Objective 3.4 Exchange 2010 Flashcards

Objective 3.4: Configure Outlook Web App (OWA).

1
Q

OWA 2010 has a single theme that is stored in ______. You can modify the graphic elements, colors, and so on in the theme, but users cannot switch between themes.

A

\Client Access\OWA\version\themes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

You can customize the OWA logon page to change colors and styles. To do this, you edit the ______ file and then replace the default logos with your own choices. However, Microsoft does not support changing the logon page content.

A

logon.css

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

If you want to use certificatebased encryption and authentication for OWA traffic, you need to create a certificate request file (CSR) by using either the EMC ______ Wizard or the EMS ______ cmdlet and send this file to a CA.

A

New Exchange Certificate,

New-ExchangeCertificate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Typically, OWA access is used by external users, and you would use a trusted external or commercial CA. Alternatively, you can use an existing certificate by obtaining its ______. You then need to install the certificate in the /owa default website.

A

thumbprint

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

File access can be configured by amending the properties settings of the OWA virtual directory. File access can be configured on a basis of each OWA mailbox policy or by configuring the properties of the OWA virtual directory. You can use the EMC for both of these tasks. You can use the EMS ______ cmdlet to perform this configuration on the same basis. You can use the EMS ______ cmdlet to configure the properties of the OWA virtual directory.

A

Set-OwaMailboxPolicy,

Set-OwaVirtualDirectory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

You can specify a list of files the user can always open by populating the allow list; you can specify those files the user can open after saving locally by populating the force save list; and you can populate the list of file types that the user is unable to open by populating the block list. The block list overrides the force save list, and the ______ list overrides both the other lists.

A

allow

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

You need to be aware that Exchange 2003 and Exchange 2007 public folders cannot be accessed by Exchange 2010 OWA (although they can by Outlook 2010), unless they have been replicated to an Exchange 2010 public folder ______.

A

database

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

You should be aware that you can use OWA and the ECP with almost any web browser. This includes Internet Explorer, Mozilla Firefox, Apple Safari, Google Chrome, and most other web browsers on computers running UNIX, Apple Macintosh, or Windows. If, however, you need to use S/MIME for digital signatures or message encryption, you must use ______ or later.

A

Internet Explorer 7

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

You should know that if you use a web browser that does not support its full feature set, OWA will open in its ______ version.

A

light

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

To have the best experience of using OWA, you need to verify that ______ is enabled. Answer: True. You should check your web browser’s options to verify the following three settings: ______.

A

JavaScript,

  1. Enable session cookies
  2. Enable JavaScript
  3. Pop-up blocker settings
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

You should be aware that the ECP provides a ______ interface with which you can manage Exchange configuration settings such as mailboxes, public groups, external contacts, administrator roles, and user roles. You can also use the reporting functionality available through the ECP to perform searches for specific messages and view delivery reports.

A

web-based

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

You can edit configuration settings by accessing the ECP through the EMC. To access ECP, select the EMC ______ node under Server Configuration, select Exchange Control Panel, and then right-click the ECP website and select Properties.

A

Client Access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

You can use the EMS ______ cmdlet to configure ECP options. Answer: True. For example, the following command disables basic authentication for ECP on server CAS01: ______.

A

Set-EcpVirtualDirectory,

Set-EcpVirtualDirectory –Identity “CAS01\ecp (default web site)” –Basicauthentication: $false

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

SANs permit multiple identities such as server names and FQDNs to be included in the same ______. You should be aware that if you are implementing certificate-based (or forms-based) authentication and encryption on the OWA website, the certificate you install should have this facility.

A

certificate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

You can configure public and private computer file access and segmentation settings both at the OWA Virtual Directory level and through individual OWA mailbox ______. You can configure the OWA authentication and remote file server’s settings only by configuring the OWA ______ Directory.

A

policies,

Virtual

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

You can configure segmentation settings at the virtual directory level. You can access the OWA virtual directory ______ dialog box through the EMC and configure (for example) segmentation settings.

A

Properties

17
Q

You can use the ______ cmdlet to configure the same settings as those available in the OWA virtual directory Properties dialog box. For example, the following command configures the left-click options on attachments for OWA on server CAS01 when the user has chosen to log on by using the Private option so that the Open option is available: ______.

A

Set-OwaVirtualDirectory,

Set-OwaVirtualDirectory -Identity “CAS-01\owa (default Web site)” -DirectFileAccessOnPrvateComputersEnabled $true

18
Q

You should know that during the installation of a Client Access server, Setup creates /exchange and /public virtual directories that are configured to ______ users to /owa. This enables users to enter the same URLs that they used to access the /exchange and /public virtual directories in Exchange 2003 and to access the /owa virtual directory used by Exchange 2007 and 2010.

A

redirect

19
Q

Remember that the /exchange and /public virtual directories are created in ______. They are not created as Exchange OWA virtual directories and are not listed by the EMS Get-OwaVirtualDirectory cmdlet.

A

IIS

20
Q

You should be aware that when the client access request is received, the Client Access server first uses ______ authentication to authenticate the user and then redirects the request to the appropriate virtual directory.

A

form-based

21
Q

You can select forms-based authentication when configuring OWA properties at the virtual directory level. ______ authentication is also available. You can access the OWA virtual directory Properties dialog box through the EMC. In this dialog box, you can configure OWA authentication properties and select ______ or forms-based authentication.

A

Standard,

standard

22
Q

You can use the ______ cmdlet to configure the same settings as those available in the OWA virtual directory Properties dialog box. For example, the following command sets forms-based authentication for OWA on server CAS01: ______.

A

Set-OwaVirtualDirectory,

Set-OwaVirtualDirectory –Identity “CAS01\owa (default web site)” –FormsAuthentication $true

23
Q

You can use the ______ Wizard from the EMC to configure the external name associated with OWA. You can also use the EMS ______ cmdlet for this task.

A

Configure External Client Access Domain,

Set-OwaVirtualDirectory

24
Q

For example, the following command sets the external client access domain for OWA on Client Access server CAS01 to mail.adatum.com, where OWA is hosted in the default location: ______.

A

Set-OwaVirtualDirectory –Identity ‘CAS01\owa (Default Web Site)’ –ExternalUrl ‘https://mail.adatum.com/owa’

25
Q

You also need to know how to configure OWA to use ______ document viewing, which allows users to view documents in their web browser rather than in the associated application.

A

WebReady

26
Q

WebReady document viewing can be configured on the basis of each OWA mailbox policy or by configuring the ______ of the OWA virtual directory. You can use the EMC for both of these tasks. You can also use the ______ cmdlet to perform this configuration on the same basis. You can use the ______ cmdlet to configure the properties of the OWA virtual directory.

A

properties,

Set-OwaMailboxPolicy,

Set-OwaVirtualDirectory

27
Q

If a client computer does not have the application version installed that is required to view a file, ______ document viewing permits a user to open the file in the browser.

A

WebReady

28
Q

You could use ______ settings in an OWA mailbox policy to block access to the Calendar or to restrict users from being able to change their password when connected through OWA.

A

segmentation

29
Q

Segmentation settings are configured on the ______ tab of an OWA mailbox policy Properties dialog box, or by using the ______ cmdlet. You can also configure these settings by using the Set-OwaVirtualDirectory cmdlet or by configuring the Segmentation tab on the OWA virtual directory (or OWA default website) Properties dialog box.

A

Segmentation,

Set-OwaMailboxPolicy

30
Q

Most OWA ______ can be configured at both the OWA mailbox policy and the OWA virtual directory level.

A

properties

31
Q

A Microsoft examiner will expect you to know when you should configure OWA at its virtual directory level and when you should configure an OWA mailbox policy. Settings configured at the virtual directory level apply to the entire ______ server, and some settings can be configured only at that level. Settings configured in an OWA mailbox policy apply to ______ who have mailboxes added to that policy.

A

Client Access,

users

32
Q

The default OWA mailbox policy exists by default and can be configured. However, you can create and configure additional policies that can be applied to different groups of user mailboxes. You can create a new OWA mailbox policy in the EMC and you can use the EMS ______ cmdlet to create one. This cmdlet supports the same parameters as the New-MailboxPolicy cmdlet. For example, the following command creates a mailbox policy named MyOWAPolicy1: ______.

A

New-OwaMailboxPolicy,

New-OwaMailboxPolicy -Name MyOWAPolicy

33
Q

You are the Exchange administrator for Contoso, Inc. Contoso has a threedomain forest and uses Exchange 2010 as its messaging solution. How do you prevent the users in the Australia.contoso.com domain from changing their passwords when using OWA?

A

You configure an OWA mailbox policy and disable Change Password in the segmentation settings.

34
Q

What EMS command would you issue to configure forms-based authentication?

A

You would issue the following command:

Set-OwaVirtualDirectory –Identity “CAS01\owa (default web site)” –FormsAuthentication $true

35
Q

You are an administrator at Blue Yonder Airlines. An employee, Don Hall, reports that he cannot access his mailbox by using OWA. Other users do not have this problem. How can you permit access for Don?

A

You inspect the properties of Don Hall’s mailbox and reconfigure as necessary.

36
Q

How do you disable notifications by text messages to mobile devices for a specific group of mailbox users?

A

You create an OWA mailbox policy and configure Text Messages in the segmentation settings. You add the user mailboxes to the policy.

37
Q

You are checking the configurations for file access and WebReady document viewing. You find that the same file type is specified on the allow list, the force save list, and the block list. Will files of this type be allowed or blocked?

A

The files will be allowed. The block list overrides the force save list and the allow list overrides both the other lists.