Вы находитесь на странице: 1из 9

1. How do we know if the users mailbox is corrupt on exchange server?

What
do we check on the server to make sure that users mailbox is corrupt on
the server?
A. Use the New-MailboxRepairRequest cmdlet to detect and repair mailbox corruptions.
You can run this command against a specific mailbox or against a mailbox database.
While this task is running, mailbox access is disrupted for the mailbox being
repaired. If you're running this command against a mailbox database, only the
mailbox being repaired is disrupted. All other mailboxes in the database remain
operational.
Use the Shell to detect corruptions and repair a mailbox
New-MailboxRepairRequest -Mailbox tony@contoso.com -CorruptionType
FolderView
Use the Shell to detect corruptions for a mailbox
New-MailboxRepairRequest -Mailbox ayla -CorruptionType
ProvisionedFolder,SearchFolder -DetectOnly
Use the Shell to repair all mailboxes in a database
New-MailboxRepairRequest -Database MBX-DB01 -CorruptionType
AggregateCounts
2. What is the difference between transport Dumster in exchange 2007 and Shadow
redundancy in exchange 2010
A. Transport dumpster is a feature built into Exchange Server 2010 HUB transport role
and designed to minimize data loss during mail delivery to a DAG in a lossy failover
scenario. The transport dumpster is stored inside the mail.que file. It's only available
for message delivery in a cluster continuous replication (CCR) environment and
doesn't address potential message loss when messages are in transit between Hub
Transport and Edge Transport servers.

With shadow redundancy, the deletion of a message from the transport databases is
delayed until the transport server verifies that all of the next hops for that message
have completed delivery. If any of the next hops fail before reporting back successful
delivery, the message is resubmitted for delivery to that next hop
3. Ten user are there, If they send mail the outgoing E-mail id is same. But Mail reached in
recipient Spam folder. you have to fix the issue. Mail should reach in inbox folder
A. We have to verify the message header and SCL rating that outgoing e-mail address
mail server calculated to our mail server and then we have to look for the reason for
SCL ratting. or may be outgoing e-mail address's mail server have set low/incorrect
SCL setting for spam e-mails.
4. What is Shadow redundancy? What is its use?

A. To provide redundancy for messages for the entire time they


are in transit. The eirler name of this technique is called
Transport Dumpster in Exchange 2007. The concept behind shadow redundancy is
that a message is not deleted from the queue until the next hop has confirmed
delivery to the subsequent hop. If confirmation is not received, the message is
resubmitted. If the next hop server is down, the message is resubmitted to another
server. Bottomline, messages are no longer lost when a routing server fails.
5. What are DS Access and DS Proxy
A. Dsproxy- a directory access cache that stores recently
accessed information for a configurable length of time. This
reduces the number of queries made to global catalog servers.

DSAcess- It creates an Address Book for Older MAPI Clients


that cannot access the Global Catalog Server. The older
clients prior to Outlook 2000.
6. How to achieve High availability in Exchange Server 2010 ?
7. user not able to see his email address in GAL ,but able to send and recieve emails.Why ?
8. Routing group ?
A. A routing group is a logical collection of servers used to
control mail flow and public folder referrals. In a routing
group, all servers communicate and transfer messages
directly to one another.

In a routing group, all servers communicate and transfer


messages directly to one another
9. Difference of front end and Backend server
10. What is circular logging
A. Circular logging log file is of 1 MB in Size. When the size
of the Transaction log is full then another log file is
created and so on.

By default circular logging is enabled to write the logs


and when you need the backup it needs to be disabled.
You can configure Exchange to save disk space by enabling
circular logging. Circular logging allows Exchange to
overwrite transaction log files after the data that the log
files contain is committed to the database. However, if
circular logging is enabled, you can recover data only up
until the last full backup. For example, you can enable
circular logging when using Exchange native data protection,

in which you don't make backups. To prevent log buildup, you


need to enable circular logging.
11. what is the capacity of MS outlook mailbox and outlook express mailbox?
12. how will we identify that those mail unwanted mails(MS Outlook) are.which are not important.
13. Why we use ruling in Ms outlook ?
A. Through ruling, we can set filters on mails. We can stop unwanted/blocked mails
from coming into inbox and set a rule to delete those mails without permission.
Ruling is basically used to keep your outlook mailbox organized and optimized.
14. If mail is not coming in mail box in MSOutlook what can be the reason behind it?
15. What are the differences between administrative permissions and client permissions in PF?
A. Client Permissions => It s used to access, Edit, delete the
public folder Items.. Ex..Editor, reviewer, author

Administrative Permissions => Send as persmission, send on


behalf of permission..
16. where are logical drives created on hard disk ?
A. extended partition
17. I dont understand clearly about global catalog server. I think we have global catalog server
can help improve the respond time user query. But do we need only one or more global
catalog server is better. What different effects?
A. It is better to have one global catalog server on each site
of AD to have fast access of the query which is asked by
the client.

GC has complete information of its own domain and partial


information of all other domains in the forest.
18. When should I run the Setup.exe /forestprep command? What permissions do I need to run
the command? When should I run the Setup.exe /domainprep command? What
permissions do I need to run the command? What is the advantage of doing a /forestprep
and /domainprep prior to an Exchange Server 2003 installation?
A. Forest prep runs a series of ldifde scripts in order to create an exchange container in
the schema configuration partition. It also prepares the schema with all the
required attributes to host an exchange server in the forest. Only an administrator
who is a member of Enterprise Admin group can run forest prep. It should be run
prior to the domain prep.
Domain prep creates Exchange Enterprise Server group and Exchange Domain
Servers group in the AD. It also Adds Exchange server group to the manage logs for
Audit and Security. It adds the Domain computer to the Exchange Domain server
group which allows the users to manage Exchange servers. Domain Prep should be
run after Forest prep by the administrator who is member of domain admin

group. Doing Forest Prep and Domain prep prior to the exchange installation
prepares the schema and Domain objects to host the exchange server.
19. Can we move the mailboxes from exchange 2003 which is reside in one exchange
organization to Exchange 2007 which is reside in another exchange organization. Both
exchange organization having forest trust ? Yes, we can move.

20. What is QBDG.


A. Query Based Distribution Group. A type of distribution group
introduced in Exchange 2003. It provides similar
functionality to that of a standard distribution group, what
is different is that it does not contain a fixed list of
members but is defined using a query. This allows the group
membership list to be generated dynamically on demand using
the query.
21. How to check RUS version
22. What are the message hygiene options you can use natigely in
exchange
A. Sender ID filtering, Recipient Filtering, Content
Filtering, Intelligent Message Filtering and ForeFront
Security for Exchange.
23. What is a smart host? Where would you configure it?
A. A smart host is a type of mail relay server which allows an
SMTP server to route e-mail to an intermediate mail server
rather than directly to the recipients server.
Often this smart host requires authentication from the
sender to verify that the sender has privileges to have
mail forwarded through the smart host.
24. What is the cost option in exchange connections?
A. Lowest cost has Highest priority.
25. How to find which CAS server is serving the OWA request from internal clients when CAS
servers are configured in NLB

A. Open OWA and click on options. After that select 'About'.


About Outlook Web Access will show CAS server name you are
connecting through.
26. Tel me the Features of the Exchange Server 2007?
A. Version Features
Standard Edition
The Standard Edition has:
Up to 5 storage groups

Up to 5 databases
16 TB per database
The Standard Edition supports
Local Continuous Replication.
Enterprise Edition
The Enterprise Edition has:
Up to 50 storage groups
Up to 50 databases
16 TB per database
The Enterprise Edition supports:
Local Continuous Replication
Single Copy Clusters
Cluster Continuous Replication
27. How can you create multiple GALs and allow the users to only see the one related to
them?

A. Created multiple custom GALs and define at server/storage


configuration
28. How would you modify the filter properties of one of the default address lists?
29. What are system public folders? Where would you find them?
A. 1.Schedule + Free Busy
2. Offline Address book
3.Eforms registry
You can view them under the the first site where public
folders are hosted .Right click on public folders and
select the option view public folders
30. What are the different Exchange Recipient types?
A. User mailbox: This mailbox is created for an individual user to store mails, calendar
items, contacts, tasks, documents, and other business data.
Linked mailbox: This mailbox is created for an individual user in a separate, trusted
forest. For example AD account is created in A.COM and Mailbox is created in B.COM
Exchange Server.
Shared mailbox: This mailbox is not primarily associated with a single user and is
generally configured to allow logon access for multiple users.
Legacy mailbox: This mailbox is resides on a server running Exchange Server 2003
or Exchange 2000 Server.
Room mailbox: This mailbox is created for a meeting location, such as a meeting or
conference room, auditorium, or training room. When we create this mailbox, by
default a disabled user object account is created.

Equipment mailbox: A resource mailbox is created for a non-location specific


resource, such as a portable computer projector, microphone, or a company car.
When we create this mailbox, by default a disabled user object account is created.
Equipment mailboxes provide a simple and efficient way for users to use resources in
manageable way.

31. What is the difference between mail user and mail contact?
A. Mail user: This is an Active Directory user that represents e-mail address outside
your Exchange organization. Each mail user has an external e-mail address to which
all messages sent to the mail user are routed.
Mail contact: This is an Active Directory contact that contains e-mail address
information about people or organizations that exist outside your Exchange
organization. Each mail contact has an external e-mail address. All messages sent to
the mail contact are routed to this external e-mail address.
32. Why doesnt we install Outlook on the same machine running

Exchange 2007/2010?
33. Where
34. How

does Exchange store its configuration settings?

would you verify that the schema was in fact updated?

35. What

are in the installation folder root setup.com and


setup.exe. Which would you use and when?

36. What

is S/MIME? What are the usage scenarios for S/MIME?

37. What

are E-Discovery features?

38. Where does Exchange 2007 get its routing topology from?
Exchange 2007 uses the Active Directory site topology to determine how messages
are transported in the organization. The Hub Transport server uses the Active
Directory Topology service to retrieve the Exchange organizations configuration
information. Unlike earlier versions of Exchange, Exchange 2007 does not use a link
state routing table and does not try to calculate an alternative route when a
connection is unavailable.
39. Where does Edge role store its settings?
Edge Transport server role installed doesnt have access to Active Directory. The

Edge Transport server stores all configuration and recipient information in ADAM.
Because Active Directory and ADAM both use Lightweight Directory Access Protocol
(LDAP), and because both directory services use the Exchange 2007 schema, you
can replicate data from Active Directory to ADAM.
40. Types of Data Replicated to ADAM
A. Edge Subscription information
Provision and maintain the credentials to help secure the LDAP connection.
Arbitrate the synchronization lock and lease process.
Optimize the EdgeSync synchronization process
B. Configuration information
Hub Transport servers
Accepted domains
Message classifications
Remote domains
Send connectors
Internal SMTP servers
Domain Secure lists
C. Recipient information
Recipients
Proxy addresses
Safe Senders List and Safe Recipients List
Per recipient anti-spam settings
D. Topology information
Notification of newly subscribed Edge Transport servers. This data is refreshed every
five minutes.
41. Edge Subscription Process
A. Make sure that the Hub Transport servers and the Edge Transport server can
resolve the each other FQDNs by using DNS.
B. Run the New-EdgeSubscription cmdlet in the EMS on the Edge Transport server

to export the Edge Subscription file.


C. Copy the Edge Subscription file to a Hub Transport server.
D. Run the New-EdgeSubscription cmdlet in the EMS or EMC to import the Edge
Subscription file.
42. Whats the default replication interval for Edge sync and what is the step to
force replication?
When the Exchange Edge server starts, the Microsoft Exchange EdgeSync service
starts and establishes a synchronization schedule.
Configuration data is synchronized to ADAM once every hour.
Recipient data is synchronized to ADAM once every four hours.
You cannot modify the synchronization intervals.
Steps to Sync Edge sync replication
Use the EMS to immediately start synchronization of data from the Active Directory
service to the subscribed Edge Transport servers. Run the below command on the
HB transport server.
Start-EdgeSynchronization -Server <Hub Transport server name>
43. What are the default connectors created during the Exchange Edge

subscription?
When we do the EdgeSync synchronization process, it creates two send connector
which then replicated to ADAM.
A Send connector that is configured to relay e-mail messages from the
Exchange organization to the Internet.
Connector Name: EdgeSync <Site Name> to Internet
A Send connector that is configured to relay e-mail messages from the Edge
Transport server to the Exchange organization.
Connector Name: EdgeSync Inbound to <Site Name>

44. Can you use Exmerge in Exchange 2007/2010? Why?


45. Whats a Dial Tone recovery?
46. Describe the concept behind Log Shipping.
47. What are the major changes in the way Exchange 2010 stores work? Name
some of the changes in comparison with Exchange 2003 and Exchange 2007.
48. What are the major changes in the way Exchange 2007 stores work?
49. What built-in tool do you have to allow you to manage Exchange store
recoveries?
50. How would you backup Exchange 2007/2010 on a Windows Server 2008/R2
machine without using 3rd-party tools?
51. Whats a Brick-Level backup?
52. How many DBs per storage group in ex2007 enterprise edition?
53. Difference between enterprise CAL and standard CAL?
54. How to configure disclaimer for exchange?
55. How to upgrade catalog DB?

56. Why not install Exchange on the same machine as a DC?


1. Redundancy and Stability if the exchange server fails then Domain Controller also
fails and it concludes a big failure
2. Overload : It may overload your existing server and that can cause a significant
performance problem.
57. What type or permissions do you need in order to install the first Exchange server in
a forest? In a domain?
A. Exchange Full Administrator at organization Level and Local machine Administrator
Permissions
You need Schema Admin, Domain Admin and Enterprise Admin Permission.
58.

Вам также может понравиться