MS Exchange Server Page1

MS Exchange Interview Questions

1.What must be done to an AD forest before Exchange can be deployed? 

-Setup.exe /forestprep 

2.What Exchange process is responsible for communication with AD? 

-DSACCESS

3.What 3 types of domain controller does Exchange access? 

-Normal Domain Controller, Global Catalog, Configuration Domain Controller

4.What connector type would you use to connect to the Internet, and what are the two methods of sending mail over that connector? 

SMTP Connector: Forward to smart host or use DNS to route to each address

5.How would you optimise Exchange 2003 memory usage on a Windows Server 2003 server with mre than 1Gb of memory? 

Add /3Gb switch to boot.ini

6.Name the process names for the following:

System Attendant? MAD.EXE, Information Store – STORE.EXE, SMTP/POP/IMAP/OWA – INETINFO.EXE

7.What is the maximum amount of databases that can be hosted on Exchange 2003 Enterprise? 

-20 databases. 4 SGs x 5 DBs.

8.What are the standard port numbers for SMTP, POP3, IMAP4, RPC, LDAP and Global Catalog? 


-25SMTP

-110 POP3

-143IMAP4

-135RPC

-389LDAP 

-636LDAP (SSL), 

-3268Global Catalog 

-465 SMTP/SSL,

-993IMAP4/SSL, 

-563IMAP4/SSL, 

-53DNS ,

-80 HTTP ,

-88Kerberos ,

-102 X.400 ,

-110 POP3 ,

-119 NNTP , 

-137 - NetBIOS Session Service 

-139 - NetBIOS Name Service , 

-379 LDAP (SRS) ,

-443HTTP (SSL) ,

-445 - NetBIOS over TCP 

-563 NNTP (SSL) , 

-691 LSA ,-993 IMAP4 (SSL) ,

-994 IRC (SSL) ,

-995 POP3 (SSL) ,

-1503 T.120 ,

-1720 H.323 ,

-1731 Audio conferencing ,

-1863 - MSN IM

-3268 GC ,

-3269 GC (SSL) ,

-6001 Rpc/HTTP Exchange Store ,

-6002 HTTP Exchange Directory Referral service ,

-6004 Rpc/HTTP NSPI Exchange Directory Proxy service/Global Catalog ,

-6667 IRC/IRCX ,

-6891 - 6900 - MSN IM File transfer ,

-6901 - MSN IM Voice ,

-7801 - 7825 - MSN IM Voice[/b]


9.What are the prequisite for installation of Exchange Server

The pre requsite are

IIS, SMTP, WWW service ,NNTP, W3SVC

NET Framework
ASP.NET
Then run Forestprep
The run domainprep

10.Which protocol is used for Public Folder ? ANS: SMTP

11.What is the use of NNTP with exchange ?

-ANS: This protocol is used the news group in exchange

12.Disaster Recovery Plan? 

Ans: Deals with the restoration of computer system with all attendent software and connections to full functionality under a variety of damaging or interfering external condtions.

13.About the new features in Exchange 2003:

1.Updated Outlook Web Access.

2.Updated VSAPI (Virus Scanning Application Programming Interface)

but in Exchange Server 2003 Enterprise, there are Specific Features which :

3.Eight-node Clustering using the Windows Clustering service in Windows Server (Ent.&Datacenter)

4.Multiple storage groups.

5..X.400 connectors which supports both TCP/IP and X.25.

14.What would a rise in remote queue length generally indicate?

-This means mail is not being sent to other servers. This can be explained by outages or performance issues with the network or remote servers.

15.What would a rise in the Local Delivery queue generally mean?

This indicates a performance issue or outage on the local server. Reasons could be slowness in consulting AD, slowness in handing messages off to local delivery or SMTP delivery. It could also be databases being dismounted or a lack of disk space.

16.What are the disadvantages of circular logging?

In the event of a corrupt database, data can only be restored to the last backup.

17.What is the maximum storage capacity for Exchange standard version? What would you do if it reaches maximum capacity?”

16GB.Once the store dismounts at the 16GB limit the only way to mount it again is to use the 17GB registry setting. And even this is a temporary solution.
if you apply Exchange 2003 SP2 to your Standard Edition server, the database size limit is initially increased to 18GB. Whilst you can go on to change this figure to a value up to 75GB, it’s important to note that 18GB is the default setting
HKLM\System\CurrentControlSet\Services\MSExchangeIS\{server name}\Private-{GUID
It therefore follows that for registry settings that relate to making changes on a public store, you’ll need to work in the following registry key:
HKLM\System\CurrentControlSet\Services\MSExchangeIS\{server name}\Public-{GUID}

Under the relevant database, create the following registry information:
Value type: REG_DWORD
Value name: Database Size Limit in GB
Set the value data to be the maximum size in gigabytes that the database is allowed to grow to. For the Standard Edition of Exchange, you can enter numbers between 1 and 75. For the Enterprise Edition, you can enter numbers between 1 and 8000. Yes, that’s right, between 1GB and 8000GB or 8TB. Therefore, even if you are running the Enterprise Edition of Exchange, you can still enforce overall database size limits of, say, 150GB if you so desire.

Exchange 2000 Server Question

18.You are the Exchange Administrator for your company. A hard disk on one of the Exchange 2000Server computers fails. The failed hard disk contained the Exchange 2000 System files. The hard disk that contained the transaction log files and exchange databases was not affected by the failure. You replace the failed hard disk. You need to bring the server online, but the only available does not include the system files.

What should you do?

A.Reinstall Exchange 2000 Server by running setup/DomainPrep on the server.

B.Reinstall Exchange 2000 Server by running setup/DisasterRecovery on the server.

C.Perform a normal installation of Exchange 2000 Server on the server. Create a new database that uses the same database names and paths as the original installation.

D.Perform a normal installation of Exchange 2000 Server on the server. Create a storage group that uses the same database names and paths as the original installation.

19.You are the Exchange Administrator for your company. You configure an Exchange 2000 Server computer as a recovery server for single mailbox recovery. You restore the database files from your production exchange server’s online backup to recovery server. You specify the correct names and paths of the databases, but you are not able to mount the databases.

What should you do?

A.Run ISINTEG-patch and then mount the databases.

B.Change the transaction log file path to match the transaction log file path of the original server.

C.In system manager, select the This database can be overwritten by a restore check box, and then mount the databases.

D.Enable circular logging on the storage group, and then restart the information store service.

20.You are the Exchange Administrator for your company. A power failure causes one of the Exchange 2000 Server computers shut down abruptly. You restore power to the exchange server, but the hard disk that contains the transaction log files was damaged. You replace the failed hard disk, but its contents are unrecoverable. When you restart the server, the mailbox store will not mount. You examine the header of the database, and find it to be in an inconsistent state. You back up the exchange database files to a safe location, and now you need to bring the mailbox store online with most current data possible.

Which two actions should you take before mounting the database? (Each correct answer presents part of the solution. Choose two)

A.Run ESEUTIL/R on the database.

B.Run ESEUTIL/P on the database.

C.Run ESEUTIL/G on the database.

D.Run ISINTEG-patch in the MDBData folder.

E.Run ISINTEG-fix on the database.

21.You are the Exchange Administrator for your company. The only domain controller on your Windows 2000 network is named as server 1. The only Exchange 2000 Server computer on the network is named server 2. Server 1 fails, and you do not have a backup of the server. You reinstall the domain controller and create a new forest. You need to allow the users in this new forest to access the exchange mailboxes on server2.

What should you do?

A.Run setup/DisasterRecovery on server 2, and then run the mailbox clean up agent on the mailboxes.

B.Perform a normal reinstallation of Exchange 2000 Server on Server 2. Configure the new installation to use your original database files, and then reconnect the mailboxes to the new user accounts.

C.Join server 2 to the new domain created by server 1, and then run the mailbox cleanup agent on the mailboxes.

D.Run EXMERGE against the exchange databases, and save the output to a file. Run setup/DomainPrep on server2, and then import the EXMERGE data files exchange.

22.You are the administrator of an exchange organization that has the Exchange 2000 Server computers.Each server supports 1,500 mailboxes. Some users are using Microsoft outlook 2000, and some are using outlook web access. Recently, you enabled SSL for the default web site on all servers and now require all outlook web access users to connect by using secure HTTP. Users report that all the servers are much slower than they were before you enabled SSL. You must keep additional level of security provided by SSL, but you need to improve server responsiveness.

What should you do?

A.Install an additional Exchange 2000 Server computer to support the secure HTTP users, and configure it as a front-end server.

B.Remove SSL and implement TLS on the SMTP and IMAP4 virtual servers.

C.Install two additional Exchange 2000 Server computers, and move the outlook web access users to the new server.

D.Specify digest authentication on the default web site, and disable integrated Windows authentication.

E.Enable Windows 2000 IPSec for the network adapter that supports SQL.

23.You are the Exchange Administrator for your company. The public folders in your organization contain more than 10,000 documents. You want to make it easier and faster for users to find specific documents.

What should you do?

A.Configure a public folder store policy, and add the public folder store to the policy.

B.Configure a public folder store policy, and create a full-text index on the public folder store.

C.Configure a public folder store policy, and set the replication for the public folder store policy to always run.

D.Create a new public folder tree, configure a public folder store policy in this tree, and then create a fulltext index for the public folder store.

24.You are the exchange administrator for your company. You have a mail box store policy for mailbox storage limits in effect for your entire exchange organization. The policy is shown in the exhibit. You add a new exchange 2000 server computer. After the server runs for a few weeks, you notice that several mailboxes are considerably over the limits that are. You need to configure the server to enforce the limits that you set.

What should you do?

A.Configure a new mailbox store policy for the new server.

B.Configure a new server policy and add the new server to this policy.

C.Set storage limits on the existing mailbox store on the new server.

D.Add the default mailbox store on the new server to the mailbox store policy.

25.You are the exchange administrator of your company. Your network is configured as shown in the exhibit. Click the exhibit button. All of your employees connect to your exchange 2000 server computers by using the Microsoft outlook 2000 or outlook express while in office and outlook web access outside the office. You examine the exchange 2000 log files and notice that unknown users on the internet are using your exchange 2000 express server computers to relay SMTP messages to users outside of your company. You need to prevent unauthorized use of your SMTP server while still allowing all of your users to connect to your exchange servers whether the users are in the office or out of the office. In addition, users must still be able to exchange internet e-mail messages with anyone.

What should you do?

A.Create a rule on the firewall to allow only the computers on the LAN to access IP addresses

192.169.1.0/24 by using port 25, port 80 and port 110.

B. Create a rule on the firewall to allow only the computers on the perimeter network to access IP address 192.168.1.0/24 by using the port 25, port 80 and port 110.

C. Configure the SMTP virtual servers to accept SMTP connections from only IP address

192.168.1.0/24 and 92.168.2.0/24.

D. Configure the SMTP virtual servers to accept connections from anyone and to allow relaying for only IP addresses 192.168.1.0/24.

26.You are the Exchange Administrator for an international company. You have Exchange 2000 Server computers located in 15 countries worldwide. You create a routing group for each country and a routing group connector between each country and the routing group for your main office. The networks in three of these countries are configured with 56-Kbps connections to your WAN. The networks in the other 12 countries have faster connections. You select several public folders and configure them to replicate to the Exchange servers in each of these three countries. You need to configure the public fold replication to occur during non-business hours during those three countries. You also need to prevent the users in these three countries from accessing public folders that have not been replicated to the Exchange servers located in their country.

What should you do?

A.Configure the replication interval for the selected public folders to always run. Configure the connection time for the routing group connectors for each of the three countries and the main office to occur at midnight.

B.Configure the replication interval for the selected public folders to run at midnight. Configure the routing group connector for each of three countries to disallow public folder referrals.

C.Configure the replication interval for the selected public folder to run at midnight. Configure the routing group connector for the main office to disallow public folder referrals.

D.Configure the connection time for the routing group connectors for each of the three countries and the main office to occur at mid night. Set the routing group connector cost to 1.

E.Configure the connection time for the routing group connectors for each of the three countries and the main office to occur at mid night. Set the routing group connector cost to 100.

27.You are the network administrator for Contoso Ltd. The company hires a consultant named Amy Jones from Litware Inc. Amy requires access to your network. She prefers to receive all of her e-mail at her ajones@litware.com address. You want Amy’s name to appear in the exchange address book, but you want e-mail messages to be sent only at her litware.com address.

What should you do?

A.Create a user account that has an exchange mailbox in active directory. Change the SMTP address on the e-mail address tab to the user property sheet to the ajones@litware.com .

B.Create an e-mail enabled contact object for Amy Jones and specify the SMTP addressajones@litware.com as the e-mail address in active directory.

C.C. Create a user account that does not have an exchange mailbox in active directory. Use exchange task wizard to assign an SMTP address for ajones@litware.com

D.D. Create a user account that does not have an exchange mailbox in active directory. Enter ajones@litware.com as the e-mail address on the General tab of the user property sheet.

28.You are the administrator of seven Exchange 2000 server computers. Each server supports 1,800 mailboxes. Each server’s mailboxes are distributed among five mailbox stores that are located in two storage groups. All mailbox store settings are configured at the default values. Tape backups on all servers occur between 4 A.M and 7 A.M. Users on the night shift report that sending and operating messages often takes several seconds between 1 A.M and 2:30 A.M. Response times are acceptable at other times. You need to improve the response times between 1 A.M and 2:30 A.M.

What should you do?

A.Configure full-text indexing to use a lower amount of system resources.

B.Schedule the tape backups to back up each of the mailbox stores at different times across a wider period of time.

C.Configure the warning interval of each of the mailbox stores so that warnings run on a custom schedule.

D.Configure the maintenance interval of each of the mailboxes stores so that maintenance is staggered across a wider period of time.

29.You are the exchange administrator of Miller textiles. Eric, the manager of human resources wants potential job candidates to send their resumes to jobs@millertextiles.com. Eric wants to prevent employees in other departments from being able to view these messages. Eric creates a Microsoft outlook public folder named job inquires. You need to configure the job inquiries folder to accept e-mail messages from job candidates.

Which two actions should you take? (each correct answer presents part of the solution. Choose two)

A.Enable anonymous access for the job inquiries folder.

B.Change the name of the job inquiries folder in the address list to jobs@millertextiles.com

C.Change the SMTP address of the job inquiries folder to jobs@millertextiles.com

D.Make the job inquiries folder visible in the address list.

E.Change the permissions role for the default user to contributor.

30.You are the Exchange Administrator for your company. You recently implemented instant messaging. Some users report that they are unable to logon to the instant messaging server. You verify that you can log on to the server and communicate with other users on the network. You need to configure your network to allow all users to log on to the instant messaging server.

What should you do?

A.Use system manager to change the permissions on the instant messaging protocol. Grant the Everyone group read permission.

B.Use system manager to change the permissions on the instant messaging protocol. Grant the user who are unable to log on the execute permission.

C.Use the Active Directory users and computers console to select the users who are unable to log on. Run Exchange task wizard and enable instant messaging.

D. Use the Active Directory users and computers console to select the users who are unable to log on. Change the protocol settings for these users.

31.You are the Exchange Administrator for your company. Your Exchange 2000 Server computer has a single storage group that contains three mailbox stores and one public folder store. You perform nightly backups, altering between a normal backup of two of the mailbox stores on one night and a normal backup of the other mailbox store and public folder store the following night. You notice hat the transaction log files are not being purged, and they are now consuming nearly all the available disk space. You need to continue to perform alternating nightly backups of the mailbox stores and the public folder store, but you must make sure that the transaction log files are not taking up too much of hard disk space.

What should you do?

A.Configure the storage group to disable circular logging.

B.Install a new physical disk and move the transaction log files to the new disk.

C.Perform a nightly incremental backup of the entire storage group in addition to the current backups.

D.Perform differential backups of the mailbox stores and the public folder store instead of normal backups.

32.You are the Exchange Administrator for your company. You are configuring your Exchange 2000 Server computer to support a disaster recovery plan. The server has three hard disks, Disk0, disk1, and disk2. The system files are stored on disk 1. Currently, disk1 and disk2 are not in use. You perform nightly online backups of the exchange databases.You must configure the server to minimize the loss of data if one of the hard disks fails.

What should you do?

A.Place the log files on disk 1. Place the .edb and .stm files on disk 2. Enable circular logging on the exchange server.

B.Place the log files on disk 1. Place the .edb files on disk 2. Enable circular logging on the exchange server.

C.Place the log files on disk 1. Place the .edb and .stm files on disk 2. Disable circular logging on the exchange server.

D.Place the log files on disk 1. Place the .stm files on disk 2. Disable circular logging on the exchange server.