MS-203 Dumps MS-203 Braindumps MS-203 Real Questions MS-203 Practice Test MS-203 Actual Questions Microsoft MS-203 Microsoft 365 Messaging https://killexams.com/pass4sure/exam-detail/MS-203 Question: 90 Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution. After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen. You have a Microsoft Exchange Server 2019 organization that contains 200 mailboxes. You need to add a second email address to each mailbox. The address must have a syntax that uses the first letter of each user’s last name, followed by the user’s first name, and then @fabrikam.com. Solution: You convert all the mailboxes to shared mailboxes, and then you run the Set-Mailbox cmdlet and specify the CEmailAddressPolicyEnabled $false parameter. Does this meet the goal? A. Yes B. No Answer: B Explanation: Reference: https://docs.microsoft.com/en-us/exchange/email-addresses-and-address-books/email-address- policies/email-address-policies?view=exchserver-2019 Email address policies define the rules that create email addresses for recipients in your Exchange organization. The basic components of an email address policy are: Email address templates: Define the email address format for the recipients (for example @contoso.com or .@contoso.com). Recipient filter: Specifies the recipients whose email addresses are configured by the policy. Priority: Specifies the order to apply the email address policies (important if a recipient is identified by more than one policy). The EmailAddressPolicyEnabled parameter specifies whether to apply email address policies to this recipient. Valid values are: $true: Email address policies are applied to this recipient. This is the default value. $false: Email address policies aren’t applied to this recipient. Question: 91 Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution. After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen. You have a Microsoft Exchange Server 2019 hybrid deployment. All user mailboxes are hosted in Microsoft 365. All outbound SMTP email is routed through the on-premises Exchange organization. A corporate security policy requires that you must prevent credit card numbers from being sent to internet recipients by using email. You need to configure the deployment to meet the security policy requirement. Solution: From Microsoft 365, you create a data loss prevention (DLP) policy. Does this meet the goal? A. Yes B. No Answer: A Explanation: Reference: https://docs.microsoft.com/en-us/microsoft-365/compliance/data-loss-prevention-policies?view=o365- worldwide Question: 92 You have a Microsoft Exchange Online tenant that contains a resource mailbox named ConferenceRoom1. ConferenceRoom1 is configured as shown in the following exhibit. You need to review the customized setting for booking requests. Which cmdlet should you run? A. Get-ResourceConfig B. Get-Mailbox C. Get-MailboxCalendarFolder D. Get-CalendarProcessing Answer: D Explanation: Reference: https://itpro.outsidesys.com/2017/11/06/exchange-configuring-the-resource-booking-attendant-with-powershell/ https://docs.microsoft.com/en-us/powershell/module/exchange/get-calendarprocessing?view=exchange-ps Question: 93 Joni Sherman reports that the Microsoft Outlook client on her Windows 10 device fails to start. You need to troubleshoot the issue. From the device, you start the Microsoft Remote Connectivity Analyzer. What should you run next? A. the Exchange ActiveSync test B. the Outlook Connectivity test C. the Service Account Access test D. the Microsoft Support and Recovery Assistant for Office 365 client Answer: D Explanation: Reference: https://www.sherweb.com/blog/office-365/microsoft-support-and-recovery-assistant/ Question: 94 You have Microsoft Exchange Online tenant that uses Microsoft Defender for Office 365. You have the policies shown in the following table. You need to track any modifications made to Policy1 by the identifying following: • The name of the user that modified the policy • The old and new values settings modified in Policy1 • How the modifications compare to the baseline settings of Standard Preset Security Policy What should you use in the Microsoft 365 Defender portal? A. Audit B. Configuration analyzer C. Threat tracker D. Threat analytics Answer: A Explanation: Reference: https://docs.microsoft.com/en-us/microsoft-365/security/office-365-security/audit-log-search The Audit feature in the Microsoft 365 Defender portal allows you to track any modifications made to the policies in your tenant, including the Anti-malware Policy1. You can use the Audit feature to view the name of the user that modified the policy, the old and new values settings modified in Policy1 and how the modifications compare to the baseline settings of Standard Preset Security Policy. Question: 95 You need to recommend a solution to retain the items in the public folders. The solution must support the planned changes. What should you recommend? A. Create an Outlook rule that forwards all the items in each public folder to a compliance mailbox. B. Place an In-Place Hold on all the mailboxes of the public folders. C. Increase the frequency of the backups. D. Modify the public folder permissions. Answer: B Explanation: References: https://docs.microsoft.com/en-us/exchange/security-and-compliance/in-place-and-litigation- holds#placingpublic-folders-on-hold Question: 96 HOTSPOT You have a Microsoft Exchange Online tenant named contoso.com. Email messages from a remote domain named fabrikam.com are received from a server that uses a wildcard certificate for fabrikam.com and are encrypted by using TLS. Fabrikam.com is switching to a third-party cloud filtering service for inbound and outbound email. The IP address used by the third-party service is 131.107.200.10. You need to reconfigure the connector to only accept messages from fabrikam.com that are encrypted and received from the third-party service. Which two settings should you modify for the connector? To answer, select the appropriate settings in the answer area. NOTE: Each correct selection is worth one point. Answer: Explanation: Graphical user interface, text, application, email Description automatically generated Question: 97 You need to recommend a solution that meets the security requirements for protecting users. What should you recommend? A. From the Security & Compliance admin center, create an ATP safe attachments policy. B. From the Exchange admin center in Exchange Online, create a spam filter policy. C. From the Security & Compliance admin center, create an ATP anti-phishing policy. D. From the Security & Compliance admin center, create an ATP Safe Links policy. Answer: D Explanation: All users must be protected from accessing unsecure websites when they click on URLs embedded in email messages. Question: 98 You need to resolve the email delivery delay issue. What should you do? A. From the Security & Compliance admin center, modify the safe attachments policy B. From the Security & Compliance admin center, create a supervision policy. C. From the Exchange admin center in Exchange Online, modify the antimalware policy. D. From the Exchange admin center in Exchange Online, modify the spam filter policy. Answer: A Explanation: References: https://docs.microsoft.com/en-us/office365/securitycompliance/dynamic-delivery-and-previewing Question: 99 HOTSPOT You have a Microsoft Exchange Online tenant. You plan to filter all inbound and outbound email messages by using a third-party message hygiene solution. You need to ensure that all the email sent and received by the tenant is filtered through the message hygiene solution. The solution must ensure that only the message hygiene solution can send email to the tenant. What should you configure for the tenant? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point. Answer: Question: 100 You have a hybrid deployment that contains a Microsoft Exchange Online tenant and an on-premises Exchange Server 2019 server named Server1. Server1 uses a certificate from a third-party certification authority (CA). The certificate is enabled for the SMTP service. You replace the certificate with a new certificate. You discover that delivery fails for all email messages sent from Server1 to your Microsoft 365 tenant. You receive the following error message for all the queued email messages: “450 4.4.101 Proxy session setup failed on Frontend with 451 4.4.0 Primary target IP address responded with 451 5.7.3 STARTTLS is required to send mail.” You need to ensure that the messages are delivered successfully from Server1 to the Microsoft 365 tenant. What should you do? A. From the Exchange admin center, update the certificate thumbprint in the properties of a connector B. From Server1, regenerate the certificate and select Make private keys exportable C. From the firewall, disable SMTP content inspection D. From Server1, enable the new certificate for the IMAP4 service Answer: C Question: 101 HOTSPOT You have a hybrid deployment of Microsoft Exchange Server 2019 and Microsoft 365 that contains three servers. All email received from the Internet is sent directly to the servers. You run the following command. Get-MalwareFilterPolicy | FL Name,BypassInboundMessages,BypassOutboundMessages,Action,IsDefault You receive the output shown in the following exhibit. You run the Get-TransportAgent cmdlet and receive the output shown in the following exhibit. For each of the following statements, select Yes if the statement is true. Otherwise, select No. NOTE: Each correct selection is worth one point. Answer: Explanation: Text Description automatically generated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