MS-203 Dumps
MS-203 Braindumps MS-203 Real Questions MS-203 Practice Test
MS-203 Actual Questions
Microsoft 365 Messaging
https://killexams.com/pass4sure/exam-detail/MS-203
Question: 90
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
You have a Microsoft Exchange Server 2019 organization that contains 200 mailboxes.
You need to add a second email address to each mailbox. The address must have a syntax that uses the first letter of each user’s last name, followed by the user’s first name, and then @fabrikam.com.
Solution: You convert all the mailboxes to shared mailboxes, and then you run the Set-Mailbox cmdlet and specify the CEmailAddressPolicyEnabled $false parameter.
Does this meet the goal?
Yes
No
Reference: https://docs.microsoft.com/en-us/exchange/email-addresses-and-address-books/email-address- policies/email-address-policies?view=exchserver-2019
Email address policies define the rules that create email addresses for recipients in your Exchange organization. The basic components of an email address policy are:
Email address templates: Define the email address format for the recipients (for example <firstname>@contoso.com or
<lastname>.<firstname>@contoso.com).
Recipient filter: Specifies the recipients whose email addresses are configured by the policy.
Priority: Specifies the order to apply the email address policies (important if a recipient is identified by more than one policy).
The EmailAddressPolicyEnabled parameter specifies whether to apply email address policies to this recipient. Valid
values are:
$true: Email address policies are applied to this recipient. This is the default value.
$false: Email address policies aren’t applied to this recipient.
Question: 91
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
You have a Microsoft Exchange Server 2019 hybrid deployment. All user mailboxes are hosted in Microsoft 365. All outbound SMTP email is routed through the on-premises Exchange organization.
A corporate security policy requires that you must prevent credit card numbers from being sent to internet recipients by using email.
You need to configure the deployment to meet the security policy requirement. Solution: From Microsoft 365, you create a data loss prevention (DLP) policy. Does this meet the goal?
Yes
No
Reference: https://docs.microsoft.com/en-us/microsoft-365/compliance/data-loss-prevention-policies?view=o365- worldwide
Question: 92
You have a Microsoft Exchange Online tenant that contains a resource mailbox named ConferenceRoom1. ConferenceRoom1 is configured as shown in the following exhibit.
You need to review the customized setting for booking requests.
Which cmdlet should you run?
Get-ResourceConfig
Get-Mailbox
Get-MailboxCalendarFolder
Get-CalendarProcessing
https://itpro.outsidesys.com/2017/11/06/exchange-configuring-the-resource-booking-attendant-with-powershell/ https://docs.microsoft.com/en-us/powershell/module/exchange/get-calendarprocessing?view=exchange-ps Question: 93
Joni Sherman reports that the Microsoft Outlook client on her Windows 10 device fails to start.
You need to troubleshoot the issue.
From the device, you start the Microsoft Remote Connectivity Analyzer. What should you run next?
the Exchange ActiveSync test
the Outlook Connectivity test
the Service Account Access test
the Microsoft Support and Recovery Assistant for Office 365 client
Reference: https://www.sherweb.com/blog/office-365/microsoft-support-and-recovery-assistant/
Question: 94
You need to track any modifications made to Policy1 by the identifying following:
The name of the user that modified the policy
The old and new values settings modified in Policy1
How the modifications compare to the baseline settings of Standard Preset Security Policy What should you use in the Microsoft 365 Defender portal?
Audit
Configuration analyzer
Threat tracker
Threat analytics
Reference: https://docs.microsoft.com/en-us/microsoft-365/security/office-365-security/audit-log-search
The Audit feature in the Microsoft 365 Defender portal allows you to track any modifications made to the policies in your tenant, including the Anti-malware Policy1. You can use the Audit feature to view the name of the user that modified the policy, the old and new values settings modified in Policy1 and how the modifications compare to the baseline settings of Standard Preset Security Policy.
Question: 95
You need to recommend a solution to retain the items in the public folders. The solution must support the planned changes.
What should you recommend?
Create an Outlook rule that forwards all the items in each public folder to a compliance mailbox.
Place an In-Place Hold on all the mailboxes of the public folders.
Increase the frequency of the backups.
Modify the public folder permissions.
References: https://docs.microsoft.com/en-us/exchange/security-and-compliance/in-place-and-litigation- holds#placingpublic-folders-on-hold
Question: 96
HOTSPOT
You have a Microsoft Exchange Online tenant named contoso.com.
Email messages from a remote domain named fabrikam.com are received from a server that uses a wildcard certificate for fabrikam.com and are encrypted by using TLS.
Fabrikam.com is switching to a third-party cloud filtering service for inbound and outbound email. The IP address used by the third-party service is 131.107.200.10.
You need to reconfigure the connector to only accept messages from fabrikam.com that are encrypted and received from the third-party service.
Which two settings should you modify for the connector? To answer, select the appropriate settings in the answer area. NOTE: Each correct selection is worth one point.