Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > Microsoft > Microsoft 365 Certified: Messaging Administrator Associate > MS-203

MS-203 Microsoft 365 Messaging Question and Answers

Question # 4

You have a Microsoft Exchange Online tenant that uses Microsoft Defender for Office 365. You have the policies shown in the following table.

You need to track any modifications made to Policy! by the identifying following:

• The name of the user that modified the policy

• The old and new values of settings modified in Policy!

• How the modifications compare to the baseline settings of Standard Preset Security Policy

What should you use in the Microsoft 365 Defender portal?

A.

Threat tracker

B.

Threat analytics

C.

Audit

D.

Configuration analyzer

Full Access
Question # 5

You have a Microsoft Exchange Online tenant that uses an email domain named contoso.com.

You enable DKIM for contoso.com and create the required DNS CNAME record for the first key.

You need to create the second DNS CNAME record required to support DKIM,

How should you complete the second DNS record? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Full Access
Question # 6

You have a Microsoft Exchange Online tenant.

You need to add a custom domain named contoso.com that meets the following requirements:

« All email messages from the intemet must first be filtered by a third-party cloud service before being delivered to Exchange Online.

« Recipient email systems must validate the messaging server for contoso.com)

Which type of DNS record should you use for each requirement? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Full Access
Question # 7

You have a Microsoft Exchange Online tenant that contains 1,000 users.

You need to prevent 100 users in the finance department at your company from using Direct file access when using Outlook on the web. The solution must ensure that all the other users in the company can continue to use Direct file access when using Outlook on the web.

What should you do?

A.

Modify the default sharing policy.

B.

Create and assign an Outlook Web App policy.

C.

Create and assign a sharing policy.

D.

Modify the default Outlook Web App policy.

Full Access
Question # 8

You have a Microsoft Exchange Online tenant.

You receive an email that was scanned by Exchange Online Protection (EOP) and contains the following message header.

The email was delivered to the Junk Email folder.

You need to identify which value pairs in the header indicate the following:

• The email was not received from a known open relay.

• The email is from a bulk sender.

What should you identify? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point.

Full Access
Question # 9

You have a Microsoft Exchange Server 2019 hybrid deployment that contains the public folders shown in the following table.

You plan to migrate the public folders to Exchange Online to improve the collaboration options available to users.

Which public folders can be migrated to Office 365 groups without losing the folders’ existing functionality?

A.

PF2 and PF3 only

B.

PF2 only

C.

PF1 and PF2 only

D.

PF1 only

E.

PF3 only

Full Access
Question # 10

You have a Microsoft Exchange Server 2019 organization.

You need to ensure that a user named User1 can prevent mailbox content from being deleted if the content contains the words Fabrikam and Confidential.

What should you do?

A.

Add User1 to the Discovery Management management role group.

B.

Assign the Legal Hold and Mailbox Import Export management roles to User1.

C.

Add User1 to the Records Management management role group.

D.

Add User1 to the Compliance Management management role group.

Full Access
Question # 11

You have a Microsoft Exchange Online tenant that uses a third-party email hygiene system named Service1. Service1 blocks all encrypted email.

All external email is routed through Service1 by using a connector.

Users classify email by using sensitivity labels. Emails classified as Secret are encrypted automatically.

You need to ensure that the users can send emails classified as Secret to external recipients.

Which two items should you create? Each correct answer presents part of the solution.

NOTE: Each correct selection is worth one point.

A.

a remote domain

B.

a connector

C.

a data loss prevention (DLP) policy

D.

a mail flow rule

E.

a label policy

Full Access
Question # 12

You have a Microsoft Exchange Online tenant that has anti-spam policies configured.

You need to identify any anti-spam policy settings that were changed during the last three months and review recommendations for increase Microsoft Standard or Stria configurations for Exchange Online anti-spam policies.

What should you use?

A.

Configuration analyzer in Microsoft 365 Defender

B.

Compliance Manager

C.

Microsoft Defender for Cloud Apps

D.

the Insights dashboard in the Exchange admin center

Full Access
Question # 13

You have a hybrid deployment of Microsoft Exchange Server 2019.

Users in your company's sales department have on-premises mailboxes and PST files.

You need to migrate the PST files to archive mailboxes. The archive mailboxes must reside in Exchange Online.

What should you do first?

A.

From Exchange Management Shell, run the Enable-Mailbox cmdlet and specify the

-Archive parameter.

B.

From Exchange Management Shell, run the New-MoveRequest cmdlet.

C.

From Exchange Online PowerShell, run the Set-Mailbox cmdlet and specify the

-ArchiveStatus parameter.

D.

From Exchange Online PowerShell, run the New-Mailbox cmdlet and specify the

-Archive parameter.

Full Access
Question # 14

You have a hybrid deployment between a Microsoft Exchange Online tenant and an on-premises Exchange Server 2019 organization.

The tenant uses an email domain named @contoso.com.

You recently purchased an email domain named fabrikam.com.

You need to ensure that all the users in the tenant can receive email messages by using the @fabrikam.com email domain. The solution must ensure that the users can continue to receive email by using the @contoso.com email domain.

Which three actions should you perform? Each correct answer presents part of the solution. NOTE; Each correct selection is worth one point.

A.

From Azure AD Connect add a domain for fabrikam.com.

B.

From the on-premises Exchange admin center, add an accepted domain for fabrikam.com.

C.

From the Exchange Management Shell, create a script that runs the

D.

From the Microsoft 365 admin center, verify the fabrikam.com email domain

E.

From the on-premises Exchange admin center, modify the email address policy

F.

From the Microsoft 365 admin center, add the fabrikam.com email domain.

Full Access
Question # 15

You need to resolve the email delivery delay issue.

What should you do?

A.

From the Security & Compliance admin center, modify the safe attachments policy

B.

From the Security & Compliance admin center, create a supervision policy.

C.

From the Exchange admin center in Exchange Online, modify the antimalware policy.

D.

From the Exchange admin center in Exchange Online, modify the spam filter policy.

Full Access
Question # 16

You must prevent HelpDeskUser1 from repeating the same mistake.

You need to identify which management role provided HelpDeskUser1 with the necessary permissions to make the mistake identified in the problem statement.

Which two cmdlets should you run? Each correct answer presents part of the solution.

A.

Get-RoleGroup

B.

Get-ManagementRoleEntry

C.

Get-RoleGroupMember

D.

Get-ManagementRoleAssignment

E.

Get-ManagementRole

Full Access
Question # 17

You need to recommend a solution that meets the security requirements for protecting users.

What should you recommend?

A.

From the Security & Compliance admin center, create an ATP safe attachments policy.

B.

From the Exchange admin center in Exchange Online, create a spam filter policy.

C.

From the Security & Compliance admin center, create an ATP anti-phishing policy.

D.

From the Security & Compliance admin center, create an ATP Safe Links policy.

Full Access
Question # 18

You need to recommend an Office 365 solution that meets the technical requirements for email from adatum.com.

Which two components should you recommend configuring from the Exchange admin center in Exchange Online? Each correct presents a complete solution.

NOTE: Each correct selection is worth one point.

A.

DKIM signatures

B.

a spam filter

C.

a malware filter

D.

data loss prevention (DLP) policies

E.

a connection filter

Full Access
Question # 19

You need to configure the Exchange organization to meet the security requirements for sending email messages to distribution groups.

Which cmdlet should you run?

A.

Set-OrganizationConfig

B.

Set-DistributionGroup

C.

Set-Mailbox

D.

New-PolicyipConfig

Full Access
Question # 20

You have a Microsoft Exchange Online tenant that contains three Azure Active Directory (Azure AD) security groups named Administrators, Managers, and Marketing. The tenant contains the users shown in the following table.

The tenant contains the resources shown in the following table.

ConferenceRoom1 has he following policy.

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Full Access
Question # 21

NO: 13

You manage an Exchange Online tenant.

You plan to migrate on-premises Microsoft Exchange Server mailboxes by using a cutover migration.

You need to grant the required permissions to the migration administrator account to complete the migration. The solution must use the principle of least privilege.

Which three permissions should you grant? Each correct answer presents a complete solution

NOTE: Each correct selection is worth one point.

A.

the FullAccess permission on each on-premises mailbox and the WriteProperty permission to modify the

TargetAddress property of the on-premises user account

B.

the Receive As permission on the on-premises mailbox database that stores the user mailboxes and the

WriteProperty permission to modify the TargetAddress property of the on-premises user account

C.

Domain Admins group member in Active Directory Domain Services (AD DS) of the on-premises Exchange

organization

D.

the FullAccess permission on each on-premises mailbox

E.

the Receive As permission on the on-premises mailbox database that stores the user mailboxes

Full Access
Question # 22

You need to configure the environment to support the planned changes for email addresses.

How should you complete the command? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Full Access
Question # 23

Use the drop-down menus to select the answer choice that complete each statement based on the information presented in the Exchange Online Connector exhibit.

NOTE: Each correct selection is worth one point.

Full Access
Question # 24

Joni Sherman reports that the Microsoft Outlook client on her Windows 10 device fails to start.

You need to troubleshoot the issue.

From the device, you start the Microsoft Remote Connectivity Analyzer.

What should you run next?

A.

the Exchange ActiveSync test

B.

the Outlook Connectivity test

C.

the Service Account Access test

D.

the Microsoft Support and Recovery Assistant for Office 365 client

Full Access
Question # 25

Lynne Robbins and the users in the sales department plan to collaborate on a project with a partner company named Contoso, Ltd. that has an email domain named contoso.com.

You need to ensure that only the sales department users can share all their calendar free/busy

information with the users in contoso.com.

How should you configure the organization relationship?

A.

Select Calendar free/busy information with time only and enter Group1

B Select Calendar free/busy information with time, subject, and location and enter Groups

C Select Calendar free/busy information with time, subject, and location and enter Group3

B.

Select Calendar free/busy information with time only and enter Group3

C.

Select Calendar free/busy information with time only and enter Group2

Full Access
Question # 26

Which contacts can sign in to and access resources in the adatum.com tenant?

A.

Contact1 only

B.

Contact2 only

C.

Contact1 and Contact3 only

D.

Contact2 and Contact3 only

E.

Contact1, Contact2. and Contact3

Full Access
Question # 27

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Full Access
Question # 28

You need to recommend a solution for the public folders that supports the planned changes and meets the technical requirements.

What should you recommend?

A.

Microsoft SharePoint site mailboxes

B.

Office 365 groups

C.

Resource mailboxes

D.

Public folder replicas

Full Access
Question # 29

You need to modify FilesPolicy to prevent users from downloading ASPX files. The solution must meet the technical requirements.

How should you complete the command? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Full Access
Question # 30

You need to identify which users clicked the links in the phishing emails.

What should you do?

A.

Run a message trace and review the results.

B.

Query the mailbox audit log.

C.

Use the URL trace reporting feature.

D.

Review the quarantine mailbox.

Full Access
Question # 31

You need to configure the new smartboard to support the planned changes.

Which three settings should you configure? To answer, select the appropriate settings in the answer area.

NOTE: Each correct selection is worth one point.

Full Access
Question # 32

User3 leaves the company.

You need to ensure that Admin1 and Admin2 can access the mailbox of User3. The solution must meet the technical requirements.

What should you do?

A.

Migrate the mailbox of User3 to a distribution group.

B.

Migrate the mailbox of User3 to a Microsoft 365 group.

C.

Convert the mailbox of User3 into a resource mailbox.

D.

Convert the mailbox of User3 into a shared mailbox.

Full Access
Question # 33

You need to encrypt email between Fabrikam and Litware to support the planned changes.

What should you configure in the Exchange admin center?

A.

a connector

B.

an organization relationship

C.

a sharing policy

D.

a remote domain

Full Access
Question # 34

How many default policy tags (DPTs), retention policy tags (RPTs), and personal tags should you create to meet the retention requirements? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Full Access
Question # 35

You need to generate a report for the mobile devices that meets the technical requirements.

Which PowerShell cmdlet should you use?

A.

Get-DevicePolicy

B.

Get-MobileDevice

C.

Get-MobileDeviceStatistics

D.

Get-DeviceTenantPolicy

Full Access
Question # 36

You need to perform a remote wipe of the devices of User2 and User3.

You run the following commands.

Clear-MobileDevice -id User2-Device

-NotificationEmailAddress "admin@Fabrikam.com"

Clear-MobileDevice -id User3-Device

-NotificationEmailAddress "admin@Fabrikam.com"

What occurs on each device? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Full Access
Question # 37

You need to ensure that In-Place Archiving is enabled for the marketing department users.

Which user should perform the change, and which tool should the user use? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Full Access
Question # 38

You need to identify the contents of the FabrikamProject public folder to meet the technical requirements.

Which PowerShell cmdlet should you run?

A.

Get-PublicFolderScaciscics

B.

Get-PublicFolderltemStatistics

C.

Get-PublicFolderMailboxDiagnoscics

D.

Get-PublicFolder

Full Access
Question # 39

You need to implement a solution to support the planned changes for the branch office administrators.

What should you do?

A.

Assign the Mail Recipients role to the branch office administrators and use a default management scope.

B.

Assign the Mail Recipients role to the branch office administrators and create a custom management scope.

C.

Assign the Recipient Policies role to the branch office administrators and use a default management scope.

D.

Assign the Recipient Policies role to the branch office administrators and create a custom management scope.

Full Access
Question # 40

You need to implement a solution to meet the technical requirements for the SCL.

How should you complete the command? To answer, select the appropriate options in the answer area.

Full Access
Question # 41

You need to implement a solution to support the planned changes for the helpdesk users.

What should you do?

A.

Assign the Recipient Policies role to the helpdesk users and a default management scope

B.

Assign the Mail Recipients role to the helpdesk users and use a default management scope

C.

Assign the Mail Recipients role to the helpdesk users and create a custom management scope

D.

Assign the Recipient Policies roles to the helpdesk users and create a custom management scope

Full Access
Question # 42

You need to recommend a procedure for closing the Brussels office that meets the technical requirements.

What should you recommend?

A.

In the main office, deploy an Exchange Server 2016 server that has the Unified Messaging role installed, and then move the mailboxes from the Brussels office to the new server.

B.

Deploy a Microsoft Skype for Business 2019 server to the main office, and then move the mailboxes from the Brussels office to an Exchange Server 2019 server in the main office.

C.

Implement a new mailbox database on an Exchange Server 2019 server in the main office, and then move the mailboxes from the Brussels office to the new mailbox database.

D.

Implement a new database availability group (DAG) that contains the server in the Brussels office and a new Exchange Server 2019 server in the main office, and then create a mailbox database copy on the new server in the main office.

Full Access
Question # 43

You need to implement a solution that meets the technical requirements for the retention of junk email, sent items, and deleted items.

What is the minimum number of retention policies and retention tags you should use? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Full Access
Question # 44

You need to resolve the issue for the customer service department users.

What should you modify?

A.

a transport rule

B.

the Send connector to the Internet

C.

the tarpit interval

D.

the global throttling policy

Full Access
Question # 45

Your company named Contoso, Ltd. has a Microsoft Exchange Server 2019 organization that contains the mailbox databases shown in the following table.

You need to assign an offline address book (OAB) named Managers to all the users in a group named Managers.

How should you complete the PowerShell script? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Full Access
Question # 46

You need to configure the required objects for the branch office administrators.

What should you create for each administrator?

A.

a management role assignment policy and a management role group

B.

a management role scope and a management role assignment

C.

a management role scope and a management role group

D.

a management role and a management role assignment policy

Full Access
Question # 47

You need to recommend a solution to retain the items in the public folders. The solution must support the

planned changes.

What should you recommend?

A.

Create an Outlook rule that forwards all the items in each public folder to a compliance mailbox.

B.

Place an In-Place Hold on all the mailboxes of the public folders.

C.

Increase the frequency of the backups.

D.

Modify the public folder permissions.

Full Access
Question # 48

You need to resolve the issue for the transport department users.

What is the best way to achieve the goal? More than one answer choice may achieve the goal. Select the

BEST answer.

A.

Move the public folder mailbox that contains TransportPF to a server in the main office.

B.

Move TransportPF to a public folder mailbox hosted in the main office.

C.

Modify the default public folder mailbox for all the transport department users.

D.

Instruct the transport department users to add TransportPF to their Favorites list in Outlook.

Full Access