Independence Day Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dpt65

MS-203 Questions and Answers

Question # 6

You need to recommend a solution to retain the items in the public folders. The solution must support the

planned changes.

What should you recommend?

A.

Create an Outlook rule that forwards all the items in each public folder to a compliance mailbox.

B.

Place an In-Place Hold on all the mailboxes of the public folders.

C.

Increase the frequency of the backups.

D.

Modify the public folder permissions.

Full Access
Question # 7

Please wait while the virtual machine loads. Once loaded, you may proceed to the lab section. This may take a few minutes, and the wait time will not be deducted from your overall test time.

When the Next button is available, click it to access the lab section. In this section, you will perform a set of tasks in a live environment. While most functionality will be available to you as it would be in a live environment, some functionality (e.g., copy and paste, ability to navigate to external websites) will not be possible by design.

Scoring is based on the outcome of performing the tasks stated in the lab. In other words, it doesn't matter how you accomplish the task, if you successfully perform it, you will earn credit for that task.

Labs are not timed separately, and this exam may have more than one lab that you must complete. You can use as much time as you would like to complete each lab. But, you should manage your time appropriately to ensure that you are able to complete the lab(s) and all other sections of the exam in the time provided.

Please note that once you submit your work by clicking the Next button within a lab, you will NOT be able to return to the lab.

Use the following login credentials as needed:

To enter your username, place your cursor in the Sign in box and click on the username below.

To enter your password, place your cursor in the Enter password box and click on the password below.

Microsoft 365 Username: admin@abc.com

Microsoft 365 Password: xxxxxx

If the Microsoft 365 portal does not load successfully in the browser, press CTRL-K to reload the portal in a new browser tab.

The following information is for technical support purposes only.

Lab Instance: XXXXXX

You need to ensure that all email messages received from an organization named contoso.com are encrypted by using TLS.

To complete this task, sign in to the Microsoft 365 admin center.

Full Access
Question # 8

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.

You have a Microsoft Exchange Server 2019 hybrid deployment. All user mailboxes are hosted in Microsoft 365. All outbound SMTP email is routed through the on-premises Exchange organization.

A corporate security policy requires that you must prevent credit card numbers from being sent to internet recipients by using email.

You need to configure the deployment to meet the security policy requirement.

Solution: From the Exchange organization, you create a data loss prevention (DLP) policy.

Does this meet the goal?

A.

Yes

B.

No

Full Access
Question # 9

You have a Microsoft Exchange Server 2019 hybrid deployment.

You are migrating mailboxes from the on-premises organization to Exchange Online.

From the Exchange admin center, you create a new migration batch that includes 25 mailboxes, and then you select Manual Complete the batch.

Later, you must complete the migration of a mailbox named user1@litware.com in the batch as soon as possible. You discover that the status of the migration batch is Syncing, but the status of the move request for user1@litware.com is Synced.

You need to complete the migration of the user1@litware.com mailbox to Exchange Online as soon as possible.

How should you complete the command? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Full Access
Question # 10

Your company has a Microsoft Exchange Server 2019 server. The company has five departments. The server contains one mailbox database for each department. Each mailbox database contains all the users in its respective department. The databases contain 1,000 users.

You create an address book policy for each department.

You need to assign the address book policies to the users.

Which cmdlet should you run?

A.

Set-Mailbox

B.

Set-AddressList

C.

Set-MailboxDatabase

D.

Sec-AddressBookPolicy

Full Access
Question # 11

Lynne Robbins and the users in the sales department plan to collaborate on a project with a partner company named Contoso, Ltd. that has an email domain named contoso.com.

You need to ensure that only the sales department users can share all their calendar free/busy

information with the users in contoso.com.

How should you configure the organization relationship?

A.

Select Calendar free/busy information with time only and enter Group1

B Select Calendar free/busy information with time, subject, and location and enter Groups

C Select Calendar free/busy information with time, subject, and location and enter Group3

B.

Select Calendar free/busy information with time only and enter Group3

C.

Select Calendar free/busy information with time only and enter Group2

Full Access
Question # 12

You need to resolve the email delivery delay issue.

What should you do?

A.

From the Security & Compliance admin center, modify the safe attachments policy

B.

From the Security & Compliance admin center, create a supervision policy.

C.

From the Exchange admin center in Exchange Online, modify the antimalware policy.

D.

From the Exchange admin center in Exchange Online, modify the spam filter policy.

Full Access
Question # 13

You need to recommend a solution that meets the security requirements for protecting users.

What should you recommend?

A.

From the Security & Compliance admin center, create an ATP safe attachments policy.

B.

From the Exchange admin center in Exchange Online, create a spam filter policy.

C.

From the Security & Compliance admin center, create an ATP anti-phishing policy.

D.

From the Security & Compliance admin center, create an ATP Safe Links policy.

Full Access
Question # 14

You must prevent HelpDeskUser1 from repeating the same mistake.

You need to identify which management role provided HelpDeskUser1 with the necessary permissions to make the mistake identified in the problem statement.

Which two cmdlets should you run? Each correct answer presents part of the solution.

A.

Get-RoleGroup

B.

Get-ManagementRoleEntry

C.

Get-RoleGroupMember

D.

Get-ManagementRoleAssignment

E.

Get-ManagementRole

Full Access
Question # 15

You need to configure the environment to support the planned changes for email addresses.

How should you complete the command? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Full Access
Question # 16

Use the drop-down menus to select the answer choice that complete each statement based on the information presented in the Exchange Online Connector exhibit.

NOTE: Each correct selection is worth one point.

Full Access
Question # 17

You need to encrypt email between Fabrikam and Litware to support the planned changes.

What should you configure in the Exchange admin center?

A.

a connector

B.

an organization relationship

C.

a sharing policy

D.

a remote domain

Full Access
Question # 18

You need to configure the Exchange organization to meet the security requirements for sending email messages to distribution groups.

Which cmdlet should you run?

A.

Set-OrganizationConfig

B.

Set-DistributionGroup

C.

Set-Mailbox

D.

New-PolicyipConfig

Full Access
Question # 19

How many default policy tags (DPTs), retention policy tags (RPTs), and personal tags should you create to meet the retention requirements? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Full Access
Question # 20

You need to configure the new smartboard to support the planned changes.

Which three settings should you configure? To answer, select the appropriate settings in the answer area.

NOTE: Each correct selection is worth one point.

Full Access
Question # 21

You need to ensure that In-Place Archiving is enabled for the marketing department users.

Which user should perform the change, and which tool should the user use? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Full Access
Question # 22

User3 leaves the company.

You need to ensure that Admin1 and Admin2 can access the mailbox of User3. The solution must meet the technical requirements.

What should you do?

A.

Migrate the mailbox of User3 to a distribution group.

B.

Migrate the mailbox of User3 to a Microsoft 365 group.

C.

Convert the mailbox of User3 into a resource mailbox.

D.

Convert the mailbox of User3 into a shared mailbox.

Full Access
Question # 23

You need to configure the required objects for the branch office administrators.

What should you create for each administrator?

A.

a management role assignment policy and a management role group

B.

a management role scope and a management role assignment

C.

a management role scope and a management role group

D.

a management role and a management role assignment policy

Full Access
Question # 24

You need to resolve the issue for the transport department users.

What is the best way to achieve the goal? More than one answer choice may achieve the goal. Select the

BEST answer.

A.

Move the public folder mailbox that contains TransportPF to a server in the main office.

B.

Move TransportPF to a public folder mailbox hosted in the main office.

C.

Modify the default public folder mailbox for all the transport department users.

D.

Instruct the transport department users to add TransportPF to their Favorites list in Outlook.

Full Access
Question # 25

You need to implement a solution to support the planned changes for the helpdesk users.

What should you do?

A.

Assign the Recipient Policies role to the helpdesk users and a default management scope

B.

Assign the Mail Recipients role to the helpdesk users and use a default management scope

C.

Assign the Mail Recipients role to the helpdesk users and create a custom management scope

D.

Assign the Recipient Policies roles to the helpdesk users and create a custom management scope

Full Access
Question # 26

You need to recommend a procedure for closing the Brussels office that meets the technical requirements.

What should you recommend?

A.

In the main office, deploy an Exchange Server 2016 server that has the Unified Messaging role installed, and then move the mailboxes from the Brussels office to the new server.

B.

Deploy a Microsoft Skype for Business 2019 server to the main office, and then move the mailboxes from the Brussels office to an Exchange Server 2019 server in the main office.

C.

Implement a new mailbox database on an Exchange Server 2019 server in the main office, and then move the mailboxes from the Brussels office to the new mailbox database.

D.

Implement a new database availability group (DAG) that contains the server in the Brussels office and a new Exchange Server 2019 server in the main office, and then create a mailbox database copy on the new server in the main office.

Full Access
Question # 27

You have a Microsoft 365 subscription that uses a default domain named contoso.com.

Users report that email messages from a domain named fabrikam.com are identified as spam even though the messages are legitimate.

You need to prevent messages from fabrikam.com from being identified as spam.

What should you do?

A.

Enable the Zero-hour auto purge (ZAP) email protection feature.

B.

Enable the safe list on a connection filter.

C.

Edit the default mail flow rule to bypass the spam filter.

D.

Modify the IP Allow list of a connection filter policy.

Full Access
Question # 28

You have a Microsoft Exchange Server 2019 organization.

You purchase a Microsoft 365 subscription and configure Active Directory synchronization.

You use a smart host for all email communication between the organization and the Internet. The smart host performs email hygiene and alerts message headers.

You plan to run the Hybrid Configuration wizard to create an Exchange hybrid deployment and change the MX record to point to Exchange Online.

You need to decommission the smart host from the organization.

What should you do first?

A.

Create a Receive connector that allows anonymous authentication.

B.

Modify the InternalSmtpServer value by running the Set-TransportConfig cmdlet.

C.

Modify the Send connector to use DNS delivery.

D.

Modify the TLSReceiveDomainSecureList value by running the Set-TransportConfig cmdlet.

Full Access
Question # 29

You need to recommend an Office 365 solution that meets the technical requirements for email from adatum.com.

Which two components should you recommend configuring from the Exchange admin center in Exchange Online? Each correct presents a complete solution.

NOTE: Each correct selection is worth one point.

A.

DKIM signatures

B.

a spam filter

C.

a malware filter

D.

data loss prevention (DLP) policies

E.

a connection filter

Full Access
Question # 30

You need to recommend a solution for the public folders that supports the planned changes and meets the technical requirements.

What should you recommend?

A.

Microsoft SharePoint site mailboxes

B.

Office 365 groups

C.

Resource mailboxes

D.

Public folder replicas

Full Access
Question # 31

You need to identify the contents of the FabrikamProject public folder to meet the technical requirements.

Which PowerShell cmdlet should you run?

A.

Get-PublicFolderScaciscics

B.

Get-PublicFolderltemStatistics

C.

Get-PublicFolderMailboxDiagnoscics

D.

Get-PublicFolder

Full Access
Question # 32

You need to identify which users clicked the links in the phishing emails.

What should you do?

A.

Run a message trace and review the results.

B.

Query the mailbox audit log.

C.

Use the URL trace reporting feature.

D.

Review the quarantine mailbox.

Full Access
Question # 33

You need to modify FilesPolicy to prevent users from downloading ASPX files. The solution must meet the technical requirements.

How should you complete the command? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Full Access
Question # 34

You need to generate a report for the mobile devices that meets the technical requirements.

Which PowerShell cmdlet should you use?

A.

Get-DevicePolicy

B.

Get-MobileDevice

C.

Get-MobileDeviceStatistics

D.

Get-DeviceTenantPolicy

Full Access
Question # 35

You have a Microsoft Exchange Server 2019 organization.

Users access their email by using Microsoft Outlook 2019.

The users report that when a mailbox is provisioned for a new user, there is a delay of many hours before the new user appears in the global address list (GAL). From Outlook on the web, the users can see the new user in the GAL immediately.

You need to reduce the amount of time it takes for new users to appear in the GAL in Outlook 2019.

What should you do?

A.

Modify the default email address policy.

B.

Create as address book policy (ABP).

C.

Create a scheduled task that runs the Update-GlobalAddressList cmdlet.

D.

Modify the offline address (OAB) schedule.

Full Access
Question # 36

You have a Microsoft Exchange Online subscription.

You need to generate a CSV file containing all the email messages that failed to send from the

user1@contoso.com email address during the last 30 days.

What are two possible ways to achieve the goal? Each correct answer presents part of the solution.

NOTE: Each correct selection is worth one point.

A.

From Exchange Online PowerShell, run the Get-MessageTrace cmdlet.

B.

From the Exchange admin center, run a message trace.

C.

From the Security & Compliance admin center, export the mailbox audit logs.

D.

From Exchange Online PowerShell, run the Get-MessagetraceDetail cmdlet.

E.

From the Security & Compliance admin center, run a message trace.

Full Access