Review Questions


1. ‚  

You have installed Microsoft Exchange Server on a server that is heavily utilized. After installation, you notice that response times are slow and that the hard disk is constantly active. You use Windows NT System Monitor to collect the following statistics:

%Processor time = 70

%Disk free space = 60

Pages/sec = 40

Avg. Disk sec/Transfer = 0.02

What should you do to reduce disk activity and improve server response time?

  1. Install more RAM.

  2. Install a faster CPU.

  3. Create additional swap files.

  4. Install an additional hard disk.

  5. Replace the hard disk with a faster hard disk.

2. ‚  

A user receives a message stating that their OST file is damaged. What should you tell them so they can access their messages without losing the unsynchronized changes in that file?

  1. Move the OST file to the server and run ISINTEG.

  2. Use the Migration tool to import the OST into a new mailbox.

  3. Rename the OST file with a .pst extension and run SCANPST on the PST file.

  4. Run SCANOST on the OST file.

3. ‚  

Your company has had problems with Exchange disk drives becoming full and stopping the IS service. What could you do to receive a warning before the IS reaches its limit again?

  1. Configure the Performance snap-in to send you an e-mail message when the Push Notification Cache Size has reached 100 percent.

  2. Configure an Exchange notification to send you an alert before the IS service stops.

  3. Configure an Exchange notification to send you an e-mail message when the IS service stops.

  4. Configure an Exchange notification to send you an e-mail message when disk space runs low.

4. ‚  

You are an assistant Exchange administrator for a large network. Your supervisor asks you to send a test message to a recipient configured on a foreign messaging system and then determine the exact path that message took to get through the Exchange system. How would you do this?

  1. Use the Queue Viewer to monitor the message as it makes its way through the Exchange messaging queues.

  2. Use the Message Tracking Center to search for the message and see its history.

  3. Use the Monitoring and Status tool to send a test message that will automatically reply with a message that includes a trace.

  4. Use the Windows Event Viewer to trace the message ‚ s route.

5. ‚  

Which of the following permissions would you assign to an object if you wanted a user to be able to view the object in System Manager but not access the object ‚ s properties?

  1. Read

  2. Read Permissions

  3. Execute

  4. Visible

6. ‚  

Recently, users have been complaining that it seems to be taking longer and longer to connect to their Exchange server to get their e-mail. You have determined that all of the users have mailboxes on the same server. You want to find out what is slowing down the server by creating a performance log using the Performance snap-in. Which of the following would be important objects to monitor to determine the bottleneck in the system? (Choose all that apply.)

  1. The Pages/sec counter of the Memory object

  2. The Messages/sec counter of the MSExchangeMTA object

  3. The Local Queue Length counter of the SMTP Server object

  4. The %Disk free space counter of the Physical Disk object

7. ‚  

You have 15 servers in your Exchange organization. Ten of those servers contain at least one mailbox store. Due to recent misuse of server-based storage, you have decided to limit the storage capacity of individual mailboxes. A store limit of 30 MB must be implemented for all mailboxes. As well, it is desired that you would be able to implement this storage limit without configuring each store manually. In addition, it is desired that you would be able to assign the Change Permissions permission on all of the mailbox stores to the Domain Admins security group .

To achieve these results, you propose to perform the following actions:

‚ Create a new server policy.

‚ On the Limits page of the policy, assign the limits you want for all stores on the server.

‚ On the Security page of the policy, assign the Change Permissions permission to the Domain Admins group.

‚ Add all the servers that contain mailbox stores to the new policy.

If you complete the proposed actions, will you have achieved the required and/or desired results?

  1. You will achieve both the required result and the two desired results.

  2. You will achieve the required result and only one of the desired results.

  3. You will achieve only the required result.

  4. You will not achieve the required result or the desired results.

8. ‚  

You have 15 servers in your Exchange organization. Ten of those servers contain at least one mailbox store. Due to recent misuse of server-based storage, you have decided to limit the storage capacity of individual mailboxes. A store limit of 30 MB must be implemented for all mailboxes. As well, it is desired that you would be able to implement this storage limit without configuring each store manually. In addition, it is desired that you would be able to assign the Change Permissions permission on all of the mailbox stores to the Domain Admins security group.

To achieve these results, you propose to perform the following actions:

‚ Create a new mailbox store policy.

‚ On the Limits page of the policy, assign the limits you want for all stores on the server.

‚ On the Security page of the policy, assign the Change Permissions permission to the Domain Admins group.

‚ Add all the mailbox stores to the new policy.

If you complete the proposed actions, will you have achieved the required and/or desired results?

  1. You will achieve both the required result and the two desired results.

  2. You will achieve the required result and only one of the desired results.

  3. You will achieve only the required result.

  4. You will not achieve the required result or the desired results.

9. ‚  

When configuring permissions on Exchange objects, such as administrative groups or servers, what is the effect of not specifically granting or denying a permission on an object?

  1. The user is granted access to the object but not to its child objects.

  2. The user is denied all access to the object and its child objects.

  3. The state of the permission is inherited from the parent container.

  4. The state of the permission is inherited from the child container.

10. ‚  

Which of the following permissions would you assign to a user if you wanted the user to be able to modify the properties of an object in System Manager?

  1. Read Properties

  2. Write Properties

  3. Change Properties

  4. Modify Properties

11. ‚  

Which of the following tools represents the easiest way to get real-time information on items such as CPU and memory usage?

  1. Performance snap-in

  2. Computer Management

  3. Monitoring and Status

  4. Task Manager

12. ‚  

Which of the following services does the Monitoring and Status tool monitor by default? (Choose all that apply.)

  1. Microsoft Exchange Information Store service

  2. Microsoft Exchange Event

  3. Microsoft Exchange Routing Engine

  4. Microsoft Exchange MTA Stacks

  5. Microsoft Exchange POP3

13. ‚  

You have configured one of the servers in your organization with an X.400 connector so that users in the organization can exchange messages with users of a foreign X.400 system. Once it was configured, though, you noticed that the X.400 traffic tends to stack up in the queue once in a while, and you would like an easy way to know when this happens without having to constantly monitor the server yourself. What would be the best way to do this?

  1. Configure the Queue Viewer to log messages to the Windows Event Log when messages stack up in the queue.

  2. Set up the Performance snap-in to monitor the queue and send an alert when messages stack up.

  3. Configure a server monitor to monitor the X.400 queue and configure a notification to e-mail you when the threshold is reached.

  4. You must monitor the queue manually using the Queue Viewer.

14. ‚  

Which of the following is not a component of an SNMP system?

  1. SNMP Agent

  2. SNMP Management System

  3. SNMP Alerter

  4. Management Information Base

15. ‚  

Which of the following properties can be configured with a public store system policy? (Choose all that apply.)

  1. The public folder tree associated with the store

  2. Support for S/MIME signatures

  3. The database associated with a store

  4. Storage limits

  5. Replication intervals

16. ‚  

By default, what types of addresses are generated automatically for all recipients by the default recipient policy? (Choose all that apply.)

  1. X.400

  2. Microsoft Mail

  3. SMTP

  4. cc:Mail

17. ‚  

You just hired two assistant administrators and want to provide them with the permissions necessary to administer the Exchange organization. However, you do not want them to be able to modify the permissions on any object. What should you do?

  1. Assign them the Full Control permission at the organization level, but explicitly deny them the Write Permissions permission, and then propagate those permissions down throughout the hierarchy.

  2. Assign them the Full Control permission for each administrative group, and then propagate those permissions down throughout the hierarchy.

  3. Use the Exchange Administration Delegation Wizard to assign them the Exchange Administrator role at the organization level.

  4. Use the Exchange Administration Delegation Wizard to assign them the Exchange Administrator role at each administrative group.

18. ‚  

Your organization has three Exchange servers. All servers belong to a single administrative group and a single routing group. One server has an SMTP connector configured so that your organization can exchange mail with users on the Internet. You would like to be able to log the number of messages sent and received by your users to help establish a baseline of messaging activity to help with future troubleshooting efforts. Which tool would be best suited for this use?

  1. System Monitor

  2. Window Event Log

  3. Diagnostics logging

  4. Computer Management

  5. Monitoring and Status

19. ‚  

A user has been granted the permission to modify permissions on objects at the organization level. That same user has been denied the permission to modify permissions on objects at the server level but has been granted the permission on a specific server. The organization is set up to use the default inheritance settings. What effective permissions does the user have on the specific server?

  1. The user can modify permissions.

  2. The user cannot modify permissions.

  3. Permissions cannot be set for individual servers.

  4. Permissions cannot be set at the organization level.

20. ‚  

Which of the following pieces of data regarding the Information Store service can you track with System Monitor? (Choose all that apply.)

  1. The number of users currently using the service

  2. The number of queries the service receives

  3. The amount of processor time the service consumes

  4. The numbered of messages queued in the service

Answers

1. ‚  

A. Pages/sec is the key item here. This value indicates a high level of pages being written from memory to disk and means that RAM is the likely bottleneck. Even though the disk and CPU usage is also high, these values are likely a secondary effect of the memory bottleneck.

2. ‚  

D. An OST file is a set of folders used for offline storage and uses the same format as the PST files used for personal folders. The OST Integrity Checker ( SCANOST.EXE ) should be able to fix the problem.

3. ‚  

D. The Exchange Monitoring and Status tool can be set up to monitor for certain resource thresholds, such as low disk space, and to send e-mail notifications when thresholds are crossed.

4. ‚  

B. The Message Tracking Center lets you search for specific messages sent within your organization and track those messages ‚ progress through any server that has message tracking enabled.

5. ‚  

A. The Read permission makes an object visible, but it does not allow a user to modify the object or even to view its property pages.

6. ‚  

A, D. It would be best to start by logging the physical aspects of your computer, such as memory, networking, disk space, and CPU performance. The trouble with monitoring Exchange-specific counters and objects in relation to a noticeable slowdown in server performance is that most Exchange- related performance is going to be slowed down by a physical component bottleneck. Of course, if you determine that a physical bottleneck is not the likely culprit, you should move on to explore other areas.

7. ‚  

D. Server policies can be used only to set message tracking and logging parameters for a server. They cannot be used to set security or limits for the stores on the servers. Mailbox store policies can be used to assign both age and storage limits to mailbox stores. However, no policies can be used to assign permissions to an object.

8. ‚  

B. Server policies can be used only to set message tracking and logging parameters for a server. They cannot be used to set security or limits for the stores on the servers. Mailbox store policies can be used to assign both age and storage limits to mailbox stores. However, no policies can be used to assign permissions to an object.

9. ‚  

C. When permissions are not specifically configured for a user or group on an object, they will be inherited from the parent object.

10. ‚  

B. The Write Properties permission allows a user to change the properties of an object.

11. ‚  

D. Task Manager displays the programs and processes running on a computer. It also displays various performance information, such as CPU and memory usage. An Exchange administrator can use this tool to view the overall health of a server. Access Task Manager by right-clicking the taskbar and choosing the Task Manager menu option.

12. ‚  

A, C, D. By default, the Monitoring and Status tool monitors the Information Store service, MTA Stacks, Routing Engine, System Attendant, Simple Mail Transfer Protocol (SMTP), and World Wide Web Publishing services on every server. You can change these defaults or add services to any server.

13. ‚  

C. Among other resources, a server monitor can be configured to monitor X.400 queue growth, and a notification can be set up to e-mail you when a threshold is reached. This is the best way to receive notification without having to monitor the system manually.

14. ‚  

C. The SNMP Agent is the device on a network that is being monitored. The SNMP Management System is the component that does the actual monitoring in an SNMP environment. The Management Information Base (MIB) is a centralized database of all the values that can be monitored for all the devices in an SNMP system. There is no such thing as an SNMP Alerter component.

15. ‚  

B, D, E. The General, Database, Replication, Limits, and Full-Text Indexing pages of a public store are available for configuration, but not all of the properties on those pages are available. You cannot configure a public folder tree or the database associated with a store because these are parameters that apply only to a specific store and cannot be applied to multiple stores using a policy.

16. ‚  

A, C. Recipient policies are used to generate e-mail addresses for recipients. Exchange includes a single recipient policy by default that is used to generate SMTP and X.400 e-mail addresses for various mail-enabled recipients. In previous versions of Exchange Server, Microsoft Mail and cc:Mail addresses were also generated by default, but not in Exchange Server 2003.

17. ‚  

C. The Exchange Administrator role gives users the same full administrative capability as the Exchange Full Administrator role but does not give them permission to modify permissions for objects. Running the wizard at the organization level would provide these permissions throughout the organization.

18. ‚  

A. System Monitor graphically charts the performance of hundreds of individual system parameters on a Microsoft Windows Server 2003 computer and can also be used to log those parameters over time. Specifically, you would want to log the Messages Sent/min and Messages Delivered/min counters of the MSExchangeIS Mailbox object.

19. ‚  

A. A specific permission granted or denied always takes precedence over any inherited permissions, no matter from where those permissions are inherited.

20. ‚  

A. The MSExchangeIS System Monitor object includes only the User Count counter, which displays the number of users who are currently using the Information Store.




MCSA[s]MCSE
MCSA[s]MCSE
ISBN: 735621527
EAN: N/A
Year: 2004
Pages: 160

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net