Microsoft Microsoft Certifications MS-203 Questions & Answers
Question 201:
You need to create a public folder named Finance in your Microsoft 365 tenant. Users must be able to send emails to Finance by using an email address of [email protected](1).TenantName.
To complete this task, sign in to the Exchange admin center.
A. See explanation below.
B. PlaceHolder
C. PlaceHolder
D. PlaceHolder
Correct Answer: A
Use the EAC to create a public folder mailbox
1.
In the EAC, go to Public folders > Public folder mailboxes, and then click Add +.
2.
In the New public folder mailbox page that opens, enter the following information:
-Name: Enter the name for the public folder mailbox.
-Organizational unit: Click Browse to select the location in Active Directory where the mailbox object is created.
-Mailbox database: Click Browse to select the mailbox database where the mailbox is created. When you're finished, click Save.
Use the EAC to create a public folder
When using the EAC to create a public folder, you'll only be able to set the name and the path of the public folder. To configure additional settings, you'll need to edit the public folder after it's created.
1.
Navigate to Public folders > Public folders.
2.
If you want to create this public folder as a child of an existing public folder, click the existing public folder in the list view. If you want to create a top-level public folder, skip this step.
3.
Click Add +.
4.
In Public Folder, type the name of the public folder.
5.
In the Path box, verify the path to the public folder. If this isn't the desired path, click Cancel and follow Step 2 of this procedure.
6.
Click Save.
7.
Navigate back to Public folders > Public folders.
8.
In the list view, select the public folder that you want to mail-enable or mail-disable.
9.
In the details pane, under Mail settings, click Enable or Disable.
10.A warning box displays asking if you're sure you want to enable or disable email for the public folder. Click Yes to continue.
You need to ensure that all email sent or received by a user named Diego Siciliani is preserved in Exchange Online. The solution must prevent Diego Siciliani from permanently deleting any email messages for 180 days.
To complete this task, sign in to the Microsoft 365 admin center.
A. See explanation below.
B. PlaceHolder
C. PlaceHolder
D. PlaceHolder
Correct Answer: A
You need configure a Retention Policy. You could also use a Litigation Hold but Retention Policies are replacing Litigation Holds in future, so a Retention Policy is the way to go.
1.
In the Microsoft 365 Compliance Center, go to the Policies section and click Retention.
2.
Click the New retention policy link.
3.
Enter a name for the policy (such as "Diego Siciliani Email Retention") and click Next.
4.
In the retention period, enter 180 days and click Next.
5.
Ensure that only Exchange email is selected. SharePoint sites, OneDrive accounts and Office 365 groups are also selected by default so you may need to deselect them.
6.
Click the Choose recipients link for Exchange email.
7.
Click the Choose recipients button to open a list of recipients.
8.
Select Admin1 and click the Choose button then click the Done button.
You need to ensure that the users in your company can schedule a conference room named Room1 in the company's office by using Microsoft Outlook.
To complete this task, sign in to the Exchange admin center.
A. See explanation below.
B. PlaceHolder
C. PlaceHolder
D. PlaceHolder
Correct Answer: A
1.
In the Exchange admin center, navigate to Recipients > Resources.
2.
To create a room mailbox, click New + > Room mailbox.
3.
Use the options on the page to specify the settings for the new resource mailbox.
-
Room name: Use this box to type a name for the room mailbox. This is the name that's listed in the resource mailbox list in the Exchange admin center and in your organization's address book. This name is required and it can't exceed 64 characters.
-
Alias: A room mailbox has an email address so it can receive booking requests. The email address consists of an alias on the left side of the @ symbol, which must be unique in the forest, and your domain name on the right. The alias is required.
- Location, Phone, Capacity: You can use these fields to enter details about the room. However, as explained earlier, you can include some or all of this information in the room name so users can see it.
4. When you're finished, click Save to create the room mailbox.
You have a Microsoft Exchange Online tenant that uses an email domain named @contoso.com.
You recently configured Microsoft 365 to use a new email domain named @fabrikam.com instead of @contoso.com.
Users report that when they send email messages to external recipients, the messages are often erroneously identified as SPAM.
You verify that all the users can receive email successfully from other companies.
You need to reduce the likelihood that the email will be identified as SPAM by the external recipients.
What should you modify?
A. a text (TXT) record
B. a mail exchanger (MX) record
C. a remote domain
D. a mail flow rule
E. a safe attachments policy
Correct Answer: D
Explanation:
In Exchange Online organizations or standalone Exchange Online Protection (EOP) organizations without Exchange Online mailboxes, you can use mail flow rules (also known as transport rules) to identify and take action on messages that
flow through your organization.
Mail flow rules are similar to the Inbox rules that are available in Outlook and Outlook on the web (formerly known as Outlook Web App). The main difference is mail flow rules take action on messages while they're in transit, not after the
message is delivered to the mailbox. Mail flow rules contain a richer set of conditions, exceptions, and actions, which provides you with the flexibility to implement many types of messaging policies.
Incorrect:
* a remote domain Remote domains in Exchange Online There are many reasons why you might want to control the types and the format of messages that your users send from Exchange Online to recipients in external domains. For example:
You don't want to let your users forward messages to recipients in other domains.
You work with an organization that you don't want to receive automatic messages from (for example, non-delivery reports and out-of-office replies).
You have a business partner that's outside your organization, and you'd like that partner to receive the same out-of-office replies as those received by people inside your organization.
Your users frequently send email to a company that supports limited email formats, and you'd like to make sure all emails sent to that organization are sent in a format that they can read.
To accomplish this, you use what's called a remote domain. The remote domain settings override settings that your users might configure in Outlook or Outlook on the web (formerly known as Outlook Web App), or that you configure in the Exchange admin center (EAC) or Exchange Online PowerShell. For example, users might have an out-of-office reply set up for people outside the organization, but if a sender from a remote domain sends mail to them, and the remote domain is not set to receive out-of-office replies, no out-of-office reply is sent.
You have a Microsoft Exchange Online tenant that uses an email domain named contoso.com.
All incoming email messages route through an external third-party cloud filtering service named Filter1 to an incoming connector named Connector1.
You discover that the incoming messages contain headers that specify the source IP address as Filter1.
You need to ensure that incoming email messages contain headers that specify the source IP address of the original sender. The solution must prevent any changes to the external third-party cloud filtering service.
What should you do?
A. From the Microsoft 365 Defender portal, configure enhanced filtering for Connector.
B. Configure the MX record of contoso.com to point to contoso-com.mail.protection.outlook.com.
C. Configure Connector1 to authenticate incoming messages by using the IP address of the Filter1 service.
D. From the Exchange admin center, create a transport rule to rewrite the header for incoming messages.
Correct Answer: A
Explanation:
Using a third-party cloud service with Microsoft 365 or Office 365
Scenario - MX record points to third-party spam filtering
Important: Microsoft strongly recommends you to enable Enhanced Filtering for Connectors or bypass filtering completely using a mail flow rule. Failure to follow this will inevitably result in misclassification of inbound email to your organization
and to subpar experience of Office 365 email and protection features.
Note: Use the Microsoft 365 Defender portal to configure Enhanced Filtering for Connectors on an inbound connector
In the Microsoft 365 Defender portal, go to Email and Collaboration > Policies and Rules > Threat policies page > Rules section > Enhanced filtering.
On the Enhanced Filtering for Connectors page, select the inbound connector that you want to configure by clicking on the name.
Etc.
Incorrect:
Not D: Instead of bypassing spam filtering using a mail flow rule, we highly recommend that you enable Enhanced Filtering for Connector (also known as Skip Listing). Most third-party cloud anti-spam providers share IP addresses among
many customers. Bypassing scanning on these IPs might allow spoofed and phishing messages from these IP addresses.
You have a Microsoft Exchange Online tenant that contains a user named User1 and a shared mailbox named Project1.
You plan to delegate User1 permission to send email messages from Project1.
You need to ensure that the messages appear to come directly from Project1.
Which permission should you assign to User1?
A. Full Access
B. Contributor
C. Send As
D. Send on Behalf
Correct Answer: C
Explanation:
Which permissions should you use?
You can use the following permissions with a shared mailbox.
Send As: The Send As permission lets a user impersonate the shared mailbox when sending mail. For example, if Kweku logs into the shared mailbox Marketing Department and sends an email, it will look like the Marketing Department sent
the email.
Incorrect:
Full Access: The Full Access permission lets a user open the shared mailbox and act as the owner of that mailbox. After accessing the shared mailbox, a user can create calendar items; read, view, delete, and change email messages; create
tasks and calendar contacts. However, a user with Full Access permission can't send email from the shared mailbox unless they also have Send As or Send on Behalf permission.
Send on Behalf: The Send on Behalf permission lets a user send email on behalf of the shared mailbox. For example, if John logs into the shared mailbox Reception Building 32 and sends an email, it looks like the mail was sent by "John on
behalf of Reception Building 32". You can't use the EAC to grant Send on Behalf permissions, you must use Set-Mailbox cmdlet with the GrantSendonBehalf parameter.
You have a Microsoft Exchange Online tenant named contoso.com that uses Microsoft 365 Defender and contains a security group named Executives.
You perform the following tasks:
1.
Configure a Strict protection preset security policy and apply the policy to the Executives group.
2.
Create a Safe Attachments policy named Policy! and apply the policy to contoso.com.
You discover that Policy1 failed to apply to the Executives group.
You need to ensure that Policy1 is applied to all the members of the Executives group.
What should you do?
A. Increase the priority of Policy1.
B. Decrease the priority of Strict Preset Security Policy.
C. Remove the Executives group from the Strict protection preset security policy.
D. Modify the Strict protection preset security policy to match Policy! and assign the Strict protection preset security policy to contoso.com.
Correct Answer: C
Remove the Executives group from the Strict protection preset security policy1. Preset security policies are policies that provide a centralized location for applying all of the recommended spam, malware, and phishing policies to users at
once1. The policy settings are not configurable and are set by Microsoft based on best practices1.
There are two types of preset security policies: Standard protection and Strict protection1 . Standard protection is a baseline protection profile that's suitable for most users1. Strict protection is a more aggressive protection profile for selected
users who are high value targets or priority users1.
If you want to apply Policy1 to the Executives group, you need to remove them from the Strict protection preset security policy first. Otherwise, the preset security policy will take precedence over Policy1 and prevent it from being applied2. To
remove the Executives group from the Strict protection preset security policy, you can follow these steps2:
Login to the Microsoft Security portal at https://security.microsoft.com. On the left nav, under Email and collaboration, select Policies and rules.
Select Threat policies.
Select Preset Security Policies underneath the Templated policies heading Select Manage underneath the Strict protection preset. Select Specific recipients and remove the Executives group from the list of recipients.
Select Save.
Question 209:
You have a Microsoft Exchange Online tenant.
You plan to implement an on-premises alarm system that will send email alerts by using SMTP. The alarm system will NOT support TLS.
You need to ensure that the alarm system can send the alerts to both internal and external recipients by using Exchange Online.
Which two actions should you perform? Each correct answer presents part of the solution.
NOTE: Each correct answer is worth one point.
A. Configure SMTP AUTH client submission.
B. Configure the alarm system settings to use a TXT record of the tenant.
C. Create a connector.
D. Configure the alarm system settings to use an MX record of the tenant.
E. Configure direct send.
Correct Answer: CE
C. Create a connector1. A connector is a configuration setting that controls how email messages are delivered to or received from your own email servers or a partner organization1. You need to create a connector to route mail between Exchange Online and your on-premises alarm system that uses SMTP1. You can specify the IP address of your alarm system as a trusted sender and configure the connector to use certificate-based authentication or IP address-based authentication1.
E. Configure direct send2. Direct send is an option that allows you to send mail directly from your printer or application to Microsoft 365 or Office 365 without using a local email server2. You need to configure direct send on your alarm system settings to use an MX record of the tenant as the SMTP server address2. For example, contoso-com.mail.protection.outlook.com2. Direct send does not require TLS encryption or SMTP authentication2.
Question 210:
You have a Microsoft Exchange Online tenant.
Users report that legitimate email messages are delivered to their Junk Email folder.
You plan to use the Microsoft Remote Connectivity Analyzer to identify the cause of the issue.
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only Microsoft exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your MS-203 exam preparations and Microsoft certification application, do not hesitate to visit our Vcedump.com to find your solutions here.