Black Friday Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: cramtick70

MS-203 Microsoft 365 Messaging Questions and Answers

Questions 4

Your company has three departments name Dept1, Dept2. and Dept3 and a Microsoft Exchange Online tenant.

You need to increase security for the email messages sent from the departments. The solution must meet the following requirements:

« Users in Dept1 must be able to digitally sign and encrypt email messages as required.

+ Email messages sent from Dept2 to an external email domain must be encrypted automatically during transit only.

« Email messages sent from Dept3 to an external email domain must be encrypted until the recipient opens the message.

« Implementation costs must be minimized.

‘Which type of encryption should you use for each department? To answer, drag the appropriate encryption types to the correct departments. Each encryption type may be used

Options:

Buy Now
Questions 5

You have a hybrid deployment between a Microsoft Exchange Online tenant and an on-premises Exchange Server 2019 organization.

You plan to block legacy authentication for the on-premises Exchange organization.

You need to validate the configuration on 10 test users, and then apply the configuration to all users.

Which three cmdlets should you run in sequence? To answer, move the appropriate cmdlets from the list of cmdlets to the answer area and arrange them in the correct order.

Options:

Buy Now
Questions 6

You have Microsoft Exchange Online tenant that uses Microsoft Defender for Office 365.

You have the policies shown in the following table.

You need to track any modifications made to Policy1 by the identifying following:

• The name of the user that modified the policy

• The old and new values settings modified in Policy1

• How the modifications compare to the baseline settings of Standard Preset Security Policy

Whet should you use in the Microsoft 365 Defender portal?

Options:

A.

Audit

B.

Configuration analyzer

C.

Threat tracker

D.

Threat analytics

Buy Now
Questions 7

You use an IMAP-based email system.

You purchase a Microsoft 365 subscription.

In Exchange Online, you create mailboxes for all users.

You need to migrate all the email accounts of all the users to Exchange Online.

Which three components should you create? Each correct answer presents part of the solution.

NOTE: Each correct selection is worth one point.

Options:

A.

a migration batch

B.

a CSV migration file

C.

an inbound connector

D.

an accepted domain

E.

a remote domain

F.

a migration endpoint

Buy Now
Questions 8

You need to configure the environment to support the planned changes for email addresses.

How should you complete the command? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Options:

Buy Now
Questions 9

Please wait while the virtual machine loads. Once loaded, you may proceed to the lab section. This may take a few minutes, and the wait time will not be deducted from your overall test time.

When the Next button is available, click it to access the lab section. In this section, you will perform a set of tasks in a live environment. While most functionality will be available to you as it would be in a live environment, some functionality (e.g., copy and paste, ability to navigate to external websites) will not be possible by design.

Scoring is based on the outcome of performing the tasks stated in the lab. In other words, it doesn't matter how you accomplish the task, if you successfully perform it, you will earn credit for that task.

Labs are not timed separately, and this exam may have more than one lab that you must complete. You can use as much time as you would like to complete each lab. But, you should manage your time appropriately to ensure that you are able to complete the lab(s) and all other sections of the exam in the time provided.

Please note that once you submit your work by clicking the Next button within a lab, you will NOT be able to return to the lab.

Use the following login credentials as needed:

To enter your username, place your cursor in the Sign in box and click on the username below.

To enter your password, place your cursor in the Enter password box and click on the password below.

Microsoft 365 Username: admin@abc.com

Microsoft 365 Password: xxxxxx

If the Microsoft 365 portal does not load successfully in the browser, press CTRL-K to reload the portal in a new browser tab.

The following information is for technical support purposes only.

Lab Instance: XXXXXX

You need to prevent email messages that contain attachments that have the .js file extension from being delivered to any recipients in your organization.

To complete this task, sign in to the Microsoft 365 admin center.

Options:

Buy Now
Questions 10

You have a Microsoft Exchange Online subscription.

You need to prevent all Android devices from using Exchange ActiveSync to sync email. Other devices must

be allowed to sync email by using Exchange ActiveSync.

What should you use?

Options:

A.

data loss prevention (DLP) policies

B.

Exchange ActiveSync access settings

C.

device access rules

D.

mobile device mailbox policies

Buy Now
Questions 11

You have a Microsoft Exchange Online tenant.

Users report that legitimate email messages are delivered to their Junk Email folder.

You plan to use the Microsoft Remote Connectivity Analyzer to identify the cause of the issue.

Which test should you run?

Options:

A.

Outlook Connectivity

B.

Inbound SMTP Email

C.

Outbound SMTP Email

D.

Message Analyzer

Buy Now
Questions 12

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.

Your company has an Exchange Online tenant that contains 2,000 mailboxes.

A partner company named Fabrikam, Inc. uses a third-party messaging solution. The outbound SMTP server for Fabrikam uses an IP address of 131.107.2.22.

You discover that several email messages from the fabrikam.com domain are erroneously marked as spam.

You need to ensure that all the email messages sent from the fabrikam.com domain are delivered successfully to the user mailboxes of your company.

Solution: You create a remote domain.

Does this meet the goal?

Options:

A.

Yes

B.

No

Buy Now
Questions 13

You have a Microsoft Exchange Server 2019 organization that uses a namespace of contoso.com.

Email address policies for contoso.com are configured as shown in the Address Policies exhibit.

The Marketing email address policy is shown in the Marketing Policy exhibit.

The Sales email address policy is shown in the Sales Policy exhibit.

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Options:

Buy Now
Questions 14

You have a Microsoft Exchange Online tenant that contains a user named User1.

User1 has a retention policy to delete Inbox messages after 30 days.

User1 is going on extended leave and requires that the Inbox messages be retained during the user’s absence.

You need to temporarily suspend the processing of the Inbox messages for User1.

How should you complete the command? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Options:

Buy Now
Questions 15

You have a Microsoft Exchange Online tenant that contains a public folder named CustomerSupport. You need to access CustomerSupport by using Outlook on the web. Which section in Outlook on the web should you add CustomerSupport?

Options:

A.

Favorites

B.

Folders

C.

Groups

Buy Now
Questions 16

You have a Microsoft Exchange Online tenant.

Two users named User1 and User2 have left the company and have inactive mailboxes.

Two new employees named User3 and User4 are hired and must meet the following requirements:

• User3 has the same job role as User1 and requires access to all the items in the User1 mailbox.

• User4 was hired to replace User2 and requires access to the User2 mailbox.

You need to recommend a solution fw User3 and User4 to access the inactive mailboxes. The solution must minimize administrative effort.

What should you recommend for each user? To answer, drag the appropriate solutions to the correct users. Each solution may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.

Options:

Buy Now
Questions 17

You have a Microsoft 365 subscription that contains two users named User1 and User2.

User1 reports to have received a suspicious email message that appears to have come from User2.

You identify that the message was sent by an external user impersonating User2.

You need to block email that contains the email address of an impersonated sender.

What should you configure?

Options:

A.

an anti-phishing policy

B.

a Tenant Allow/Block Lists rule

C.

an anti-spam policy

D.

an Enhanced filtering rule

Buy Now
Questions 18

You have a Microsoft Exchange Online tenant that uses Microsoft Defender for Office 365. You have the policies shown in the following table.

You need to track any modifications made to Policy! by the identifying following:

• The name of the user that modified the policy

• The old and new values of settings modified in Policy!

• How the modifications compare to the baseline settings of Standard Preset Security Policy

What should you use in the Microsoft 365 Defender portal?

Options:

A.

Threat tracker

B.

Threat analytics

C.

Audit

D.

Configuration analyzer

Buy Now
Questions 19

You have a Microsoft Exchange Online tenant.

You plan to implement an on-premises alarm system that will send email alerts by using SMTP. The alarm system will NOT support TLS.

You need to ensure that the alarm system can send the alerts to both internal and external recipients by using Exchange Online.

‘Which two actions should you perform? Each correct answer presents part of the solution.

NOTE: Each correct answer is worth one point.

Options:

A.

Configure SMTP AUTH client submission.

B.

Configure the alarm system settings to use a TXT record of the tenant.

C.

Create a connector.

D.

Configure the alarm system settings to use an MX record of the tenant.

E.

Configure direct send.

Buy Now
Questions 20

You have a Microsoft Exchange Server 2019 hybrid deployment.

You use Advanced Threat Protection (ATP).

You have safe attachments policies configured as shown in the following table.

You have the users shown in the following table.

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Options:

Buy Now
Questions 21

You have a Microsoft Exchange Online tenant that contains 1,000 users.

You need to prevent 100 users in the finance department at your company from using Direct file access when using Outlook on the web. The solution must ensure that all the other users in the company can continue to use Direct file access when using Outlook on the web.

What should you do?

Options:

A.

Modify the default sharing policy.

B.

Create and assign an Outlook Web App policy.

C.

Create and assign a sharing policy.

D.

Modify the default Outlook Web App policy.

Buy Now
Questions 22

Please wait while the virtual machine loads. Once loaded, you may proceed to the lab section. This may take a few minutes, and the wait time will not be deducted from your overall test time.

When the Next button is available, click it to access the lab section. In this section, you will perform a set of tasks in a live environment. While most functionality will be available to you as it would be in a live environment, some functionality (e.g., copy and paste, ability to navigate to external websites) will not be possible by design.

Scoring is based on the outcome of performing the tasks stated in the lab. In other words, it doesn't matter how you accomplish the task, if you successfully perform it, you will earn credit for that task.

Labs are not timed separately, and this exam may have more than one lab that you must complete. You can use as much time as you would like to complete each lab. But, you should manage your time appropriately to ensure that you are able to complete the lab(s) and all other sections of the exam in the time provided.

Please note that once you submit your work by clicking the Next button within a lab, you will NOT be able to return to the lab.

Use the following login credentials as needed:

To enter your username, place your cursor in the Sign in box and click on the username below.

To enter your password, place your cursor in the Enter password box and click on the password below.

Microsoft 365 Username: admin@abc.com

Microsoft 365 Password: xxxxxx

If the Microsoft 365 portal does not load successfully in the browser, press CTRL-K to reload the portal in a new browser tab.

The following information is for technical support purposes only.

Lab Instance: XXXXXX

You need to prevent users in your company from sending out-of-office replies to users who use an email address suffix of @contoso.com. The solution must NOT use mail flow rules.

To complete this task, sign in to the Exchange admin center.

Options:

Buy Now
Questions 23

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.

Your company has a Microsoft Exchange Server 2019 hybrid deployment that contains two Mailbox servers named MBX1 and MBX2.

The company has the departments shown in the following table.

From the on-premises organization, outbound email is sent directly to the Internet by using DNS lookups.

You are informed that some sales department users send email messages that are identified as spam.

You need to automatically block the sales department users from repeatedly sending spam.

Solution: You run the Install-AntispamAgents.psl PowerShell script on the MBX1 Mailbox server.

Does this meet the goal?

Options:

A.

yes

B.

No

Buy Now
Questions 24

Please wait while the virtual machine loads. Once loaded, you may proceed to the lab section. This may take a few minutes, and the wait time will not be deducted from your overall test time.

When the Next button is available, click it to access the lab section. In this section, you will perform a set of tasks in a live environment. While most functionality will be available to you as it would be in a live environment, some functionality (e.g., copy and paste, ability to navigate to external websites) will not be possible by design.

Scoring is based on the outcome of performing the tasks stated in the lab. In other words, it doesn't matter how you accomplish the task, if you successfully perform it, you will earn credit for that task.

Labs are not timed separately, and this exam may have more than one lab that you must complete. You can use as much time as you would like to complete each lab. But, you should manage your time appropriately to ensure that you are able to complete the lab(s) and all other sections of the exam in the time provided.

Please note that once you submit your work by clicking the Next button within a lab, you will NOT be able to return to the lab.

Use the following login credentials as needed:

To enter your username, place your cursor in the Sign in box and click on the username below.

To enter your password, place your cursor in the Enter password box and click on the password below.

Microsoft 365 Username: admin@abc.com

Microsoft 365 Password: xxxxxx

If the Microsoft 365 portal does not load successfully in the browser, press CTRL-K to reload the portal in a new browser tab.

The following information is for technical support purposes only.

Lab Instance: XXXXXX

You need to ensure that all email messages in the mailbox of a user named Pradeep Gupta are retained for 90 days.

To complete this task, sign in to the Microsoft 365 admin center.

Options:

Buy Now
Questions 25

NO: 27

Your network contains an Active Directory domain named corp.contoso.com. The domain contains client computers that have Microsoft Office 36S Apps installed. You have a hybrid deployment that contains a Microsoft Exchange Online tenant and an on-premises Exchange Server 2019 server named Server1. All recipients use an email address suffix of Contoso.com.

You migrate all the Exchange Server recipients to Exchange Online, and then decommission Server1.

Users connected to the internal network report that they receive an Autodiscover error when they open Microsoft Outlook.

You need to ensure that all users can connect successfully to their mailbox by using Outlook.

Which two actions should you perform? Each correct answer presents a complete solution.

NOTE: Each correct selection is worth one point.

Options:

A.

From the corp.contoso.com DNS zone, modify the Autodiscover host (A) record.

B.

Add an accepted domain.

C.

From the contoso.com DNS zone, modify the Autodiscover alias (CNAME) record

D.

Modify the name of the TLS certificate.

E.

From the domain, modify the Autodiscover service connection point (SCP).

Buy Now
Questions 26

You have a Microsoft Exchange Online tenant that contains two groups named Group1 and Group2. You need to configure threat policies to meet the following requirements:

• URLs in email messages sent to Group1 must be scanned before the user can read the messages.

• Email messages sent to Group2 must be protected against spoofed senders.

Which type of policy should you configure for each requirement? To answer, drag the appropriate policy types to the correct groups. Each policy type may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.

NOTE: Each correct selection is worth one point.

Options:

Buy Now
Questions 27

You have a hybrid deployment between a Microsoft Exchange Online tenant and an on-premises Exchange Server 2019 organization.

The certificate for the hybrid deployment expires in two days.

You need to replace the certificate.

Which three cmdlets should you run in sequence? To answer, move the appropriate cmdlets from the list of cmdlets to the answer area and arrange them in the correct order.

Options:

Buy Now
Questions 28

You need to resolve the email delivery delay issue.

What should you do?

Options:

A.

From the Security & Compliance admin center, modify the safe attachments policy

B.

From the Security & Compliance admin center, create a supervision policy.

C.

From the Exchange admin center in Exchange Online, modify the antimalware policy.

D.

From the Exchange admin center in Exchange Online, modify the spam filter policy.

Buy Now
Questions 29

You need to recommend an Office 365 solution that meets the technical requirements for email from adatum.com.

Which two components should you recommend configuring from the Exchange admin center in Exchange Online? Each correct presents a complete solution.

NOTE: Each correct selection is worth one point.

Options:

A.

DKIM signatures

B.

a spam filter

C.

a malware filter

D.

data loss prevention (DLP) policies

E.

a connection filter

Buy Now
Questions 30

You need to recommend a solution for the public folders that supports the planned changes and meets the technical requirements.

What should you recommend?

Options:

A.

Microsoft SharePoint site mailboxes

B.

Office 365 groups

C.

Resource mailboxes

D.

Public folder replicas

Buy Now
Questions 31

You must prevent HelpDeskUser1 from repeating the same mistake.

You need to identify which management role provided HelpDeskUser1 with the necessary permissions to make the mistake identified in the problem statement.

Which two cmdlets should you run? Each correct answer presents part of the solution.

Options:

A.

Get-RoleGroup

B.

Get-ManagementRoleEntry

C.

Get-RoleGroupMember

D.

Get-ManagementRoleAssignment

E.

Get-ManagementRole

Buy Now
Questions 32

You need to configure the Exchange organization to meet the security requirements for sending email messages to distribution groups.

Which cmdlet should you run?

Options:

A.

Set-OrganizationConfig

B.

Set-DistributionGroup

C.

Set-Mailbox

D.

New-PolicyipConfig

Buy Now
Questions 33

Joni Sherman reports that the Microsoft Outlook client on her Windows 10 device fails to start.

You need to troubleshoot the issue.

From the device, you start the Microsoft Remote Connectivity Analyzer.

What should you run next?

Options:

A.

the Exchange ActiveSync test

B.

the Outlook Connectivity test

C.

the Service Account Access test

D.

the Microsoft Support and Recovery Assistant for Office 365 client

Buy Now
Questions 34

You discover that email messages sent to contoso.com are NOT delivered through Contoso Connector.

You need to ensure that all email sent to contoso.com is delivered through Contoso Connector.

Which connector setting should you modify?

Options:

A.

Routing

B.

Security restrictions

C.

Use of connector

D.

Status

Buy Now
Questions 35

Which contacts can sign in to and access resources in the adatum.com tenant?

Options:

A.

Contact1 only

B.

Contact2 only

C.

Contact1 and Contact3 only

D.

Contact2 and Contact3 only

E.

Contact1, Contact2. and Contact3

Buy Now
Questions 36

You need to migrate 10 Microsoft Outlook.com users to the adatum.com tenant.

Which type of migration should you perform, and which items can be migrated? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Options:

Buy Now
Questions 37

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Options:

Buy Now
Questions 38

You need to email a list of configuration changes to the Exchange Online environment that were recently performed by Allan Deyoung.

What should you do?

Options:

A.

Run the admin audit log report

B.

Run the external admin audit log report

C.

Export the admin audit log

D.

Run an administrator role group report

E.

Export the mailbox audit logs

Buy Now
Questions 39

Lynne Robbins and the users in the sales department plan to collaborate on a project with a partner company named Contoso, Ltd. that has an email domain named contoso.com.

You need to ensure that only the sales department users can share all their calendar free/busy

information with the users in contoso.com.

How should you configure the organization relationship?

Options:

A.

Select Calendar free/busy information with time only and enter Group1

B Select Calendar free/busy information with time, subject, and location and enter Groups

C Select Calendar free/busy information with time, subject, and location and enter Group3

B.

Select Calendar free/busy information with time only and enter Group3

C.

Select Calendar free/busy information with time only and enter Group2

Buy Now
Questions 40

Allan Deyoung must perform a message trace of the email messages sent by Isaiah Langer and provide a report that contains all the messages sent during the last 30 days.

You need to ensure that Allan Deyoung can perform the message trace.

What should you do?

Options:

A.

Add Allan Deyoung to the Organization Management role group

B.

Add Allan Deyoung to the Security Administrator role group

C.

For Allan Deyoung. set ElcProcessingDisabled to true

D.

For Isaiah Langer. set ElcProcessingDisabled to true

Buy Now
Questions 41

You need to ensure that Alex Wilber can recover deleted items when using Outlook on the web.

Which two actions should you perform? Each correct answer presents a complete solution.

NOTE: Each correct selection is worth one point.

Options:

A.

Assign Sales Policy to Alex Wilbur.

B.

Modify Marketing Policy.

C.

Remove Alex Wilbur from all groups.

D.

Assign Policy2 to Alex Wilbur.

E.

Modify Policy1

Buy Now
Questions 42

You need to ensure that Allan Deyoung can create a new public folder for the sales department.

Which two actions should you perform first? Each correct answer presents part of the solution.

NOTE: Each correct selection is worth one point.

Options:

A.

Add Allan Deyoung to the Organization Management role group

B.

Create a new public folder mailbox

C.

Add Allan Deyoung to the Recipient Management role group

D.

Create a new shared mailbox

E.

Modify Sales Policy

Buy Now
Questions 43

User3 leaves the company.

You need to ensure that Admin1 and Admin2 can access the mailbox of User3. The solution must meet the technical requirements.

What should you do?

Options:

A.

Migrate the mailbox of User3 to a distribution group.

B.

Migrate the mailbox of User3 to a Microsoft 365 group.

C.

Convert the mailbox of User3 into a resource mailbox.

D.

Convert the mailbox of User3 into a shared mailbox.

Buy Now
Questions 44

You need to generate a report for the mobile devices that meets the technical requirements.

Which PowerShell cmdlet should you use?

Options:

A.

Get-DevicePolicy

B.

Get-MobileDevice

C.

Get-MobileDeviceStatistics

D.

Get-DeviceTenantPolicy

Buy Now
Questions 45

You need to identify which users clicked the links in the phishing emails.

What should you do?

Options:

A.

Run a message trace and review the results.

B.

Query the mailbox audit log.

C.

Use the URL trace reporting feature.

D.

Review the quarantine mailbox.

Buy Now
Questions 46

You need to configure the new smartboard to support the planned changes.

Which three settings should you configure? To answer, select the appropriate settings in the answer area.

NOTE: Each correct selection is worth one point.

Options:

Buy Now
Questions 47

You need to perform a remote wipe of the devices of User2 and User3.

You run the following commands.

Clear-MobileDevice -id User2-Device

-NotificationEmailAddress "admin@Fabrikam.com"

Clear-MobileDevice -id User3-Device

-NotificationEmailAddress "admin@Fabrikam.com"

What occurs on each device? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Options:

Buy Now
Questions 48

How many default policy tags (DPTs), retention policy tags (RPTs), and personal tags should you create to meet the retention requirements? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Options:

Buy Now
Questions 49

You need to recommend a procedure for closing the Brussels office that meets the technical requirements.

What should you recommend?

Options:

A.

In the main office, deploy an Exchange Server 2016 server that has the Unified Messaging role installed, and then move the mailboxes from the Brussels office to the new server.

B.

Deploy a Microsoft Skype for Business 2019 server to the main office, and then move the mailboxes from the Brussels office to an Exchange Server 2019 server in the main office.

C.

Implement a new mailbox database on an Exchange Server 2019 server in the main office, and then move the mailboxes from the Brussels office to the new mailbox database.

D.

Implement a new database availability group (DAG) that contains the server in the Brussels office and a new Exchange Server 2019 server in the main office, and then create a mailbox database copy on the new server in the main office.

Buy Now
Questions 50

You need to implement a solution to support the planned changes for the helpdesk users.

What should you do?

Options:

A.

Assign the Recipient Policies role to the helpdesk users and a default management scope

B.

Assign the Mail Recipients role to the helpdesk users and use a default management scope

C.

Assign the Mail Recipients role to the helpdesk users and create a custom management scope

D.

Assign the Recipient Policies roles to the helpdesk users and create a custom management scope

Buy Now
Questions 51

You need to implement a solution to meet the technical requirements for the SCL.

How should you complete the command? To answer, select the appropriate options in the answer area.

Options:

Buy Now
Questions 52

You need to resolve the issue for the transport department users.

What is the best way to achieve the goal? More than one answer choice may achieve the goal. Select the

BEST answer.

Options:

A.

Move the public folder mailbox that contains TransportPF to a server in the main office.

B.

Move TransportPF to a public folder mailbox hosted in the main office.

C.

Modify the default public folder mailbox for all the transport department users.

D.

Instruct the transport department users to add TransportPF to their Favorites list in Outlook.

Buy Now
Questions 53

You need to resolve the issue for the customer service department users.

What should you modify?

Options:

A.

a transport rule

B.

the Send connector to the Internet

C.

the tarpit interval

D.

the global throttling policy

Buy Now
Questions 54

You need to recommend a solution to retain the items in the public folders. The solution must support the

planned changes.

What should you recommend?

Options:

A.

Create an Outlook rule that forwards all the items in each public folder to a compliance mailbox.

B.

Place an In-Place Hold on all the mailboxes of the public folders.

C.

Increase the frequency of the backups.

D.

Modify the public folder permissions.

Buy Now
Questions 55

You need to implement a solution that meets the technical requirements for the retention of junk email, sent items, and deleted items.

What is the minimum number of retention policies and retention tags you should use? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Options:

Buy Now
Questions 56

You need to configure the required objects for the branch office administrators.

What should you create for each administrator?

Options:

A.

a management role assignment policy and a management role group

B.

a management role scope and a management role assignment

C.

a management role scope and a management role group

D.

a management role and a management role assignment policy

Buy Now
Questions 57

Your company named Contoso, Ltd. has a Microsoft Exchange Server 2019 organization that contains the mailbox databases shown in the following table.

You need to assign an offline address book (OAB) named Managers to all the users in a group named Managers.

How should you complete the PowerShell script? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Options:

Buy Now
Questions 58

You need to implement a solution to support the planned changes for the branch office administrators.

What should you do?

Options:

A.

Assign the Mail Recipients role to the branch office administrators and use a default management scope.

B.

Assign the Mail Recipients role to the branch office administrators and create a custom management scope.

C.

Assign the Recipient Policies role to the branch office administrators and use a default management scope.

D.

Assign the Recipient Policies role to the branch office administrators and create a custom management scope.

Buy Now
Exam Code: MS-203
Exam Name: Microsoft 365 Messaging
Last Update: Nov 26, 2024
Questions: 394
MS-203 pdf

MS-203 PDF

$28.5  $94.99
MS-203 Engine

MS-203 Testing Engine

$33  $109.99
MS-203 PDF + Engine

MS-203 PDF + Testing Engine

$43.5  $144.99