is always transformed from one known valid state, to another. |
|
|
Term
How big is a checkpoint file? |
|
Definition
|
|
Term
_______ is a feature that allows log files to be overwritten by new log files after the transactions in the original log file have been committed to the database. |
|
Definition
|
|
Term
At what level is the Circular logging defined? |
|
Definition
|
|
Term
What is the store database cache? |
|
Definition
A large area in the memory subsystem where database transactions are saved before they are committed to the store, also called ESE Buffer. |
|
|
Term
Using what tool you can monitor free disk space, virtual memory usage, CPU utilization, and the status of Exchange and Windows services? |
|
Definition
Monitoring and Status Tool |
|
|
Term
Exchange Server 2003 Enterprise Edition can support up to ___ storage groups per server, with each storage group containing up to ___ databases. |
|
Definition
|
|
Term
What database structure does Exchange Server uses to store data? |
|
Definition
ESE (Extensible Storage Engine) |
|
|
Term
(T/F) Transaction log files and database files have different behavior. |
|
Definition
|
|
Term
What are the names of the two files that each Exchange database contains? |
|
Definition
Rich-text (edb) and streaming (stm) |
|
|
Term
(T/F) During a full offline backup, the .edb, .stm and .log files that comprise the Exchange store are backed up and checked for corruption at the file system level. |
|
Definition
|
|
Term
What do you need to check to verify the success of your backup procedures? |
|
Definition
- Windows Server Backup Log
- Event Viewer
|
|
|
Term
(T/F) Restoring a public folder store will not only restore the public folder you are trying to recover, but will merge all the other existing public folders with the information contained in the backup. |
|
Definition
|
|
Term
What is an exchange database that houses data such as email addresses and documents? |
|
Definition
|
|
Term
What is a collection of mailbox stores and public folder stores? |
|
Definition
|
|
Term
What is the fifth storage group only supported with Enterprise Edition? |
|
Definition
|
|
Term
What services must be running properly for Exchange to function properly? |
|
Definition
- Microsoft Exchange Information Store
- Microsoft Exchange MTA Stacks
- Microsoft Exchange Routing Engine
- Microsoft Exchange System Attendant
- SMTP
- World Wide Web Publishing
|
|
|
Term
CPU utilization should not exceed what? |
|
Definition
|
|
Term
Why should you use multiple databases and storage groups? |
|
Definition
- Reduce backup and restore times
- Different backup schdeules
- Mailbox stores can be restore individually
- Independent circular logging setings
|
|
|
Term
What are the two Performance Console snap-ins? |
|
Definition
- Performance Logs and Alerts (logging)
- System Monitor (real time)
|
|
|
Term
|
Definition
Automatically, as soon as you create the log file or when specified start time on schedule equals current time. |
|
|
Term
What is a system-generated event that is triggered when counters perform outside of predefined thresholds? |
|
Definition
|
|
Term
(T/F) Message tracking is turned on by default. |
|
Definition
|
|
Term
What are the supported Exchange protocols? |
|
Definition
- HTTP
- POP3
- IMAP4
- ESMTP/SMTP
- NNTP
|
|
|
Term
What is the default and secure port for POP3? |
|
Definition
|
|
Term
What is the default and secure port for IMAP4? |
|
Definition
|
|
Term
What is the default and secure port for HTTP? |
|
Definition
|
|
Term
What is the default and secure port for NNTP? |
|
Definition
|
|
Term
What is the default and secure port for SMTP? |
|
Definition
|
|
Term
What is the default location for Exchange Server files? |
|
Definition
C:\Program Files\Exchsrvr |
|
|
Term
What command-line utility is used to defragment the Mailbox and Public Folder Stores in Exchange? |
|
Definition
|
|
Term
When using eseutil, what do the /d, /r, and /g switches do? |
|
Definition
- /d - offline compaction of database
- /r - recovery and brings all databases to a consistent state
- /g - verifies integrity of database
|
|
|
Term
What command-line utility searches an offline information store for integrity weaknesses and repairs detected issues? |
|
Definition
|
|
Term
What service manages the Microsoft Exchange Information Store, including mailbox stores and public folder store? |
|
Definition
Microsoft Exchange Information Store |
|
|
Term
What service provides monitoring, maintenance, and Active Directory lookup services? |
|
Definition
Microsoft Exchange System Attendant |
|
|
Term
What are the heart of Exchange's functionality? |
|
Definition
|
|
Term
What are the ACID Properties? |
|
Definition
- Atomicity
- Consistency
- Isolation
- Durability
|
|
|
Term
Writes to the Transaction Log are ______. |
|
Definition
|
|
Term
Reads from and to database are ______. |
|
Definition
|
|
Term
What size are all Transaction log files? |
|
Definition
|
|
Term
What is a place marker that points to a location in the log files? |
|
Definition
|
|
Term
What is the name of the First Storage Group checkpoint file and its size? |
|
Definition
|
|
Term
What are additional files created in Exchange directories? |
|
Definition
|
|
Term
(T/F) Circular logging is turned on by default. |
|
Definition
|
|
Term
What is the finite amount of memory used by the store.exe process in Exchange 2003? |
|
Definition
|
|
Term
(T/F) The /3GB switch to the boot.ini file is supported by all versions of Windows Server 2003. |
|
Definition
|
|
Term
EDB and STM files grow in what increment size? |
|
Definition
|
|
Term
What is the difference between Static data and Dynamic data? |
|
Definition
- Static - data either does not change, or does not change very often
- Dynamic - data changes frequently
|
|
|
Term
What are the five Exchange backup strategies? |
|
Definition
- Full
- Full + Incremental
- Full + Differential
- Copy
- Copy + Incremental
|
|
|
Term
What are examples of static data? |
|
Definition
- OS software
- Packaged application data
- Backup management software
- User application software
|
|
|
Term
What are examples of dynamic data? |
|
Definition
- Exchange Server database and log files
- Active Directory data
- Microsoft Certificate service data
- Site replication service databases
- System State data
|
|
|
Term
What is the difference between Online and Offline backups? |
|
Definition
- Online - while services are running
- Offline - dismount stores and backup manually, does not check database for corruption
|
|
|
Term
What are the two methods of restoration? |
|
Definition
- Point-in-time (Hard recovery)
- Roll-forward (Soft recovery)
|
|
|
Term
What Microsoft service manages the restore operation? |
|
Definition
Microsoft Exchange Information Store |
|
|
Term
What provides opportunities, cues, and information that allows you to address major risks before they adversely affect the business of your organization? |
|
Definition
|
|
Term
What helps standardize the way snapshot backups are performed? |
|
Definition
Windows Volume Shadow Copy Service |
|
|
Term
What does the Monitoring and Status utility monitor by default? |
|
Definition
|
|
Term
A loss of service due to inadequate or improper configuration can result in what? |
|
Definition
- Security breach
- Denial-of-Service
- Virus outbreak
|
|
|
Term
In order to test Active Directory connectivity, how can you verify which domain controller Exchange Server is using? |
|
Definition
Open Directory Access page on Exchange Server. |
|
|
Term
Give three different reasons why Mail-enabled objects may not appear in the global address list or other address lists. |
|
Definition
- RUS has not updated the object
- Replication has not occured to the Global Catalog
- The Exchange enterprise servers group does not have appropriate permissions
- The LDAP query my be incorrect
- The Exchange server has been taken offline
|
|
|
Term
In an organization with a single Active Directory site you can count on replication completing within about ___ minutes. |
|
Definition
|
|
Term
What does an error like DNS code 5.1.4 indicate? |
|
Definition
Two recipients in the directory have the same SMTP address. |
|
|
Term
What does the command-line utility dcdiag analyze? |
|
Definition
The state of Domain Controllers in a forest and reports any problems. |
|
|
Term
How can you develop a Block List? |
|
Definition
Adding new IP addresses to the Global Accept and Deny List. |
|
|
Term
What is recipient filtering? |
|
Definition
A method used for reducing unsolicited commercial email by filtering inbound email based on the recipient. |
|
|
Term
What is an administrative group? |
|
Definition
A collection of Exchange 2000 and 2003 objects that are grouped together for the purpose of managing and delegating permissions. |
|
|
Term
(T/F) Permissions are automatically propagated to all child objects. |
|
Definition
|
|
Term
For Exchange 2003 Setup to run, what four (4) services you must install and enable but not necessarily start? |
|
Definition
- NNTP
- SMTP
- World Wide Web Publishing Service
- IIS Admin Service
|
|
|
Term
What are the event numbers that indicate the start and end of the backup process? |
|
Definition
|
|
Term
What does the Event ID 4000 indicate? |
|
Definition
A connection fails for a reason other than a specific protocol error. |
|
|
Term
What does a server status of unreachable indicate? |
|
Definition
One of the main servers is down, or if a server is in a different routing group, a connector between routing groups may be down, or not exist. |
|
|
Term
(T/F) Each server must be able to query Active Directory for logon authentication and information about configuration and mail-enabled objects. |
|
Definition
|
|
Term
What utility performs diagnostic functions that help ensure the NetLogon service finds Domain Controllers and Global Catalog Servers? |
|
Definition
|
|
Term
What NLTEST syntax would list the domain controllers in the navy mil domain? |
|
Definition
|
|
Term
What NLTEST syntax displays the current site name? |
|
Definition
|
|
Term
What NLTEST syntax lists detailed information about each domain controller? |
|
Definition
|
|
Term
What is the simplest way to get a list of the objects attributes? |
|
Definition
|
|
Term
What type of file does LDIFDE dump its information to? |
|
Definition
|
|
Term
How does junk email prove to be a major problem? |
|
Definition
- Uses a computers memory resources
- Consumes network bandwidth
- Wastes user's time in reading email
|
|
|
Term
What objects can be added to a new Administrative Group? |
|
Definition
- System Policy objects
- Routing Group objects
- Public Folder Tree objects
- Server objects
|
|
|
Term
What are a group of permissions that enable administrators to perform their administrative tasks in Exchange 2000 and 2003? |
|
Definition
Exchange administrative permissions |
|
|
Term
What utility enables you to grant Exchange Administrative permissions? |
|
Definition
Exchange Administration Delegation Wizard |
|
|
Term
What are the three roles supported by Exchange Administrative Delegation Wizard? |
|
Definition
- Exchange Full Administrator
- Exchange Administrator
- Exchange View Only Administrator
|
|
|
Term
What Exchange Built-in Groups are automatically created? |
|
Definition
- Exchange Domain Servers
- Exchange Enterprise Servers
|
|
|
Term
What services must be running before Microsoft System Attendant will start? |
|
Definition
- Event Log
- NTLM Security Support Provider
- RPC
- Server
- Workstation
|
|
|
Term
The information store process creates and manages indexes for common key fields for faster lookups and searches for documents that reside in a store. |
|
Definition
|
|
Term
What does event ID 9582 identify? |
|
Definition
Low or fragmented virtual memory |
|
|
Term
Where is the Badmail folder located? |
|
Definition
C:\Program Files\exchsrvr\mailroot\vsi1\badmail |
|
|