Appendix A -- Questions and Answers

Appendix A

Questions and Answers

Chapter 1

Review Questions

  1. Why would you prefer a client/server messaging system to a shared-file messaging system?

    Client/server systems are more scalable than shared-file systems, making client/server messaging systems suitable for the needs of small and large organizations. Clients do not poll the active messaging server and files will not be opened directly by any messaging client. Furthermore, client/server-based systems are more secure than shared-file systems because the client doesn't need read-write permission in a post office. The server services are the actual components that write messages into and read messages from the server's messaging databases.

  2. What is the most significant difference between Exchange Server 5.5 and Exchange 2000 Server?

    Exchange 2000 Server is seamlessly integrated with Windows 2000 Active Directory, which allows single-seat administration because all attributes, including Exchange 2000 Server-related directory information, are maintained in a single repository.

  3. Exchange 2000 Server supports a variety of Internet protocols. What clients can be used to access e-mail-related information on the server?

    MAPI-based clients, such as Outlook 2000, can access all messaging- related information stored on the computer running Exchange 2000 Server. IMAP4 clients can access e-mail-related information stored in Exchange 2000 mailboxes and public folders. POP3 clients have the ability to download messages from your inbox. NNTP-based newsreader programs can access public folders as newsgroups. Web browsers are able to work with mailboxes and public folders via Web Store and Outlook Web Access.

  4. You are planning to utilize Exchange 2000 Server's powerful collaboration solutions; however, workgroup and workflow applications are new to your administrators. Which type of collaboration solutions allows you to implement workgroup applications with minimal configuration and development effort?

    You should start with instant collaboration solutions because these solutions rely on built-in modules of Outlook 2000 and don't require any programming skills.

  5. Your organization is currently using Exchange Server 5.5 for messaging and collaboration. A PROFS connector is installed to provide a messaging path between PROFS and Exchange. You are planning an upgrade to Exchange 2000 Server. How can you provide connectivity to PROFS in the future Exchange 2000 Server environment?

    You integrate Exchange 2000 Server into your existing Exchange server environment and continue to use the PROFS connector running on Exchange Server 5.5 for message connectivity. With the exception of the connector server, all computers running Exchange Server 5.5 can be upgraded to Exchange 2000.

Chapter 2

Review Questions

  1. After the installation of Exchange 2000 Server, you want to create new mailboxes for your user accounts. Which MMC snap-in would you use?

    The Active Directory Users and Computers snap-in.

  2. Recently, you have installed Exchange 2000 Server in your organization. Your organization is comprised of multiple domain trees arranged in a single forest. You intend to configure your mailbox resources from one of your computers running Exchange 2000. However, when you open the Active Directory Users and Computers snap-in, most of the Exchange-related property pages are not available. What do you have to install on the computer to configure mailboxes successfully?

    You have to install the management utilities of Exchange 2000 Server on the server.

  3. Your organization has deployed Active Directory and organized its resources in OUs according to the structure of the enterprise. Names of OUs reflect the names of departments. Frequently, users move between departments. Consequently, it is necessary to move user accounts to the appropriate OUs as well. Do you need to delete the old user accounts and create new ones to reflect the organizational changes in Active Directory?

    No, using the Active Directory Users and Computers snap-in it is possible to easily move directory objects, such as user accounts, between OUs. It is not necessary to delete and re-create the user accounts.

  4. Active Directory holds all of the address information, such as the Global Address List, of Exchange 2000 Server. How does Exchange 2000 Server support MAPI-based client programs that are expecting to connect to an Exchange-based directory service?

    Exchange 2000 Server provides a feature known as DSProxy, which forwards MAPI-based directory lookups without further processing to a Global Catalog server. DSProxy also keeps a reference of connections between clients and servers, ensuring that the response from the Global Catalog is passed back to the correct client.

  5. In the past, your organization deployed Outlook 2000 successfully. Now you are installing Exchange 2000 Server. You wish to redirect your Outlook 2000 clients to a Global Catalog server. Outlook 2000 should contact the Global Catalog directly and without proxying. What do you have to configure on the computer running Exchange 2000 to achieve the desired result?

    To make DSProxy divert Outlook 2000 and other smart clients, set the registry parameter RFR Target Server on the server machine to the name of the desired Global Catalog server. You need to add the parameter under HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\ MSExchangeSA\Parameters.

  6. You plan to install Exchange 2000 Server in two locations connected to each other via a slow dial-up telephone connection. Do you need to upgrade the existing link to a permanent connection?

    No, server-to-server communication in Exchange 2000 environments relies solely on SMTP-based messages. SMTP is an asynchronous transfer protocol that doesn't require permanent network connectivity.

Chapter 3

Review Questions

  1. What are the essential Exchange 2000 Server components required to deliver messages in a single-server environment?

    The essential components that need to be operational are the System Attendant, the Information Store, the IIS Admin Service, and the SMTP transport. Of course, Active Directory as an essential Windows 2000 service also needs to be available. The System Attendant controls the entire Exchange 2000 server system and is a prerequisite for the Information Store. The Information Store hosts mailboxes and public folders and relies on the SMTP service for message delivery. The SMTP transport, in turn, requires the IIS Admin Service, because this transport is implemented in the form of an IIS.

  2. To perform an offline backup, you want to shut down the IIS and the Exchange 2000 Server services without rebooting the entire server. Which of the components must be stopped directly to stop all other server components as well?

    You need to stop the System Attendant, which in turn shuts down all Exchange 2000 Server-specific services. You also need to stop the IIS Admin Service, which automatically stops all related IISs, such as the SMTP service and the NNTP service.

  3. You have stopped the MTA service. How does this affect the behavior of connected Outlook clients?

    The MTA is not required for delivery of messages to recipients on the same computer or on different computers reachable via SMTP. However, messages to X.400 systems and foreign messaging systems are not routed until you restart the Exchange MTA Stacks service.

  4. As an administrator you have stopped the Microsoft Exchange Information Store service. How does this affect Outlook clients?

    Outlook clients cannot log on to the Exchange 2000 server and will receive an error message indicating that the Exchange Server computer is not available. Outlook users currently logged on will lose their sessions. However, Outlook is able to automatically reconnect the user when you restart the Information Store, so it is not necessary to restart Outlook.

  5. To satisfy growing messaging demand, you decide to install a second Exchange 2000 server. Which components communicate directly with each other between servers?

    Only the SMTP services communicate directly with each other. All other services rely on e-mail messages and use the SMTP transport as their native communication mechanism.

  6. List the two general types of information stores an Exchange 2000 server can maintain.

    The two types of information store are the public store, which maintains information stored in public folders, and the mailbox store, which holds all mailboxes and messages sent to individual users.

  7. How many storage groups can you configure on a particular Exchange 2000 server, and how many information store databases can each storage group contain?

    You can manage up to 16 individual storage groups on a single Exchange 2000 server and each storage group is capable of holding up to six individual stores. This gives you the capability to create a maximum of 96 physical stores and spread them across your server's hard disk system.

  8. As a user using Outlook 2000, you can happily send messages to all other users in your environment. After lunch, however, the situation changes. All of a sudden, your messages don't seem to leave the Outbox anymore. Other users with mailboxes on your server report the same problem. What is most likely the cause of this dilemma?

    Another administrator has directly or indirectly stopped the SMTP service on your Exchange 2000 server. The SMTP service hosts the advanced queuing engine, which is the central information controller in Exchange 2000 Server. Without this essential service, Exchange 2000 Server cannot deliver any messages and all messages must remain in the user's Outbox.

Chapter 4

Review Questions

  1. Your computer network consists of multiple domains. Most of them are grouped together in a single domain tree, but one domain tree exists in a separate forest for political reasons. You now have to implement an Exchange 2000 organization for all your users. How can you best accomplish this task?

    Exchange 2000 organizations cannot span multiple Active Directory forests. Therefore, the domain in the separate forest must be isolated and integrated into the main forest of the environment before installing Exchange 2000 Server for these users.

  2. Your computer network consists of multiple domains. All domains reside in a single forest. Where do you need to install Exchange 2000 Server first?

    Because Exchange 2000 Server needs to extend the Active Directory Schema, you need to first install Exchange 2000 Server in the domain where the schema master resides.

  3. You are in charge of a complex messaging environment spread across several international locations. You plan to implement decentralized system management, giving all locations Full Administrative permissions over their own resources. How would you structure the Exchange 2000 organization to achieve this goal?

    Define an administrative group for each location and assign the appropriate user accounts Exchange Full Administrator permissions.

  4. What is the purpose of a routing group?

    Routing groups describe regions of high-speed connections within a network. Messages sent between servers in the same routing group are transferred directly and immediately using the SMTP transport service. You can use a Routing Group Connector, X.400 connector, or an SMTP Connector to provide a message path between Exchange 2000 routing groups.

  5. What are the restrictions that apply when operating an Exchange 2000 organization in mixed mode?

    Administrative groups are handled similar to Exchange Server 5.5 sites. Therefore, it is impossible to move mailboxes between servers in different administrative groups. It is also impossible to move servers between administrative groups. Finally, routing groups can only contain servers from the same administrative group. Although one administrative group may contain multiple routing groups, routing groups cannot span multiple administrative groups.

  6. Your messaging management is separated from Windows 2000 administration. Consequently, you need to ask your Windows 2000 administrator to prepare the domain environment for you prior to installing Exchange 2000. What must the Windows 2000 administrator do to prepare the domain environment?

    The Windows 2000 administrator must prepare the forest by launching the Exchange 2000 Setup program in ForestPrep and after that in DomainPrep mode. ForestPrep extends the Active Directory Schema to add Exchange-specific classes and attributes. ForestPrep also creates the directory object for the Exchange 2000 organization and assigns the specified account Exchange Full Administrator permissions. Your Windows 2000 administrator should specify your account at this point. Your account then has the authority to install and manage Exchange 2000 Server throughout the forest and has the authority to assign further administrators Exchange Full Administrative permissions once the first server is installed. DomainPrep, on the other hand, adds further Exchange-specific configuration information to the Active Directory directory service. When Exchange 2000 Server is installed at a later time, Setup can retrieve the configuration information from Active Directory and does not need to prompt the administrator for it.

  7. What is the difference between Exchange Full Administrator and Exchange Administrator permissions?

    An Exchange Full Administrator can administer the Exchange organization and modify permissions on Exchange configuration objects, whereas an Exchange Administrator can only administer the Exchange organization, but does not have the ability to modify permissions on Exchange configuration objects.

  8. You are planning to deploy Exchange 2000 Server in a hosted environment that has to support more than 10,000 Internet users accessing their mailboxes primarily through Outlook Web Access. Consequently, you plan to implement an FE/BE configuration. What do you have to do to configure a front end server?

    You configure a front end server by activating the This Is A Front-End Server check box in the server's properties within the Exchange System Manager.

Chapter 5

Review Questions

  1. To save disk space, you have used the Minimum installation option during setup of the first server. Now you want to delegate administrative permissions to a colleague. Why can't you manage the Exchange 2000 Server? What type of installation could you use to install all required components? How can you add the components to the server that was installed with Minimum installation type?

    The Minimum installation type installs Exchange 2000 with the minimum number of files needed for messaging and collaboration services. Because administrative utilities are not installed when selecting this option, you cannot manage the first server. Launch the Setup program in maintenance mode to add the management utilities to the server installation or install these utilities separately on your workstation.

  2. You want to designate additional administrators in an administrative group. The additional accounts will be responsible for system configuration only. These administrators should not be able to change security settings. What administrative role do you need to assign these administrators?

    You need to assign these administrators the administrative role Exchange Administrator, which is available at the organization and administrative group level.

  3. What administrative role is required to display configuration information?

    Exchange View Only Administrator.

  4. You are using Exchange Server 4.0 in a complex environment. Because of the extended Internet features implemented in Exchange 2000 Server, you decide to upgrade the messaging network. What upgrade strategy should you use?

    You need to upgrade the Exchange Server to version 5.5 first because the in-place upgrade to Exchange 2000 is only supported for version 5.5. After that, update the Windows NT Server to Windows 2000, configure connection agreements in the Active Directory Connector, and then launch the Exchange 2000 Server Setup program to accomplish the upgrade.

  5. Another administrator has previously installed Outlook 2000 on a server computer, which is an unsupported configuration. To clean up the unsupported configuration, you have decided to remove the client with all its components. You then find that the server no longer works properly because the MAPI32.DLL is missing. How can you fix this problem?

    You need to reinstall Exchange 2000 Server in maintenance mode, which replaces corrupted files and fixes problems with missing components, such as MAPI32.DLL.

  6. You plan to install Exchange 2000 Server unattended to run Setup simultaneously on more than one computer. How would you create the predefined setup initialization file?

    You need to launch SETUP.EXE in CreateUnattand mode via the command SETUP.EXE /CreateUnattend SETUP.INI. This will launch the Exchange Installation Wizard, where you can make your choices. However, the server will not be installed, but the initialization file is generated at the specified location.

  7. The messaging network of your company consists of one single location. Five server computers exist within this local area network. You want to administer all these computers from a Windows 2000 workstation in your office. What needs to be installed on the Windows 2000 workstation? How do you install the additional components?

    You need to install the Microsoft Exchange System Management Tools via the Setup program of Exchange 2000 Server. Launch Setup and under Action in the Microsoft Exchange 2000 category, select Custom.

Chapter 6

Review Questions

  1. You are planning to integrate Exchange 2000 Server into an existing Exchange Server 5.5 site. Which two strategies can you use?

    The first approach is to upgrade an existing Exchange server directly, thus joining an existing site automatically using the in-place upgrade procedure. The second method involves installing a fresh server and specifying joining an existing site during Setup. Exchange 5.5 resources must then be migrated to the Exchange 2000 server.

  2. Your Exchange Server organization consists of one site containing a mixed installation of various earlier server versions, such as Exchange Server 5.0 and Exchange Server 5.0 Service Pack 3. You are planning to upgrade with a minimal disruption of business processes. Which upgrade strategy would be best?

    You should rely on the move-mailbox upgrade. Join the existing site with an Exchange 2000 server, specify a server running Exchange Server 5.5 with Service Pack 3 during the installation, and move Exchange resources onto the new system afterward. Outlook clients will be redirected to the new system automatically and users are not noticeably affected. As soon as all resources are on Exchange 2000 Server you can remove the legacy Exchange Server versions.

  3. You have joined an existing site with a new Exchange 2000 server. You now plan to use the Exchange System snap-in to manage the resources of the site. How can you manage Exchange Server 5.5 Service Pack 3 resources via Active Directory?

    You cannot manage resources of previous Exchange Server versions via Active Directory. You need to use the Exchange Administrator program to manage Exchange Server 5.5 Service Pack 3 and the Exchange System snap-in to administer Exchange 2000 Server.

  4. You have joined an existing site of eight servers with one new Exchange 2000 server. Which utility should you use to manage mailbox resources in this site?

    You should use the Active Directory Users and Computers tool to manage the mailbox resources. New mailboxes should be created on the Exchange 2000 server only, which requires the Active Directory Users and Computers tool. Configuration changes on existing mailboxes can also be made using this tool because user connection agreements of an ADC in conjunction with SRS are able to replicate the information from Active Directory to the Exchange directories.

  5. You have successfully migrated all resources to Exchange 2000 Server using the move-mailbox approach. You now plan to switch the organization into native mode. What do you need to accomplish before you can carry out the change?

    You need to remove the existing installations of earlier Exchange Server versions and their corresponding objects in the SRS database and Active Directory. The switch to native mode is only possible if no previous versions of Exchange Server exist in the organization.

Chapter 7

Review Questions

  1. What are the three physical connections that join the nodes of a cluster together?

    A shared storage bus, and a public and private network connection connect the nodes in a cluster. The shared storage bus connects all nodes to the disks where the clustered data resides. The public network connection connects client computers to the nodes in the cluster and allows the nodes to exchange information as well. The private network connection is optional, connects only the nodes in a cluster, and ensures that the nodes will be able to communicate with each other in the event of an outage of the public network.

  2. You plan to install Exchange 2000 Server in a Windows 2000 cluster. The cluster consists of two nodes. You want to run Exchange 2000 Server in an active/active configuration. How many disk volumes are required at a minimum if you want to configure dedicated Exchange 2000 resource groups?

    A minimum of three disk volumes must be connected to the Exchange cluster. One disk volume is used as the quorum resource. The remaining two volumes will each be assigned to a separate virtual Exchange 2000 server. Both virtual servers can then run on either node in the cluster.

  3. You have installed and configured a four-node cluster running Windows 2000 Datacenter Server. Now, you want to install Exchange 2000 Server. What are the installation steps you must accomplish?

    Install Exchange 2000 Server on one node at a time, then reboot each node to complete the installation. The Setup program will do the bulk of the work automatically by detecting that it started on a cluster node and configuring the Exchange components accordingly. It is important to set up all nodes using the same directories and installation options. It is advantageous to reserve the M drive on all nodes for the Web Store of Exchange 2000 Server. After you have installed Exchange 2000 Enterprise Server on all nodes, configure the virtual servers.

  4. You want to add Exchange 2000 Server to an existing resource group. This resource group is already hosting SQL 2000 Server resources. What resources do you need to add to the existing resource group?

    Because the existing resource group already owns an IP address, network name, and disk, only the Exchange SA needs to be added manually. All other Exchange 2000 resources will be attached automatically.

  5. You have successfully configured a virtual server for Exchange 2000 and brought it online. Now you want to test the failover behavior of your system. How can you trigger a failover to another node in the cluster?

    Using Cluster Administrator, you can trigger a failover by right-clicking on an Exchange 2000 resource and selecting Initiate Failure. All resources in the cluster group will be taken offline and then brought back online on another available node in the cluster. The process of stopping and starting resource instances is performed automatically.

  6. Because of the increased scalability of Exchange 2000 Server in a clustered installation, you plan to consolidate your Exchange resources and replace the existing five nonclustered servers with one Windows 2000 cluster. How can you incorporate the existing information store databases into the cluster installation?

    You cannot mount nonclustered information store databases in a clustered Exchange 2000 environment. Clustered information store databases contain special structures required to support access from multiple nodes, which aren't present in nonclustered counterparts. To incorporate the existing Exchange resources, install the clustered Exchange 2000 system in the organization and then move mailboxes and public folders into it. As soon as all resources reside on the cluster, you can remove the nonclustered systems.

Chapter 8

Review Questions

  1. What are the system requirements for Outlook 2000 on a computer running Windows 2000 Professional?

    Outlook 2000 requires at least an Intel Pentium-compliant processor and 16 MB of RAM (in addition to Windows 2000's requirements), although it is advisable to double the amount of RAM to get better performance.

  2. Which three options do you have to customize the Outlook 2000 installation process?

    You can customize the installation process by using command-line parameters, adjusting SETUP.INI settings, or creating a transform file using the Custom Installation Wizard.

  3. You plan to roll out Outlook 2000 to numerous users working on Windows 98, Windows NT 4.0 Workstation, and Windows 2000 Professional. What do you need to accomplish to install the new client platform unattended via a login script?

    You need to launch Setup with the parameter /A to set up an administrative installation point, which you then can customize using the Custom Installation Wizard. At the end of the customization process, a transform file is written, which you will save in the installation point. After that, the Custom Installation Wizard suggests a command line for an unattended installation, which you should copy into the users' login script. You should make sure that the command line is only executed once per user.

  4. You have created an administrative installation point and customized the installation using SETUP.INI and the Custom Installation Wizard. You are now planning to deploy Outlook through a specific command line, which contains further options. Which settings take precedence over which other settings?

    The transform file created by the Custom Installation Wizard has lowest priority, followed by SETUP.INI, which is superseded by the command-line options.

  5. Where can you optimize the RPC connection order for Windows 2000-based Outlook 2000 clients?

    You can modify the client connection order in the Registry under HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Exchange\Exchange Provider. The Rpc_Binding_Order value determines the connection order.

  6. A delegate is sending messages on your behalf, but you don't want the delegate's name to appear on the From line of the message header. What kind of permission must be granted to the assistant to achieve this?

    The assistant's name won't appear in messages sent on your behalf if the assistant has been granted the Send As for your account, which can be set in the Active Directory Users and Computers management tool.

Chapter 9

Review Questions

  1. What is a messaging profile?

    A messaging profile contains configuration information about information services that will be used by the Microsoft Exchange Client to establish a session with the underlying messaging backbone. The client cannot start without an existing profile.

  2. Which tool assists you in creating messaging profiles?

    The Microsoft Outlook Setup Wizard (formerly known as the Microsoft Exchange Setup Wizard).

  3. Where are the messaging profiles of a currently logged on user stored in Windows 2000?

    The profile of a currently logged on user can be found under: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles. Subkeys exist corresponding to each configured profile.

  4. Which two message stores can be configured to keep messages available offline?

    For users to work offline with messages, the messages need to be copied to the computer's hard disk. To do this you can configure an offline or a personal folder store. The offline store is a replica of the actual server-based content, whereas the personal folder store normally is used to download and remove messages from the server.

  5. You have configured a personal folder store and the Exchange transport service. How can you define the personal folder store as the location for incoming messages?

    You can configure the message delivery on the Delivery tab of the Services dialog box, which can be displayed using the Services command on the client's Tools menu. In this tab, the primary Inbox can be specified under the Deliver New Mail To The Following Location option.

  6. What is the most significant advantage of the offline folder store?

    The offline folder store provides the advantage of synchronizing public folders. In other words, using an offline store you are able to work with public folders while disconnected from the server.

  7. How can you assign centralized messaging profiles to roving users that work on computers running Windows 2000?

    The profiles for Windows 2000_based Outlook Clients will be stored in the user-specific Registry keys (HKEY_CURRENT_USER). These settings can be included in server-based profiles, which will then be activated on any machine as soon as the roving user logs on to the domain.

Chapter 10

Review Questions

  1. You plan to integrate Exchange 2000 Server into your Novell NetWare network. You install Windows 2000 Server and the NWLink IPX/SPX_compatible Transport. Which two important configuration parameters of the NWLink IPX/SPX_Compatible Transport may need to be configured manually?

    The frame type and the internal network number.

  2. Because Exchange Server validates users based on Windows 2000 account information, you need to create a corresponding Windows 2000 account for each existing Novell NetWare user. Which tool can you use to synchronize the account information for both systems?

    Microsoft Directory Synchronization Services (MSDSS).

  3. Users on Novell NetWare workstations are complaining about the startup times of Outlook 2000. What should you first check?

    The RPC Binding Order value in the Registry under: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Exchange\Exchange Provider should be checked first. The RPC over SPX communication method (ncacn_spx) should be placed on top.

  4. Your Novell NetWare 5 network relies on TCP/IP only. You have deployed the Novell NetWare 5 Client software on all your workstations running Windows 2000 Professional. Which component do you need to add to the workstation configuration to allow your users to access their Exchange 2000 mailboxes with Outlook 2000?

    You need to install the Client for Microsoft Networks to support RPC communication between Outlook 2000 and Exchange 2000 Server.

Chapter 11

Review Questions

  1. As an Exchange 2000 administrator, you have connected your organization to the Internet. Now you want to support common Internet clients as well. Which Internet protocols does Exchange 2000 Server support?

    IMAP4, POP3, NNTP, and HTTP, as well as SMTP are supported. LDAP access is available via Active Directory and Global Catalog servers.

  2. You want to increase the access security for Exchange 2000 resources. How would you limit the group of workstations that are able to access existing servers through IPs?

    Using Exchange System Manager, display the properties of the desired virtual server, click on the Access tab, and click Connection Control to specify the range of IP addresses that should be granted access to the virtual server.

  3. Which authentication methods can you use to support all possible POP3/IMAP4 clients?

    You can use the Basic Authentication or the Integrated Windows Authentication to prompt your users for logon credentials. When using the Basic Authentication method over the Internet, make sure the communication is encrypted using SSL; otherwise passwords will be exposed because they are transferred in clear text.

  4. As a management consultant, you want to emphasize the benefits of Exchange 2000 Server in a presentation for your most important customer. Spontaneously, you are asked about this feature called Web Store that everybody seems to talk about. How can you demonstrate the Web Store ad hoc without any preparation or additional configuration on a computer running Exchange 2000 Server?

    You can open Internet Explorer and connect to the URL http://localhost/Exchange/ to demonstrate how to access mailbox and public folder resources from any modern Web browser. You can also launch Windows Explorer and explain how to configure a Web folder connection to access public folder resources via HTTP and WebDAV. The URL http://localhost/public/ allows you to access the entire public folders tree from within Windows Explorer just as any shared network resource. Finally, you may start an Office or any other application and access mailbox or public folder resources via drive M that corresponds to the ExIFS.

  5. You have successfully configured a pull feed to replicate newsgroups with the USENET. After three days, you realize that this newsfeed is pulling in several gigabytes of data. You expect to run out of disk space very soon. Which steps should you carry out to avoid a server shutdown due to unavailable disk space?

    A pull feed initiates the connection to a remote USENET host and pulls the information from existing newsgroups. To pause a newsfeed, display its properties, and in the General tab, deselect the Enable Feed check box. Then click OK. This step temporarily disables the newsfeed. Now you can add more disks or move resources to another server to create more disk space, and then enable the feed again.

Chapter 12

Review Questions

  1. You want to configure an entire Exchange 2000 Server organization using Exchange System Manager on your Windows NT Workstation computer. How do you install this program and which of the existing servers in your organization can be configured?

    Exchange System Manager cannot be installed on a computer running Windows NT Workstation. Hence, you will need to use a different approach, such as Terminal Services, in which case you can use an Exchange System Manager instance running on Windows 2000 Server remotely. Theoretically, you can administer all Exchange 2000 servers that are members of administrative groups where you have Administrative permissions. Changes are written to Active Directory and replicated across the entire forest.

  2. You add new memory (RAM) to a computer running Exchange 2000 Server. The server performance has not been improved, so you are wondering which component might create the actual bottleneck. Which utility can you use to determine the critical component?

    The Performance tool allows you to monitor performance objects on the local and remote computers. Using this tool, you can create a performance chart for processor utilization, disk and network activities, and Exchange 2000 processes. Performance charts can help to isolate bottlenecks and allow you to precisely allocate hardware upgrades.

  3. You want to manage the available disk space across all of the servers in your administrative group. Therefore, you want to define storage limits. How can you define storage limits for all these servers with minimal effort?

    You can define mailbox store policies and set the storage limits according to your preferences on the Limits tab. After that, place all the servers from your administrative group under this policy.

  4. A supervisor in the marketing department calls and wants to know whether Fred Pumpkin is working online. You will need to view information about currently logged on users. Which object provides the fastest access to the desired information?

    The Logon object under the Private Information Store object provides the fastest access to the desired information. As soon as you select this object, status information regarding all logged on users will be displayed in the contents pane of the Administration window.

Chapter 13

Review Questions

  1. When would you configure mail-enabled contact objects in Active Directory?

    Mail-enabled contact objects reference recipients outside the organization. They don't possess mailboxes on an Exchange 2000 server. Instead, mail-enabled contacts are wrappers around an underlying e-mail address, which points to the actual recipient somewhere outside.

  2. How do you hide a particular mailbox from the address book?

    You need to click on the Exchange Advanced tab of the desired mailbox in Active Directory Users and Computers and select the Hide The Account From Exchange Address Lists check box.

  3. How can you accomplish the transfer of group management responsibilities to a regular user?

    By designating the user as the distribution list owner.

  4. Your Exchange 2000 server is a very busy machine. Another server in the same administrative group has less work to perform so you decide to designate this computer as an expansion server. How can you accomplish this configuration?

    You can designate this server for each group separately using the Expansion Server setting in the Exchange Advanced tab. If you have numerous groups to configure, consider updating them in bulk using the LDIFDE or CSVDE utility.

  5. Although your Windows 2000 environment consists of multiple domains, you have deployed Exchange 2000 Server only in the top-level domain. What do you need to configure on the Exchange 2000 server to support all users in your organization?

    You need to run the Exchange 2000 Setup program in each domain in DomainPrep mode. After that, an instance of the Recipient Update service must be configured for each domain individually on the server using the Exchange System Manager utility.

Chapter 14

Review Questions

  1. You plan to create multiple storage groups and message stores on an Exchange 2000 server. Which Exchange 2000 Server version do you need to install on this machine, and how many information stores can you configure?

    You need to install the Exchange 2000 Enterprise Server edition, which is able to handle a maximum of four storage groups, each capable of holding up to five individual stores.

  2. Your organization uses various advanced collaboration solutions for account management, sales tracking, and knowledge management. These solutions rely on a specific public folder structure, which is accessed by numerous users from various departments on a daily basis. For best performance, you are considering a dedicated public folder server for these forums. What do you need to accomplish before you can configure a server as a dedicated public folder server?

    Configuring a dedicated public folder server means removing all existing mailbox stores, which cannot be accomplished if the mailbox stores contain user mailboxes. Hence, you need to move all existing user mailboxes from this computer to other servers in the administrative group.

  3. You are planning to implement a document management system and want to activate full-text indexing for the corresponding public store. What are the steps to activate Exchange 2000 Server's full-text indexing feature?

    You need to create a full-text index for the public store by right-clicking it and selecting the Create Full-Text Index command. Then, you need to populate the full-text catalog via the Start Full Population command. As soon as this process is complete, you can make the catalog available for full-text searches by clients on the store's Full-Text Indexing tab. You should also define update and rebuild intervals to ensure that search information is always up to date.

  4. How can you move a server between administrative groups?

    You cannot move servers between administrative groups. The server must be reinstalled, at which time you can specify the server's new administrative group. The administrative group must be created beforehand in Exchange System Manager.

  5. As an administrator for Exchange 2000 Server you have configured several nested server-based address lists. However, correct address list information is not displayed in the client's address books yet. How can you trigger an immediate address list update?

    Right-click on the Recipient Update service for your domain, and click Rebuild. A Rebuild Address Lists And Recipient Policies dialog box will appear, informing you that the settings for all recipients are recalculated on the next scheduled update interval. To overrule the update interval by triggering an immediate update, right-click the update service object again and select the Update Now command.

Chapter 15

Review Questions

  1. You are the administrator of a small Exchange organization with one Exchange 2000 server. You have successfully connected the server to the Internet. Test messages sent to an Internet address are delivered without problems. Replies to test message, however, end in nondelivery reports. What do you have to accomplish to allow replies to test messages to be delivered to your organization?

    For incoming messages to be delivered to your host, your SMTP domain name must be registered in MX records in the Internet DNS.

  2. Your users complain about a large number of unsolicited commercial messages. You check the messages and determine they all come from a domain called Pleasegiveusyourmoney-times-10.com. How can you prevent the delivery of these messages most conveniently?

    You can configure a message filter and activate the filtering for your SMTP virtual server. Under Global Settings, display the properties of the Message Delivery object in Exchange System Manager. Click on the Filtering tab, and use the Add button to specify "*@Pleasegiveusyourmoney.com" as the filtered sender information. As soon as the filter is defined, activate the filtering feature on your virtual server.

  3. Your server is operating as a central bridgehead server in your organization, which has to handle a constant stream of messages to downstream servers in other routing groups. How can you optimize the throughput of messages?

    It may be advantageous to not limit the number of messages per connection and let the bridgehead handle all e-mail over established links. This increases the performance because it avoids additional handshakes for further connection establishments.

  4. Your internal DNS servers are not integrated with the Internet. How can you enable Exchange 2000 Server to use Internet DNS servers for outbound message transfer?

    You can add references to external DNS servers to your SMTP virtual server configuration. In the Delivery tab, click the Advanced button. This will display the Advanced Delivery dialog box. Under Configure External DNS Servers, click the Configure button. You can specify multiple DNS servers.

  5. Users complain about lost messages that have been automatically forwarded to an Internet account. What is most likely the cause of this problem?

    You have deselected the Allow Automatic Forward check box in the Default message format definition, which is located in the Internet Message Formats container in Exchange System Manager.

Chapter 16

Review Questions

  1. When should you separate Exchange 2000 servers by means of routing groups?

    You should configure multiple routing groups if access to public folder resources must be controlled, if dedicated bridgehead servers with optimized hardware for message transfer are desired, if you need to take geographical requirements into consideration, or if you need to optimize or reduce network traffic. Unstable network links affect message transfer performance, which would benefit from the use of multiple routing groups. The same applies to WAN connections that generate costs.

  2. What are the minimum configuration parameters you need to define for an RGC?

    At minimum, you need to specify a name in the General tab and a remote bridgehead server in the Remote Bridgehead tab.

  3. What are the minimum configuration parameters you need to define for an SMTP Connector between two routing groups?

    At minimum, you need to specify a name in the General tab and define a local bridgehead server. You also need to specify a remote SMTP virtual server in the form of a smart host and a remote routing group in the Connected Routing Groups tab.

  4. Your organization consists of numerous routing groups. Within your local routing group 10 servers have been installed. You plan to replace the hardware of the server that was installed in your routing group first. What do you need to accomplish to guarantee efficient message routing while the hardware is replaced?

    The first server in a routing group typically acts as the routing group master, maintaining the LST for all other servers in the routing group. If you shut down the routing group master for a significant period of time, as you would to replace its hardware, you should designate a different master to avoid inefficient message routing. Launch Exchange System Manager, expand the Local Routing Group, and select the Members container. In the details pane, right-click another server object, and select Set As Master.

Chapter 17

Review Questions

  1. What is a dedicated public server?

    A dedicated public server is a server that maintains folders in public stores only. All mailbox stores have been removed.

  2. Which communication method is used to access the public folder content using Outlook 2000?

    Outlook 2000 relies on RPCs in any case, whether the content is stored on the user's home server or another public server within the routing group or organization.

  3. You have decided to place all public folders on a particular server without configuring dedicated servers. A user works with Outlook 2000 and creates a new top-level folder. Where will the new public folder be located?

    On the user's home server, because this server holds the default public folder store for the user.

  4. A user works with the Outlook 2000 and creates a new subfolder directly under a top-level folder. Where will the new public folder be stored?

    All subfolders will be created on the server that maintains the parent folder.

  5. Olivia calls and complains that some other users can't see her new public folder in their public folder trees. Users on the local server are able to work with the new folder. What is most likely the cause of the problem?

    The public folder hierarchy replication has not been completed yet. After a short delay, the public folder will appear in the public folder hierarchy.

  6. Users in your routing group need to work with a public folder called Customer Feedback. This folder is not kept in the local routing group and you don't want to create a local replica of this folder. RPC communication is supported between all servers in your organization. What must be accomplished to allow your users access to the public folder content?

    Nothing. Routing group connectors allow public folder referrals by default. If public folder access is prohibited due to manual configuration changes, clear the Do Not Allow Public Folder Referrals check box on the routing group connector's General tab.

Chapter 18

Review Questions

  1. What are the general advantages of the public folder content replication?

    Public folder content replication permits maintenance of multiple synchronized copies of a particular public folder. Multiple replicas, in turn, can be used to distribute the workload across multiple servers. This improves the response time for all users in the organization. Furthermore, multiple replicas provide fault tolerance.

  2. Your company has implemented two routing groups because a WAN connection exists that does not support remote procedure calls (RPCs). What needs to be configured to provide all public folders within the organization to all users?

    All public folders must be kept locally in all routing groups. The content of each public folder must be replicated to at least one server in each remote routing group to ensure that the content is accessible.

  3. You need to create a local replica for a desired public folder, which exists in another routing group, but you don't want to bother the remote administrator. However, RPC communication is impossible. How can you achieve the desired configuration?

    To add a public folder replica from another server to the public store on your server, right-click Public Folder Instances under your server's public store, point to All Tasks, and click Add Replica. This will launch the Public Store dialog box, where you can select the desired folder from the associated public folder hierarchy.

  4. How does the receiving PFRA determine whether a replication conflict has occurred?

    The receiving PRFA checks whether the change number of the local message is included in the predecessor list of the updated message. If it is, the information can be replaced. If the local message change number is not included, a replication conflict will be detected.

  5. What does backfill mean?

    Backfill is the mechanism used to discover out-of-sync replicas based on message status information, which is included in every replication message. If no changes have to be replicated, status information is exchanged once every day automatically. If a PFRA discovers missing changes, it requests them from any Information Store that maintains a more recent replica.

  6. As a public folder contact you receive a conflict message. Which choices do you have to resolve the public folder replication conflict?

    You can accept the local, the updated, or both replicated items.

  7. At the same time, two public folder owners have modified the design of a public folder on two different instances, generating a design conflict. How can you resolve the conflict?

    Design conflicts do not need to be resolved explicitly because the most recent changes overwrite all others. Public folder contacts and public folder owners are notified because they should check which design was applied.

Chapter 19

Review Questions

  1. What are the features of advanced security and when will you use them?

    Advanced security supports signing and sealing of messages. Signing permits a sender to add a digital signature to a message, which proves the message's origin and authenticity. Sealing is another term for message encryption. Both features can be used individually or simultaneously.

  2. What is the KM Server password used for, and when do you need it?

    The KM Server password is used to decrypt the KM Database Master Encryption key to gain access to the KM database. It must be supplied during the KMS startup.

  3. What does a KM administrator need to do to enable a user's advanced security?

    The KM administrator has to begin the process of enabling advanced security. During this process a 12-character security token will be generated, which must be provided to the user. It is possible to enroll multiple users concurrently.

  4. What does the user need to accomplish to enable advanced security?

    The user needs to receive the security token from the KM administrator. In the Options dialog box of Outlook 2000, using the Security tab, the user can request a digital ID from the Exchange 2000 server. During this process, the user needs to enter the security token and specify a security password for the digital ID. A request message will be sent to the KM Server, which will forward the request to Certificate Services to obtain approved X.509 version 3 certificates. Finally, a response from the KM Server will be received, which can be opened as usual. At this point, the user will be asked for the security password as recently defined. The user must enter the password to complete the process of enabling advanced security.

  5. When does Outlook encrypt a message?

    After the user sends the message.

  6. How does Outlook sign messages?

    The original message is hashed and the user's private signing key is retrieved from the security store. The hash is then encrypted using the private signing key. The encrypted hash will be added to the message as well as the user's signing certificate, which contains the public signing key. The client then sends the message.

  7. Which steps must be accomplished to send a sealed message?

    First, the client contacts Active Directory to obtain each recipient's sealing certificate, which contains the public sealing key and describes the supported encryption method. Based on this information, the encryption method for the message will be determined. Accordingly, the client generates a bulk encryption key and encrypts the message content. The bulk encryption key will then be encrypted using each recipient's public sealing key, creating a bulk encryption lockbox for each recipient. The lockbox will be attached to the encrypted message. The sender's sealing certificate will also be added to the message before it is sent.

  8. How can you implement central advanced security management in an organization with two administrative groups?

    Install the KM Server in one administrative group. After that, use the Encryption Configuration object of the second administrative group to specify the KM Server location.

  9. Walter Woodpecker has forgotten the security password for his digital ID. What do you have to accomplish to allow Walter to sign and seal messages again?

    You need to recover the security keys for this user. The KM Server will generate a new 12-character security token, which must be provided to the user. The user will complete the recovery by repeating the steps of enabling advanced security. A new digital ID will be created for the user.

Chapter 20

Review Questions

  1. A Windows 2000 Server administrator informs you that several user accounts were deleted accidentally from the domain. New accounts have been created, but the users cannot connect to their former mailboxes. How can you provide these users with their messages most quickly?

    The users' mailboxes were deleted, but deleted mailboxes are retained for 30 days by default. You can reconnect mailboxes to the new user accounts without any difficulty using Exchange System Manager. Right-click on the mailbox, select Reconnect to specify the new user account, and the user will be able to work with the reconnected mailbox immediately.

  2. You are the administrator of a complex Exchange 2000 Server organization with multiple administrative and routing groups. You plan to use server monitoring extensively to ensure prompt system maintenance according to service-level agreements. For this purpose, you are configuring system monitors and e-mail notifications. You need to specify a monitoring server. Where should the monitoring server be located?

    System monitoring relies on LSI, which is most efficiently propagated between the servers in the local routing group. Consequently, you should specify monitoring servers that reside in the same routing group as the monitored server.

  3. A user informs you that messages must have been lost, because they were apparently not delivered to specified recipients. How can you verify that all messages reached their intended addressees?

    Message tracking can be used to determine where a message was delivered. You can search for messages by the originator's e-mail address and examine the path the messages have taken from server to server in your organization. The Message Tracking Center reads tracking information from the network shares of each server that has been involved in a particular message transfer. Message tracking must be enabled to write these log files.

  4. What Exchange 2000 Server databases can be included in online backups?

    The databases of mailbox and public stores that belong to the Information Store, as well as the databases of the KMS and SRS can be backed up online using an Exchange 2000 Server_enabled backup program.

  5. Which files types does ESE utilize in addition to the actual database files?

    Transaction logs, previous logs, reserved logs, checkpoint files, patch files, and a temporary database file.

  6. The following event was written to your application event log: "The database 'First Storage Group\Mailbox Store (BLUESKY-SRV1)' has 821 megabytes of free space after online defragmentation has terminated." How can you recover the disk space unnecessarily consumed by the database?

    You can use ESEUTIL.EXE with the /d switch to reduce the physical size of the database files. This operation is known as offline database compaction.

  7. What is the difference between an incremental and a differential backup?

    The incremental backup purges transaction log files, setting the context for the next backup. The differential backup does not discard any transactions. It does not change the context for any following incremental or differential backup.

  8. You have restored a full and several incremental database backups, but you have forgotten to select the Last Backup Set check box during the last restore operation. How can you complete the database restoration?

    You can restore the last backup one more time with the Last Backup Set check box selected, or you can run hard recovery manually using ESEUTIL.EXE with the /CC switch from the temporary folder of the transaction log files where RESTORE.ENV file exists.

  9. What is the purpose of the Setup /DisasterRecovery switch?

    Setup /DisasterRecovery will reconfigure the local server, including program files, registry settings, and database paths based on the configuration information still available in Active Directory. The old server object must still exist in the Exchange 2000 Server configuration. When running Setup /DisasterRecovery, make sure all the components that were previously installed on the server are marked for disaster recovery on the Component Selection wizard screen. You can restore databases online after the disaster recovery.

  10. Why do you have to install recovery servers in different Active Directory forests than the production systems?

    Mailbox GUIDs associate user accounts with their mailboxes. These identifiers must be unique within the Active Directory forest. Therefore, you cannot have two copies of the same database on different servers in the same organization. Exchange 2000 Server does not allow you to reconnect a mailbox from a restored database to the same or another user as long as the mailbox from the production database is connected to a user account. To bypass this issue, recovery servers must be installed in different Active Directory forests.

Chapter 21

Review Questions

  1. What are the two general types of Outlook forms and what are their purposes?

    It is possible to design send forms or post forms. Send forms are used to send formatted information to other users. The forms definition may be included in the message. Post forms, on the other hand, allow you to share information between users through public folders.

  2. Which three types of forms libraries can exist on an Exchange 2000 server?

    Organization forms library, folder forms library, and personal forms library.

  3. You are developing a new send form and want to test your solution. Where would you install the form?

    In the Personal Forms Library.

  4. You are planning to implement a project management solution for your team of Exchange administrators. You want to use a custom form to manage project tasks. How would you begin the design of your custom form?

    It would be advantageous to create a public folder for tasks items. After that, the standard Outlook task form should be displayed and modified using the Outlook Forms Designer. To load an Outlook form into the designer you need to launch the form, open the Tools menu, point to Forms, and select the Design This Form command. This will switch the form into design mode, where you can make modifications and add custom functionality. The form also can be published in design mode.

Chapter 22

Review Questions

  1. Why is Exchange 2000 Server OWA incompatible with OWA of earlier versions of Exchange Server?

    The new approach is based on ISAPI instead of ASPs, which the former version utilized. (The ASPs were processed by another ISAPI extension called ASP.DLL using a script interpreter.) Because OWA of Exchange 2000 Server does not rely on ASPs, both OWA versions are incompatible. The direct utilization of ISAPI gives better performance and scalability.

  2. During the installation of Exchange 2000 Server, four OWA-related virtual directories are created. What are their names and purposes?

    The four virtual directories are called Exadmin, Exchange, Exchweb, and Public. Exadmin allows Exchange System Manager to work with public folder properties. Exchange provides connection to mailboxes. Public can be used to access MAPI-based public folders. Exchweb points to graphics and other files that reside in \Program Files\Exchsrvr\Exchweb.

  3. Why is it advantageous to use Internet Explorer 5.0 in conjunction with OWA?

    Internet Explorer 5.0 supports advanced features, such as DHTML and XML, shortcut menus, and drag-and-drop operations between folders. Internet Explorer 5.0 can render mailbox and public folder data locally instead of sending requests to the server. This minimizes network communication and increases the scalability of the system.

  4. You have deployed three front end servers and plan to implement a software solution for load balancing. Which load-balancing solution does Microsoft recommend?

    It is recommended to group front end systems using Microsoft Network Load Balancing.

  5. Your organization uses OWA to provide access to Exchange 2000 Server over the Internet. Consequently, FE/BE systems have been installed, and SSL was enforced on the front end systems to enforce data security over Internet connections. Why should you refrain from implementing a DNS-based load- balancing solution?

    Round-robin DNS should not be used for load balancing across SSL- enabled hosts. The SSL bulk encryption key is maintained per host and would be lost if the client is redirected to another host by DNS. The client would have to establish a new session to generate a new bulk encryption key.

  6. You are working under the mailbox-enabled Administrator account. Your mailbox resides on BLUESKY-SRV1. What URL would you have to use to open the Calendar folder of your mailbox in Internet Explorer 5.0 directly?

    http://bluesky-srv1/Exchange/Administrator/Calendar/?Cmd=contents

Chapter 23

Review Questions

  1. Which Exchange 2000 Server component allows applications access to mailbox and public folder resources based on ADO?

    The Exchange OLE DB provider (ExOLEDB) supports record-level access to messaging information based on OLE DB and ADO 2.5 interfaces.

  2. What is the advantage of the ExIFS driver?

    ExIFS allows you to access message items using functions from Win32 file APIs. This allows you to access and share mailbox and public folders in much the same way as ordinary directories on the server's file system. Most important, direct file access through ExIFS allows you to store Web pages and other application elements directly in mailbox or public folders.

  3. You plan to implement a simple Web-based enterprise solution to demonstrate the benefits of Exchange 2000 Server. How can you quickly implement Web-based folder views and custom forms into a demo public folder?

    You should install the Web Storage System Forms SDK on your Exchange 2000 server and the FrontPage Extensions for Web Storage System Forms. Using FrontPage 2000, it is easy to design Web-based folder views and custom forms and register them with the desired public folder.

  4. What is the purpose of the Web Storage System Forms Registry?

    Web Storage System forms must be registered in registration items. Otherwise, the rendering engine cannot determine the location of the custom form to render the data. Various properties can be set for registration items to control how Web pages are used.

  5. You have implemented a Web-based travel expense report application. It is required to route new expense reports to the finance department for approval. Which feature of the Web Storage System would you use to implement the required functionality?

    You can implement a Web Storage System event sink to intercept the asynchronous OnSave event, which is triggered when new items or item changes are committed. To register your event sink, you can use REGEVENT.VBS.

Chapter 24

Review Questions

  1. When would you prefer to use CDOEX instead of ADO 2.5 in your custom applications?

    CDO is the ideal choice to implement workflow and other collaborative applications. It allows you to perform actions such as sending messages, managing contacts, scheduling appointments, handling meeting requests, creating folders, and so on. CDO simplifies working with raw data in item streams. Streams are created automatically based on Internet standard formats. Unlike ADO, CDO recreates streams when item properties are changed.

  2. Which basic CDO CoClass can you use to send e-mail messages?

    CDO.Message

  3. You are developing a CDO-based calendaring application. Which file URL do you need to use to write appointments to a user's Calendar folder?

    You need to specify a URL of file://./BackOfficeStorage/<domain name/MBX/<user alias>/calendar/. The user alias corresponds to the left half of the sender's SMTP address, which is not necessarily the user's Windows 2000 account name.

  4. How can you quickly obtain contact information for your Windows 2000 account from Active Directory in vCard format?

    You have to create a CDO.Person object, bind it to your account in Active Directory, and then use the GetVCardStream method to write the desired information to a specified file vCard-compliant MIME format.

  5. What level of permissions is required to successfully work with CDO for Exchange Management?

    You need to have Exchange Administrator permissions if you want to manage an organization or administrative group. CDOEXM applications require the same level of permissions as Exchange System Manager.

  6. You want to develop a workflow solution for your organization. Which tool should you use to implement process definition and business logic?

    Workflow Designer for Exchange 2000 Server.

  7. What restrictions apply to the Can Register Workflow role?

    The workflow logic must be written in VBScript, but calls to CreateObject are prohibited. Restricted VBScript code cannot instantiate COM classes. The code runs in the context of a special account called EUSER_EXSTOREEVENT with guest privileges by default. The workflow system account requires the Windows 2000 Act As Part Of The Operating System permission.

Chapter 25

Review Questions

  1. You have successfully deployed Instant Messaging in your organization. You are using MSN Messenger to send and receive instant messages and to propagate your presence information. Using the Status button in MSN Messenger, you change your status to Away From Computer. How does your IM home server propagate this change to other users?

    Your IM home server maintains a subscriber list for your account to send notifications to registered subscribers if the status of your account changes. As soon as your state changes to Away From Computer, the server actively sends a status change notification to each subscriber, which ensures that contact lists are always up to date. IM users that have subscribed your account as a contact will see the new status right away.

  2. How can you block the propagation of presence information?

    The MSN Messenger client allows you to block the propagation of presence information via the Privacy command, which is available on the Tools menu.

  3. How do IM clients outside a protected network communicate with internal clients that are inside the firewall?

    IM clients outside a protected network can only connect to IM routers, which in turn communicate with IM home servers inside the protected network on behalf of the external clients.

  4. You plan to simplify the IM domain naming scheme by matching the IM domain name to the SMTP domain name of your organization (such as bluesky-inc-10.com). How can you achieve the desired configuration?

    You have the option to add an SRV resource record for your IM router to DNS and map the common domain name (such as bluesky-inc-10.com) to the Instant Messaging service (_rvp) and the TCP port on which the service is provided.

  5. You plan to install Exchange 2000 Chat Service on a computer that is not running Exchange 2000 Server. What level of permissions is required in the Exchange 2000 organization to successfully complete the installation?

    The permissions of an Exchange Administrator are required in the Administrative Group to which you want to add the Chat Service.

  6. What are the minimum configuration prerequisites to successfully deploy Exchange 2000 Conferencing Server?

    Exchange 2000 Conferencing Server requires Windows 2000 Server and IIS 5.0. Exchange 2000 Server is not required on the local computer, but Active Directory and Exchange 2000 Server must have been deployed in the Windows 2000 domain. In addition, the network must be IP multicast-enabled and must provide MADCAP services for videoconferencing. Windows 2000 Certificate Services is required to support private conferences.

Chapter 26

Review Questions

  1. What are the three most important components of the MS Mail Connector?

    The MS Mail Connector Interchange, the Connector PO, and one or many MS Mail Connector (PC) MTAs.

  2. What is the function of the Connector PO?

    The Connector PO represents the MS Mail interface of Exchange 2000 Server. It is the intermediate repository for MS Mail messages between an Exchange 2000 server and MS Mail postoffices.

  3. You have configured an MS Mail Connector between one MS Mail postoffice and an Exchange 2000 server. Exchange users can send messages, but users on the MS Mail postoffice cannot. How can you correct this problem?

    This is an MS Mail-related problem. You need to use the MS Mail Administrator program to check that the Connector PO has been registered as an external postoffice.

  4. What are the three stages of a complete Dirsync cycle?

    The three stages are T1, T2, and T3. At T1, requestors generate update messages, which are addressed to the Dirsync server. At T2 time, the Dirsync server incorporates address updates into the master address list. Also, update messages for requestor postoffices will be generated and sent back to the requestors. At T3, received address changes are committed to the postoffice address lists.

  5. You have configured an Exchange 2000 server as a DXA server. MS Mail requestor postoffices are sending their address changes to the Exchange 2000 server through the MS Mail Connector. When will address list changes appear in the specified import container?

    Running as a Windows 2000 service, the DXA is permanently active. It will commit address updates to Active Directory immediately as soon as they are received. MS Mail address information is maintained in recipient objects that are placed in an OU that was specified as the import container for the remote Dirsync requestor.

  6. Which configuration can you use to map MS Mail template information to Exchange mailbox attributes?

    MS Mail template labels can be mapped to mailbox attributes using the Directory Synchronization configuration object in Exchange System Manager. A mapping can be defined for both incoming and outgoing information through the Incoming Templates and Outgoing Templates tabs.

  7. Why must you configure a distribution group before configuring the Schedule+ Free/Busy Connector?

    A distribution group is required to contain the Adminsch accounts of the MS Mail postoffices. The Schedule+ Free/Busy Connector uses this distribution group to address the free/busy update messages.

Chapter 27

Review Questions

  1. How many direct Lotus cc:Mail post offices does the Connector for Lotus cc:Mail support?

    The Connector for Lotus cc:Mail can only connect to one Lotus cc:Mail post office directly.

  2. What are the main components of the Connector for Lotus cc:Mail?

    The Information Store maintains the connector message queues (MTS-OUT and MTS-IN). The actual Connector for Lotus cc:Mail service performs the transfer and conversion of messages. The Connector Store acts as the intermediate repository for scratch files. The Lotus cc:Mail programs Import and Export are used to access a Lotus cc:Mail post office. Address and details templates allow specifying Lotus cc:Mail recipients in Microsoft Outlook. The proxy address generator CCMPROXY.DLL allows the Recipient Update service to generate proxy CCMAIL addresses for all recipients in the organization.

  3. You need to adjust the proxy CCMAIL address format. You are required to assign e-mail aliases in the form of first name immediately followed by first character of the last name. Where and how can you adjust the proxy address format?

    Using Exchange System Manager, you need to customize the proxy address format by means of a recipient policy. Recipient policy objects can be found in the Recipients container, under Recipient Policies. Click on the E-Mail Addresses tab and select the CCMAIL check box. Double-click the Address entry to customize the proxy address generation. Specify the following format: %g%1s at <Organization Name>.

  4. Which program is used to write messages into the Lotus cc:Mail post office?

    IMPORT.EXE

  5. Which program is used to poll the Lotus cc:Mail post office for address information?

    EXPORT.EXE

Chapter 28

Review Questions

  1. What do you have to configure in Lotus Domino/Notes to support the Connector for Lotus Notes?

    A Connector ID has to be created, which should not be included in directory synchronization. This ID requires Access permissions to the server's router mailbox, called MAIL.BOX, as well as the Connector-specific databases, by default EXCHANGE.BOX and EXCHANGE.BAD. Both can be created using Lotus Notes Administrator. If they are missing, the Connector for Lotus Notes creates them automatically. For directory synchronization, Access permissions for source and target name and address books are required, and it is advisable to add the Connector ID to the list of administrators in the server's Server document if you want the Connector to compact its databases during maintenance cycles. Do not forget to register your Exchange 2000 Server organization in a foreign domain document. To support Doclink conversion, general Reader access to Notes databases is required.

  2. Which Connector component retrieves messages from the MTS-OUT queue?

    The MEXOUT process.

  3. Which processes perform directory synchronization with Lotus Domino/Notes and how do they accomplish their tasks?

    DXANOTES uses the Notes client API to read and write address information in Lotus Domino/Notes and DXAMEX uses ADSI to work with Active Directory. DXANOTES and DXAMEX in turn communicate with each other by means of temporary MIF files called DXANOTES.TXT and DXAMEX.TXT.

  4. In which tab can you change the name of the Domino server that the Connector for Lotus Notes contacts for message transfer?

    In the General tab.

Chapter 29

Review Questions

  1. What needs to be prepared in the GroupWise domain to support the Connector for Lotus Novell GroupWise?

    You need to install and configure Novell GroupWise Patch 2 for API NLM on a NetWare server and enable it for distribution list expansion. You also need to create a gateway object for it in the GroupWise domain. The Exchange 2000 Server organization must be registered in the form of an external foreign domain, which is connected to GroupWise via API Gateway. The Connector for Novell GroupWise requires a NetWare account with membership in the NTGATEWAY group to access the API Gateway for message transfer and directory synchronization.

  2. Which Connector component retrieves messages from the API Gateway?

    The Microsoft Exchange Router for Novell GroupWise, which is implemented in a separate Windows 2000 service running on the Exchange 2000 server.

  3. You have implemented the Connector for Novell GroupWise. Message transfer and directory synchronization work properly; however, an Exchange user calls you and complains that all messages sent to GroupWise users appear in plain text. How can you solve this problem?

    This happens by design. The API Gateway only supports message bodies in plain text. Consequently, RTF information cannot be preserved in e-mail messages between Exchange and GroupWise users.

  4. Based on the Connector for Novell GroupWise, you have configured directory synchronization between Exchange 2000 Server and GroupWise. GroupWise recipients appear in Active Directory, but you want to change the way the GroupWise users appear in the server-based address lists. Where can you find the mapping rule files that you need to edit to achieve the desired results?

    The mapping rule file for synchronization from GroupWise to Active Directory is MAPGWISE.TBL, which you can find in the connector store in the \Dxagwise subdirectory.

  5. How does DXAGWISE retrieve GroupWise directory information?

    DXAGWISE generates an administrator message to request a list of all users in the GroupWise directory. It places this message in the form of an .api file in the \Gwrouter\Togwise directory of the connector store, where the Router for Novell GroupWise picks it up and transfers it into the API Gateway's API_IN directory. GroupWise processes the request and returns a list with all GroupWise users through the API_OUT directory of the API Gateway, which the Router for Novell GroupWise transfers into the \Gwrouter\Dirsync directory.



MCSE Training Kit Exam 70-224(c) Microsoft Exchange 2000 Server Implementation and Administration
MCSE Training Kit Exam 70-224(c) Microsoft Exchange 2000 Server Implementation and Administration
ISBN: N/A
EAN: N/A
Year: 2001
Pages: 186

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net