70-664 - TS: Microsoft Lync Server 2010, Configuring

Go back to Microsoft

Example Questions

Your network contains an internal network and a perimeter network. The networks are separated by a firewall. The internal network contains a Lync Server 2010 pool. The perimeter network contains a Lync Server 2010 Edge pool. You discover that updates to the Lync Server 2010 topology do not replicate to the Edge Servers. You need to ensure that the Lync server replicates successfully to the Edge Servers. Which port should you open on the firewall? Your network contains an Active Directory domain. The domain contains 500 user accounts. You deploy Lync Server 2010 on the network. You need to ensure that all users can sign in to Microsoft Lync 2010 and initiate IM conversations. What should you do from the Lync Server Management Shell? Your network contains a Lync Server 2010 Standard Edition server and 200 client computers. All client computers have Microsoft Lync 2010 installed. Users report that they are unable to use application sharing. You need to ensure that all the users can share applications. What should you do? Your network has a Lync Server 2010 infrastructure that contains a Monitoring Server. You need to generate reports that contain call quality and per call diagnostic information. What should you do first? You work as a Network Administrator at ABC.com. The network contains an internal network and a perimeter network. The internal network consists of an Active Directory Domain Services (AD DS) domain named ABC.com. All servers run Windows Server 2008 R2. You are in the process of deploying a Lync Server 2010 infrastructure for the company. You have deployed a Lync 2010 server in the internal network. You now want to configure a Lync Server 2010 Edge Server in the perimeter network. Company security policy states that no servers in the perimeter network can be joined to the ABC.com domain. What do you need to do on the Edge server to ensure that it can communicate with the Lync 2010 server on the internal network? Your network contains a Lync Server 2010 server named Server1. A user named User1 reports that he is unable to sign in to Server1. You verify that User1 can connect to the network and that other users can sign in to Server1. You need to identify why User1 cannot sign in to Server1. Which component should you log from the Lync Server Logging Tool? You work as a Network Administrator at ABC.com. The company's communication system is provided by a Windows Server 2008 R2 Server that runs Lync Server 2010 Standard Edition. All users have the Microsoft Lync 2010 client installed on their computers. You notice that the Application Event Logs on the client computers records only major events. You want to configure the logging so that detailed information about Lync 2010 will be recorded in the Application Event Logs. How can you configure the required logging? Your network has Lync Server 2010 deployed. You need to modify the Lync Server 2010 infrastructure to meet the following requirements: • Users must be prevented from creating conferences that have more than 20 invitees. • Department managers must be able to create conferences that have as many as 300 invitees. What should you do? Your network has a Lync Server 2010 infrastructure that uses Enterprise Voice. You need to enable call park for Enterprise Voice users. You configure a call park number range. What should you do next? Your network has Lync Server 2010 deployed. You deploy dial-in conferencing. You need to provide the dial-in conferencing information to all the users on the network. What should you run? You plan to deploy Lync Server 2010 Standard Edition on the network. You need to modify the Active Directory schema for the planned deployment. What should you do? You work as a Network Administrator at ABC.com. You are configuring a new Lync Server 2010 infrastructure. The Lync Server 2010 infrastructure contains a SIP domain named ABC.com and includes three Edge servers configured as an Edge pool. A server named TK-DNS1 runs the DNS Server role and is publicly accessible. TK-DNS1 hosts DNS records for the corporate web site and email servers. You need to configure the Lync Server 2010 infrastructure so that it can be discovered for federation by other Lync organizations. You create a host (A) record named sip.ABC.com on TK-DNS1. What other DNS record should you create? Your network has Lyric Server 2010 deployed. You need to ensure that a user named User1 can perform the following tasks: • Run synthetic tests. • View the properties of the Voice Policies . You must achieve this goal by assigning the minimum amount of rights to User1. Which role should you assign to User1? Your network has Lync Server 2010 deployed. The network contains a server that runs Microsoft Exchange Server 2010. The server has the Unified Messaging server role deployed. You need to ensure that the voice mail of all Enterprise Voice users is stored in their Exchange mailboxes. You enable Unified Messaging (UM) for all Exchange mailbox-enabled users and create a UM dial plan. What should you do next? Your network contains a Lync Server 2010 Standard Edition server named Server1. You need to verify the status of all Lync services on Server1. What should you run from Server1? Your network contains a Lync Server 2010 Standard Edition server. All users have Microsoft Lync 2010 installed. All of the users use Lync 2010 to initiate IM conversations. You need to prevent the users from sending instant messages that contain URLs that have an ftp prefix. What are two possible ways to achieve this goal? (Each correct answer presents a complete solution. Choose two.) Your network contains the following components: • Three routers • Five subnets ▪ Eight domain controllers • Five Active Directory sites • Two wireless access points (WAPs) • One Lync Server 2010 server You plan to support location information services and create a network wiremap. You need to identify which elements must be used in the wiremap. Which two elements should you identify? (Each correct answer presents part of the solution. Choose two.) Your network has a Lync Server 2010 infrastructure. You need to archive all peer-to-peer IM conversations and Web conferences. You deploy an Archiving Server. What should you do next? Your company has a country code of 1 and an area code of 425. The network has a Lync Server 2010 infrastructure that uses Enterprise Voice. You plan to create a normalization rule to normalize seven-digit numbers to E.164 format. You need to identify the appropriate translation rule for the normalization rule. Which translation rule should you identify? Your network has Lync Server 2010 deployed. All client computers run Microsoft Lync 2010. You need to ensure that errors generated by Lync 2010 can be viewed from Event Viewer on each client computer. What should you do? Your network has Lync Server 2010 deployed. You configure Call Admission Control. You need to enable Call Admission Control. Which cmdlet should you run? You work as a Network Administrator at ABC.com. The network contains an internal network and a perimeter network. The internal network consists of an Active Directory Domain Services (AD DS) domain named ABC.com. All servers run Windows Server 2008 R2. You have recently deployed a Lync Server 2010 infrastructure for the company which includes a Lync Server 2010 server pool in the internal network and a Lync Server 2010 Edge Server pool in the perimeter network. A server named TK-CMS1 in the internal network runs the Lync Central Management Server (CMS) role. You notice that Central Management Store (CMS) changes are not replicating from TK-CMS1 to the Edge server pool. To troubleshoot the issue, you decide the check the configuration of the firewall that connects the perimeter network to the internal network. What firewall rule should you check for? Your network has Lync Server 2010 deployed. You deploy a common area phone. You need to prevent users from enabling call forwarding on the common area phone. What should you do? Your network has Lync Server 2010 deployed. You need to identify whether an administrator was granted the rights required to manage the Lync Server settings. Which cmdlet should you run? Your network has Lync Server 2010 deployed. The network contains a server named Server1 that runs Windows Server 2008 R2. Server1 is a member of a workgroup. You need to deploy the Edge Server role on Server1. What should you do first? Your network contains an internal network and a perimeter network. The networks are separated by a firewall. The internal network contains a Central Management Server. The perimeter network contains an Edge Server. You discover that changes to the Central Management Store (CMS) do not replicate to the Edge Server. You need to ensure that all changes to the CMS replicate to the Edge Server. Which protocol should you allow on the firewall? Your network has a Lync Server 2010 infrastructure that has Enterprise Voice enabled. You need to create a Response Group. What should you do? Your network contains an internal network and a perimeter network. The perimeter network contains a server named Server1 that runs Windows Server 2008 R2. Server1 is a member of a workgroup. You plan to configure Server1 as a Lync Server 2010 Edge Server. You need to prepare Server1 for the planned configuration. What should you do on Server1? You work as a Network Administrator at ABC.com. The network includes a Lync Server 2010 infrastructure that includes the following servers: A server named TK-Lync1 runs Microsoft Lync Server 2010. A server named TK-Exch1 runs Microsoft Exchange Server 2010. You receive reports from the Sales Manager that a user named Mia Hamm is unable to sign in to TK-Lync1. After verifying that Mia can access other network resources, you decide to use the Lync Server Logging Tool to troubleshoot the problem. Which of the Lync Server Logging Tool flags when selected would most likely indicate the cause of the problem? You deploy a Lync Server 2010 pool and a hardware load balancer. You plan to provide load balancing for dial-in conferencing. You need to identify which TCP ports must be redirected on the hardware load balancer. Which TCP ports should you identify? Your network has Lync Server 2010 and Microsoft Office Communications Server 2007 R2 deployed. The network contains an Edge Server that runs Office Communications Server 2007 R2. Lync users report that they are unable to initiate IM conversations to federated contacts. You verify that Office Communications Server 2007 R2 users can successfully initiate IM conversations to federated contacts. You need to ensure that all Lync users can successfully communicate with the federated contacts. Which two tasks should you perform? (Each correct answer presents part of the solution. Choose two.) You need to create a backup of the Lync Server 2010 topology. Which two possible tools should you use to achieve this goal? (Each correct answer presents a complete solution. Choose two.) Your network has a Lync Server 2010 infrastructure that contains two sites named Site1 and Site2. You need to verify whether users in Site1 can successfully call each other by using Lync audio calls. Which cmdlet should you run? Your network has Lync Server 2010 deployed. Certain telephone numbers in your number range are currently unassigned. You need to ensure that when users call an unassigned telephone number, they hear a custom message. What should you create? Your company has a telephone number range of (425) 555-1200 to (425) 555-1299. The country code is 1. The network has Lync Server 2010 deployed. You need to create a normalization rule for four-digit extension dialing that normalizes extensions to E.164 format. Which two tasks should you perform? (Each correct answer presents part of the solution. Choose two.) You deploy a Lync Server 2010 server. You need to ensure that the required ports for Lync services are allowed through Windows Firewall. Which cmdlet should you run? You work as a Network Administrator at ABC.com. The company's communication system is provided by a Lync Server 2010 infrastructure. A user named Mia Hamm is responsible for backing up the Lync Server infrastructure. Mia needs to back up the Enhanced 911 (E911) services configuration. Mia will use the Lync Server Management Shell to perform the backup. Which cmdlet should she run? Your network contains a server named Server1 that tuns Windows Server 2008 R2. You plan to install the Lync Server 2010 Topology Builder on Server1. You need to install the required prerequisites for the planned installation. What should you Install first? You work as a Network Administrator at ABC.com. You are configuring a new Lync Server 2010 infrastructure to provide Enterprise Voice services. You need to configure the Call Park service. You want to modify the configuration so that if a parked call is not answered within a specified time, the call is forwarded to a Response Group. How can you achieve the required configuration? Your network has Lync Server 2010 deployed. Several users report that they are unable to add more contacts to their Contacts lists. You need to verify whether the users' Contacts lists reached their limit. What should you do? You need to modify the Simple URLs of a Lync Server 2010 Standard Edition server. Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.) Your network contains a Lync Server 2010 Standard Edition server. You need to prevent all users from using Microsoft Lync 2010 to transfer files that have a JSP file extension. What are two possible ways to achieve this goal? (Each correct answer presents a complete solution. Choose two.) You work as a Network Administrator at ABC.com. You are configuring a new Lync Server 2010 infrastructure. All users have IP phones and have Microsoft Lync 2010 installed. All users can enable call forwarding on their phone extensions. ABC.com has a conference room. ABC.com users hold meetings with customers in the conference room. You install a phone in the conference room. How can you prevent users from enabling call forwarding on the conference room phone? Your network has Lync Server 2010 deployed. You need to ensure that when users on the PSTN receive calls from users in your organization, the calls display the telephone number +14255551212. What should you do? Your network has Lync Server 2010 deployed. You deploy a Mediation Server, and then you configure a voice route that uses a SIP trunk. You create a test user named User1. You enable Enterprise Voice for User1. You need to verify that when User1 initiates calls to external telephone numbers, the calls are routed through the SIP trunk. What should you run? Your network contains a SIP domain named contoso.com. The network has a Lync Server 2010 infrastructure that contains an Edge pool. You need to ensure that other Lync Server 2010 organizations on the Internet can automatically discover your Edge Servers for federation. Which DNS records should you create? You work as a Network Administrator at ABC.com. All servers run Windows Server 2008 R2 and all client computers run Windows 7 Enterprise. You are configuring a new Lync Server 2010 infrastructure. The network includes the following servers: TK-Lync1 is configured as a Microsoft Lync 2010 Front End Server. TK-Edge1 is configured as a Microsoft Lync 2010 Edge Server. TK-Exchange1 runs Microsoft Exchange Server 2010. TK-GW1 runs Microsoft Forefront Threat Management Gateway (TMG) and connects the ABC.com corporate network to the Internet. Some Sales users work remotely. All users including the external Sales users have Microsoft Lync 2010 installed on their client computers. All users can successfully initiate Instant Messaging (IM) conversations using the Lync 2010 software. However, the external Sales users report that they are unable to expand distribution groups. How can you resolve the problem? You need to back up the Contacts lists of all the users in your Lync Server 2010 pool. Which tool should you use? Your network has Lync Server 2010 deployed. The Lync Server infrastructure contains multiple locations. You need to set the street address for each location. Which cmdlet should you run? Your network connects to the Internet by using a server that runs Microsoft Forefront Threat Management Gateway (TMG). The network has a Lync Server 2010 infrastructure that contains an Edge Server and a Front End Server. All client computers run Microsoft Lync 2010. Some users work remotely. Remote users report they are unable to expand distribution groups. You verify that all of the users can initiate IM conversations. You need to enable distribution group expansion for all users. What should you do first?