Cert Exam Prep: Exam 70-345: Designing and Deploying ...

Cert Exam Prep: Exam 70-345: Designing and Deploying ...

BRK3254 Cert Exam Prep: Exam 70-345: Designing and Deploying Microsoft Exchange Server 2016 Vladimir Meloski MCT, MVP Twitter: @VladimirMeloski [email protected] Exam 70-345 Designing and Deploying Microsoft Exchange Server 2016

Plan, deploy, manage, and troubleshoot mailbox databases Plan, deploy, manage, and troubleshoot client access services Plan, deploy, manage, and troubleshoot transport services Plan, deploy, and manage an Exchange infrastructure, recipients, and security Plan, deploy, and manage compliance, archiving, eDiscovery, and auditing

Implement and manage coexistence, hybrid Plan, deploy, manage, and troubleshoot mailbox databases Plan, deploy, and manage mailbox databases Plan, deploy, and manage high-availability solutions for mailbox databases Plan, deploy, and manage a site-resilient Database Availability Group (DAG) Monitor and troubleshoot mailbox

databases Plan, deploy, and manage backup and Plan, deploy, and manage mailbox databases Plan for database size and storage performance requirements Plan mailbox database capacity and placement Plan archive mailboxes capacity and placement

Plan modern public folder capacity and placement Plan for storage architecture (SAN, DAS, Plan, deploy, and manage mailbox databases Plan file system requirements Plan for auto reseed Plan for virtualization requirements and scenarios Validate storage design by running

JetStress Create and configure mailbox databases Manage mailbox databases Configure transaction log properties and file Plan, deploy, and manage highavailability solutions for mailbox databases Identify failure domains Plan a solution that meets SLA requirements around scheduled downtime Plan for software updates and server maintenance Plan for change management Plan, deploy, and manage highavailability solutions for mailbox

Create, configure, and manage Database databases Availability Groups (DAGs) Create, configure, and manage DAG networks Create, configure, and manage proper placement of a file share witness Create and configure mailbox database copies Create, configure, and manage Azure file share witness

Plan, deploy, and manage a site-resilient Database Availability Group (DAG) Recommend quorum options with given customer requirements Plan, create, and configure cross-site DAG configuration Plan, deploy, and configure Datacenter Activation Coordination (DAC) Configure and manage proper placement of an alternate file share witness (FSW) Test and perform site recovery

Monitor and troubleshoot mailbox databases Monitor mailbox database replication and content indexing Troubleshoot mailbox database replication and replay Troubleshoot mailbox database copy activation Troubleshoot mailbox database performance

Troubleshoot database failures (e.g., repair, defrag, recover) Resolve quorum issues Troubleshoot data center activation Plan, deploy, and manage backup and recovery solutions for mailbox databases Plan most appropriate backup solution that meets SLA requirements of recovery point

objectives and recovery time objectives Deploy, configure, and manage lagged mailbox database copies Recover an Exchange Server, mailbox database, mailbox, public folder, or mail item Recover the public folder hierarchy Perform a dial tone restore Sample Question Your company is planning to deploy Exchange Server 2016. You need to determine the average user profile of the deployment. What are two tools you can use to estimate the user profile? a)

Performance Monitor b) Exchange Server Role Requirements Calculator c) Jetstress M I C R O S O F T C O N F I D E N T I A L I N T E R N A L O N LY Answer Your company is planning to deploy Exchange Server 2016. You need to determine the average user profile of

the deployment. What are two tools you can use to estimate the user profile? a) Performance Monitor b) Exchange Server Role Requirements Calculator c) Jetstress d)

Message tracking logs Takeaways Know the tools well and what they are used for Plan, deploy, manage, and troubleshoot client access services Plan, deploy, and manage client access services

Plan, deploy, and manage mobility solutions Plan, deploy, and manage load balancing Monitor and troubleshoot client connectivity Plan, deploy, and manage a site-resilient client access services solution Plan, deploy, and manage client access services Plan namespaces for client connectivity Plan proxy and redirection requirements Plan and deploy certificates; plan and configure authentication (including FBA, Basic, NTLM, and Kerberos)

Plan, deploy, and configure Autodiscover, Outlook Anywhere, Outlook MAPI over HTTP, Exchange Web Services, Outlook on the Web, Exchange Admin Center, Exchange ActiveSync, POP3, and IMAP4 Plan, deploy, and manage client access services Plan, deploy, and configure Office Online Servers (OOS) Plan, create, and configure Offline Address Book (OAB) Plan, create, and configure hierarchical address lists Plan, deploy, and configure address book policies

Plan, deploy, and manage mobility solutions Plan, deploy, and configure OWA for Devices, Outlook for the Web policies, and mobile device mailbox policies Plan, deploy, and configure Allow Block Quarantine (ABQ) Plan, deploy, and configure Office Apps Plan, deploy, and manage load balancing Configure namespace load balancing, Plan for differences between layer seven

and layer four load balancing methods Monitor and troubleshoot client connectivity Troubleshoot Outlook Anywhere connectivity Troubleshoot connectivity

Troubleshoot Troubleshoot Troubleshoot Troubleshoot Troubleshoot Troubleshoot Troubleshoot Outlook MAPI over HTTP Exchange Web Services (EWS), Outlook on the Web POP3 and IMAP4 authentication Autodiscover Exchange ActiveSync proxy and redirection issues

Plan, deploy, and manage a site-resilient client access services solution Plan site-resilient namespaces Configure site-resilient namespace URLs Perform and test steps for site failover and switchover Plan certificate requirements for site failovers Manage expected client behavior during a failover and switchover Sample Question Your company has deployed and configured Office Online Server. You need to complete the integration

of Exchange Server 2016 with Office Online Server. Which two commands could you run to configure the integration? (Select 2) a) Set-MailboxServer MBX -WacDiscoveryEndpoint "https://oos.internal.adatum.com" b) Set-MailboxServer MBX -WacDiscoveryEndpoint "https://oos.internal.adatum.com/hosting/discovery" c) Set-OrganizationConfig -WacDiscoveryEndpoint "https://oos.internal.adatum.com/hosting/discovery"

d) Set-OrganizationConfig -WacDiscoveryEndpoint "https://oos.internal.adatum.com" ? M I C R O S O F T C O N F I D E N T I A L I N T E R N A L O N LY Answer Your company has deployed and configured Office Online Server. You need to complete the integration of Exchange Server 2016 with Office Online Server. Which two commands could you run to configure the integration? (Select 2) a) Set-MailboxServer MBX -WacDiscoveryEndpoint "https://oos.internal.adatum.com"

b) Set-MailboxServer MBX -WacDiscoveryEndpoint "https://oos.internal.adatum.com/hosting/discovery" c) Set-OrganizationConfig -WacDiscoveryEndpoint "https://oos.internal.adatum.com/hosting/discovery" Set-OrganizationConfig -WacDiscoveryEndpoint "https://oos.internal.adatum.com" ? Takeaways d) They love PowerShell!

Plan, deploy, manage, and troubleshoot transport services Plan, deploy, and manage transport services Troubleshoot and monitor transport services Plan, deploy, and manage message hygiene Plan, deploy, and manage site resilience transport services Plan, deploy, and manage transport services Plan a solution that meets SLA

requirements around message delivery Plan inter-site mail flow Plan inter-org mail flow Plan, deploy, and configure redundancy for intra-site scenarios Plan, deploy, and manage transport services Plan and configure for SafetyNet Plan and configure for shadow redundancy Plan and configure for redundant MX records Plan, create, and configure TLS transport, Edge transport, Send/Receive connectors, transport rules, accepted domains, email

address policies, and Address Rewriting Troubleshoot and monitor transport services Interpret message tracking logs and protocol logs Troubleshoot a shared namespace environment Troubleshoot SMTP mail flow Given a failure scenario, predict mail flow

and identify how to recover Troubleshoot TLS Troubleshoot the new transport Plan, deploy, and manage message hygiene Plan and configure malware filtering Plan and configure Plan and configure Plan and configure Plan and configure Framework Plan and configure (SCL) thresholds

connection filtering spam filtering recipient filtering Sender Policy Spam Confidence Level Plan, deploy, and manage site resilience transport services Plan, create and configure MX records for failover scenarios Manage resubmission and reroute queues Plan, create, and configure Send/Receive connectors for site resiliency

Test and perform steps for transport failover and switchover Sample Question You have an Exchange 2016 Server named EX03. Which of the following default receive connectors accepts authenticated connections from the Transport service on Mailbox servers over port 717. Select the correct answer. a) Client Proxy EX03 b) Client Frontend EX03

c) Default Frontend EX03 d) Default EX03 e) Outbound Proxy Frontend EX03 M I C R O S O F T C O N F I D E N T I A L I N T E R N A L O N LY Answer You have an Exchange 2016 Server named EX03.

Which of the following default receive connectors accepts authenticated connections from the Transport service on Mailbox servers over port 717. Select the correct answer. a) Client Proxy EX03 b) Client Frontend EX03 c) Default Frontend EX03

d) Default EX03 e) Outbound Proxy Frontend EX03 Plan, deploy, and manage an Exchange infrastructure, recipients, and security

Plan and configure Active Directory (AD) Domain Services for Exchange and Organizational settings Create and configure mail-enabled objects Manage mail-enabled object permissions Plan, deploy, manage, and troubleshoot Role Based Access Control (RBAC) Plan an appropriate security strategy Plan, deploy, manage, and troubleshoot IRM with Active Directory Rights Management Plan and configure Active Directory (AD) Domain Services for Exchange and Organizational settings Plan the number of domain controllers

Plan placement of Global Catalog (GC) Plan and configure DNS changes required for Exchange Plan for schema changes required for Exchange, prepare AD for Exchange Prepare domains for Exchange Plan and configure Active Directory site topology Plan and configure throttling policies

Create and configure mail-enabled objects Create and configure mailboxes Create and configure resource mailboxes and scheduling Create and configure shared mailboxes Create and configure mail-enabled users and contacts

Create and configure distribution lists Configure moderation, create Configure linked mailboxes Create and configure modern public folders Manage mail-enabled object permissions Determine when to use Send-As and Send On-Behalf permissions Configure mailbox folder permissions Configure mailbox permissions

Set up room mailbox delegates Configure auto-mapping Create and configure public folder permissions Plan, deploy, manage, and troubleshoot Role Based Access Control (RBAC) Determine appropriate RBAC roles and cmdlets Limit administration using existing role groups Evaluate differences between RBAC and Active Directory split permissions Plan and configure a custom-scoped role group Plan and configure delegated setup Plan and create unscoped top-level roles, troubleshoot RBAC Plan and configure user assignment policies

Plan an appropriate security strategy Plan and configure BitLocker Plan and configure S/MIME Plan, deploy, manage, and troubleshoot IRM with Active Directory Rights Management Services (AD RMS) or Azure RMS Plan and configure Information Rights

Management (IRM) in Exchange Create an RMS template Plan and create transport protection rules Plan and create Outlook protection rules Plan and configure journal report decryption Plan and configure IRM for eDiscovery Plan and configure pre-licensing for client access Troubleshoot failed IRM protection Sample Question You want to create a custom SMTP email address that includes the first 3 characters of a users first name and the first 3 characters of their last name.

Which variables would you use to specify those values?? a) %3i and %3g b) %3g and %3s c) %3d and %3s d)

%3f and %3l e) %3m and %3g M I C R O S O F T C O N F I D E N T I A L I N T E R N A L O N LY Answer You want to create a custom SMTP email address that includes the first 3 characters of a users first name and the first 3 characters of their last name. Which variables would you use to specify those values?? a) %3i and %3g

b) %3g and %3s c) %3d and %3s d) %3f and %3l e) %3m and %3g

Plan, deploy, and manage compliance, archiving, eDiscovery, and auditing Plan and configure Data Loss Prevention (DLP) solutions Plan, configure, and manage Archiving and Message Records Management (MRM) Plan, configure, and perform eDiscovery Plan, configure, and manage a compliance solution

Plan, manage, and use mailbox and administrative auditing Plan and configure Data Loss Prevention (DLP) solutions Plan a DLP solution to meet business requirements Plan and configure pre-built rules Plan and create custom rules Plan and configure custom DLP policies Plan and configure DLP fingerprinting Plan, configure, and manage Archiving and Message Records Management (MRM) Plan and configure retention policies

Plan, create, and configure custom tags Assign policies to users Plan and configure the Managed Folder Assistant Remove and delete tags Plan and configure online archiving (Office 365) Plan and create archive policies Plan, configure, and perform eDiscovery Plan and delegate RBAC roles for

eDiscovery Enable a legal/litigation hold Perform a query-based InPlace hold Perform multi-mailbox searches in Exchange Administration Center (EAC) and Exchange Management Shell Integrate InPlace federated searches with Microsoft SharePoint Discovery center Plan, configure, and manage a compliance

solution Plan and configure MailTips Plan, create, configure, and deploy message classifications Plan and configure transport rules to meet specified compliance requirements Plan and configure journaling Plan, manage, and use mailbox and administrative auditing Plan and configure mailbox audit logging Plan and configure administrative audit logging Search and interpret all audit logs

Sample Question Administrators can apply retention settings to items and folders in a users mailbox. What is the purpose of applying retention settings? (Select 2) a) They specify how long a message stays in the users mailbox. b) They specify whether action messages will be automatically tagged as tasks. c) They specify whether the archive mailbox is cached on the client computer.

d) They specify what happens when a message reaches its retention age. M I C R O S O F T C O N F I D E N T I A L I N T E R N A L O N LY Answer Administrators can apply retention settings to items and folders in a users mailbox. What is the purpose of applying retention settings? (Select 2) a) They specify how long a message stays in the users mailbox. b)

They specify whether action messages will be automatically tagged as tasks. c) They specify whether the archive mailbox is cached on the client computer. d) They specify what happens when a message reaches its retention age. Implement and manage coexistence, hybrid scenarios, migration, and federation Plan, deploy, and troubleshoot coexistence with Office 365 (Exchange Online)

Plan, deploy, manage, and troubleshoot Exchange federation Plan, deploy, and troubleshoot onpremises coexistence with earlier supported versions of Exchange Migrate from earlier supported versions of Exchange Plan, deploy, and troubleshoot coexistence with Office 365 Plan, deploy, and manage hybrid configuration evaluate limitations of the Hybrid Configuration Wizard Plan and manage hybrid deployment OAuthbased authentication Plan and configure certificate and firewall requirements for Exchange Hybrid setup Troubleshoot transport with Exchange Online

Troubleshoot client access with Exchange Online Plan, deploy, manage, and troubleshoot Exchange federation Plan, create, and manage federation trusts with Microsoft federation gateways Manage sharing policies Manage organization relationships Plan and create certificate and firewall requirements for federation Troubleshoot Exchange federation trust and organization relationships Troubleshoot cross-forest availability Plan, deploy, and troubleshoot on-premises

coexistence with earlier supported versions of Exchange Plan, create, and configure namespaces for coexistence Plan and configure proxy redirect Plan firewall configuration for coexistence Plan and configure for mail flow requirements

Plan for mailbox migrations Troubleshoot transport in coexistence Troubleshoot client access in coexistence Migrate from earlier supported versions of Exchange Determine transition paths to Exchange Migrate to modern public folders Migrate mailboxes Plan for discontinued features, transition and decommission servers Troubleshoot Mailbox Replication Services Sample Question Your Exchange organization is already using federated

sharing with the target domain contoso.com. In order to establish free/busy information sharing with the domain adatum.com that is a different Exchange organization, what do you need to configure? a) Create a federation trust, and a new organization relationship b) Create a new organization relationship c) Create a federation trust d) Add the adatum.com domain to the existing organization relationship M I C R O S O F T C O N F I D E N T I A L I N T E R N A L O N LY

Answer Your Exchange organization is already using federated sharing with the target domain contoso.com. In order to establish free/busy information sharing with the domain adatum.com that is a different Exchange organization, what do you need to configure? a) Create a federation trust, and a new organization relationship b) Create a new organization relationship c) Create a federation trust d) Add the adatum.com domain to the existing organization relationship

Other Preparation Resources Resources to prepare for the Office 365 exams Books Online courses Instructor Led Courses Practice tests Self pace experience

Books MS Press Books Notable titles: Exam Ref 70-345 Designing and Deploying Microsoft Exchange Server 2016: Coming September 16, 2016 Pros: Very portable and cheap Cons: Can be out of date Online Courses Microsoft Virtual Academy http://mva.microsoft.com/ edX.org Notable titles: 6 MVA courses

CLD208 series and CLD209 series Pros: Self paced and cheap Cons: Time consuming Instructor Led Training Microsoft Official Curriculum books Notable titles: Course 20345-1A: Administering Microsoft Exchange Server 2016: https://www.microsoft.com/en-us/learning/course.aspx?cid=20345-1 Course 20345-2A: Designing and Deploying Microsoft Exchange Server 2016: https://www.microsoft.com/en-us/learning/course.aspx?cid=20345-2 Pros: Very detailed and hands on

Cons: Expensive and time consuming Practice Tests MeasureUp Pros: As a knowledge check, least amount of time Cons: Can be out of date. Does not really prepare you for the product, only for the exam. Believed by some to be easier than the actual exam. Self pace experience Implement Exchange Server 2016 for customers

TechNet labs: https://technet.microsoft.com/en-us/virtuallabs Q&A Please evaluate this session Your feedback is important to us! From your PC or Tablet visit MyIgnite at http://myignite.microsoft.com From your phone download and use the Ignite Mobile App by scanning the QR code above or visiting

https://aka.ms/ignite.mobileapp 2016 Microsoft Corporation. All rights reserved.

Recently Viewed Presentations

  • A Sparse Texture Representation Using Affine-Invariant Regions

    A Sparse Texture Representation Using Affine-Invariant Regions

    Herbert Simon, 1957 "It is not my aim to surprise or shock you---but … there are now in the world machines that think, that learn and that create.Moreover, their ability to do these things is going to increase rapidly until---in...
  • ONLINE EDUCATION - flite-proj.cenfim.pt

    ONLINE EDUCATION - flite-proj.cenfim.pt

    Gilly Salmon. ANNE FOX APS WWW.ANNEFOX.EU . ONLINE EDUCATION: STATE OF THE ART. Apply what we know about effective learning both to face to face AND online learning. ANNE FOX APS WWW.ANNEFOX.EU . SOURCES. Bonk, C, Adding Some TEC-VARIETY, free...
  • Diapositive 1 - WordPress.com

    Diapositive 1 - WordPress.com

    Sa solution est fragile et Einstein sait que ses équations ont ouvert la voie à un autre modèle, qui, développé en 1917, 1922, 1927 et 1929, oblige Einstein à finalement rendre les armes : il abandonne son idée d'un Univers...
  • Chapter 1: The World Before the Opening of the Atlantic

    Chapter 1: The World Before the Opening of the Atlantic

    Chapter 1: The World Before the Opening of the Atlantic Students will identify Native American Societies that developed across Mesoamerica and South America Students will analyze many divers Native American cultures that developed across the different geographic regions of North...
  • Environmental effects of Wireless radiation Professional Awareness -

    Environmental effects of Wireless radiation Professional Awareness -

    RF Sources -We encounter daily Broadcast (TV / Radio) - kW in VHF / UHF Portable phones (5 W in VHF / UHF range) Pager / Cordless phone (< 1 Watt in VHF) Microwave oven - source produces 2000W, but...
  • The Renaissance 1300-1500

    The Renaissance 1300-1500

    Adoration of the Magi Santa Maria Novella, c. 1475-76 it contains the portraits of Cosimo de Medici, his sons Piero and Giovanni (all these by now dead), and his grandsons Lorenzo and Giuliano. There are also portraits of the donor...
  • Oxidation-Reduction Chemistry - Oneonta

    Oxidation-Reduction Chemistry - Oneonta

    Electrolysis of Molten Salts. A current of 7.06 A is passed through an electrolysis cell containing molten CaCl. 2. for 12.9 minutes.. b. Calculate the quantity or volume of products collected at the anode and cathode (assume gases are collected...
  • Guidance Note Work Health & Safety Obligations for

    Guidance Note Work Health & Safety Obligations for

    "No contracting out" is a core element of model WHS Act that directly affects the engagement of Independent Contractors. In practice, this means that a PCBU cannot use a contract to limit or modify their statutory obligations.