Term
| What kind of user has an account in Active Directory, an Exchange mailbox and email address? |
|
Definition
|
|
Term
| What kind of user has an authentication account in Microsoft Windows and an external email address associated with it but no Exchange mailbox? |
|
Definition
|
|
Term
| You can create a mailbox for a user by using ______ if the default has been overridden or if you are installing Exchange into an existing Active Directory forest. |
|
Definition
|
|
Term
| (T/F) When you delete a mailbox, by default, the mailbox is disconnected but not immediately deleted. |
|
Definition
|
|
Term
| By default, a _____ is disconnected for 30 days, during which time it is flagged for deletion unless you choose to purge the mailbox manually. |
|
Definition
|
|
Term
| An ______ is a collection of recipient objects that require objects that are using a Lightweight Directory Access Protocol (LDAP) query and based on attributes in Active Directory. |
|
Definition
|
|
Term
| A(n) ______ contains all Exchange recipients in the organization. |
|
Definition
|
|
Term
| A(n) _____ is a collection of address lists that are available to Exchange users when they are working offline. |
|
Definition
|
|
Term
| You can use a _____ to configure an e-mail address policy, a mailbox management policy, or both. |
|
Definition
|
|
Term
| What are the four types of Exchange recipients? |
|
Definition
- Users
- Contact
- Group
- Public Folders
|
|
|
Term
| What are the advantages of Query-based distribution groups? |
|
Definition
- Dynamic membership
- Reduces administrative overhead
|
|
|
Term
| What are the disadvantages of Query-based distribution groups? |
|
Definition
- Higher performance cost on server resources
- Can only be created in Native Mode Topology for Exchange Server 2003
|
|
|
Term
| What can be done with Exchange Task Wizard? |
|
Definition
- Create or delete mailbox
- Establish or delete an email address
- Move a mailbox
- Hide or unhide group membership
- Configure exchange features
- Remove exchange attributes
|
|
|
Term
| What is the default mailbox retention limit? |
|
Definition
|
|
Term
| What notification messages are sent to mailbox owners who reach the storage limit defined for their mailboxes? |
|
Definition
|
|
Term
| What are the three levels of thresholds for storage limits? |
|
Definition
- Issue warning at (KB)
- Prohibit send at (KB)
- Prohibit send and receive at (KB)
|
|
|
Term
| What are three ways to configure storage limits? |
|
Definition
- On individual mailboxes
- On individual mailbox stores
- Using mailbox store policy
|
|
|
Term
| What is the difference between "Send on behalf" and "Send as" permissions? |
|
Definition
- Send on behalf shows "From: DelegatedUser on behalf of MailboxOwner
- Send as shows "From: MailboxOwner"
|
|
|
Term
| What are two ways to move mailboxes? |
|
Definition
- Using Exchange Task Wizard
- Using Exchange Merge Wizard (exmerge.exe)
|
|
|
Term
| When should you use exmerge.exe instead of Exchange Task Wizard? |
|
Definition
| If you must move mailboxes across Exchange organizations. |
|
|
Term
| (T/F) You should only mail-enable Universal groups and not Domain Local or Global groups if you have multiple domains in the environment? |
|
Definition
|
|
Term
| What are the four types of address lists? |
|
Definition
- Default
- Global
- Offline
- Custom
|
|
|
Term
| What are the five types of Default address lists? |
|
Definition
- All Contacts
- All Groups
- All Users
- Public Folders
- Default GAL
|
|
|
Term
| To create filter rules, you must define _____, ______, and ______. |
|
Definition
|
|
Term
| What service builds and maintains address lists, polls Active Directory for updated recipient info? |
|
Definition
| RUS (Recipient Update Service) |
|
|
Term
|
Definition
| Exchange System Manager, Recipients, RUS |
|
|
Term
| (T/F) All GALs will be shown in outlook address book if multiple GALs are provided. |
|
Definition
|
|
Term
| What permissions must you have to run ForestPrep? |
|
Definition
- Enterprise Admin
- Schema Admin
- Domain Admin
- Local Admin
|
|
|
Term
| What permissions must you have to run DomainPrep? |
|
Definition
|
|
Term
| What policy always has the lowest priority? |
|
Definition
|
|
Term
| What are the two ways to force address lists to be updated? |
|
Definition
|
|
Term
| What are the two types of Exchange users? |
|
Definition
- Mail-enabled
- Mailbox-enabled
|
|
|
Term
| Transferring messages between servers is called _____. |
|
Definition
|
|
Term
| Name the three different connectors that are supported by Exchange Server. |
|
Definition
- Routing Group Connectors
- SMTP Connectors
- X.400 Connectors
|
|
|
Term
| What is the name of the first routing group automatically created by Exchange when you install the first server that runs Exchange into an administrative group? |
|
Definition
|
|
Term
| What is the Monitoring and Status tool? |
|
Definition
| An administrative tool built into Exchange System Manager that is used to monitor the status and performance of Servers, Connectors, and Resources. |
|
|
Term
| When an Exchange host communicates with another host, it sends ________ over TCP port 25 to communicate with the host. |
|
Definition
|
|
Term
|
Definition
| A protocol that extends SMTP functionality by providing additional capabilities, such as delivery notifications and TLS. |
|
|
Term
|
Definition
| A DNS record that tells other computers your Email Server IP address and name so that the user can receive email. |
|
|
Term
| What is a pull relationship? |
|
Definition
| When one computer queues messages and the other computer pulls them by using TURN or ETRN commands. |
|
|
Term
| What indicates if you can ping by IP address but not by host name? |
|
Definition
| Name resolution problem and possibly a problem with DNS. |
|
|
Term
| The _______ diagnostic utility is used to isolate networking and connectivity problems by performing a series of tests to determine the state of your server. |
|
Definition
|
|
Term
|
Definition
| A repository for different types of information (multimedia files, email messages, and text documents) which can be shared with users in an Exchange organization as well as with NNTP and HTTP users outside of Exchange organization. |
|
|
Term
| What is a top-level folder? |
|
Definition
| A public folder that is created at the root of a Public Folder tree. |
|
|
Term
| How can users in an Exchange Organization access public folders? |
|
Definition
|
|
Term
| What are public folder permissions? |
|
Definition
| The permissions that control the creation, management, and use of public folders and their contents. |
|
|
Term
| (T/F) A public folder inherits its permissions from a parent object. |
|
Definition
|
|
Term
| What are Exchange servers connected over permanent networks? |
|
Definition
|
|
Term
| What Exchange server is responsible for tracking and maintaining routing, such as routing path availability, for all the servers in the routing group? |
|
Definition
|
|
Term
| When do you use just one routing group? |
|
Definition
- Have permanent and reliable connections
- Belong to same Active Directory Forest
- Connect consistently and reliably to the Routing Group Master
|
|
|
Term
| When may multiple Routing Groups be required? |
|
Definition
- Network connections are slow or intermittent
- Network is unreliable
- Message transmission is complex and indirect (multiple hops)
- Message transmission must be scheduled
- Routing Group structure is created to prevent users from accessing Public Folder replicas
|
|
|
Term
| What are the three connectors supported by Exchange? |
|
Definition
- Routing Group Connectors
- SMTP Connectors
- X.400 Connectors
|
|
|
Term
| What connector supports large file transfer? |
|
Definition
|
|
Term
| What are the two Monitoring and Status components? |
|
Definition
|
|
Term
| What are the four possible statuses that apply to servers? |
|
Definition
- Available
- Unavailable
- In Maintenance Mode
- Unknown
|
|
|
Term
| When a host initiates a TCP connection through port 25, what is the response from the server? |
|
Definition
|
|
Term
| When a host sends a HELO command, initiates the sender using mail from and the receipient using receipt to, what is the response from the server? |
|
Definition
|
|
Term
| What is the process of ensuring that users are who they claim to be? |
|
Definition
|
|
Term
| What is a technique where the contents of an email message are scrambled into a code that can only be read by a person who has the key to decode it on his/her computer? |
|
Definition
|
|
Term
| What are the three authentication methods supported by Exchange? |
|
Definition
- Anonymous Authentication
- Basic Authentication
- Integrated Windows Authentication
|
|
|
Term
| Which authentication method is the weakest? |
|
Definition
|
|
Term
| Which authentication method is the strongest? |
|
Definition
| Integrated Windows Authentication |
|
|
Term
| When an attacker impersonates a trusted host by using its IP address in an attempt to gain unauthorized access to a computer network is called what? |
|
Definition
|
|
Term
| How do you prevent IP Spoofing? |
|
Definition
|
|
Term
| When you set your computers to use the sender's SMTP domain name to carry out a DNS lookup to confirm the IP address is from the same network that is registered in DNS? |
|
Definition
|
|
Term
| What tools are used to identify problematic email domains? |
|
Definition
|
|
Term
| What is the syntax for using Nslookup to identify problematic email domains? |
|
Definition
| nslookup -querytype=mx domainname |
|
|
Term
| What are the three permission categories for public folders? |
|
Definition
- Client permissions
- Directory rights
- Admin rights
|
|
|
Term
| What are the client permissions of public folders? |
|
Definition
- Owner
- Author
- Reviewer
- Editor
|
|
|
Term
| By default, what permissions do all users have to Public folders? |
|
Definition
|
|
Term
| By default, who are directory rights granted to? |
|
Definition
- Administrators
- Enterprise Admins
- Exchange Domain Servers
- Exchange Enterprise Servers
|
|
|
Term
| By default, what tree is replicated to all Public Folder Servers? |
|
Definition
|
|
Term
| What are the two types of Public Folder trees? |
|
Definition
- Default Public Folder tree
- General Purpose Public Folder tree
|
|
|
Term
| What are multiple copies of public folders known as? |
|
Definition
|
|
Term
| Public Folder replication is an ____________ process. |
|
Definition
|
|
Term
| (T/F) Public Folders are mail-enabled by default. |
|
Definition
|
|
Term
| How are client permissions configured for Public Folders? |
|
Definition
- Exchange System Manager for any Public Folder
- Outlook for folders in the Default Public folder
|
|
|
Term
| The frequency of public folder replication depends on: |
|
Definition
- The contents of the folder
- Network traffic
- The business needs of the users
|
|
|
Term
| What is the main source of errors in public folders? |
|
Definition
| Incorrectly configured permissions |
|
|
Term
| Virtual memory should not fall below ______ free on an Exchange server for any length of time. |
|
Definition
|
|
Term
|
Definition
| Messages or scripts that Exchange System Manager directs Exchange to send out to notify when something is wrong. |
|
|
Term
| Name five of the maintenance tasks that you should perform daily. |
|
Definition
- Monitor Event Viewer
- Check Monitoring and Status
- Check Queue Viewer
- Check logs
- Check for available disk space
- Monitor Exchange and Network services
- Monitor server performance
- Monitor cluster resources
- Verify replication
- Examine Exchange Storage Stats
|
|
|
Term
| What information can you obtain from an antivirus log? |
|
Definition
| When last scan was performed, what was scanned, and what results were. |
|
|
Term
| Typically, the first indication about incorrect configuration of Windows services is through _____. |
|
Definition
|
|
Term
| Name three abnormal event numbers. |
|
Definition
- 2064 and 2069
- 9582
- 1018, 1019, and 1022
|
|
|
Term
| You can use the ____ to display messages in the queue or to search for messages by specifying search criteria, such as the sender or recipient and the message state. |
|
Definition
| Find Messages in Queue Viewer |
|
|
Term
| _______ defragmentation creates a new defragmented database and reduces database size. |
|
Definition
|
|
Term
| With _______ you can identify the types of frames that are being transmitted or received by any computer, determine if a computer is excessively loaded, and analyze the traffic that is loading it. |
|
Definition
|
|
Term
| System Attendant service is tightly integrated with _____ to retrieve information about recipients and address lists. |
|
Definition
|
|
Term
| How does a multi-user database work? |
|
Definition
| All clients read and write directly to database files |
|
|
Term
|
Definition
| A sequence of operations that are treated as a single unit. |
|
|
Term
| What does a database do to ensure consistency during an ACID test? |
|
Definition
| The database is always transformed from one known valid state, to another. |
|
|
Term
| How big is a checkpoint file? |
|
Definition
|
|
Term
| _______ is a feature that allows log files to be overwritten by new log files after the transactions in the original log file have been committed to the database. |
|
Definition
|
|
Term
| At what level is the Circular logging defined? |
|
Definition
|
|
Term
| What is the store database cache? |
|
Definition
| A large area in the memory subsystem where database transactions are saved before they are committed to the store, also called ESE Buffer. |
|
|
Term
| Using what tool you can monitor free disk space, virtual memory usage, CPU utilization, and the status of Exchange and Windows services? |
|
Definition
| Monitoring and Status Tool |
|
|
Term
| Exchange Server 2003 Enterprise Edition can support up to ___ storage groups per server, with each storage group containing up to ___ databases. |
|
Definition
|
|
Term
| What database structure does Exchange Server uses to store data? |
|
Definition
| ESE (Extensible Storage Engine) |
|
|
Term
| (T/F) Transaction log files and database files have different behavior. |
|
Definition
|
|
Term
| What are the names of the two files that each Exchange database contains? |
|
Definition
| Rich-text (edb) and streaming (stm) |
|
|
Term
| (T/F) During a full offline backup, the .edb, .stm and .log files that comprise the Exchange store are backed up and checked for corruption at the file system level. |
|
Definition
|
|
Term
| What do you need to check to verify the success of your backup procedures? |
|
Definition
- Windows Server Backup Log
- Event Viewer
|
|
|
Term
| (T/F) Restoring a public folder store will not only restore the public folder you are trying to recover, but will merge all the other existing public folders with the information contained in the backup. |
|
Definition
|
|
Term
| What is an exchange database that houses data such as email addresses and documents? |
|
Definition
|
|
Term
| What is a collection of mailbox stores and public folder stores? |
|
Definition
|
|
Term
| What is the fifth storage group only supported with Enterprise Edition? |
|
Definition
|
|
Term
| What services must be running properly for Exchange to function properly? |
|
Definition
- Microsoft Exchange Information Store
- Microsoft Exchange MTA Stacks
- Microsoft Exchange Routing Engine
- Microsoft Exchange System Attendant
- SMTP
- World Wide Web Publishing
|
|
|
Term
| CPU utilization should not exceed what? |
|
Definition
|
|
Term
| Why should you use multiple databases and storage groups? |
|
Definition
- Reduce backup and restore times
- Different backup schdeules
- Mailbox stores can be restore individually
- Independent circular logging setings
|
|
|
Term
| What are the two Performance Console snap-ins? |
|
Definition
- Performance Logs and Alerts (logging)
- System Monitor (real time)
|
|
|
Term
|
Definition
| Automatically, as soon as you create the log file or when specified start time on schedule equals current time. |
|
|
Term
| What is a system-generated event that is triggered when counters perform outside of predefined thresholds? |
|
Definition
|
|
Term
| (T/F) Message tracking is turned on by default. |
|
Definition
|
|
Term
| What are the supported Exchange protocols? |
|
Definition
- HTTP
- POP3
- IMAP4
- ESMTP/SMTP
- NNTP
|
|
|
Term
| What is the default and secure port for POP3? |
|
Definition
|
|
Term
| What is the default and secure port for IMAP4? |
|
Definition
|
|
Term
| What is the default and secure port for HTTP? |
|
Definition
|
|
Term
| What is the default and secure port for NNTP? |
|
Definition
|
|
Term
| What is the default and secure port for SMTP? |
|
Definition
|
|
Term
| What is the default location for Exchange Server files? |
|
Definition
| C:\Program Files\Exchsrvr |
|
|
Term
| What command-line utility is used to defragment the Mailbox and Public Folder Stores in Exchange? |
|
Definition
|
|
Term
| When using eseutil, what do the /d, /r, and /g switches do? |
|
Definition
- /d - offline compaction of database
- /r - recovery and brings all databases to a consistent state
- /g - verifies integrity of database
|
|
|
Term
| What command-line utility searches an offline information store for integrity weaknesses and repairs detected issues? |
|
Definition
|
|
Term
| What service manages the Microsoft Exchange Information Store, including mailbox stores and public folder store? |
|
Definition
| Microsoft Exchange Information Store |
|
|
Term
| What service provides monitoring, maintenance, and Active Directory lookup services? |
|
Definition
| Microsoft Exchange System Attendant |
|
|
Term
| What are the heart of Exchange's functionality? |
|
Definition
|
|
Term
| What are the ACID Properties? |
|
Definition
- Atomicity
- Consistency
- Isolation
- Durability
|
|
|
Term
| Writes to the Transaction Log are ______. |
|
Definition
|
|
Term
| Reads from and to database are ______. |
|
Definition
|
|
Term
| What size are all Transaction log files? |
|
Definition
|
|
Term
| What is a place marker that points to a location in the log files? |
|
Definition
|
|
Term
| What is the name of the First Storage Group checkpoint file and its size? |
|
Definition
|
|
Term
| What are additional files created in Exchange directories? |
|
Definition
|
|
Term
| (T/F) Circular logging is turned on by default. |
|
Definition
|
|
Term
| What is the finite amount of memory used by the store.exe process in Exchange 2003? |
|
Definition
|
|
Term
| (T/F) The /3GB switch to the boot.ini file is supported by all versions of Windows Server 2003. |
|
Definition
|
|
Term
| EDB and STM files grow in what increment size? |
|
Definition
|
|
Term
| What is the difference between Static data and Dynamic data? |
|
Definition
- Static - data either does not change, or does not change very often
- Dynamic - data changes frequently
|
|
|
Term
| What are the five Exchange backup strategies? |
|
Definition
- Full
- Full + Incremental
- Full + Differential
- Copy
- Copy + Incremental
|
|
|
Term
| What are examples of static data? |
|
Definition
- OS software
- Packaged application data
- Backup management software
- User application software
|
|
|
Term
| What are examples of dynamic data? |
|
Definition
- Exchange Server database and log files
- Active Directory data
- Microsoft Certificate service data
- Site replication service databases
- System State data
|
|
|
Term
| What is the difference between Online and Offline backups? |
|
Definition
- Online - while services are running
- Offline - dismount stores and backup manually, does not check database for corruption
|
|
|
Term
| What are the two methods of restoration? |
|
Definition
- Point-in-time (Hard recovery)
- Roll-forward (Soft recovery)
|
|
|
Term
| What Microsoft service manages the restore operation? |
|
Definition
| Microsoft Exchange Information Store |
|
|
Term
| What provides opportunities, cues, and information that allows you to address major risks before they adversely affect the business of your organization? |
|
Definition
|
|
Term
| What helps standardize the way snapshot backups are performed? |
|
Definition
| Windows Volume Shadow Copy Service |
|
|
Term
| What does the Monitoring and Status utility monitor by default? |
|
Definition
|
|
Term
| A loss of service due to inadequate or improper configuration can result in what? |
|
Definition
- Security breach
- Denial-of-Service
- Virus outbreak
|
|
|
Term
| In order to test Active Directory connectivity, how can you verify which domain controller Exchange Server is using? |
|
Definition
| Open Directory Access page on Exchange Server. |
|
|
Term
| Give three different reasons why Mail-enabled objects may not appear in the global address list or other address lists. |
|
Definition
- RUS has not updated the object
- Replication has not occured to the Global Catalog
- The Exchange enterprise servers group does not have appropriate permissions
- The LDAP query my be incorrect
- The Exchange server has been taken offline
|
|
|
Term
| In an organization with a single Active Directory site you can count on replication completing within about ___ minutes. |
|
Definition
|
|
Term
| What does an error like DNS code 5.1.4 indicate? |
|
Definition
| Two recipients in the directory have the same SMTP address. |
|
|
Term
| What does the command-line utility dcdiag analyze? |
|
Definition
| The state of Domain Controllers in a forest and reports any problems. |
|
|
Term
| How can you develop a Block List? |
|
Definition
| Adding new IP addresses to the Global Accept and Deny List. |
|
|
Term
| What is recipient filtering? |
|
Definition
| A method used for reducing unsolicited commercial email by filtering inbound email based on the recipient. |
|
|
Term
| What is an administrative group? |
|
Definition
| A collection of Exchange 2000 and 2003 objects that are grouped together for the purpose of managing and delegating permissions. |
|
|
Term
| (T/F) Permissions are automatically propagated to all child objects. |
|
Definition
|
|
Term
| For Exchange 2003 Setup to run, what four (4) services you must install and enable but not necessarily start? |
|
Definition
- NNTP
- SMTP
- World Wide Web Publishing Service
- IIS Admin Service
|
|
|
Term
| What are the event numbers that indicate the start and end of the backup process? |
|
Definition
|
|
Term
| What does the Event ID 4000 indicate? |
|
Definition
| A connection fails for a reason other than a specific protocol error. |
|
|
Term
| What does a server status of unreachable indicate? |
|
Definition
| One of the main servers is down, or if a server is in a different routing group, a connector between routing groups may be down, or not exist. |
|
|
Term
| (T/F) Each server must be able to query Active Directory for logon authentication and information about configuration and mail-enabled objects. |
|
Definition
|
|
Term
| What utility performs diagnostic functions that help ensure the NetLogon service finds Domain Controllers and Global Catalog Servers? |
|
Definition
|
|
Term
| What NLTEST syntax would list the domain controllers in the navy mil domain? |
|
Definition
|
|
Term
| What NLTEST syntax displays the current site name? |
|
Definition
|
|
Term
| What NLTEST syntax lists detailed information about each domain controller? |
|
Definition
|
|
Term
| What is the simplest way to get a list of the objects attributes? |
|
Definition
|
|
Term
| What type of file does LDIFDE dump its information to? |
|
Definition
|
|
Term
| How does junk email prove to be a major problem? |
|
Definition
- Uses a computers memory resources
- Consumes network bandwidth
- Wastes user's time in reading email
|
|
|
Term
| What objects can be added to a new Administrative Group? |
|
Definition
- System Policy objects
- Routing Group objects
- Public Folder Tree objects
- Server objects
|
|
|
Term
| What are a group of permissions that enable administrators to perform their administrative tasks in Exchange 2000 and 2003? |
|
Definition
| Exchange administrative permissions |
|
|
Term
| What utility enables you to grant Exchange Administrative permissions? |
|
Definition
| Exchange Administration Delegation Wizard |
|
|
Term
| What are the three roles supported by Exchange Administrative Delegation Wizard? |
|
Definition
- Exchange Full Administrator
- Exchange Administrator
- Exchange View Only Administrator
|
|
|
Term
| What Exchange Built-in Groups are automatically created? |
|
Definition
- Exchange Domain Servers
- Exchange Enterprise Servers
|
|
|
Term
| What services must be running before Microsoft System Attendant will start? |
|
Definition
- Event Log
- NTLM Security Support Provider
- RPC
- Server
- Workstation
|
|
|
Term
The information store process creates and manages indexes for common key fields for faster lookups and searches for documents that reside in a store. |
|
Definition
|
|
Term
| What does event ID 9582 identify? |
|
Definition
| Low or fragmented virtual memory |
|
|
Term
| Where is the Badmail folder located? |
|
Definition
| C:\Program Files\exchsrvr\mailroot\vsi1\badmail |
|
|