Exchange server 2010 interview questions and answers pdf

Saturday, April 20, 2019 admin Comments(0)

Exchange server Interview Questions With Answers: 1. What is Exchange Server ? Exchange Server is an email, calendaring and address book. Exchange server Interview Questions High Availability Filed under: Exchange Server exchange2k10 @ pm 1. What are the. 1) Mention what are the new features in MS Exchange ? Provide a resilient solution: It built upon the exchange server and redesigned for simplicity.

Language: English, Spanish, Portuguese
Country: Japan
Genre: Religion
Pages: 673
Published (Last): 12.11.2015
ISBN: 475-3-33845-975-6
ePub File Size: 26.37 MB
PDF File Size: 16.31 MB
Distribution: Free* [*Regsitration Required]
Downloads: 23728
Uploaded by: ALEJANDRA

Exchange Interview Question answers - Free download as PDF File .pdf), Exchange Server Standard edition supported 1Storage Group and 2. Exchange server Interview Questions – High Availability. Filed under: Exchange Server — exchange2k10 @ pm 1. What are the vision and. + Exchange Server Interview Questions and Answers, Question1: What is Exchange Server ? Question2: What are the Exchange Server

Equipment mailbox - A resource mailbox that's assigned to a non-location specific resource, such as a portable computer projector, microphone, or a company car. What is Multi Mailbox Search? Exchangefull admln- full control over tile exchange orpnlzatlon Including permission 2 ExchanseAdmin-Manageeverythingwltllln tile orsanlzatlonexceptpermission. Administrator has to provide access permission on to use this feature. SCCs require the use of a shared-nothing architecture, which includes shared disk storage.

What is site resilience? Site Resilience is a disaster recovery solution used for recovery from site failure 7. Pre-installation of failover cluster 2. Explain new features in Exchange Server High Availability? Databases are tied to specific server can be float across servers in organization Failover and switchover occurs at the database level and not the server level 3.

Give an idea on Exchange server High Availability Architecture changes? In exchange server HA. With the new HA feature. No need to failover a server if a single database fails 2. In Exchange Server management console. Cross premises Exchange Management — includes Mailbox move 4. Who can use ECP and what are the manageable options? Specialist and administrators — administrator can delegate to specialist e.

Multiple forest support 3. What is Exchange Control Panel? Built on remote power shell and RBAC 2. ECP deployed as part of the client access server role.

End users — comprehensive self-service tools for end users — fetch phone number. PowerShell command logging 2. Recipient bulk edit 5. Exchange management tools can be installed in 64 bit OS like vista. Assign the new management role 7. How to delegate a Role? Remote PowerShell management can be installed in x86 and x64 bit OS. Create a management scope if required 4. Change the new management roles entries by removing old entries 3.

What are the supportable OS platforms to install Exchange Management console? In Exchange server all functions are 64 bit only. What is Remote power shell in Exchange Server ?

Exchange 2010 Interview Question answers

In Exchange Create the management role 2. Calendar and contact sharing 3. Free busy information 2. What are the benefits of federation? What are the options shared in federated sharing? How federated sharing works in Exchange server ? Explain the federation commands in Exchange server ? Sharing policy 3. What is federated sharing? Federated Sharing allows easy sharing of availability information. Exchange Server — exchange2k10 4: Explain the operation of federation?

The trust allows users authenticated by Active Directory.

Server pdf questions 2010 and exchange interview answers

Prove domain ownership 3. With MFG acting as the trust broker. The delegation tokens allow users from one federated organization to be trusted by another federated organization. Although you can create a sharing policy for any external domain. What is Federation Trust? The certificate is used for encrypting tokens Add domains 8.

How to establish federated sharing in Exchange Server ? What is Microsoft Federation Gateway? What is Sharing Policy? Sharing policies allow you to control how users in your organization can share calendar and contact information with users outside the organization.

Users can access external resources using a single sign-on SSO experience 9. Create trust with certificate exchange 2.

To provision recipients to use a particular sharing policy One copy of journal per database and 6. Growing E-Mail Volume — everyone wants to have more E-mail because of this the storage. Which would you use and when? What are E-Discovery features? In Exchange , what are the minimum requirements for implementing a high availability topology, in relation to the server roles and server numbers? Exchange Recipient Level.

What are the different Exchange Recipient types? User mailbox: This mailbox is created for an individual user to store mails, calendar items, contacts, tasks, documents, and other business data. Linked mailbox: This mailbox is created for an individual user in a separate, trusted forest.

For example AD account is created in A. COM and Mailbox is created in B. COM Exchange Server. Shared mailbox: This mailbox is not primarily associated with a single user and is generally configured to allow logon access for multiple users. Legacy mailbox: This mailbox is resides on a server running Exchange Server or Exchange Server. Room mailbox: This mailbox is created for a meeting location, such as a meeting or conference room, auditorium, or training room.

When we create this mailbox, by default a disabled user object account is created. Equipment mailbox: A resource mailbox is created for a non-location specific resource, such as a portable computer projector, microphone, or a company car. Equipment mailboxes provide a simple and efficient way for users to use resources in manageable way. What is the difference between mail user and mail contact? Mail user: This is an Active Directory user that represents e-mail address outside your Exchange organization.

Don't modify this folder. StoreEvents Each public folder database has a StoreEvents folder, which holds registration information for custom Exchange database events. Other folders To support internal Exchange database operations, a tree may contain several other system folders, such as schema-root.

Don't modify these folders. How would you plan and configure Public Folder redundancy? How can you immediately stop PF replication? What types of PF management tools might you use? What are the differences between administrative permissions and client permissions in PF? How can you configure PF replication from the command prompt in Exchange ? What are the message hygiene options you can use natively in Exchange ?

What are the configuration options in IMF? What are virtual servers? When would you use more than one? Replace smtp virtual server on exchange backend with hub transport. The hub server will perform this role.

But if you like it can do it also immidiatly, just create a send connector and permit the server to connect to servers on the internet on port What is a Mail Relay? Name a few known mail relay software or hardware options. Mail relays are typically used within local networks to transmit e-mails among local users. For example, all of the student and faculty e-mail of a college campus. Mail relays are particularly useful in e-mail aliasing where multiple e-mail addresses are used but the mail relay forwards all messages to the specified e-mail addresses to one single address.

A mail relay is different than an open relay, where an e-mail server processes a mail message that that neither originates or ends with a user that is within the servers local domain i. What is a Smart Host? Where would you configure it? For example, suppose our Exchange Server is responsible for mail in the mydomain. The Exchange Server receives a message for a user in the otherdomain.

The message for the user at otherdomain. The smart host resolves the MX domain name for otherdomain. There are several advantages to using a smart host: You do not need to configure a DNS server on the internal network to resolve Internet host names.

In Exchange , it's possible to configure a smarthost on the Default SMTP Virtual Server but, if you do it this way, you can only set a single smarthost. The preferred method, therefore, is to use an SMTP Connector for your outgoing emails which does allow multiple smarthosts to be specified.

What are Routing Groups? When would you use them? What are the types of Connectors you can use in Exchange?

What is the cost option in Exchange connectors? What is the Link State Table? How would you view it? How would you configure mail transfer security between 2 routing groups? What is the Routing Group Master? Who holds that role? Explain the configuration steps required to allow Exchange to send and receive email from the Internet consider a one-site multiple server scenario.

What is DS2MB? What is Forms Based Authentication? How would you configure OWA's settings on an Exchange server? Exchange needs access to Active Directory domain controllers for a variety of reasons. Configuration information for the organization. Recipient information in the Global Catalog. Recipient information in a domain. An Exchange service called DSAccess has the task of finding domain controllers and Global Catalog servers suitable for use by Exchange.

This avoids the expensive chore of building up and tearing down RPC and TCP connections each time the Exchange server needs information. It uses a round robin selection process for load balancing.

The e-mail address recipient policy concept in Exchange is separated into two concepts in Exchange This topic covers the relationship of EAP and accepted domains in Exchange and how the functionality of e-mail address recipient policies in Exchange maps to EAP and Accepted Domains in Exchange Any accepted domain added to the system can be linked to an EAP so that it will generate recipient e-mail addresses for this accepted domain.

And every EAP must link to an existing accepted domain so that e-mails sent to e-mail addresses that are defined by the EAP can be routed by Exchange transport servers. In Exchange , authoritative and relay domains are managed together as accepted domains. In Exchange Management Console, the Accepted Domains tab of Hub Transport node under Organization Configuration work center is used to manage all accepted domains defined in the organization.

E-Mail Address Policy wizard provides the console GUI used to select an accepted domain for which a new e-mail address policy applies. Only accepted domains defined in the Exchange organization can be added to the list in the EAP.

What is the "issue" with trying to remove email addresses added by recipient policies? How would you fix that? What RUS? When would you need to manually create additional RUS? What are Address Lists? How would you modify the filter properties of one of the default address lists? How can you create multiple GALs and allow the users to only see the one related to them? What is a Front End server? In what scenarios would you use one?

What type of authentication is used on the front end servers? When would you use NLB? How would you achieve incoming mail redundancy? What are the 4 types of Exchange backups? What is the Dial-Tone server scenario? A dial tone recovery involves creating an empty database on a server to replace a failed database. This empty, or dial tone, database allows users to send and receive e-mail while the failed database is recovered.

Exchange Server 2007/2010 interview questions and answers – Part 1

By using a dial tone recovery approach, you can restore basic e-mail service to users providing them with a "dial tone" and then restore users' previous data as it becomes available. Create a new empty dial tone database to replace the failed database This new database will allow users who had mailboxes on the failed database to send and receive new messages.

Exchange has a feature called dial tone portability that allows you to point a user to a different database without moving the mailbox.

If you created the dial tone database on a different server than the server that housed the failed database, you will need to move the mailbox configuration to that new server.

Exchange Server Interview Questions | Ajay Tiwari's Interview Question and Answer's Blog

Restore the old database Use whatever backup and recovery software you typically use to restore the failed database. If there is no backup of the failed database, recover the failed database. If you are using the same server for dial tone recovery, you need to restore the database to a recovery storage group. Swap the dial tone with the restored database After the failed database has been restored, swap it with the dial tone database.

This gives the users the ability to send and receive e-mail and access all the data in the restored database. If users were moved to a dial tone database on another server, you then need to move the mailbox configuration back to the original server. Merge databases the. To get the data from the dial tone database into the restored database, merge the data.

When would backup? What is the dumpster? What is the eOO. What is circular logging? When would you use it? What's the difference between online and offline defrag? How would you know if it is time to perform an offline defrag of your Exchange stores? How would you plan for, and perform the offline defrag?

What is the eseutil command? When a database is corrupt or damaged, you can restore data from backup or repair it using Eseutil. Eseutil is a command-line tool that works with the Extensible Storage Engine ESE , database files, and log files associated with a Microsoft Exchange database. Eseutil is located in the Exchange default install folder, which is Created by Aslam Kader.

Eseutil can be run on one database at a time from the command prompt. You can use Eseutil to perform a range of database tasks including repair, offline defragmentation, and integrity checks. Table llists the most common Eseutil switches. Eseutil examines the structure of the database tables and records at the low level of the database Ese. You can use the defragmentation mode to compact a database offline.

Other Eseutil modes such as repair, recovery, and restore can be used to repair a corrupt or damaged database. Modes like integrity, file dump, and checksum can be used to verify the state of a database. This mode reduces the gross size on the disk of the database. Integrity Verifies the page level and ESE level logical integrity of the database.

Application-level logical integrity can be verified with lsinteg for mailbox and public folder databases. Displays headers of database files, transaction log files, and checkpoint files.

Also displays database page header information, and database space allocation and metadata. Checksum Copy File File Dump. Verifies checksums on all pages inthe database, log files, and checkpoint files. Performs a fast copy of very large files. What is the isinteg command? You can use the lsinteg. To view the command-line help about usage of lsinteg. To run lsinteg. You need to first start the information store service and dismount the databases; you can only check databases that are offline.

Usage is displayed. Check private information store default. Check public information store. Repair information store. Default is isinteg. How would you monitor Exchange's services and performance? Name 2 or 3 options. Enhance your messaging environment by using the many tools available with Microsoft Exchange Server.

This tools documentation provides detailed information about tools that can help you plan, install, manage, and troubleshoot Exchange Server. What is Direct Push? What are the requirements to run it? Direct Push is a feature that's built into Microsoft Exchange Server Direct Push keeps a mobile phone current over a cellular network connection. It provides notification to the mobile phone when new content is ready to be synchronized to the mobile phone. O verview For Direct Push to work, the mobile phone or other mobile device must be Direct Push capable.

These devices include the following: Mobile phones that have Windows Mobile 5.

Mobile phones that are produced by Microsoft Exchange ActiveSync licensees and are designed specifically to be Direct Push compatible.

By default, Direct Push is enabled in Exchange The Exchange server monitors activity on the user's mailbox and sends a response to the device if there are any changes, such as new or changed e-mail messages or calendar or contact items.

If changes occur within the lifespan of the HTTPS request, the Exchange server issues a response to the device that states that changes have occurred and the device should initiate synchronization with the Exchange server. The device then issues this request to the server. When synchronization is complete, a new long-lived HTTPS request is generated to start the process again. This guarantees that e-mail, calendar, contact, and task items are delivered quickly to the mobile phone, and the device is always synchronized with the Exchange server.

Microsoft Exchange Server lets you send a command to a mobile device that will perform a wipe of the device. This process, known as a remote device wipe, clears all Exchange information that is stored on the device.

You can use this procedure to clear data from a stolen device or to clear a device before assigning it to another user. BeforeYou Begin. To perform this procedure, the account that you use must be delegated the Exchange Server Administrator role. For more information about permissions, about how to delegate roles, and about the rights that are required to administer Exchange Server , see Permission Considerations. To perform a remote device wipe on a device by using the Exchange Management Console, the user must be assigned to an Exchange ActiveSync mailbox policy.

Procedure To use the Exchange Management Console to perform a remote device wipe 1. Open the Exchange Management Console. Under Recipient Configuration, click Mailbox. In the Mailbox window, select the user. In the action pane, click Manage mobile device or right-click the user's mailbox, and then click Manage mobile device. Select the mobile device from which you want to clear all data. In the Actions section, click Clear.

Click Clear again. To use Outlook Web Access to perform a remote device wipe 1. Open Outlook Web Access. Log on to the device owner's mailbox. Click Options. In the navigation pane, select Mobile Devices. Select the ID of the device that you want to wipe and remove from the list. Click Wipe all data from device. Click Remove Device from List. To use the Exchange Management Shell to perform a remote device wipe 1. Run the following command to obtain the identity of the device: Run the following command: What are the issues with connecting Outlook from a remote computer to your mailbox?

This allows traffic to traverse network firewalls without requiring RPC ports to be opened. In Exchange , as in Exchange , it's easy to deploy and manage this feature.

Benefits Anywhere. Outlook Anywhere offers the following benefits to clients that use Outlook , Outlook , or Outlook to access your Exchange messaging infrastructure: Users have remote access to Exchange servers from the Internet. Unauthenticated requests from Outlook can't access Exchange servers. Deploying Anywhere Outlook. Deploying Outlook Anywhere for your organization is straightforward. The following recommendations should be followed to successfully deploy Outlook Anywhere: Use at least one Client Access server per site In Exchange , a site is a network location with high bandwidth connectivity between all computers.

We recommend that you install at least one Client Access server in each site to provide client access to the Mailbox server.

However, you can have multiple Client Access servers in each site for increased performance and reliability. This lets clients that use Outlook or Outlook connect to a user's mailbox through the Client Access server in the site. This reduces the risk associated with using RPCs across the Internet. Using RPCs across the Internet can adversely affect performance.

Cached Exchange Mode, available in Outlook , , and , is similar to offline folders in previous versions of Outlook, though easier to use. Cached Exchange Mode allows you to work with your Exchange account data when your connection to the Exchange server is interrupted or unavailable. Outlook automatically manages your server connection and data updates; when your connection is restored, Outlook synchronizes your cached mailbox with your mailbox on the server.

What are the benefits and issues when using cached mode? How would you tackle those issues? By default Cached Exchange Mode is on for mailbox and off for public folder favorites. GC servers. Since the user is primary working out of the offline address book and OST, it means fewer round trips to the server when looking at the same message lots of times. Less round tripping to the server means that one should be able to have a higher user per server count. Cached mode is also required in order for the junk email feature to work in Outlook.

The biggest drawback is that it can take up to 24 hours before the end user sees a change to the. This is because the default behavior of Outlook is to update the OAB once a day. If your organization have frequent address book changes than it is recommended to turn off Cached Exchange Mode.

What are the IPSec usage scenarios for Exchange ? How do you enable OWA? SSL on. What are the considerations for obtaining a digital certificate for SSL on Exchange? What are SAN certificates? It allows specifying a list of host names to be protected by a single SSL certificate. The Subject Alternative Name extension has been a part of the X certificate standard since before , but only recently achieved widespread use with the launch of Microsoft Exchange Server which makes good use of Subject Alternative Name to simplify server configuration.

What can a Subject Alternative do? Secure host names on different base domains in one certificate.

Hosting multiple SSL-enabled sites on a single server typically requires a unique IP address per site, but a certificate with Subject Alternative Names can solve this problem. SAN Certificates secure: Multiple fully qualified domain names FQDN with a single certificate.

Using a SAN certificate saves the hassle and time involved in configuring multiple IP addresses on Exchange server, binding each IP address to a different certificate, and running a lot of low level PowerShell commands just to piece it all together.

Name a few 3rd-parties CAs. What do you need to consider when using client-type AV softwareon an Exchange server? What are the different clustering options in Exchange ? Which one would you choose and why. Why log file size reduced in exchange server ? The transaction log files are a record of every transaction performed by the database engine. All transactions are written to the log first, and then lazily written to the database.

This change was made to support the continuous replication features and to minimize the amount of data loss if primary storage fails. The original RTM release of Exchange Server offered two different types of continuous replication: Local continuous replication provides a degree of fault tolerance on a single mailbox server.

The basic premise is that LCR creates a secondary copy of an Exchange Server database on a separate volume than the server. In contrast, CCR uses a similar method to create a separate copy of the database and stores it on a separate Exchange server. When Microsoft released Service Pack 1for Exchange Server , it introduced a third type of continuous replication known as standby continuous replication SCR.

SCR can create multiple replicas of a database. Even though Exchange Server provides three different types of continuous replication, all three work in basically the same way. Continuous replication is based on a technique called log shipping, which involves copying each log file to the location where the backup database is stored while the log file is built. The log file is then replayed against the replica database, bringing the database into a current state.

Microsoft classifies continuous replication as a storage group-level operation, but I think it's more accurate to classify it as a database-level operation. Log files reside at the storage group level, but continuous replication, in any form, limits the protected storage group to a single database.

Questions interview server and pdf answers exchange 2010

Therefore, continuous replication could be considered a database-level operation because it involves a single database.

A single copy cluster SCC is a clustered mailbox server that uses shared storage in a failover cluster configuration to allow multiple servers to manage a single copy of the storage groups. This feature is similar to the clustering features in previous versions of Microsoft Exchange.

However, there are some significant changes and improvements that have been made. The way in which you build, manage, and troubleshoot an sec is completely different from the way in which previous versions of Exchange clusters were built and managed. In addition, the out-of-box failover behavior has changed significantly in Microsoft Exchange Server SCCs require the use of a shared-nothing architecture, which includes shared disk storage.

In a shared-nothing architecture, although all nodes in the cluster can access shared data, they cannot access it at the same time.

For example, if a physical disk resource is assigned to node 1of a two-node cluster, node 2 cannot access the disk resource until node 1is taken offline, fails, or the disk resource is moved to node 2 manually. In an SCC, an Exchange Mailbox server uses its own network identity, not the identity of any node in the cluster.

This network identity is referred to as a clustered mailbox server. If the node running a clustered mailbox server experiences problems, the clustered mailbox server goes offline for a brief period until another node takes control of the clustered mailbox server and brings it online.

This process is known as failover. The storage hosting the clustered mailbox server's storage groups and databases is hosted on shared storage that is available to each possible host node of the clustered mailbox server. As the failover occurs, the storage associated with the clustered mailbox server is logically detected from the failed node and placed under the control of the new host node of the clustered mailbox server.

In addition to failover, an administrator can manually move a clustered mailbox server between nodes in a cluster. This process is known as a handoff.

In the result pane, select the Mailbox server that contains the storage group that you want to enable for LCR. In the work pane, right-click the storage group that you want to enable, and then select Enable Local Continuous Replication. On the Introduction page, click Next. Click Next to continue. The database page appears with the name of the database in the storage group. Use Browse to specify the path for the LCR database file.

Review the Configuration Summary information on the Enable page, and verify that the correct paths have been configured. After you have verified the paths, click Enable to enable LCR for the storage group.

After the storage group and database have been enabled for LCR, click Finish to close the wizard. Open the Exchange Management. After the Enable-DataBaseCopy command has successfully completed, run the following command: The account you use to perform this operation must be delegated the Exchange Server Administrator role and local Administrators group for the target server.

After LCR has been enabled for a storage group, it will initially report a status of Initializing. The storage group will change from a status of Initializing to a status of Healthy after one transaction log file has been generated. What Exchange edition version do you need for LCR? What Windows edition version do you need for LCR?

How do you recover from a store corruption when using LCR? Name the procedures you would use. Complete the wizard to enable the passive copy.

This process checks that the replica log files have been brought completely up to date and replayed into the replica database so that it is ready to be mounted. Before the passive copy can be brought online it must be placed in the location of the original production database.