[Free] 2019(Nov) EnsurePass Microsoft 70-347 Dumps with VCE and PDF 61-70

Get Full Version of the Exam
http://www.EnsurePass.com/70-347.html

Question No.61

You administer Microsoft Exchange Online for Fabrikam, Inc. Fabrikam#39;s Exchange Online tenant domain name is fabrikam.onmicrosoft.com.

You verify the domain fabrikam.com in the Office 365 admin center and instruct other administrators to configure new Exchange Online users with fabrikam.com as the primary SMTP domain. The fabrikam.com domain is not federated.

A user reports that his reply-to address is displayed to external email message recipients as User1@fabrikam.onmicrosoft.com.

You need to configure the user#39;s mailbox to meet the following requirements:

image

The user#39;s reply-to address must be User1@fabrikam.com.

image

The email address User1@fabrikam.onmicrosoft.com must function as a secondary email address for the user.

Which Windows PowerShell command should you run?

  1. Set MsolUser -UserPrincipalNameUser1@fabrikam.onmicrosoft.com – AlternateEmailAddresses user1@fabrikam.com

  2. Set-Mailbox -Identity user1@fabrikam.onmicrosoft.com -ForwardingAddress quot;User 1quot;

  3. Set-Mailbox -Identity user1@fabrikam.onmicrosoft.com – WindowsEmailAddressUser1@fabrikam.com

  4. Set-Mailbox -Identity user1@fabrikam.onmicrosoft.com -EmailAddresses user1@fabrikam.onmicrosoft.com, user1@fabrikam.com

Correct Answer: C

Question No.62

Your company is planning to migrate to Microsoft Exchange Online. The company employs 5,000 people, each with a mailbox currently located on Exchange Server 2000.

The company has the following migration requirements:

image

Move mailboxes in batches.

image

Do not migrate calendar or contact items.

image

Provide migration status reports to administrators. You need to select the appropriate migration strategy. Which migration strategy should you use?

  1. Staged migration

  2. Cutover migration

  3. IMAP migration

  4. Hybrid migration

Correct Answer: C

Question No.63

You are the Office 365 administrator for your company. All users have been assigned E3 licenses and use Office Web Apps to create and edit documents. A user attempts to access documents stored on a USB flash drive. When the user double- clicks a file that is stored on the USB flash drive, an error message states that Windows can#39;t open the file and needs to know what program to use to open it. You need to ensure that the user can start Office applications and edit Office documents by double-clicking files. What should you do on the user#39;s computer?

  1. Use Office on Demand.

  2. Install Office 365 ProPlus from the Office 365 portal.

  3. Copy the files from the USB flash drive to the local hard drive.

  4. Install and configure Microsoft Word Viewer.

Correct Answer: B

Question No.64

Your company uses Office 365 and has an Enterprise E3 license plan. Employees are issued laptop computers that are configured with a standard image. The image includes an installation of Office 365 ProPlus that must be activated by the employees. An employee recently received a new laptop computer to replace an older laptop. The older laptop will be reimaged. When the employee attempts to start Word for the first time, she receives a message saying that she cannot activate it because she has already activated five devices. You need to help the employee activate Office on her new laptop computer. What should you do?

  1. Assign a second E3 license to the employee.

  2. Remove the employee#39;s E3 license and then assign a new E3 license.

  3. Sign in to the Office 365 portal as the employee and deactivate the old laptop.

  4. Sign in to the Office 365 portal by using your Global Admin account and then deactivate the old laptop.

Correct Answer: C

Question No.65

You are the Office 365 administrator for your company. The company uses Office 365 ProPlus and has multiple Microsoft SharePointOnline sites. The company recently started a project that requires employees to collaborate with external users on the development of a set of documents that are stored in a team site. You need to ensure that external users can access and edit the documents without affecting the security of other content. What should you do?

  1. Create a new SharePoint team site and share it by using the Share function and adding the external users to the Visitors group.

  2. Create a new SharePoint team site and share it by using the Share function and adding the external users to the Contributors group.

  3. Share the existing SharePoint team site by using the Share function and adding the external users to the Visitors group.

  4. Share the existing SharePoint team site by using the Share function and adding the external users to the Contributors group.

Correct Answer: B

Question No.66

A company is upgrading its 3,000 client computers to Office 365 ProPlus. The company uses the Telemetry Dashboard to identify document compatibility issues. The Telemetry Agent is deployed to all client computers. The telemetry environment is described in the following table.

image

You need to ensure that telemetry data is collected for more than 20 client computers at a time. What should you do?

  1. Migrate the telemetry database to a computer that runs SQL Server 2008.

  2. Use the Registry Editor to trigger the data collection.

  3. Use Group Policy to set the MaxConnectionsPerServer setting to 100.

  4. Migrate the Telemetry Processor to a computer that runs Windows Server 2012.

Correct Answer: D

Explanation:

http://technet.microsoft.com/en-us/library/jj219431(v=office.15).aspx

Telemetry Processor runs on one or more computers and collects inventory, usage, and telemetric data from the telemetry shared folder and imports the data to the telemetry database. Telemetry Processor is installed as a Windows service named quot;Telemetry Processor.quot;

We recommend the following operating systems for computers that run Telemetry Processor: For production environments For best performance, we recommend these operating systems:

Windows Server 2008 Windows Server 2008 R2 Windows Server 2012 Windows Server 2012 R2

For test or small production environments You can use computers that run Windows 7, Windows 8, and Windows 8.1 in test environments and in small production environments. There is a limit of 20 concurrent connections for client operating systems, but in small environments, the agent randomization setting should minimize any chances of more than 20 agents connecting at one time.

http://technet.microsoft.com/en-us/library/jj863580(v=office.15).aspx

Question No.67

You are the Office 365 administrator for your company. The company recently subscribed to Office 365 ProPlus. When performing a test deployment, you receive the following error message: quot;Windows cannot find #39;C:\Program Files\Microsoft Office 15 \clientX64\integratedOffice. exe#39;.

Make sure you typed the name correctly, and then try again. quot; You need to successfully complete the test deployment. Which two actions can you perform to achieve this goal? Each correct answer presents a complete solution.

  1. Manually remove the registry subkeys associated with Office 2013, and then restart the Office 365 ProPlus installation.

  2. Completely uninstall existing versions of Office 2013 and then restart the Office 365 ProPlus installation.

  3. Download the Office 365 ProPlus package to a file share, and then deploy Office 365 ProPlus by using Group Policy.

  4. Automate the installation of Office 365 ProPlus applications by using Microsoft System Center Configuration Manager.

Correct Answer: AB

Question No.68

DRAG DROP

You are a Microsoft SharePoint administrator for Contoso, Ltd. Contoso recently purchased Office 365 E3 licenses for all employees. You administer Office 365 by using the admin@contoso.com account. Contoso plans to migrate all legacy SharePoint sites to

SharePoint Online.

The human resources department manager asks you to set up a SharePoint Online site collection that meets the requirements described in the following table.

image

You need to set up the site collection.

Which three actions should you perform in sequence?

To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.

image

Correct Answer:

image

Question No.69

DRAG DROP

Your company uses Microsoft SharePoint Online. You create a subsite in an existing site collection. The subsite will serve as a document repository from which anyone can download documents. External sharing is turned off globally.

You plan to share documents with users by emailing document links. Users must not be required to sign in to the subsite to download the documents.

You need to configure the environment to allow document sharing with external users. Which three actions should you perform in sequence?

To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.

image

Correct Answer:

image

Question No.70

You are the Office 365 administrator for Contoso, Ltd. Some email messages sent from the trusted domain fabrikam.com are being rejected as spam. Some of these email messages originate inside the fabnkam.com network, and some of them originate from an application in the fabrikam.com co-located data center. The fabrikam.com systems administrators have asked you to add their domain and the IP addresses of the data center that hosts their external application to your list of safe senders. You need to configure Microsoft Exchange Online Protection. Which two actions should you perform? Each correct answer presents part of the solution.

  1. Configure a content filter to allow the fabrikam.com domain.

  2. Configure a mail flow rule to bypass spam filtering for the data center IP address range.

  3. Create a connection filter to allow the data center IP address range.

  4. Add the fabrikam.com domain as an accepted domain.

  5. Create an inbound connector for the fabrikam.com domain.

  6. Configure a mail flow rule to bypass spam filtering for the fabrikam.com domain.

Correct Answer: BF

Explanation:

In general, we recommend that you add the IP addresses (or IP address ranges) for all your domains that you consider safe to the IP Allow list. However, if you don#39;t want your IP Allow List entry to apply to all your domains, you can create a Transport rule that excepts specific domains.

To do this, perform the following steps:

  1. In the EAC, navigate to Mail flow gt; Rules.

  2. Click Add Icon and then select Create a new rule. 3.Give the rule a name and then click More options.

  1. Under Apply this rule if, select The sender and then choose IP address is in any of these ranges or exactly matches.

  2. In the specify IP addresses box, specify the IP address or IP address range you entered in the IP Allow list, click Add Add Icon, and then click ok.

  3. Under Do the following, set the action by choosing Modify the message properties and then set the spam confidence level (SCL). In the specify SCL box, select 0, and click ok.

  4. Click add exception, and under Except if, select The sender and choose domain is.

  5. In the specify domain box, enter the domain for which you want to bypass spam filtering, such as contosob.com. Click Add Add Icon to move it to the list of phrases. Repeat this step if you want to add additional domains as exceptions, and click ok when you are finished.

  6. If you#39;d like, you can make selections to audit the rule, test the rule, activate the rule during a specific time period, and other selections. We recommend testing the rule for a period before you enforce it. Manage mail flow rules contains more information about these selections.

  7. Click the save button to save the rule. It appears in your list of rules.

After you create and enforce the rule, spam filtering for the IP address or IP address range you specified is bypassed only for the domain exception you entered.

References:

https://technet.microsoft.com/en-us/library/dn198251(v=exchg.150).aspx https://technet.microsoft.com/en-us/library/jj200718(v=exchg.150).aspx

Get Full Version of the Exam
70-347 Dumps
70-347 VCE and PDF

Leave a Comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.