You are on page 1of 32

Troy Technologies USA

MCSE
STUDY GUIDE
Exchange Server 5.5
Exam 70-81
Congratulations!!

You have purchased one of the Troy Technologies USA MCSE Study
Guides.

This study guide consists of a selection of questions and answers very, very
similar to the ones you will find on the official MCSE exam. All you need
to do is study and memorize the following questions and answers.....and you
will be ready to take the exam. Remember, we guarantee it!

Average study time is 10 to 12 hours. Then you are ready.

GOOD LUCK!

Guarantee

Should you use this study guide and still fail the appropriate MCSE exam,
then send your original of the official score notice, along with your mailing
address to:

Troy Technologies USA


8200 Pat Booker Rd. #368
San Antonio, TX 78233

We will gladly refund the full cost of this study guide. However, you are not
going to need this guarantee if you follow the above instructions.

 Copyright 1998 Troy Technologies USA. All Rights Reserved.


Exchange 5.5 Concepts
Installation
Exchange 5.5 can be installed on any Windows NT 4.0 machine that is acting as the Primary Domain
Controller (PDC), Backup Domain Controller (BDC) or a Member Server as long as Windows NT
Service Pack 3 has already been installed.

For optimal performance you should place the transaction log files and database files on separate disks
connected to a separate disk controllers.

Core Components
Exchange Server 5.5 consists of four basic core components. These are the System Attendant,
Directory Service, Message Transfer Agent, and the Information Store.

Component Description
System Attendant (SA) Responsible for creating Email Addresses for new Recipients,
building Routing Tables, handling Message Tracking functions, Link
& Server Monitoring, and reclaiming lost disk space.
Directory Service (DS) Provides all the information pertaining to the various objects within
Exchange, such as mailboxes, folders, distribution lists, and site
containers.
Information Store (IS) Responsible for the actual server-side storage of message data. It is
also responsible for the delivery of Local email.
Message Transfer Agent Responsible for the routing of messages. It routes messages within
(MTA) and
between sites.

System Attendant (SA)

The SA must be started before any of the other Exchange services will start. Since the SA service
takes an inordinately long period of time to shutdown. It is best to stop the SA service prior to a
shutdown.

Directory Service (DS)

Each Exchange server maintains a complete copy of the directory for a particular site. A process
called directory replication is responsible for ensuring that each server within a site is updated
properly. The actual DS database is kept in a file called DIR.EDB, which is stored, by default, in the
\EXCHSRVR\DSADATA\ directory.

Some directory information, such as user-related properties, are made available in the Global Address
List (GAL). The GAL is a subset of directory information.

Information Store (IS)

The Information Store is comprised of two databases, the Private Store and the Public Store. These
two databases are maintained on the same server by default, but they should be separated for
performance benefits.

1
Private Store: Contains messages and data that are intended for a specific recipient such as an
individual user or a group of users.

Public Store: Contains messages and data that have been sent to a public folder. Public folders are
like shared message centers that many users can access. Public folders can be configured to have their
contents or the entire folder removed after a set period of time.

The actual files comprising the IS are the PRIV.EDB and the PUB.EDB found in the default directory
of \EXCHSRVR\MDBDATA\.

Message Transfer Agent (MTA)

The MTA translates and routes messages to foreign systems. It is also the component responsible for
the expansion of distribution lists.

MTA Configuration

When configuring the values of the MTA, it is always a balancing act between transmission time and
the reliability of the connection.

Reliable Transfer Service (RTS) Values

Checkpoint Size - Specifies the amount of message data sent before the MTA inserts a checkpoint. If
a errors occurs, the data is resent from the last successful checkpoint. When you decrease checkpoint
value, the transmission time is reduced. This means less data has to be transmitted again if an error
occurs or transmission is interrupted.

Recovery time-out - The time after an error occurs before the MTA will wait for a reconnection
before deleting the checkpoint information and restarting the transmission. If the message fails the
MTA will put the message back in the queue.

Window Size - The number of checkpoints that can remain unacknowledged before the MTA will
suspend the data transfer.

Connection Retry Values

Max Open Retries - The maximum number of times the system tries to resend the message before it
sends a Non-Delivery report (NDR).

Max Transfer Retries - The amount of time the message tries to resend the message on a open
connection.

Open interval - The time to wait before reopening a new connection after an error.

Transfer interval - The amount of time to wait before resending a message on an open connection.

Databases and Logs


When Exchange opens its databases, they remain open the entire time the program is running. This
typically means that the database is inaccessible to all but Exchange from the time the server starts
until the time the server shuts down. Normally you would have no choice but to shutdown Exchange,
backup the necessary files, and then restart Exchange. This is a problem if your server requires
continuous access. However, Exchange 5.5 comes with a replacement version of NTBACKUP. This

2
new version installs automatically through Exchange Setup and provides the ability for Exchange
databases to be backed up while the server is online.

The Database Files

All Exchange data is saved in Exchange database files. The following table outlines the Databases
and their associated files.

Database Files
Information Store Pub.edb, Priv.edb, and Edb.log
Directory Dir.edb and Dir.log

Transaction Logs

The Information Store actually consists of two EDB files. In addition to the various EDB files, each
database also has an associated log file. Exchange implements the idea of log files for both
performance and recoverability reasons. All transactions are first written to log files before they are
written to the actual databases. When the CPU has idle cycles they are then copied from the log files
to the actual Database. The transactions in the log are then marked as committed and will eventually
be purged.

A transaction can describe the addition or deletion of a message to the Private or Public Information
Store, or even the modification of an object in the Directory.

Because the data is first written to the log files, the active database is not having to contend with
handling both READ and WRITE operations. Instead, the WRITE operations can wait for idle CPU
cycles. This improves performance.

Another benefit of log files is recoverability. Because data is written to the log in addition to the
database, a second copy is available in the event the database is lost. This benefit is obviously most
greatly realized when the log files and the database files are kept on separate physical disks. If this is
the case and the database disk fails, a backup can be restored to a new disk and the current log files
can be replayed against the database, providing recovery right up to the point of failure.

Log files are maintained within each Database directory. The current primary log file is always named
EDB.LOG. Although the Information Store consists of two EDB files, there is only one primary log
file.

Log files are always 5MB in size. This is regardless of the amount of actual data contained within the
database. Once the EDB.LOG fills up, it is renamed using a sequential numbering scheme like
EDB00001.LOG, EDB00002.LOG, EDB00003.LOG and so on. A new EDB.LOG file is created and
all current transactions go into the new EDB.LOG file.

The Checkpoint File

As each transaction gets written to the database, they are marked as committed. During the next full
backup, any logs that are entirely committed are deleted. This is maintained through a concept known
as the checkpoint file. This file contains entries for each transaction indicating if the transaction has
been committed. When data is written from the log to the database file, the entry in the checkpoint

3
file is updated to reflect is as being committed. Each database has a checkpoint file called EDB.CHK.

Since each of these log files are kept until a full backup is performed, they contain all data since the
last full backup. When an Incremental or Differential backup is performed, it is actually the log files
that are being backed up instead of the database files.

Online Backups

If a transaction is received that would alter a portion of the EDB that has not yet been backed up,
Exchange simply writes it into the EDB file as it otherwise would. However, if a transaction is
received that would modify a portion of the EDB file that has already been backed up, it is not only
written out to the EDB file but also written out to a Patch file. After the EDB has been backed up, the
patch files are also backed up and rolled into the EDB file on the backup tape. These .PAT files are
only visible during the actual backup operation. Once backed up, they are deleted from disk.

Circular Logging

Circular Logging is enabled on the Exchange Server by default. When Circular Logging is enabled,
transaction logs are still used, but they aren't saved. This means you get the performance benefit of
logs but you don't get the recoverability features.

With Circular Logging, Exchange will attempt to maintain about 4 log files. When it is time to create
a new log file, Exchange looks at the oldest one. If it is completely committed it gets purged. This
means that your existing log files will not contain all the transactions since the last backup. So
Incremental and Differential backup options are not available while Circular Logging is enabled.

Deleted Item Recovery

One of the new features introduced with Exchange 5.5 is the Deleted Item Recovery. The Deleted
Item Recovery feature is made possible through the use of hidden folders. When this feature is
enabled, deleted messages are moved to these hidden folders.

There are a couple of important settings for Deleted Item Recovery. Deleted Item Retention Time
specifies
the number of days that deleted mail should be retained. After this period has expired, the message
will
actually be deleted.

Another option enables you to avoid permanent deletion until a full backup has occurred. So, if the
Retention period is set to 30 days, even if the 30 days passes, the item won't be permanent deleted
until a full backup has been performed.

It is also important note is the effect of deleting a message with an IMAP client. IMAP does have the
capability to work with special non-mail folders. So rather than the deleted mail being moved into the
hidden folders, they are simply marked as deleted. Because of this difference, if IMAP is used to
delete a message, IMAP must be used to recover the message.

Exchange Backups

The are four types of Microsoft Exchange Backups:

4
Type Description
Full Complete backup of the Information Store and Directory
Databases, Transaction logs backed up then purged.
Incrementa A Complete backup of the Information Store and Directory
l Databases is performed first. Every following night only the logs
are backup and then deleted.
Differentia A Complete backup of the Information Store and Directory
l Databases is performed first. Every following night only the logs
are backup. The logs remain on the disk and are not deleted until
anther full backup.
Copy A copy is essentially the same as the full backup. The entire
directory and information stores are backed up but the transaction
logs are not deleted. A Scenario when this would be used if you
want to take a complete backup and preserve the regular backup
schedule.

Connectivity
Exchange Server sites can be linked together via connectors. Normally servers within a site
communicate directly through the MTA in order to exchange messages or from one Directory Service
to another Directory Service to exchange directory information. This isn't possible for communication
between sites. Therefore, a connector must be used to establish a logical link between the sites.

There are connectors for both messaging and for directory replication. Since directory replication
occurs through the transfer of messages, a messaging connector must first be in place before directory
replication can be configured.

Message Connectors

Message Connectors are the basis of inter-site communication. All inter-site communication will take
place via a message connector. Directory Replication between sites depends upon the underlying
existence of a message connector. There are four standard types of message connectors:

• Site Connector
• X.400 Connector
• Dynamic RAS Connector
• Internet Mail Service (IMS) Connector

The X.400 and IMS Connectors can be used to connect the Exchange Server to foreign email systems.
It is for this reason that Directory Replication must be explicitly configured, via a separate connector,
over these pathways.

The Site Connector

The Site Connector is by far the easiest to configure between sites. It is only used to connect
Exchange systems and therefore doesn't require the Directory Replication connector be configured.
Inter-site communication is done just as with Intra-site communication, and is able to take place via
the raw Exchange messaging format. Other connectors, such as X.400 require translation into an
appropriate format. When connecting an Exchange server to another Exchange server via X.400, the
translation must occur twice, once on the sending end from Exchange to X.400 and again on the

5
receiving end from X.400 back to Exchange. For this reason, the Site Connector is the most efficient
connector to use between Exchange sites.

When configuring Site Connectors, all of the configuration can be done from one side. By default all
servers in the remote site are potential Target servers and all servers in the local site are potential
Bridgehead servers. This allows any Exchange server in one site to directly communicate with any
other Exchange server at another site.

A Site Connector requires a high-speed connection. The actual speed needs to be above 128Kbps as
with a LAN or a T1 connection. Site Connectors can not schedule connections. It assumes it is on a
high-speed, high-availability network and therefore wants to make connections on its own schedule.
Site Connectors can not restrict message size or restrict user access to the connector.

Site Connectors can use TCP/IP, NetBEUI, or IPX/SPX communication protocols. It will use TCP/IP
as first preference if available.
The X.400 Connector

Using the X.400 Connector, Exchange can send messages to another system compatible with the
X.400 Message Handling System standard. This other system can be a private or public X.400
network, or could be another Exchange system, as is the case for Inter-site connectivity over a slow
communication line. When configuring this type of connector, it must be done on both sides of the
connection, and the name of the remote MTA has to be specified. This allows MTA to MTA
communication to occur between two sites.

The X.400 Connector has some distinct advantages over the Site Connector. It is tolerant of slower
speed networks, including dial-up connections. This connector also allows for scheduling, message
size restriction and restricting the users that can send messages through the connector. However, the
X.400 Connector is not quite a fast as the Site Connector. It requires additional configuration,
configuration on both sides of the connection, and because of the requirement to specify a remote
MTA for the connection, you only have a single server to single server communication path. These
two servers are known as Bridgehead servers and all X.400 traffic must go through these designated
servers. This can become a performance bottleneck.

Dynamic RAS Connector

Dynamic RAS offers the ability for Exchange servers to exchange messages automatically over dial-
up lines. It takes advantage of a RAS server to do this. This connector is intended to be used when no
type of permanent connectivity between sites exists. This connector works best for an ISDN, Modem,
or X.25 connection.

This connector also provides the ability to schedule connections, limit user connectivity, and limit
message size. However, it's slow, expensive, and requires a lot of configuration.

Dynamic RAS can take advantage of any RAS transport protocol, such as TCP/IP, IPX/SPX, and
NetBEUI.

Internet Mail Service Connector

The Internet Mail Service handles the Simple Mail Transport Protocol (SMTP). SMTP is the protocol
used on the Internet to transfer messages. With the IMS Connector, you can connect two Exchange
sites over an existing Internet connection or SMTP network. It also allows the restriction of users,
message size, and can be scheduled if a dial-up connection is used.

6
Like X.400, you have message bridgeheads at each site, presenting a potential bottleneck. You also
have a potential privacy issue with messages traveling via the Internet backbone. IMS requires that
the TCP/IP protocol be installed.

Directory Replication Connections

Within a site, directory replication is able to take place via direct Directory Service to Directory
Service communication. This is not possible, however, between sites. Instead it takes place over the
Directory Replication connector. Directory Replication Connectors allow sites to share directory
information.

Directory Replication between sites occurs via messages over an existing messaging connector. Some
connectors don't necessary have to connect two exchange sites together. X.400, for instance, can be
used to connect Exchange to a public X.400 network, and the IMS can simply be used to provide
Internet email capabilities. So if you are using X.400, IMS, or even Dynamic RAS, you must
explicitly configure these messaging connectors to allow Directory Replication. The only connector
that doesn't require this is the Site Connector which is only used between Exchange sites.

Once the messaging connectors are in place and properly configured, the Directory Replication
Connector can be installed. The Directory Replication connector creates a logical directory
connection between two sites. One specific server in each site must be designated as the Directory
Replication Bridgehead Server.

Address Space
The typical Exchange deployment often involves more than a single server, often multiple sites, and
often multiple connectors such as X.400 or SMTP (IMS). With such a complexity of delivery options,
Exchange must use the concept of Address Spaces to determine where to deliver messages. An
Address Space can be considered the least amount of information necessary to determine the path to
use to reach a recipient.

There are four basic types of Addresses that appear in an Exchange system. Exchange can
automatically create the following addresses:

• Native Exchange (X.500 Style)


• X.400
• SMTP
• Microsoft Mail

Exchange Addresses (EX)

Native Exchange Addresses are based on the X.500 address standard. So an Exchange Address is an
object path within the hierarchical Exchange directory. This full path is also referred to as a
Distinguished Name. Distinguished Names are used for communication within an Exchange
Organization.

The format of an EX address is as follows:

/o=Organization/ou=Site/cn=RecipientContainer/cn=MailBox

Example: /o=TroyTech/ou=USA/cn=Recipient/cn=HelenCox

7
X.400 Addresses (X.400)

X.400 Addresses are used when a Distinguished Name is not known or available. They are based on a
global X.400 Address Space. X.400 addresses are comprised of several fields. Not all are required,
but you must include enough so that each address within the X.400 name space is unique.

The following are some of the more common fields:

c =Country
a =Administrative management domain or ADMD
p =Private management domain or PRMD
o =Organization
ou1 =Organizational units
cn =Common name
q =Generation qualifier
i =Initials
s =Surname
g =Given Name

Addresses are constructed by appending these fields to one another with a semicolon. By default,
these values map to the following Exchange values:

Surname and Given Name = Recipients Name


Organization = Site Name
PRMD = Exchange Organization
ADMD = (‘space’ by default)

Example: c=us;a= ;p=TroyTech;o=USA;s=Cox;g=Helen

Note the space for the ADMD. This is an important default requirement.

SMTP Addresses (SMTP)


SMTP addresses are Internet addresses. They are also hierarchical in nature, using the concept of
Domains. There are several "Top Level" Domains, that include “NET”, "COM", "EDU", "GOV", and
"MIL". Each Top Level Domain has many subdomains and these subdomains can be further divided.

The address typically takes the format of:

mailbox@sub-domain.domain

Exchange generates SMTP address of the following format:

mailbox@site.organization.com

Example: Helen.Cox@sales.troytec.com

MS Mail Addresses (MS)

Microsoft Mail uses the concept of Networks and Post Offices. A typical MS Mail recipient would
have an address such as:

8
TroyTech/USA/HelenCox

Gateway Address Routing Table (GWART)

Exchange needs to keep track of these Address Spaces. To do this Exchange uses the Gateway
Address Routing Table (GWART). The GWART is a text file that lists all known messaging routes
between sites. The gwart0.mta contains the current routing configuration and is saved in the
EXCHSRVR\MTADATA directory. When changes are made to the GWART, it is first copied to
gwart1.mta in the same directory. So after changes have been made, the previous routing table is
always available. The GWART includes the type of route (EX, X400, SMTP, MS), the Address Space,
the cost of the route, and connector to use.

Integration with Microsoft Mail


Microsoft Mail is Microsoft's legacy mail system. Microsoft Mail is limited in comparison to the
power afforded by Exchange. Microsoft encourages customers to migrate and provides the tools
necessary to make this process fairly smooth.

MS Mail

Exchange is a client-server messaging system. This is contrasted with MS Mail which uses shared
file-system messaging. All email is stored in a shared location on the network called a post office.
Most processing occurs at the client side. When a user sends a message, their mail client accesses the
server and places the message directly in the recipients mailbox. This type of system requires each
user to have the ability to write directly to each other users mailbox. In addition, the client must
continually poll the server to check for new mail. This creates unnecessary use of network bandwidth.

MS Mail systems may have more than one post office. Directory information is exchanged between
post offices via the MS Mail Directory Synchronization Protocol. In this environment, one server is
designated as a Dirsync Server. It is the Dirsync Server that maintains the master copy of the
directory. The other servers that are participating in directory synchronization are called Dirsync
Requestors.

DirSync Events

The actual process of directory synchronization occurs during three distinct timed events. The
following table briefly describes these:

Event Description
T1 Dirsync Requestors sends the address list for their post office to the
Dirsync Server.
T2 The Dirsync Server combines all entries received from the Requestors
into a Global Address List. It is also during this time interval that the
Global Address List is sent back out to the Requestors.
T3 The Dirsync Requestor rebuilds its Global Address List.

The MS Mail Connector

Exchange has a MS Mail Connector for the integration and coexistence of Exchange and MS Mail.
The Connector is comprised of the MS Mail Connector Interchange, the MS Mail Connector Post

9
Office, and the MS Mail Connector MTA.

MS Mail Connector Post Office: Exchange implements a MS Mail Post Office referred to as a
Shadow Post Office. It is much like an ordinary MS Mail Post Office, except it is only temporary. As
messages come into the connector from another MS Mail system they are temporary written to the
Shadow Post Office before being translated. Before messages go out from Exchange to an MS Mail
system they are first translated and placed into the Shadow Post Office where they will be then sent
off to the MS Mail system.

MS Mail Connector Interchange: This is an NT service that basically provides for transformation
between the differing message formats. It reads messages entering a Shadow Post Office and if they
are destined for an Exchange recipient, translates the message and places it in the Information Store.
It also translates messages from Exchange users headed for MS Mail users and places them into the
Shadow Post Office.

MS Mail Connector MTA: The unit responsible for the actual transfer of messages between
Exchange and MS Mail. There can be up to 10 instances of this MTA running for an MS Mail
Connector. However, only one MS Mail Connector can be installed on an Exchange Server. This
allows a single connector to connect to up to 10 different Post Offices.

Directory Synchronization

Exchange and MS Mail can share directory information through the Directory Synchronization Agent
(DXA). The DXA is the Exchange component that provides support for the MS Mail Directory
Synchronization Protocol. By implementing the DXA, Exchange users will be able to see MS Mail
recipients as custom addresses in the GAL and likewise MS Mail users will be able to see Exchange
users.

The DXA allows Exchange to act as either a Dirsync Server or a Dirsync Requestor. It can only play
one of these roles and there can not be more than one Dirsync Server per site. Once implemented, the
DXA operates much like any other MS Mail server, participating in the three timed synchronization
events mentioned above. You can force a T2 event (compiling the GAL and sending to requestors)
when the DXA is operating as a DirSync Server by stopping and starting the Directory
Synchronization Service.

You can control which Exchange recipients are included in the dirsync process through the
implementation of Trust Levels (1-100). Users with an assigned trust level greater than that
established by the connector will not be replicated.

Message Tracking
Microsoft Exchange Server provides the ability to turn on Message Tracking. This feature is a good
trouble shooting tool as each component that processes a message records its activities in a log file
which allows an administer to identify and follow the path a message takes through Exchange.

The tracking files are stored in \EXCHSRVR\TRACKING.LOG\. A log file is maintained for each
day and is named in the format of YYYYMMDD.LOG. These files are plain text files that can be
viewed with any text editor, or through the Message Tracking Center within the Exchange
Administrator.

Message tracking can be enabled for the MTA, the IS, and the IMS. Because of the overhead incurred
during message tracking, it should only be turned on during troubleshooting and on those components
involved in the delivery of a message. It should be pointed out that many times, all of these

10
components will work hand in hand. Consider a message destined for an SMTP client. The message
is first written to the IS. This IS realizes it is destined for a remote connector so it hands it off to the
MTA. The MTA then selects the appropriate connector. Therefore, to track an SMTP message, you
would need to enable message tracking for all three components.

Ports & Protocols


Users may need to access an Exchange system over a router, or through a firewall. In such instances,
it is necessary that the router or firewall be able to pass the appropriate type of traffic through the
necessary ports. The following table summarizes these ports:

Protocol Port Secure Port


DNS 53 -
HTTP 80 443
IMAP4 143 993
IRC 194 -
LDAP 389 636
NNTP 119 -
POP3 110 995
SMTP 25 -
RPC Mapper 135 -

One particular port of interest is the RCP Mapper port 135. This is also referred to as the End-Point
Mapper service. This port is responsible for assigning what port various other exchange services, such
as the MTA, DS, and IS, will use.

When Exchange server starts, the MTA, DS, and IS are each dynamically assigned a port by the End-
Point Mapper service. So the first connection is made to port 135 with a request for the port of the
service that is needed. The End-Point Mapper replies with the correct port and then communication is
established with that port.

This can cause an obvious problem if a router or firewall in between the two services has these ports
closed. And since the ports are dynamically assigned you can't be sure which port needs to be opened.
However, these ports can be specified rather than assigned dynamically.

Utilities
Exchange offers a series of maintenance utilities that can be used to help in managing and
administering the Exchange Server.

Utility Purpose
SCANPST This utility is used to scan Personal Message Stores (.PST) and Offline Message
Stores (.OST). It checks message headers and file structure and attempts to
correct any corruptions.
REQMAIN This is actually an MS Mail utility. It is used by an MS Mail server during
directory replication. It can be useful to an Exchange administrator when
replication needs to be forced because it can be manually run. REQMAIN -t
will cause a Post Office to transmit updates.
MTACHECK Used to scan the MTA queue for corrupt messages that could be clogging the
MTA. MTACHECK rebuilds the queue to get things running again and places

11
corrupted messages in files for later viewing. The MTA must be stopped to run
this utility.
ESEUTIL The Extensible Storage Engine (ESE) Utility is the name for the new database
engine in Exchange 5.5. This tool is used on the Information Store and
Directory databases to defragment, repair, and check integrity. It does this based
on the database low-level table structure, not the data content. It is not intended
for regular maintenance, it should be used for troubleshooting only and in direct
consultation with Microsoft. It is considered a tool of last resort.
EDBUTIL The Exchange Database Utility is the primary off-line routine maintenance
utility for both the Information Store and the Directory Service. These
respective services must be stopped. It has the ability to defragment, do a
Consistency Check, and do some database recovery.
ISINTEG The Information Store Integrity utility is also an off-line utility that can be used
to repair the Information Store database. It is not intended for routine
maintenance. Rather it should only be used upon the advice of Microsoft. It is
used to test and repair errors in the Information Store.
ISINTEG -PATCH Used after performing an off-line file-based backup of Exchange databases.
Each object within Exchange is identified by a Globally Unique Identifier
(GUID). The GUID is partially based on time. If you roll back a server, it is
theoretically possible to duplicate GUID values for other objects that have since
been created in the Organization. Therefore, the GUIDs must be patched during
the backup process. This happens automatically through API calls when
Exchange is backed-up online. When it is backed up offline, you must use this
command to patch the GUIDs.
ISINTEG -FIX Provides high level database recovery by fixing structural problems with the
schema. Used in the event of a sudden shutdown which results in the corruption
to the Information Store.

Configuring Outlook-Exchange Client


Creating a Client Profile

Default.prf - The administrator can create a default user profile that will generate a user’s profile the
first time the user starts the email Client. If no profile exists the user will be prompted to set up the
configuration.

Outlook.prf - If the administrator wants to a create a default user profile that will generate a user’s
profile the first time the user starts the Outlook Client. Outlook.prf is in the same format as
Default.prf

Auto Profile Generator

Exchange includes a utility that can be used to generate advanced profiles (Template.prf)
automatically. The Newprof.exe generates a custom profile from the Default.prf file. This custom
profile can be used with a variety of distribution mechanisms.

RPC binding order

One of the configuration settings set in the *.prf is the RPC binding order, you can set the binding
order in the *.prf file. The binding order can effect the outlook/exchange load time. If the client is
taking excessive time to load up, you can manually change the default RPC binding order in the
registry.

12
Personal Folder Store

The Personal Folders have a *.PST file extension. A password can be placed on these files. These
folders are used to back up folders and messages, work with folders away from the office, and to
archive old messages.

Off-line Folders

An Offline Folder has an *.OST file extension and is used for off-line storage and access to your
public folders. When connected to your office, Exchange server grants you full access to your
personal folders that are stored on the server. If you wish to continue working on this information
disconnected from the network, you can create a *.OST file which is a copy of your Public
Information folders. Remotely you can make changes to your folders creating, modifying or deleting
information. When you reconnect to the network, Exchange server will synchronize with your *.OST
file and replicate changes to the information on the Exchange server.

Setting up Outlook for Offline Folders

When you first install Outlook and create a profile, Outlook will ask you if you travel with this
computer. If you select YES, then an *.OST file will be created. You can then select and copy the
public folders to your Favorite folder in the outlook bar.

Mailbox Access

Multiple Users Sharing a Single Mailbox

In situations where it is necessary, multiple users can share the same mailbox. However, multiple
users will not be able to access the shared mailbox simultaneously. The configuration must be done
from the Exchange Administrator.

Send As Delegate Access

This setting will let another user send mail so that it appears to have come from you. The
administrator can grant the Send As access.

Send On Behalf of Delegate Access

If a user is out of the office and won’t have access to their incoming mail, the user can grant delegate
access to a co-worker and then grant them specific rights to their Inbox folder. Send On Behalf Of
access enables the delegate to send a message in the users behalf. Send On Behalf Of can be granted
in the Exchange Administrator and Outlook client.

Recipient Information
You should be familiar with the following terms:

Term Description
Home Server The home server is the physical location where the user mailbox resides. A

13
mailbox can be moved within your site by either renaming the Home Server or
by selecting “Move Mailbox” from the tools menu.
Display Names The name that appears in the administrator window. You can also use the users
Full display name, alias name or the surname when addressing mail. Outlook
will check these names against the Global Address list and insert the display
name. Outlook will not let you mail to a local address unless the name has
been found in the GAL. Character Limit - 256 Characters Long.
Alias Names The name associated with mail addresses for an Exchange mailbox. Exchange
has an auto-name generation feature, that is able to generate an alias name for a
new recipient. There are 3 default settings to choose from or you can create
your own custom scheme. Character Limit - 64 Characters Long
Custom Recipients A special type of mailbox you can setup to identify users on a foreign e-mail
system.
Distribution Lists A grouping of recipients created to expedite mass mailing and other
information.
Address Book The off-line Address Book is a snapshot of the Exchange directory that can be
downloaded to client’s workstation when they are disconnected and off-line
from the Exchange server. Clients will perceive no difference between the
Exchange address book and the off-line address book both will validate
addresses on the server and contain the same details. Each Site nominates its
own server to create its own off-line address book and determines when it is
generated and updated. To view and change details of the Address book is
contained in the DS Site Configuration.
Address Book View Address Book Views attempt to organize the GAL into logical and custom
groupings. Views are organized by details defined in each object.
Directory You can define you own custom attributes in the DS Site Configuration. Each
Customization recipient has a Custom attribute tab where you can define these parameters.
You can add these custom attributes into custom address book views to display
a more personal view for your organization.
Key Management The Key Management server component, which is X.509 compliant, is
Server responsible for generating and dispensing keys to users in the organization. It
generates 2 Sets of keys, Private and Public Encryption Keys and a Private and
Public certificate
keys (4 Keys total).

Migration
Included in Exchange is a Migration Wizard to move messages and other information created in
foreign messaging systems. For a PC based LAN mail system, direct network migration is possible.
The Migration Wizard has the capability to migrate any of the following mail system:

• Microsoft Mail
• Lotus cc: Mail
• Novel GroupWise
• Netscape Collabra
• Main/Mini-Frame Email Systems (IBM, DEC, etc.)

First you create the extraction files on the host system and transfer the files to the Exchange Server by
using a Source Extraction Utility. The Source Extraction Utility creates 3 types of migration files.

14
Packing List File (*.PKL) - Contains the code page for character set and the names of the Primary
and Secondary Intermediate Files.

Primary Intermediate Files (*.PRI) - Contains directory data, personal address book, mail message
data and schedule data and pointers to data used in the Secondary Intermediate Files.

Secondary Intermediate Files (*.SEC) - Contains the message bodies and attachments.

After this, you would run the Exchange Migration Wizard and use the Exchange Directory Export
utility and other tools to clean up the accounts.

Directory Import/Export Files

Microsoft Exchange is able to Import and Export files into its directory database. Exchange will
extract the contents of the database into a comma delimited *.CSV file.

CSV File Structure

The CSV file is divided into two parts. The header, which defines the directory attributes, and the
attributes for each object. Not all of the attributes have to be listed in this file.

The header can contain the following fields:

• Obj-Class
• Mode
• Directory Name
• First Name
• Last Name
• Display Name
• Alias Name
• Display Name
• E-mail Address
• E-mail Addresses
• Obj-Container

Licensing
A Server License is required for each installed server product. The Server License grants the customer
the right to run Microsoft server software on a single server.

Microsoft Exchange Client Access Licenses (CALs) are required for any client software or application
that will connect to a Microsoft Exchange Server. This license is not included with Microsoft
Windows95 or Microsoft Office 97.

In addition, once the X.400 capabilities of the Microsoft Exchange Server Enterprise Edition have
been installed on one server in an organization, all Exchange servers in the organization must either
have Exchange Server Enterprise Edition installed or have licensed the X.400 connector separately.

15
EXAM 70-81
QUESTIONS

1: You've migrated some of the your users from MS Mail. However, now the Exchange users
cannot receive messages from the MS Mail users, but Exchange can send messages to MS Mail
users. What is most likely the problem?

16
A: The obsolete MSMail mailboxes have not been deleted.

2: A user named Bill leaves your company due to scandals. Management would like a user
named Al to assume his responsibilities. What could you do so that Al can receive Bill’s e-mail
messages?

A: Make Al’s mailbox an alternate recipient for Bill’s mailbox.

3: What 3 services do you need to track in order to see the path of an SMTP message in the
tracking log?

A: MTA
IS
IMS Connector

4: The aliases in your organization are formatted as first initial followed by last name.
Management would like the format changed to last name followed by first initial. You also want
all new aliases to use this new format. What must you do? (Choose two)

A: Modify all existing aliases.


Modify alias name generation to be %Last%1First.

5: You have an Exchange server with 64 MB RAM and 32 MB paging file size. The System
Attendant starts, but the Information Store service doesn't. What should you do?

A: Increase the paging file size.

6: You are using the import utility of Microsoft Exchange Administrator to modify a large
number of existing mailboxes. You want to add the area code to the Telephone-Office2 field of
each of these mailboxes. The export information of one of these recipients is listed below:

Obj-Class, Alias Name, Display Name, Telephone-Office1, Telephone-Office2

Mailbox, Mpeterson, Mary Peterson, 801-333-4343, 333-5654

Which field or fields must you include in your import file in order to add an area code to the
Telephone-Office2 field? (Choose all that apply)

A: Mode
Obj-Class
Alias name
Telephone-Office2

7: Your Exchange server crashes attempting to start the Information store service. What should
you do?

A: Run Isinteg -PATCH.

8: You have created a Microsoft Exchange client network installation point on one of your
servers. You want to predetermine the client settings in order to create a standard installation.
What do you need to do?

A: Edit the DEFAULT.PRF and copy this file to the installation share point.

17
9: You have multiple chat servers. You want to disable one of the chat servers and have it be
transparent to the users. How?

A: Suspend new sessions and then use performance monitor to monitor the current sessions and shut
down when no more sessions are open.

10: Clients on your network use both IPX and TCP/IP. However, for your MS Outlook
installation for 32-bit clients, you want them to only use IPX. What file would you have to
modify?

A: outlook.stf

11: You have enabled anonymous access for LDAP users on your system that has a firewall, but
they still can't access your system. What is wrong?

A: You haven't opened the LDAP port (389) on your firewall.

12: Your network has hundreds of users. You have just installed Microsoft Exchange Server on
five servers. You would like clients to connect to just one server and perform an over-the-
network installation. However, you would like the clients to have the option during their
installations to select any of the five Exchange servers. How would you do this?

A: Configure separate shares for each server and set the default in DEFAULT.PRF accordingly.

13: You have a server you need to take off-line but it is a part a server monitor group. How do
you take it off-line without creating a monitor alert?

A: Run Exchange Admin with monitor suspension option.

14: If you wanted all new client installations to be configured to use IPX and not use TCP/IP,
what would you do?

A: Use Setup Editor to remove TCP/IP from the RPC binding order.

15: A user named Sharon uses Microsoft Outlook on both her office computer and her home
computer. One night at home, Sharon connects to her office server in order to read her mail.
The next day at the office when Sharon attempts to re-read the previous day’s mail, there are no
messages in her inbox. What is the most likely cause?

A: Sharon’s mail was downloaded to a .PST file on her home computer.

16: You have enabled advanced security. As users leave the company, you revoke their keys.
Performance declines. What else should you do?

A: Delete their mailbox.

17: When adding a Microsoft Exchange Server to an existing site, which two pieces of
information do you need to know?

A: The name of an existing Exchange Server in that site and the password for the site service account.

18
18: Lyndy has a laptop computer that she uses both at the office and when out of the office. Her
laptop is configured with an .OST file. She routinely synchronizes her laptop computer with the
office server. Lyndy has identified a public folder that she would like to designate as an offline
folder, but she does not see the Synchronization tab among the property pages of that public
folder. What does she have to do to enable synchronization with that public folder?

A: Lyndy must designate the public folder as a Favorites folder.

19: You are on a remote computer and want to know when the WWW connection on a server
goes down. What do you use to notify you in the event of a failure?

A: Performance monitor

20: You will be using a scripted installation to setup a number of Microsoft Exchange Client
applications. You will use Setup Editor to modify EXCHNG.STF. Even though all workstations
use both TCP/IP and IPX, you want clients to use only IPX when connecting to their Microsoft
Exchange servers. What should you do to accomplish that configuration?

A: Remove TCP/IP from the RPC binding order in the installation script.

21: Your network uses IPX as its only network protocol. Your Microsoft Exchange Server has
two network adapters. One adapter is connected to the internal LAN and uses IPX. The other
adapter is connected to an outside WAN and uses TCP/IP. Users on the internal LAN use
Microsoft Outlook to connect to the Microsoft Exchange Server. However, when these users
attempt to connect to the Microsoft Exchange Server, it takes up to 10 minutes to connect and to
send mail. What can be done to reduce this time?

A: Change the RPC binding order on each client computer.

22: What three fields must be present in a import file to successfully import altered mailboxes?

A: Mode
Obj-Class
Alias name

23: An IMAP client connects to your Exchange server and receives an error message stating that
the message size is unknown. Which of the following should you do to fix this problem?

A: Clear the "Enable fast message retrieval" check box.

24: Your organization contains two interconnected networks and corresponding Exchange sites
named ACCOUNTING and RESEARCH. Both networks use IPX and TCP/IP. The X.400
Connector is used to connect the two sites. No directory replication is configured between the
sites. Your Exchange servers have LDAP enabled. The users in the ACCOUNTING site report
that they cannot access the LDAP directory. You find out that all the users on the
ACCOUNTING network use only IPX. What can be done to allow the Accounting users to
access the LDAP directory?

A: Install TCP/IP on all the client computers in the ACCOUNTING site.

25: Which of the Exchange Core components must be running at all times?

A: System Attendant

19
26: Which of the Exchange Core components will generate a newly created email address for a
new recipient?

A: System Attendant

27: Which of Exchange Core components will translate messages to foreign email systems like
SMTP or X.400?

A: MTA

28: Which of the following events can you force manually by stopping and starting the DS?

A: T2

29: How many key management server do you need in an Exchange Organization with 7 Sites?

A: One

30: How can you restrict anonymous LDAP access to the directory properties of recipients, but
still allow Web clients with authenticated names to access those properties?

A: Disable anonymous access through the LDAP object.

31: Two organizations, Organization A and Organization B, need a long-term coexistence


strategy. How could you allow LDAP clients to connect to Organization A and see the
directories of both Organization A and Organization B?

A: Set Organization B as the default LDAP referral for Organization A.

32: Management has decided to allow company access to various newsgroups. Your Internet
Service Provider can provide full newsgroup access, but they do not configure newsfeeds on a
customer-by-customer basis. How would you configure the transfer of the newsfeeds?

A: Configure it for pull transfer only.

33: How do you upgrade from Exchange 4.0 to 5.5 Server?

A: Exchange 4.0 Service Pack 2 must be installed, upgrade brigdehead servers first, and the rest in
any order.

34: How would you change the area code for Exchange recipients?

A: Export to a database, change the area code, import back in.

35: If you wanted to prevent anonymous users using LDAP from seeing a particular Exchange
attribute, like telephone numbers, where in the Exchange hierarchy would you have to go to in
order to set this up?

A: DS Site Configuration.

36: If you wanted to reject certain IP addresses of Web clients from accessing your Exchange
server, what program would you use?

20
A: Internet Service Manager.

37: How would you move 300 mailboxes to another exchange server?

A: Export to a .CSV file and Import it back into the other Exchange server.

38: You have been asked as the Exchange administrator to set the default display names to
LastName FirstName, such as Smith John. Where do you configure that setting?

A: Auto Naming property page of the Exchange Administrator program.

39: Your organization has multiple Exchange servers. Currently, when users create public
folders, they are placed on Server A. After monitoring that server, you notice that its hard disks
is almost full. You move all those public folders to Server B. How can you ensure that all future
folders will be created on Server B?

A: Configure Server B as the public folder server for all recipients on Server A.

40: Deleted Item Retention is enabled on a mailbox. What happens to items when they are
deleted?

A: They become hidden objects in the Information Store.

41: When ever you add a new connector, what should you do afterwards?

A: Run Performance Optimizer

42: You have your Exchange server backed up using an offline backup procedure. After a
hardware failure, you restore the server using the offline backup tapes. But after the restore is
complete, the IS will not start. What do you need to do?

A: Run ISINTEG – Patch.

43: Your organization has an Exchange server with two disk controllers and two hard drives.
One hard drive contains the IS databases, the other hard drive has the transaction log files.
Circular logging is disabled. One of the disk controllers malfunctions and corrupts the IS
databases. You made a full backup four days ago, and did three incremental backups since then.
The hardware failure took place 12 hours after the last incremental backup. What information
can be restored?

A: All information stored up to the time the logs were updated at point of failure.

44: Someone needs permission to add new users. Where should you give them this permission?

A: Admin tab on the Site Object

45: Your organization performs a complete backup every weekend. You have been asked to add
a plan to also backup the system every weekday evening with all the changes made since the
weekend backup. You also want to minimize the time it takes to restore a system from the
backups. How would you configure Microsoft Windows NT Backup?

A: Set the weekend backup type to Normal. Set each weekday backup type to Differential.

21
46: You are formulating a backup strategy for your company. The computer that will be your
Exchange server has two hard drives of equal capacity, with one of the drives significantly faster
than the other.

Required result: A requirement of the backup strategy is to perform a complete backup every
night.

Optional Result 1: Be able to restore all files up to the moment of failure.


Optional Result 2: Minimize server response times for users.

Proposed Solution:
Place the transaction log files on the second faster hard disk.
Place the database files on the first slow hard disk.
Enable circular logging.
Perform a nightly backup.

What results does this strategy produce?

A: The required result and only one of the optional results.

47: What Protocols can you give access to at mailbox level?

A: HTTP, IMAP4, NNTP, POP3

48: Your company has had problems with Exchange disk drives becoming full and stopping the
IS service. What could you do to receive a warning before the IS reaches its limit again?

A: Configure Microsoft Windows NT Performance Monitor to send you an email message when the
available disk space gets low.

49: You want to use an X.400 Connector to send messages to a foreign mail. The computer
name of your X.400 Connector bridgehead is 16 characters in length. But the foreign mail will
only accept names up to 8 characters. What can you do?

A: Enter an 8 character name in the Local MTA field on the Override page.

50: Your Exchange site uses custom attributes that should not be replicated to other sites. How
would you configure your site to accomplish that?

A: Specify all attributes except the custom attributes in the DS Site Configuration object.

51: You will be installing two Exchange sites that will be connected with the X.400 Connector.
You do not want administrators from one site to be able to administer the other site. What type
of trust relationship, if any, would have to be established and what amount of account
information exchanged between the two sites?

A: No trust relationship is needed. No account information needs to be exchanged.

52: Your organization is made up of five Exchange sites. The five sites are connected using a
mesh topology. X.400 Connectors are used to connect the sites. Each site also has Internet Mail
Service running. You want to make sure that all outgoing SMTP messages are only sent out of

22
their sites through the IMS connector, and not the X.400 Connector. Which of the following
would accomplish this?

A: Create an SMTP address space on each X.400 Connector. Assign a cost of 100 to each SMTP
address space.

53: An IMS server sends mail to a Domain A and a Domain B. As IMS administrator, you
begin to receive reports that Exchange email attachments sent to Domain B have been arriving
as unreadable text. You investigate and find out that the problem does not exist with
attachments sent to Domain A. You also find out that Domain A uses UUENCODE while
Domain B uses MIME. How would you fix this problem?

A: Use the Internet Mail property page and designate UUENCODE as the encoding method for
Domain B.

54: Your Exchange environment uses IMS to send and receive SMTP mail with a company
named Jefferson Tools. Jefferson Tools uses a host-based SMTP mail system. When users on
your system send mail to the name of the host at Jefferson Tools, it is not delivered. But if those
users use an IP address for addressing, the mail is delivered. You are informed that other
systems can send mail to Jefferson Tools using a host name in the addressing. What should you
do to enable your users to be able to send mail to using the host name?

A: Configure a DNS server in the TCP/IP network configuration on your server.

55: An Exchange user, Helen, sends a message through the Internet to another Exchange user
named Toni to Toni@troytec.com. Helen receives an NDR stating "Recipient not found:
TROYTEC.COM." You confirm that Toni’s mailbox is configured with the email address
SMTP:Toni@troytec.com. What is the likely problem?

A: The host troytec.com is not entered in the DNS.

56: Your company has both Microsoft Exchange and MS Mail. There will eventually be a
migration from MS Mail to Exchange, but right now you need to come up with a coexistence
strategy. Part of that strategy is to make a global distribution list available that contains
recipients from both systems. How could you do that?

A: Create an Exchange distribution list that includes the both the MS Mail DL and the Exchange DL.

57: Your company currently uses Microsoft Mail. You have just added an Exchange server to
the network. Management would like both systems to coexist and be able to exchange both
messages and directory information. Management would also like to keep the current dirsync
strategy. What steps must you take on the Exchange server?

A: Configure the Microsoft Mail Connector on the Exchange Server.


Make Exchange Server a dirsync requestor.

58: You have two sites one in London and one is Japan. How would you setup Exchange so that
users at each site access their public folders first before accessing the other site?

A: Configure the location value of each server to be the name of the city in which the server located.

59: Your company is made up of two domains, one has MS Mail and the other has Exchange.
Each domain and its message system has about half the users. There are no trust relationships

23
between the two domains. A Microsoft Exchange recipient named Randy uses Microsoft
Schedule+ 7.5 to create an appointment that includes a Microsoft Mail user named Sharon.
When Randy views the Planner tab, he cannot see Sharon’s availability. But Randy can send e-
mail to Sharon. What do you need to do to allow Randy to view Sharon’s availability?

A: Configure the Microsoft Schedule+ Free/Busy Connector.

60: Your Microsoft Exchange Server is configured as a dirsync server and has remote dirsync
requestors defined. You configure the synchronization time on the Exchange server to Always.
Three hours later, you notice that Microsoft Mail recipients have not yet replicated to your
Exchange Global Address List. What is the solution to this problem?

A: Run the REQMAIN utility with the transmit option on the Microsoft Mail post office.
61: What is the MS Mail directory synchronization parameter that is used by a dirsync server
to recompile the Global Address List?

A: T2

62: You are implementing a migration from Microsoft Mail to Exchange. You have just
completed the first step in a two-step migration. If you wanted to modify the existing naming
convention during the second step in the migration, what file would you have to modify?

A: Primary file (*.pri)

63: You have a desktop and a laptop. You want the laptop to be able to access public and
private folders while offline. What do you do?

A: Create an .ost file on the laptop.

64: The first step in a two-step migration has already taken place. The CSV file contains
directory information on 2200 users. What would be the most efficient way to modify all of the
recipient display names?

A: Edit the CSV file, and then continue with the second phase of the migration.

65: How can you modify a large number of Exchange recipients in a bulk manner?

A: Directory Import and Export.

66: What are the filenames of the Exchange 5.5 Databases. (Check all that apply)

A: Pub.edb
Dir.edb
Priv.edb

67: What databases comprise the Information Store? (Choose all that apply)

A: Pub.edb (Public Store)


Priv.edb (Private Store)

68: You've migrated some users from a foreign mail system to Exchange. The foreign mail
system uses a UNIX SMTP Relay agent to relay messages to and from the Internet. The
Exchange server is also set up to relay messages using the same UNIX SMTP Relay agent.

24
There is no connection between the foreign system and Exchange. You want migrated users to
still receive email using their old email address. How?

A: Make Exchange Server the new SMTP Relay host.

69: Maggie retires from your company. Andrew is hired as her replacement. What do you as
an administrator need to do to give Andrew access to Maggie’s messages?

A: Disable Maggie’s NT account and grant Andrew the right to access Maggie’s mail.

70. Exchange and Groupwise should be able to exchange e-mail. Groupwise has a MHS gateway
and Internet connectivity. How would you allow both to exchange e-mail ?

A: Install and configure IMS on Exchange server.


Add Groupwise users as custom recipients on Exchange server.
71: A deleted item retention time of 4 days is set. The Server is set to not permanently delete
deleted items until after Private IS store has been backup up. A user wants to restore an item
deleted on the previous day. A full backup was performed on the previous night. How do you
restore that item?

A: Recover from Outlook with Recover Deleted Item option.

72: You have 4 subnets in your Network. Your LANs have the following 10/100 switched
environments: 1) 100MB no users, 2) 10MB 25 users, 3) 10MB 150 users, and 4) 1 MB SLOW
WAN link with 125 users. On which segment would you place your Exchange Server?

A: (3) Put server where the most users are.

73: You manage two NT domains named PERSONNEL and RESOURCES. The PERSONNEL
domain contains all user accounts, while the RESOURCES domain contains all servers. You
will be installing Microsoft Exchange Server into the RESOURCES domain. You would like to
use the NT user accounts in the PERSONNEL domain with mailboxes on the Exchange server.
What type of trust relationship must be established between the two domains?

A: The RESOURCES domain must trust the PERSONNEL domain.

74: Your Exchange server is using TCP/IP and is configured with LDAP, HTTP, and POP3. A
firewall sits between your network and the Internet. Your Exchange server has its name and IP
address entered into a public DNS server on the Internet. Your network’s firewall prohibits
traffic on all ports that are not explicitly allowed. The ports that are open are port 25 (SMTP),
port 53 (DNS), port 80 (HTTP), and all ports greater than port 1023.

Required: Management would like users to be able to connect over the Internet to your
Exchange server using Microsoft Outlook and LDAP applications. Policy dictates that
passwords be transmitted in a secure manner.

Optional Results: While not required, management would like to allow Web clients that do not
support Windows NT Challenge/Response authentication to be able to connect to your Exchange
server. Another wish is that POP3 clients could connect to the Exchange server and download
their messages.

Proposed Solution:
1. Assign port numbers to the Exchange Directory Service and Information Store. Then allow

25
those
ports through the firewall.
2. Configure LDAP on the Exchange server to allow anonymous access.
3. Configure the Exchange protocols to use SSL as an authentication method.
4. Allow SSL traffic through the firewall.
5. Allow LDAP traffic (port 389) through the firewall.
6. Allow RPC traffic (port 135) through the firewall
7. Allow POP3 traffic (port 110) through the firewall.

What result does the proposed solution produce?

A: The proposed solution does not produce the required results.

75: You shut down the server services and want to backup the directory and information store.
Which files must you backup? (Choose 3).

A: Private Information store


Public Information store
Directory file
76: You perform a Normal (Full) backup during the weekend and Incremental daily backups
during the week. If you lose one of the Incremental backups, can you use all the following
backups for that week?

A: No, because you would not be able to recreate all the Transaction logs.

77: You use an IMAP client to delete a message. Can you recover it from Outlook?

A: Yes, however you must use an IMAP client configuration to recover if IMAP deleted it.

78: You have two departments A and B. Department A needs to see in its GAL both itself and
Department B. Department B shouldn't see Department A for security reasons. Users on both
sides should be able to e-mail each other. How do you accomplish this?

A: Set the trust on Department A recipients to be greater that the trust of the site connector.

79: You create a new form for the user clients. You e-mail them the form. What else must you
do to ensure successful adoption of the new form?

A: Save the form in the public folders.

80: Your organization is in London and has 5 branch offices. All are connected via a 56K line.
How should you deploy Exchange for maximum user access?

A: Separate sites at each location.

81: Your organization is in London and has 5 branch offices. All are connected via ISDN lines.
What site connector would you use to connect these sites?

A: X.400

82: You administer an Exchange environment on a Wireless WAN that experiences intermittent
connectivity. What do you do to minimize retransmissions? (Choose two)

26
A: Reduce the check-point size to a minimum but greater than 0
Increase the Open interval retry

83: You have 25 local users and you are going to hire 30 new field workers that will access
remotely using the three new modems you just installed on your server. You currently have 25
CALs. How many more do you need to obtain?

A: 30

84: What is the best installation method for overall fault tolerance? (Choose all that apply)

A: Install Exchange on a member server.


Disable circular logging.

85: What information is contained in the Exchange.stf and Outlook.sft files?

A: Installation customization settings as well as registry modifications and protocol binding order.
86: What information is contained in the Default.prf and Outlook.prf files?

A: Profile information

87: What objects are exported during directory replication?

A: All objects with trusts less than or equal to the site connector.

88: In order to perform a customized installation of Outlook clients, what would you use?

A: Network Installation Wizard

89: Why would you want to disable circular logging?

A: If it is enabled, it recycles logs and you can only restore from last full backup. If you disable, it
keeps logs until next backup and you can recover up to the time of a crash.

90: When using the MS-Mail connector, where do you put the distribution lists?

A: On the Exchange side.

91: Which address space entry in the X.400 address space will tell you the Exchange
Organization?

A: p= (private management domain)

92: Users complain that Distribution lists are slow to expand. How could you speed it up?

A: Expand Distribution list on a fast or a less used server.

93: How do you clean up Exchange tracking logs?

A: Manually

94: After installation of Exchange, the DS does not start, why?

27
A: Not configured with enough Disk space.

95: Can you do scheduling via the Site Connector?

A: No

96: After you add more memory to your Exchange server, what do you need to do for Exchange
to see the memory?

A: Run Performance Optimizer

97: How can you ensure your Outlook client users are required to logon in order to access the
Exchange Server even if they are already logged on the your NT Network?

A: Configure user profiles so security is not used during logon by Disabling “Use Network Security to
logon” in Advanced Server Properties.

98: Your POP3 clients can access the Exchange server and download mail. However, they get
an error message when ever they try to send Internet mail via SMTP. What is the problem?

A: IMS is set to not reroute incoming SMTP.

99: One of your company's locations contains an exchange site with 25 users, each using
Outlook.. You have purchased 25 client access licenses. The Company hires 10 new employees
that will connect to the site remotely. Five of the new users will be using pop3 applications, and
five will be using http applications. How many additional licenses must be bought?

A: 10

100: As the Microsoft Exchange Server administrator for your organization, you are currently
creating an X.400 Connector to enable messaging connectivity between two Microsoft Exchange
Server sites. For the remote computer, you specify an address that results in the following
connection string: "C=US;A= ;P=WHITE;O=BLACK." What does the WHITE property
represent?

A: The name of the remote Microsoft Exchange Server organization

101: You have 1 site. In that site you have 3 Exchange Servers in London and 2 in Tokyo. If you
want the London users to query their own servers first while searching public folders, what do
you do?

A: Configure London as their home server

102: What does the "o=" field in an X.400 address equate to in an EX address?

A: Site Name

103: You have enabled LDAP and allowed anonymous access.. But u realize that there are
certain attributes that you do not want viewed through such access. What should you do?

A: Clear the fields of those attributes in the DS site configuration object.

28
104: A single site encompasses London and Chicago. Three servers are in London and two are
in Chicago. What do you do to ensure that users in London always access public folders in
London before accessing replicas in Chicago?

A: Set the location value so that the servers in both cities are associated with each other.

105: Your exchange server message with server in another site over 64kbps connection. U have a
site connector configured between two sites. The network experiences high latency and packet
loss. What actions to optimize performance for this configurations? ( Choose Two )

A: Reduce MTA checkpoint Size


Increase MTA message threshold

106: Your Exchange Server organization consist of multiple sites. You have a business division
named ATG that does classified work. The ATG division is in its own site and domain. Your
company does not want the directory information about ATG employees to be visible to other
connected sites within its Exchange Server organization. However, your company still wants
users in each site to be able to send messages to all Exchange recipients. The company wants
ATG employees to be able to view directory info about all recipient from all other sites. What
would you do?

A: Clear all directory replication attributes in the DS sites configuration object for the ATG site.

107: You have one Exchange Server 5.5 and five Exchange Server 4.0 in a site. One of the
Exchange 4.0 Servers fail and you want to replace another 4.0 Server. What would you do?

A: Install Exchange 4.0 and copy Exchange Server 5.5 support files to the Exchsrvr\Bin.

108: A company with a messaging system on host in central office and 5 remote offices from
where clients connect to Host in the main office via 56 kbps links. They want to replace the Host
with Exchange system. How do they implement Exchange messaging system in order to use not
peak traffic hours and optimize client access and use of message system?

A: Implement 5 Exchange servers each at its own office connected through x.400 connector.

109: You have an Exchange 5.5 server running on Windows NT 4.0 Server with TCP/IP protocol
stack installed. The Internet Mail Service (SMTP) connector is installed. Users can send mail to
recipients outside the organization, but the can’t receive mail from outside the organization.
What is the problem?

A. The DNS does not have a MX record pointing to the server on which the MTA resides.

110: You are planning the configuration of an Exchange Server computer that will route mail to
the Internet. You want to minimize cost by limiting the amount of time your server is connected
to the Internet via an Internet Service provider (ISP). How should you configure the Internet
Mail Service and connectivity to the Internet to minimize cost?

A: Establish a dial-up connection to the Internet and Configure the Internet Mail Service to use ETRN
to retrieve mail from the ISP.

111: You want to add a new Exchange server to a site. What information do you need? (Choose
2)

29
A: The name of the existing server in the site
The password of the service account

30

You might also like