Enable or disable message tracking

Assignment Help Basic Computer Science
Reference no: EM133985120

Questions

1. You are responsible for configuring a shared SMTP domain namespace due to a recent mergers and acquisitions between your organization and another company. Your organization is running Exchange Server, while the other company runs a third-party email system. You asked your Internet DNS provider to add the MX records with the new shared SMTP domain. However, users in both organizations started to complain that they are not receiving emails when it is sent with the new SMTP domain suffix in their email address.

Which two steps should you perform to resolve the issue? (Select 2)
a. Create an Internal Relay Accepted Domain with the new shared SMTP domain namespace.

b. Create a new Active Directory domain for the company that merged with your organization.

c. Create a send connector that will route the messages to the shared SMTP domain.

d. Install a new Exchange Server for the company that merged with your organization.

2. You manage an Exchange Server organization. You need to add the DNS records so that email from the Internet is properly routed to your organization. Which record type should you add to your DNS to support email to your custom domain?

a. MX

b. CNAME

c. TXT

d. SPF

3. You are an administrator of an Exchange Server organization. An employee has complained that a message sent to a colleague never arrived. You are responsible for troubleshooting this transport issue. You need to determine the following requirements:

- What happened to the message that a user sent to a specific recipient?

- Whether a transport rule acted on the message.

- Find all messages that this specific user sent during a specified time.

Which type of logging solution will you use?

a. Message Tracking Log

b. Protocol Log

c. Telnet

d. Application Log

4. You are migrating your messaging solution from Exchange 2013 to Exchange 2019. Before the migration, network devices were configured to send notification emails through Exchange 2013. After the migration was completed, you noticed that mailboxes that used to receive email from those applications and devices no longer receive email.

What will you do to troubleshoot the problem?

a. Enable protocol logging on the receive connector on Exchange 2019 where the application connects.

b. Restart the applications and devices and try to force sending an email to Exchange Server 2019.

c. In the file location where the receive connector stores protocol logs, open the log file with the file name format RECVyyyymmdd-nnnn.log and analyze the data recorded.

d. Configure authentication options on the Exchange 2019 receive connectors to accept email from third-party applications and devices.

e. Restart the network switch where Exchange 2019 is connected.

f. Restart Exchange Server.

5. Your colleagues complain that they cannot send emails to a domain of a partner company named Contoso. You need to troubleshoot this problem since Contoso is a strategic partner and communication with them is very important for your organization. Email communication between other companies works normally.

Which tools should you use to troubleshoot this email delivery issue?

a. Queue Viewer

b. Partner Send and Receive Connectors

c. Telnet

d. Active Directory Users and Computers console

6. You are an Exchange administrator for your organization. After the upgrade of Exchange 2013 to Exchange 2019, you have decommissioned all Exchange 2013 servers. After the uninstall process has been completed, organization employees complained they are no longer receiving emails from the Internet. You run the Exchange Remote Connectivity Analyzer and you notice that there are DNS records for your organization. You notice that the IP addresses listed in the DNS was used by Exchange 2013 but not by Exchange 2019. You need to provide your DNS provider with information as to what records should be updated for your Exchange 2019 organization.

Which records should your DNS provider update so that email connectivity can be re-established in your organization?

a. MX record

b. A Record

c. SRV record

d. PTR record

e. CNAME record

7. You are an administrator for an Exchange organization. You need to send and receive secure emails with a partner organization. Therefore, you have configured mutual TLS, where each server verifies the identity of the other server by validating the certificate that the other server provides. However, users in your organization report that they cannot send emails to the partner organization. They also report that they can send email on any other domain to the Internet. What troubleshooting steps will you perform?

a. Check if the name of the servers is correctly configured in Domain Security settings to match the common name in the certificate used for TLS.

b. Check if the certificate issued to the Mailbox servers in Domain Security configuration is trusted.

c. Check whether the firewall in your organization is blocking mail sent to the Internet.

d. Run the essential utility.

8. Each Exchange Server maintains its own set of message-tracking logs that are retained by default for how many days?

a. 30 days

b. 60 days

c. 90 days

d. 120 days

9. What tool can you use to enable or disable message tracking and specify the location of the message tracking log files?

a. Front-End Transport services

b. Extensible Storage Engine

c. Remote Connectivity Analyzer

d. Message Transport services

e. Exchange Admin Center

Reference no: EM133985120

Questions Cloud

What are the thing you can take away from and the motivation : What are the things you can take away from and the motivation from the verse : Galatians chapter 1, verse 10: Am I now trying to win the approval of human being
Explain what it means to explain the interpretive outcomes : Explain what it means to explain the interpretive outcomes of the citing context in Isaiah 6:9-10 in the way in which it interprets Deuteronomy 29:2-4.
In what ways can isaiah be interpreted by the statement : In what ways can Isaiah 6:9-10 be interpreted by the statement this day the Lord has not given you a mind that understands or eyes that see or hears that hear?
What are some limitations : What are some limitations? Support your position with examples from case law, the U.S. Constitution, or other readings.
Enable or disable message tracking : What tool can you use to enable or disable message tracking and specify the location of the message tracking log files?
What does the lds church/ morrmonism claim to make distinct : What does the lds church/ morrmonism claim to make distinct feom christins churches. Is it original copies of the bible, ezerciee divine judgment over evil?
Develop guidelines for how dignity should be upheld : Develop guidelines for how dignity should be upheld in various contexts, such as healthcare, education, and social services.
What is the significance of gods punishment : God is the Creator, he is the authority. Why does he make eating from the tree forbidden? What is the significance of God's punishment?
Major types of active directory service accounts : There are three major types of Active Directory service accounts. Accounts that are assigned to end users, accounts created to provide a security context

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Identifies the cost of computer

identifies the cost of computer components to configure a computer system (including all peripheral devices where needed) for use in one of the following four situations:

  Input devices

Compare how the gestures data is generated and represented for interpretation in each of the following input devices. In your comparison, consider the data formats (radio waves, electrical signal, sound, etc.), device drivers, operating systems suppo..

  Cores on computer systems

Assignment : Cores on Computer Systems:  Differentiate between multiprocessor systems and many-core systems in terms of power efficiency, cost benefit analysis, instructions processing efficiency, and packaging form factors.

  Prepare an annual budget in an excel spreadsheet

Prepare working solutions in Excel that will manage the annual budget

  Write a research paper in relation to a software design

Research paper in relation to a Software Design related topic

  Describe the forest, domain, ou, and trust configuration

Describe the forest, domain, OU, and trust configuration for Bluesky. Include a chart or diagram of the current configuration. Currently Bluesky has a single domain and default OU structure.

  Construct a truth table for the boolean expression

Construct a truth table for the Boolean expressions ABC + A'B'C' ABC + AB'C' + A'B'C' A(BC' + B'C)

  Evaluate the cost of materials

Evaluate the cost of materials

  The marie simulator

Depending on how comfortable you are with using the MARIE simulator after reading

  What is the main advantage of using master pages

What is the main advantage of using master pages. Explain the purpose and advantage of using styles.

  Describe the three fundamental models of distributed systems

Explain the two approaches to packet delivery by the network layer in Distributed Systems. Describe the three fundamental models of Distributed Systems

  Distinguish between caching and buffering

Distinguish between caching and buffering The failure model defines the ways in which failure may occur in order to provide an understanding of the effects of failure. Give one type of failure with a brief description of the failure

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd