Acquiring Microsoft Microsoft certification is really a hard activity by oneself. The Microsoft 70-346 exam real exam will get some adjustments, and our own Microsoft 70-346 practice questions and answers will make several modifications accordingly. The particular Microsoft 70-346 test can be an important a part of Microsoft Microsoft certification exam. Exambible offers abundant resources for you to get ready the Microsoft 70-346 exam. The particular Microsoft 70-346 certificate is a threshold to the IT industry.

2021 Dec 70-346 practice exam

Q21. Your company has a hybrid deployment of Office 365. You need to verify whether free/busy information sharing with external users is configured. 

Which Windows PowerShell cmdlet should you use? 

A. Test-OutlookConnectivity 

B. Test-FederationTrust 

C. Get-OrganizationRelationship 

D. Get-MSOLDomainFederationSettings 

Answer:


Q22. An organization implements single sign-on (SSO) for use with Office 365 services. You install an Active Directory Federation Services (AD FS) proxy server. 

Users report that they are unable to authenticate. You launch the Event Viewer and view the event information shown in the following screen shot:

You need to ensure that users can authenticate to Office 365. 

What should you do? 

A. Re-enter the credentials used to establish the trust. 

B. Verify the federation server proxy is trusted by the federation service. 

C. Re-install the Secure Sockets Layer (SSL) certificate for the federation service. 

D. Verify network connectivity between the Federation Service Proxy and federation server. 

Answer:


Q23. HOTSPOT 

You manage a team of three administrators for an organization that uses Office 365. 

You must assign roles for each of the administrators as shown in the table. You must assign the minimum permissions required to perform the assigned tasks. 

You need to assign the correct role to each administrator. 

Which administrative role should you configure for each user? Select the correct answer from each list in the answer area. 

Answer: 


Q24. You have an Office 365 tenant that uses an Enterprise E3 subscription. You have two 

servers in a perimeter network that have the Active Directory Federation Services (AD FS) 

proxy role service installed. A federation server farm is located behind a firewall. 

You need to ensure that the AD FS proxies can communicate with the federation server 

farm. 

Which two name resolution strategies can you use? Each correct answer presents a 

complete solution. 

A. HOSTS file on the proxy servers 

B. DNS server in the perimeter network 

C. LMHOSTS file on the proxy servers 

D. LMHOSTS file on the federation servers 

E. HOSTS file on the federation servers 

Answer: A,B 

Explanation: Configure Name Resolution for a Federation Server Proxy in a DNS Zone That Serves Only the Perimeter Network So that name resolution can work successfully for a federation server in an Active Directory Federation Services (AD FS) scenario in which one or more Domain Name System (DNS) zones serve only the perimeter network, the following tasks must be completed: 

*The hosts file on the federation server proxy must be updated to add the IP address of afederation server. 

*DNS in the perimeter network must be configured to resolve all client requests for the ADFS host name to the federation server proxy. To do this, you add a host (A) resource record to perimeter DNS for the federation server proxy. 

Reference: Configure Name Resolution for a Federation Server Proxy in a DNS Zone That Serves Only the Perimeter Network 

https://technet.microsoft.com/en-us/library/dd807045.aspx 


Q25. You are the Office 365 administrator for your company. 

Users report that they have received significantly more spam messages over the past month than they normally receive. 

You need to analyze trends for the email messages received over the past 60 days. 

From the Office 365 admin center, what should you view? 

A. the Mail protection reports 

B. the Office 365 Malware detections in received mail report 

C. messages on the Message center page 

D. the Mailbox access by non-owners report 

Answer:

Explanation: 

Use mail protection reports in Office 365 to view data about malware, spam, and rule detections. 

If you're an Exchange Online or Exchange Online Protection (EOP) admin, there's a good chance you'd like to monitor how much spam and malware is being detected, or how often your transport rules are being matched. With the interactive mail protection reports in the Office 365 admin center, you can quickly get a visual report of summary data, and drill-down into details about individual messages, for as far back as 90 days. 

Reference: https://technet.microsoft.com/en-us/library/dn500744(v=exchg.150).aspx 


Improved 70-346 real exam:

Q26. You plan to deploy an Office 365 tenant to multiple offices around the country. 

You need to modify the users and groups who are authorized to administer the Rights Management service. 

Which Windows PowerShell cmdlet should you run? 

A. Add-MsolGroupMember 

B. Get-AadrmRoleBasedAdministrator 

C. Remove-AadrmRoleBasedAdministrator 

D. Enable-AadrmSuperUserFeature 

Answer:


Q27. An organization plans to migrate to Office 365. 

You need to estimate the post-migration network traffic. 

Which tool should you use? 

A. Lync 2013 Bandwidth Calculator 

B. Process Monitor 

C. Microsoft Network Monitor 

D. Microsoft OnRamp Readiness tool 

Answer:

Explanation: 

Office 365 includes Lync 2013. 

With this latest version of the Microsoft Lync Server 2010 and 2013 Bandwidth Calculator, you can enter information about your users and the Lync Server features that you want to deploy, and the Bandwidth Calculator will determine bandwidth requirements for the WAN that connects sites in your deployment. The accompanying Bandwidth Calculator User Guide describes the recommended process for estimating your WAN bandwidth needs for Lync client real-time traffic. 

Reference: Lync Server 2010 and 2013 Bandwidth Calculator Version 2.0 

http://blogs.technet.com/b/nexthop/archive/2013/06/07/lync-server-2010-and-2013bandwidth-calculator-version-2-0.aspx


Q28. Your company has a subscription to Office 365 for midsize business and enterprises. The company uses Microsoft Lync Online. 

You need to open ports on the network firewall to enable all of the features of Lync Online. 

Which port or ports should you open? (Each correct answer presents part of the solution. Choose all that apply.) 

A. inbound TCP 443 

B. outbound TCP 5061 

C. outbound UDP 3478 

D. outbound TCP 443 

E. outbound UDP 50000 to outbound UDP 59999 

F. inbound TCP 8080 

Answer: A,C,D,E 

Explanation:

Reference: http://ahandyblog.wordpress.com/cloud-technologies/firewall-ports-for-office-


Q29. A company deploys an Office 365 tenant in a hybrid configuration with Exchange Server 2013. 

Office 365 users cannot see free/busy information that is published from the on-premises Exchange Server. In addition, Exchange Server users cannot see free/busy information that is published from Office 365. 

You need to troubleshoot why users cannot access free/busy information from both Office 365 and Exchange Server 2013. 

Which tool should you run? 

A. The Hybrid Configuration wizard 

B. The Remote Connectivity Analyzer with the Exchange Server tab selected 

C. The Microsoft Connectivity Analyzer Tool 

D. The Remote Connectivity Analyzer with the Office 365 tab selected 

Answer:


Q30. A company has an Office 365 tenant. 

You must reset the password for an account named User1. 

You need to ensure that the new password for the account meets complexity rules. 

Which two passwords can you use? Each correct answer presents a complete solution. 

A. Summer2015 

B. May2015 

C. User1User1 

D. summer2015 

E. May 2015 

F. summer!@#$ 

G. M1crosoft 

Answer: A,G 

Explanation: 

If the user is set to require a strong password, then all of the following rules must be met: 

The password must contain at least one lowercase letter. 

The password must contain at least one uppercase letter. 

The password must contain at least one non-alphanumeric character. 

The password cannot contain any spaces, tabs, or line breaks. 

The length of the password must be 8-16 characters. 

The user name cannot be contained in the password. 

Incorrect: 

Not B: too few characters 

Not C: Cannot contain account name User1 

Not D: no capital letter. 

Not E: no spaces 

Not F: Illegal characters.