ExamGecko
Home Home / Microsoft / MS-203

Microsoft MS-203 Practice Test - Questions Answers, Page 17

Question list
Search
Search

List of questions

Search

Related questions


SIMULATION Please wait while the virtual machine loads. Once loaded, you may proceed to the lab section. This may take a few minutes, and the wait time will not be deducted from your overall test time. When the Next button is available, click it to access the lab section. In this section, you will perform a set of tasks in a live environment. While most functionality will be available to you as it would be in a live environment, some functionality (e.g., copy and paste, ability to navigate to external websites) will not be possible by design. Scoring is based on the outcome of performing the tasks stated in the lab. In other words, it doesn't matter how you accomplish the task, if you successfully perform it, you will earn credit for that task. Labs are not timed separately, and this exam may have more than one lab that you must complete. You can use as much time as you would like to complete each lab. But, you should manage your time appropriately to ensure that you are able to complete the lab(s) and all other sections of the exam in the time provided. Please note that once you submit your work by clicking the Next button within a lab, you will NOT be able to return to the lab. Use the following login credentials as needed: To enter your username, place your cursor in the Sign in box and click on the username below. To enter your password, place your cursor in the Enter password box and click on the password below. Microsoft 365 Username: [email protected] Microsoft 365 Password: xxxxxx If the Microsoft 365 portal does not load successfully in the browser, press CTRL-K to reload the portal in a new browser tab. The following information is for technical support purposes only. Lab Instance: XXXXXX You need to ensure that a notification email is sent to [email protected] when a user marks an email message as Not Junk in Microsoft Outlook. To complete this task, sign in to the Microsoft 365 admin center.









Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.

Your company has an Exchange Online tenant that contains 2,000 mailboxes.

A partner company named Fabrikam, Inc. uses a third-party messaging solution. The outbound SMTP server for Fabrikam uses an IP address of 131.107.2.22.

You discover that several email messages from the fabrikam.com domain are erroneously marked as spam.

You need to ensure that all the email messages sent from the fabrikam.com domain are delivered successfully to the user mailboxes of your company.

Solution: You create a remote domain.

Does this meet the goal?

A.

Yes

A.

Yes

Answers
B.

No

B.

No

Answers
Suggested answer: B

DRAG DROP

Your company has a Microsoft Exchange Server 2019 hybrid deployment.

The company has two departments that have the mailboxes configured as shown in the following table.

All the accounting department mailboxes reside in a database named ACCT-DB01.

You create the mailboxes shown in the following table.

You need to record all the email communication of the users in each department. The solution must minimize costs.

What should you use for each department? To answer, drag the appropriate options to the correct departments. Each option may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.

NOTE: Each correct selection is worth one point.


Question 162
Correct answer: Question 162

Explanation:

Reference:

https://www.microsoft.com/en-gb/microsoft-365/exchange/microsoft-exchange-server-licensing-licensing-overview?rtc=1

HOTSPOT

Your company has a Microsoft Exchange Server 2019 hybrid deployment.

The company has four departments that have the mailboxes shown in the following table.

The mailboxes are configured as shown in the following table.

You have two administrators named Admin1 and Admin2 that are assigned the permissions shown in the following table.

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.


Question 163
Correct answer: Question 163

Explanation:

Reference:

https://docs.microsoft.com/en-us/exchange/discovery-management-exchange-2013-help

https://docs.microsoft.com/en-us/powershell/module/exchange/mailboxes/search-mailbox?view=exchange-ps

HOTSPOT

You manage a Microsoft Exchange Online subscription.

You use Advanced Threat Protection (ATP).

A partner company sends daily invoices to your company. The invoices are always named AdatumInvoice.xlsx.

Some users report that sometimes they cannot find the invoices in their Inbox folder.

You need to identify whether the invoices are identified as malicious by Microsoft 365.

Which two blades should you use? To answer, select the appropriate blades in the answer area.

NOTE: Each correct selection is worth one point.


Question 164
Correct answer: Question 164

DRAG DROP

You have a Microsoft Exchange Server 2019 organization.

You need to identify which accounts in Active Directory are assigned permissions to dismount mailbox databases.

How should you complete the command? To answer, drag the appropriate values to the correct targets. Each value may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.

NOTE: Each correct selection is worth one point.


Question 165
Correct answer: Question 165

Explanation:

Reference:

https://docs.microsoft.com/en-us/powershell/exchange/find-exchange-cmdlet-permissions?view=exchange-ps

You have a Microsoft Exchange Server 2019 organization.

You plan to migrate all mailboxes to Exchange Online.

You need to provide a user with the ability to perform the mailbox migrations. The solution must use the principle of least privilege.

Which role should you assign to the user?

A.

Recipient Management

A.

Recipient Management

Answers
B.

Server Management

B.

Server Management

Answers
C.

Help Desk

C.

Help Desk

Answers
D.

Organization Management

D.

Organization Management

Answers
Suggested answer: A

Explanation:

Reference:

https://docs.microsoft.com/en-us/exchange/permissions/feature-permissions/recipient-permissions?view=exchserver-2019

HOTSPOT

You have a Microsoft Exchange Server 2019 hybrid deployment.

You use Advanced Threat Protection (ATP).

You have safe attachments policies configured as shown in the following table.

You have the users shown in the following table.

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Question 167
Correct answer: Question 167

Explanation:

Box 1: No

Dynamic Delivery cannot make changes to on-premise mailboxes after the message has been delivered.

Box 2: Yes

Policy2 applies to User2. Policy2 has a block action so the message will be placed in quarantine.

Box 3: No

User3 does not have a policy assigned so the attachment will be forwarded without being scanned.

Reference:

https://docs.microsoft.com/en-us/microsoft-365/security/office-365-security/atp-safe-attachments?view=o365-worldwide

https://docs.microsoft.com/en-us/microsoft-365/security/office-365-security/atp-safe-attachments?view=o365-worldwide#dynamic-delivery-in-safe-attachments-policies

You deploy a Microsoft Exchange Server 2019 organization.

You need to ensure that users of all new mailboxes are prevented from editing their personal information.

What should you do?

A.

From the Exchange admin center, create a new role assignment policy.

A.

From the Exchange admin center, create a new role assignment policy.

Answers
B.

From PowerShell, run the New-Ro1eAssignmentPolicy cmdlet and specify the

-isDefault parameter.

B.

From PowerShell, run the New-Ro1eAssignmentPolicy cmdlet and specify the

-isDefault parameter.

Answers
C.

From the Exchange admin center, create a new role group and assign the role group to Domain Users.

C.

From the Exchange admin center, create a new role group and assign the role group to Domain Users.

Answers
D.

From PowerShell, run the New-RoleGroup cmdlet and specify the

-CustomRecipientWriteScope parameter.

D.

From PowerShell, run the New-RoleGroup cmdlet and specify the

-CustomRecipientWriteScope parameter.

Answers
Suggested answer: B

Explanation:

Reference:

https://docs.microsoft.com/en-us/powershell/module/exchange/role-based-access-control/new-roleassignmentpolicy?view=exchange-ps

You have a Microsoft Exchange Online tenant.

You discover that a virus has infected the mailboxes of several users. The users are currently spreading the virus by emailing attachments that contain the virus.

You need to temporarily prevent all users from emailing attachments while you remove the virus from all the mailboxes.

What should you configure?

A.

a connection filter

A.

a connection filter

Answers
B.

a mail flow rule

B.

a mail flow rule

Answers
C.

a connector

C.

a connector

Answers
D.

a spam fitter

D.

a spam fitter

Answers
Suggested answer: B

Explanation:

Reference:

https://docs.microsoft.com/en-us/exchange/security-and-compliance/mail-flow-rules/common-attachment-blocking-scenarios

Your company has a partnership with another company named contoso.com.

You need to ensure that all email messages containing the word sensitive and sent to the users at contoso.com are encrypted automatically.

You enable Azure Information Protection.

What should you do next?

A.

Create a data loss prevention (DLP) policy.

A.

Create a data loss prevention (DLP) policy.

Answers
B.

Create a mail flow rule.

B.

Create a mail flow rule.

Answers
C.

Configure a remote domain.

C.

Configure a remote domain.

Answers
D.

Configure an Outbound connector.

D.

Configure an Outbound connector.

Answers
Suggested answer: B

Explanation:

Reference:

https://thevaliantway.com/2019/01/encrypting-email-office-365-azure-information-protection/

Total 386 questions
Go to page: of 39