1. ‚ | You have installed Microsoft Exchange Server on a server that is heavily utilized. After installation, you notice that response times are slow and that the hard disk is constantly active. You use Windows NT System Monitor to collect the following statistics: %Processor time = 70 %Disk free space = 60 Pages/sec = 40 Avg. Disk sec/Transfer = 0.02 What should you do to reduce disk activity and improve server response time?
| |
2. ‚ | A user receives a message stating that their OST file is damaged. What should you tell them so they can access their messages without losing the unsynchronized changes in that file?
| |
3. ‚ | Your company has had problems with Exchange disk drives becoming full and stopping the IS service. What could you do to receive a warning before the IS reaches its limit again?
| |
4. ‚ | You are an assistant Exchange administrator for a large network. Your supervisor asks you to send a test message to a recipient configured on a foreign messaging system and then determine the exact path that message took to get through the Exchange system. How would you do this?
| |
5. ‚ | Which of the following permissions would you assign to an object if you wanted a user to be able to view the object in System Manager but not access the object ‚ s properties?
| |
6. ‚ | Recently, users have been complaining that it seems to be taking longer and longer to connect to their Exchange server to get their e-mail. You have determined that all of the users have mailboxes on the same server. You want to find out what is slowing down the server by creating a performance log using the Performance snap-in. Which of the following would be important objects to monitor to determine the bottleneck in the system? (Choose all that apply.)
| |
7. ‚ | You have 15 servers in your Exchange organization. Ten of those servers contain at least one mailbox store. Due to recent misuse of server-based storage, you have decided to limit the storage capacity of individual mailboxes. A store limit of 30 MB must be implemented for all mailboxes. As well, it is desired that you would be able to implement this storage limit without configuring each store manually. In addition, it is desired that you would be able to assign the Change Permissions permission on all of the mailbox stores to the Domain Admins security group . To achieve these results, you propose to perform the following actions: ‚ Create a new server policy. ‚ On the Limits page of the policy, assign the limits you want for all stores on the server. ‚ On the Security page of the policy, assign the Change Permissions permission to the Domain Admins group. ‚ Add all the servers that contain mailbox stores to the new policy. If you complete the proposed actions, will you have achieved the required and/or desired results?
| |
8. ‚ | You have 15 servers in your Exchange organization. Ten of those servers contain at least one mailbox store. Due to recent misuse of server-based storage, you have decided to limit the storage capacity of individual mailboxes. A store limit of 30 MB must be implemented for all mailboxes. As well, it is desired that you would be able to implement this storage limit without configuring each store manually. In addition, it is desired that you would be able to assign the Change Permissions permission on all of the mailbox stores to the Domain Admins security group. To achieve these results, you propose to perform the following actions: ‚ Create a new mailbox store policy. ‚ On the Limits page of the policy, assign the limits you want for all stores on the server. ‚ On the Security page of the policy, assign the Change Permissions permission to the Domain Admins group. ‚ Add all the mailbox stores to the new policy. If you complete the proposed actions, will you have achieved the required and/or desired results?
| |
9. ‚ | When configuring permissions on Exchange objects, such as administrative groups or servers, what is the effect of not specifically granting or denying a permission on an object?
| |
10. ‚ | Which of the following permissions would you assign to a user if you wanted the user to be able to modify the properties of an object in System Manager?
| |
11. ‚ | Which of the following tools represents the easiest way to get real-time information on items such as CPU and memory usage?
| |
12. ‚ | Which of the following services does the Monitoring and Status tool monitor by default? (Choose all that apply.)
| |
13. ‚ | You have configured one of the servers in your organization with an X.400 connector so that users in the organization can exchange messages with users of a foreign X.400 system. Once it was configured, though, you noticed that the X.400 traffic tends to stack up in the queue once in a while, and you would like an easy way to know when this happens without having to constantly monitor the server yourself. What would be the best way to do this?
| |
14. ‚ | Which of the following is not a component of an SNMP system?
| |
15. ‚ | Which of the following properties can be configured with a public store system policy? (Choose all that apply.)
| |
16. ‚ | By default, what types of addresses are generated automatically for all recipients by the default recipient policy? (Choose all that apply.)
| |
17. ‚ | You just hired two assistant administrators and want to provide them with the permissions necessary to administer the Exchange organization. However, you do not want them to be able to modify the permissions on any object. What should you do?
| |
18. ‚ | Your organization has three Exchange servers. All servers belong to a single administrative group and a single routing group. One server has an SMTP connector configured so that your organization can exchange mail with users on the Internet. You would like to be able to log the number of messages sent and received by your users to help establish a baseline of messaging activity to help with future troubleshooting efforts. Which tool would be best suited for this use?
| |
19. ‚ | A user has been granted the permission to modify permissions on objects at the organization level. That same user has been denied the permission to modify permissions on objects at the server level but has been granted the permission on a specific server. The organization is set up to use the default inheritance settings. What effective permissions does the user have on the specific server?
| |
20. ‚ | Which of the following pieces of data regarding the Information Store service can you track with System Monitor? (Choose all that apply.)
|
Answers
1. ‚ | A. Pages/sec is the key item here. This value indicates a high level of pages being written from memory to disk and means that RAM is the likely bottleneck. Even though the disk and CPU usage is also high, these values are likely a secondary effect of the memory bottleneck. |
2. ‚ | D. An OST file is a set of folders used for offline storage and uses the same format as the PST files used for personal folders. The OST Integrity Checker ( SCANOST.EXE ) should be able to fix the problem. |
3. ‚ | D. The Exchange Monitoring and Status tool can be set up to monitor for certain resource thresholds, such as low disk space, and to send e-mail notifications when thresholds are crossed. |
4. ‚ | B. The Message Tracking Center lets you search for specific messages sent within your organization and track those messages ‚ progress through any server that has message tracking enabled. |
5. ‚ | A. The Read permission makes an object visible, but it does not allow a user to modify the object or even to view its property pages. |
6. ‚ | A, D. It would be best to start by logging the physical aspects of your computer, such as memory, networking, disk space, and CPU performance. The trouble with monitoring Exchange-specific counters and objects in relation to a noticeable slowdown in server performance is that most Exchange- related performance is going to be slowed down by a physical component bottleneck. Of course, if you determine that a physical bottleneck is not the likely culprit, you should move on to explore other areas. |
7. ‚ | D. Server policies can be used only to set message tracking and logging parameters for a server. They cannot be used to set security or limits for the stores on the servers. Mailbox store policies can be used to assign both age and storage limits to mailbox stores. However, no policies can be used to assign permissions to an object. |
8. ‚ | B. Server policies can be used only to set message tracking and logging parameters for a server. They cannot be used to set security or limits for the stores on the servers. Mailbox store policies can be used to assign both age and storage limits to mailbox stores. However, no policies can be used to assign permissions to an object. |
9. ‚ | C. When permissions are not specifically configured for a user or group on an object, they will be inherited from the parent object. |
10. ‚ | B. The Write Properties permission allows a user to change the properties of an object. |
11. ‚ | D. Task Manager displays the programs and processes running on a computer. It also displays various performance information, such as CPU and memory usage. An Exchange administrator can use this tool to view the overall health of a server. Access Task Manager by right-clicking the taskbar and choosing the Task Manager menu option. |
12. ‚ | A, C, D. By default, the Monitoring and Status tool monitors the Information Store service, MTA Stacks, Routing Engine, System Attendant, Simple Mail Transfer Protocol (SMTP), and World Wide Web Publishing services on every server. You can change these defaults or add services to any server. |
13. ‚ | C. Among other resources, a server monitor can be configured to monitor X.400 queue growth, and a notification can be set up to e-mail you when a threshold is reached. This is the best way to receive notification without having to monitor the system manually. |
14. ‚ | C. The SNMP Agent is the device on a network that is being monitored. The SNMP Management System is the component that does the actual monitoring in an SNMP environment. The Management Information Base (MIB) is a centralized database of all the values that can be monitored for all the devices in an SNMP system. There is no such thing as an SNMP Alerter component. |
15. ‚ | B, D, E. The General, Database, Replication, Limits, and Full-Text Indexing pages of a public store are available for configuration, but not all of the properties on those pages are available. You cannot configure a public folder tree or the database associated with a store because these are parameters that apply only to a specific store and cannot be applied to multiple stores using a policy. |
16. ‚ | A, C. Recipient policies are used to generate e-mail addresses for recipients. Exchange includes a single recipient policy by default that is used to generate SMTP and X.400 e-mail addresses for various mail-enabled recipients. In previous versions of Exchange Server, Microsoft Mail and cc:Mail addresses were also generated by default, but not in Exchange Server 2003. |
17. ‚ | C. The Exchange Administrator role gives users the same full administrative capability as the Exchange Full Administrator role but does not give them permission to modify permissions for objects. Running the wizard at the organization level would provide these permissions throughout the organization. |
18. ‚ | A. System Monitor graphically charts the performance of hundreds of individual system parameters on a Microsoft Windows Server 2003 computer and can also be used to log those parameters over time. Specifically, you would want to log the Messages Sent/min and Messages Delivered/min counters of the MSExchangeIS Mailbox object. |
19. ‚ | A. A specific permission granted or denied always takes precedence over any inherited permissions, no matter from where those permissions are inherited. |
20. ‚ | A. The MSExchangeIS System Monitor object includes only the User Count counter, which displays the number of users who are currently using the Information Store. |