Which three actions should you perform?

###BeginCaseStudy###
Case Study: 3
Contoso Ltd
Overview
General Overview
Contoso, Ltd., is an aerospace engineering company that manufactures jet engine parts for
various industries and government agencies. Contoso has an Exchange Server 2013
organization.
A partner company named Tailspin Toys has an Exchange Server 2010 organization.
Physical Locations
Contoso has two offices. The offices are located in Montreal and Chicago.
Each office contains a data center:
• The Montreal and Chicago offices connect to each other
by using a direct WAN link.
• All connections to the Internet are routed through the
Montreal office.
• Most of Contoso’s employees work from the Montreal
office.
Existing Environment
The network of Contoso is configured as shown in the exhibit. (Click the Exhibit button.)

The network of Contoso contains the following components:
• Client computers that run either Microsoft Outlook
2007 or Outlook 2010.
• Users who have a primary SMTP address that uses the
contoso.com suffix.
• A retention policy that retains all email messages for
580 days and is associated to all users.
• Six servers that have Exchange Server installed. The
servers are configured as shown in the following table.

• A data availability group (DAG) named DAG1 that
contains all of the mailbox servers. EX5 is configured
as the witness server for DAG1. A file server in the
Chicago office is configured as an alternate witness
server. DAG1 has Datacenter Activation Coordination
(DAC) mode enabled.
Requirements
Planned Changes
Contoso plans to implement the following changes:
• Implement an organization relationship between
Contoso and Tailspin Toys.
• Move the mailboxes of all the members of the sales
department to Office 365.
• Evaluate Unified Messaging (UM) by conducting a
small pilot in the Montreal office.
Security Requirements
Contoso identifies the following security requirements:
• Ensure that the data in the Exchange Server databases
cannot be read if a hard disk is stolen.
• Prevent temporary employees from executing a Reply
All or a Forward of any email messages they receive.
• Prevent temporary contractors from changing the
configurations of the user accounts for the users in the
research and development department.
• Ensure that all of the connections to Outlook Web App
from the Internet use Extensible Authentication
Protocol (EAP) protocols and Transport Layer Security
(TLS) protocols.
• Secure all of the email messages from the users at
Tailspin Toys to the Contoso users. Ensure that all of
the messages can be secured if the certificates at
Tailspin Toys are issued by a trusted third-party
certification authority (CA).

Auditing Requirements
Contoso identifies the following requirements for auditing mailboxes:
• The manager of the legal department must receive a
daily report by email that contains a record of all the
eDiscovery mailbox searches.
• Any access to a mailbox by a service account must be
excluded from the daily report.
Compliance Requirements
All of the email messages in the Sent Items folder of each user in the marketing department
of Contoso must be deleted automatically after 365 days.
Office 365 Coexistence Requirements
Contoso identifies the following Office 365 coexistence requirements:
• Office 365 users must be able to access their mailbox by
using their Active Directory user account in Contoso.
• On-premises users must be able to share free/busy
information and calendar information with the Office
365 users.
###EndCaseStudy###

DRAG DROP
You need to implement a solution to meet the security requirement for the temporary employees.
You deploy an Active Directory Rights Management Services (AD RMS) cluster, and then you run the
Set-IRMConfiguration cmdlet.
Which three actions should you perform?
To answer, move the three appropriate actions from the list of actions to the answer area and
arrange them in the correct order.

###BeginCaseStudy###
Case Study: 3
Contoso Ltd
Overview
General Overview
Contoso, Ltd., is an aerospace engineering company that manufactures jet engine parts for
various industries and government agencies. Contoso has an Exchange Server 2013
organization.
A partner company named Tailspin Toys has an Exchange Server 2010 organization.
Physical Locations
Contoso has two offices. The offices are located in Montreal and Chicago.
Each office contains a data center:
• The Montreal and Chicago offices connect to each other
by using a direct WAN link.
• All connections to the Internet are routed through the
Montreal office.
• Most of Contoso’s employees work from the Montreal
office.
Existing Environment
The network of Contoso is configured as shown in the exhibit. (Click the Exhibit button.)

The network of Contoso contains the following components:
• Client computers that run either Microsoft Outlook
2007 or Outlook 2010.
• Users who have a primary SMTP address that uses the
contoso.com suffix.
• A retention policy that retains all email messages for
580 days and is associated to all users.
• Six servers that have Exchange Server installed. The
servers are configured as shown in the following table.

• A data availability group (DAG) named DAG1 that
contains all of the mailbox servers. EX5 is configured
as the witness server for DAG1. A file server in the
Chicago office is configured as an alternate witness
server. DAG1 has Datacenter Activation Coordination
(DAC) mode enabled.
Requirements
Planned Changes
Contoso plans to implement the following changes:
• Implement an organization relationship between
Contoso and Tailspin Toys.
• Move the mailboxes of all the members of the sales
department to Office 365.
• Evaluate Unified Messaging (UM) by conducting a
small pilot in the Montreal office.
Security Requirements
Contoso identifies the following security requirements:
• Ensure that the data in the Exchange Server databases
cannot be read if a hard disk is stolen.
• Prevent temporary employees from executing a Reply
All or a Forward of any email messages they receive.
• Prevent temporary contractors from changing the
configurations of the user accounts for the users in the
research and development department.
• Ensure that all of the connections to Outlook Web App
from the Internet use Extensible Authentication
Protocol (EAP) protocols and Transport Layer Security
(TLS) protocols.
• Secure all of the email messages from the users at
Tailspin Toys to the Contoso users. Ensure that all of
the messages can be secured if the certificates at
Tailspin Toys are issued by a trusted third-party
certification authority (CA).

Auditing Requirements
Contoso identifies the following requirements for auditing mailboxes:
• The manager of the legal department must receive a
daily report by email that contains a record of all the
eDiscovery mailbox searches.
• Any access to a mailbox by a service account must be
excluded from the daily report.
Compliance Requirements
All of the email messages in the Sent Items folder of each user in the marketing department
of Contoso must be deleted automatically after 365 days.
Office 365 Coexistence Requirements
Contoso identifies the following Office 365 coexistence requirements:
• Office 365 users must be able to access their mailbox by
using their Active Directory user account in Contoso.
• On-premises users must be able to share free/busy
information and calendar information with the Office
365 users.
###EndCaseStudy###

DRAG DROP
You need to implement a solution to meet the security requirement for the temporary employees.
You deploy an Active Directory Rights Management Services (AD RMS) cluster, and then you run the
Set-IRMConfiguration cmdlet.
Which three actions should you perform?
To answer, move the three appropriate actions from the list of actions to the answer area and
arrange them in the correct order.

Answer:

Explanation:



Leave a Reply 6

Your email address will not be published. Required fields are marked *


potpal

potpal

last one should be OutlookprotectionRule

joe

joe

seen both outlook protection rule and transport rule as the last option.

This question is a bit rubbish as it can be either.

Why would it be one over the other? Can anyone explain why?

potpal

potpal

Looked into this some more and the answer looks to be correct should be “New-Transport” rule.

Here is why

Requirement: Prevent temporary employees from executing a Reply
All or a Forward of any email messages they receive.

Key words are “any email” and since Outlook protection rules do not run on Web App or Mobile devices it rules that out. https://msdn.microsoft.com/en-us/library/gg598216(v=exchsrvcs.149).aspx#OPRorTR

Sanan

Sanan

New-OutlookProtectionRule “Sent By Temporary Employees”
-FromDepartment TemporaryEmployees
-SentToScope All
-ApplyRightsProtectionTemplate “Do Not Forward”
-UserCanOverride $False

Ngoc Quang

Ngoc Quang

Finally PASSED 70-342 exam last week for the second try, scored 905!

Got 40 questions = 8 questions in the Case Study and 32 mixed questions.

About 5-8 NEW Qs (NOT available in this AIO site, I got them from other sites, visit the links at the end of this comments), they are mainly on RMS/IRM, Office365 co-existence, DAG (site resilience).

And, questions on ShadowRedundancy and SafetyNet have been reworded.

NOTE: a good knowledge about UM and lifestyle of DAG’s will help you a lot for passing!

P.S. Case Studies FYI:
1. A.Datum
2. Contoso, Ltd.
3. Trey Research
4. Proseware, Inc.
5. Fabrikam, Inc.

I learned valid 70-342 dumps here: http://www.passleader.com/70-342.html (231q VCE & PDF dumps, wrong answers have been corrected, all new Qs are from it, the most valid 70-342 dumps!)