Review Questions


1. ‚  

Jane uses Microsoft Outlook on both her office computer and her home computer. One night at home, Jane connects to her office server in order to read her mail. The next day at the office when Jane attempts to re-read the previous day ‚ s mail, there are no messages in her Inbox. What is the most likely cause of this situation?

  1. Jane ‚ s mail was delivered to an OST file on her home computer.

  2. Jane ‚ s home computer is still logged on to the server.

  3. Jane did not synchronize her mailbox with the server.

  4. Jane ‚ s mail was delivered to a PST file on her home computer.

2. ‚  

Lou has a laptop computer for doing work away from the office and a desktop computer at the office. Microsoft Outlook is installed on both computers. Lou would like to see all of his messages while using either computer. The laptop computer does not have a continuous connection to the office server, but Lou would like to be able to read and compose messages while using the laptop offline. How should Lou configure his two computers?

  1. Configure the laptop computer with an OST file and the desktop computer to access his private folders in the Private Information Store.

  2. Configure both computers with PST files.

  3. Configure both computers to access his private folders in the Private Information Store.

  4. Configure the laptop computer with a PST file and the desktop computer to access his private folders in the Private Information Store.

3. ‚  

Which of the following MAPI components manages memory, administers profiles, routes client requests to the relevant service provider, and returns results from servers via service providers?

  1. Client Application Layer

  2. MAPI subsystem

  3. Common Mail Call

  4. MAPI service provider

4. ‚  

An IMAP4 client connects to your Exchange server and receives an error message stating that the message size is unknown. Which of the following should you do to fix this problem?

  1. Enable MCIS.

  2. Increase the Idle Timeout setting.

  3. Use plain-text authentication.

  4. Clear the Enable Fast Message Retrieval check box.

5. ‚  

A user has come to you after forgetting the password she assigned to her personal folders. What can you do to retrieve the messages in those folders?

  1. Use the Inbox Repair Tool to assign a new password.

  2. Use System Manager to assign a new password.

  3. Use System Manager to create a new set of personal folders and then import messages from the old personal folders.

  4. Use Outlook to create a new set of personal folders and then import messages from the old personal folders.

  5. Nothing ‚ you cannot retrieve the information.

6. ‚  

You are creating a custom electronic form for a public folder using Outlook 2003. Which of the following components could you include on the form?

  1. A functioning Excel spreadsheet

  2. Voting buttons that let users vote on the usefulness of that spreadsheet

  3. A button that automatically routes the form to the next person on a routing list

  4. All of the above

7. ‚  

Your company receives newsfeeds from your Internet Service Provider. You notice a folder within the newsgroup hierarchy that you do not want to receive. What must you do to permanently remove this folder from the hierarchy?

  1. Rename the folder.

  2. Exclude the folder from the newsfeed.

  3. Clear the folder ‚ s Folder Visible attribute.

  4. Delete the folder through Microsoft Outlook.

8. ‚  

Management has decided to allow company access to various newsgroups. Your ISP can provide full newsgroup access, but they do not configure newsfeeds on a customer-by-customer basis. How would you configure the transfer of the newsfeeds?

  1. No transfer type is necessary.

  2. Configure it for both push and pull.

  3. Configure it for a push transfer only.

  4. Configure it for a pull transfer only.

9. ‚  

You have just configured your Exchange server for POP3 client access. POP3 clients can be authenticated with Basic, Basic with SSL, or Integrated Windows authentication. The administrator of your firewall informs you that the firewall will allow traffic from SMTP (port 25), POP3 (port 110), and HTTP (port 80). For what additional traffic must the firewall be configured to allow your Exchange server POP3 configuration to be used?

  1. 995

  2. 443

  3. 137

  4. 135

10. ‚  

An Outlook 2003 user has just sent a message to a recipient who is also using Outlook 2003, and he realizes that he has forgotten to attach an important document to the message. He can recall the message so long as what has not happened ?

  1. The recipient has not received the message.

  2. The recipient has not opened the message.

  3. The recipient has not replied to or forwarded the message.

  4. The recipient has not moved the message from the Inbox.

  5. The recipient has not deleted the message.

11. ‚  

Your organization consists of four back-end Exchange Server 2003 computers and two front-end Exchange Server 2003 computers. Only the back-end Exchange servers contain mailboxes. You want to configure and implement RPC over HTTP to allow your traveling sales force to use Outlook 2003 to connect securely to your Exchange organization. Which of the following are requirements that you must meet in order to be able to perform this task? (Choose all that apply.)

  1. The front-end servers must be running Exchange Server 2003 on Windows 2000 or better.

  2. The back-end servers must be running Exchange Server 2003 on Windows Server 2003.

  3. All client computers must be running Windows XP Service Pack 1.

  4. All Global Catalog servers must be running Windows 2000 Server Service Pack 4 or better.

12. ‚  

You organization consists of three Exchange Server 2003 computers running on Windows Server 2003 servers. All employees in the company use Outlook 2003 as their standard messaging client. All employees have Outlook 2003 configured to use the cache mode of operation. If you want ensure that your users get a complete list of all new messages as quickly as possible, with message bodies and attachments being downloaded and synchronized after that, which option should you configure?

  1. Download Full Items

  2. Download Headers

  3. Download Headers And Then Full Items

  4. On Slow Connections Download Headers Only

13. ‚  

If you wanted to prohibit certain IP addresses of web clients from accessing your Exchange server, what program would you use?

  1. Exchange System Manager

  2. Network applet in Control Panel

  3. Internet Information Services (IIS) Manager

  4. Network Monitor

14. ‚  

Why can ‚ t POP3 clients see e-mail messages in subfolders of their Inbox?

  1. POP3 clients can access messages only in the Inbox, not subfolders of the Inbox.

  2. LDAP is not enabled at the mailbox object.

  3. NNTP is not enabled at the mailbox object.

  4. The IIS computer is down.

15. ‚  

For POP3 clients to be able to send Internet mail from their mailbox, what other component must be operational?

  1. LDAP

  2. NNTP

  3. Active Server Components

  4. SMTP

16. ‚  

What two types of files does the Windows Installer use to install Outlook?

  1. Installer package file

  2. Installer transform file

  3. Installer answer file

  4. Installer user file

17. ‚  

You have made certain configuration changes to the POP3 protocol using Internet Information Services (IIS) Manager. However, soon after you make the changes, you find that the configuration has reverted to its previous state. You try again, but the same thing happens. What is the problem?

  1. You can make changes only using the Exchange System Manager.

  2. You must make the configuration changes in both the Exchange System Manager and Internet Information Services (IIS) Manager.

  3. You must make the configuration changes in both Active Directory Users and Computers and Internet Information Services (IIS) Manager.

  4. You must configure IIS to replicate changes to the Exchange System Manager.

18. ‚  

Which of the following features are not available when accessing an Exchange server with a web browser via Outlook Web Access?

  1. Personal folders

  2. Public folders

  3. Searching for messages

  4. Group scheduling

19. ‚  

Which of the following components is responsible for merging a form with information from the Information Store to create an HTML or XML page that is delivered to a web client?

  1. W3svc

  2. Information Store

  3. DAVEx

  4. Forms Registry

20. ‚  

Which of the following components manages the flow of messages between a MAPI message store and MAPI transport providers?

  1. MAPI client

  2. Offline folder

  3. Message spooler

  4. Transport service

Answers

1. ‚  

D. A personal folder store is a file-based storage container independent of the Exchange Server back end. A file that is composed of a set of personal folders has the .pst extension. A PST file can be stored on the user ‚ s local machine or on a shared directory on a network server.

2. ‚  

A. If mailbox storage is left in the default location (the Private Information Store) and offline access to that data is also needed, the user can utilize an offline folder. An offline folder is a local copy of the user ‚ s private folders in the Private Information Store. The mailbox on the server remains the master copy.

3. ‚  

B. The MAPI subsystem provides a single interface for client applications. Communication with all MAPI-compliant server messaging systems is facilitated by interfacing with the MAPI subsystem. It is the middleware, or broker, in the messaging environment.

4. ‚  

D. The Enable Fast Message Retrieval option, which is enabled by default, permits an Exchange server to approximate the size of messages when reporting to an IMAP4 client application. Approximating message sizes increases the speed of message retrieval. Some IMAP4 client applications, however, require a server to report the exact message size. If that is the case, this field can be cleared (i.e., unchecked).

5. ‚  

E. Passwords assigned to a personal folder can be neither viewed by the Exchange administrator nor retrieved without the password. Therefore, if a user forgets this password, the information in that folder is inaccessible. Several third-party utilities exist that can be used to try to break the password on a PST file, however.

6. ‚  

D. Because of Microsoft object technology, a spreadsheet contained in a form would not be merely rows and columns but could include the Excel code to execute the functions of the spreadsheet. Voting buttons are a built-in function of Outlook 2003, and a routing function is an example of a simple custom code that could be placed into a form.

7. ‚  

B. You can exclude the folder from the newsfeed using the Subscription page of the newsfeed ‚ s property pages.

8. ‚  

D. When one server actively sends information to another server, it is referred to as a push feed (it is also referred to as publishing). A server can also be configured to request that information be sent to it from another server. This is referred to as a pull feed.

9. ‚  

A. POP uses TCP/IP as its transport protocol. The session, or conversation, between the POP client and server takes place on TCP port 110. If Secure Sockets Layer (SSL) is being used to create an encrypted channel, port 995 is used instead.

10. ‚  

B. An Outlook 2003 user can recall a sent message, assuming the recipient has not already opened it.

11. ‚  

B, C. The requirements to configure and implement RPC over HTTP are as follows :

‚ Client computers must have Outlook 2003 installed.

‚ Client computers must be running Windows XP with Service Pack 1 and hot fix Q331320.

‚ Front-end servers must be running Exchange Server 2003 on Windows Server 2003.

‚ Back-end servers must be running Exchange Server 2003 on Windows Server 2003.

‚ Public folder servers must be running Exchange Server 2003 on Windows Server 2003.

‚ All Global Catalog servers must be running Windows Server 2003.

12. ‚  

C. Leaving the default configuration, Download Headers And Then Full Items, in place results in the message list being built quickly because only the headers are downloaded initially. After all of the headers are downloaded, the message bodies and any attachments are then downloaded.

13. ‚  

C. Internet Information Services (IIS) Manager is used to provide management of the HTTP protocol.

14. ‚  

A. POP3 clients can be used to retrieve messages from the Inbox only.

15. ‚  

D. POP3 is a protocol used for message retrieval only. In order to send messages, POP3 clients use the SMTP protocol.

16. ‚  

A, B. Windows Installer uses two types of files to install Outlook: an installer package (MSI) file and an installer transform (MST) file. The package file contains a database that describes the configuration information. The transform file contains modifications that are to be made as Windows Installer installs Outlook. The package file never changes; it is essentially a database that helps Windows Installer relate various features to actual installation files. The transform file is what is modified using the Custom Installation Wizard.

17. ‚  

A. When virtual servers are managed using the Exchange System Manager, the Exchange System Attendant writes the configuration information to the Active Directory. From there, the information is written to the IIS metabase. If you configure virtual servers directly in IIS, it is possible that the information you configure will be overwritten by older information configured in System Manager or Active Directory.

18. ‚  

A. While OWA provides many advanced Exchange features, not all of the features available in a MAPI client such as Outlook are available through OWA.

19. ‚  

C. DAVEx retrieves an appropriate form from the Forms Registry and merges it with the information from the Information Store, creating an HTML or XML document. DAVEx then sends the formatted document to the W3svc service for delivery to the client.

20. ‚  

C. The message spooler is an independent process that manages the flow of messages between the message store and the transport providers. It is like a queue where incoming and outgoing messages are sent and from there are routed to the necessary provider. When a message is marked for sending, a message store provider will send it to the message spooler.




MCSA[s]MCSE
MCSA[s]MCSE
ISBN: 735621527
EAN: N/A
Year: 2004
Pages: 160

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net