70-347 Dumps 70-347 Exam Questions 70-347 New Questions 70-347 PDF 70-347 VCE Microsoft

[2017-06-02] Free Lead2pass Microsoft 70-347 Dumps VCE Download (1-20)

2017 June Microsoft Official New Released 70-347 Dumps in Lead2pass.com!

100% Free Download! 100% Pass Guaranteed!

Are you interested in successfully completing the Microsoft 70-347 Certification Then start to earning Salary? Lead2pass has leading edge developed Microsoft exam questions that will ensure you pass this 70-347 exam! Lead2pass delivers you the most accurate, current and latest updated 70-347 Certification exam questions and available with a 100% money back guarantee promise!

Following questions and answers are all new published by Microsoft Official Exam Center: http://www.lead2pass.com/70-347.html

QUESTION 1
You are the Office 365 administrator for your company.
The company has a single Active Directory Domain Services domain.
As part of the Office 365 deployment, the company is preparing to deploy Office Telemetry.
You need to disguise file names and document titles, while still collecting the telemetry data.
What should you do?

A.    In the Telemetry Dashboard, display only files that are used by multiple users.
B.    On each client computer, edit the registry to prevent telemetry logging.
C.    In the Telemetry Dashboard, obfuscate the document name, title, and path.
D.    In the Telemetry Dashboard, apply a label named Private to employees.

Answer: C
Explanation:
The enablefileobfuscation policy setting configures the Telemetry Agent to disguise the file name, file path, and title of Office documents before uploading telemetric data to the shared folder.
Incorrect Answers:
A: Displaying only files that are used by multiple users will not disguise file names and document titles, while still collecting the telemetry data.
B: The option to turn off logging also includes turning off the agent. This will also prevent the collection of the telemetry data.
D: Assigning a label named Private to employees will not disguise file names and document titles, while still collecting the telemetry data.
https://technet.microsoft.com/en-us/library/jj219431.aspx#agentpolicy
https://technet.microsoft.com/en-us/library/jj591589.aspx

QUESTION 2
Hotspot Question
A company has an on-premises deployment of Microsoft Exchange Server 2010 with Service Pack 3.
The company is migrating to Office 365.
During the migration, users must be able to see availability information between the on- premises deployment and Office 365.
You need to identify the appropriate mailbox migration strategy to use.
Which migration strategies are supported for this scenario? To answer, drag the appropriate answer choices to the correct targets. Each answer choice may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.

Answer:

Explanation:
The only migration method that enables users to see availability information between the on-premises deployment and Office 365 is a remote move migration.
A remote move migration is used to migrate on-premises Exchange mailboxes to Exchange Online in an Exchange hybrid deployment. You must have an Exchange hybrid deployment to use a remote move migration. With a hybrid deployment, you get the following capabilities:
User account management in your on-premises organization.
Directory synchronization between your on-premises and Exchange Online organizations.
Single sign-on to mailboxes located either on-premises or in the Exchange Online organization.
Secure mail routing between on-premises and Exchange Online organizations.
Free/busy and calendar sharing between on-premises and Exchange Online organizations.
Even if you plan to permanently move your on-premises email organization to Exchange Online and Office 365 over a longer period of time, you can take advantage of these hybrid deployment features during the transition.
Incorrect Answers:
Cutover migration:  In a cutover Exchange migration, all mailboxes in the on-premises Exchange organization are migrated to Exchange Online in a single migration batch. In a cutover migration, new mailboxes are created in Exchange Online and the on-premise mailboxes are synchronized to the online mailboxes. After the initial synchronization, incremental synchronizations are performed until the on-premise and online mailboxes have the same data.  The users are then switched over to the online mailboxes. As all users are switched to the online mailboxes at the same time, there is no period when some users are using online mailboxes while other users are using on-premise mailboxes. Therefore, the sharing of free/busy information between the on-premise and online environments is unnecessary. Therefore, this answer is incorrect.
Staged migration:  In a staged Exchange migration, mailboxes in the on-premises Exchange organization are migrated to Exchange Online in batches. However, staged migrations are not supported with on-premise Exchange 2010 or Exchange 2013.  In this question, we’re using on-premise Exchange 2010. Therefore, this answer is incorrect.
IMAP migration:  In an IMAP migration, the contents of users’ mailboxes on an IMAP messaging system are migrated to their Exchange Online mailboxes.  An IMAP migration does not provide Free/busy and calendar sharing between on-premises and Exchange Online organizations. Therefore, this answer is incorrect.
http://technet.microsoft.com/en-GB/library/jj863291(v=exchg.150).aspx

QUESTION 3
Drag and Drop Question
You are the Office 365 administrator for your company.
Employees share documents with internal and external users on Microsoft SharePoint Online sites.
User1 inadvertently shares a link to Document1 with an external user named Customer1.
You need to remove access to Document1 from Customer1.
Which five actions should you perform in sequence? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.

Answer:

Explanation:
If you want to withdraw an invitation you have sent to an external user, you can revoke the invitation before it is accepted.
1.    Go to Settings  > Site Settings.
2.    Under Users and Permissions, click Access requests and invitations.
3.    Under Guest User Invitations, find the person you would like to uninvite to the site, and click the ellipses . . .to open the menu.
4.    In the properties window, click Withdraw.

https://support.office.com/en-in/article/Set-up-and-manage-access-requests-94b26e0b-2822-49d4-929a-8455698654b3#__toc334189260

QUESTION 4
You are the Office 365 administrator for your company.
The company’s environment includes Office 2007, Office 2010, Office 2013, Windows 7, and Windows 8.
The company uses Office Telemetry.
You need to collect Office version usage data for an upcoming migration to Office 365 ProPlus.
What should you do?

A.    Open documents by using Office 2007, Office 2010, or Office 2013 on client computers that
run Windows 7.
B.    Use the Get-MsolUsercmdlet with the ServiceStatus parameter.
C.    Search network shares for Office documents and export the results to a . log file.
D.    Search local computers for Office documents and export the results to a . csv file.

Answer: A
Explanation:
Telemetry Agents for all versions of Office collect the data of the most recently used documents, registered add-ins, and system and user information to upload to the shared folder. By opening documents by using Office 2007, Office 2010, or Office 2013 on client computers that run Windows 7, you allow the Telemetry Agents to collect the relevant data.
Incorrect Answers:
B: The ServiceStatus parameter is not valid for the Get-MsolUser cmdlet.
C: Searching network shares for Office documents and exporting the results to a .log file will not collect Office version usage data.
D: C: Searching local computers for Office documents and exporting the results to a .csv file will not collect Office version usage data.
https://technet.microsoft.com/en-us/library/jj863580.aspx
https://msdn.microsoft.com/en-us/library/azure/dn194133.aspx

QUESTION 5
Hotspot Question
You are the Office 365 administrator for your company.
A user wants to share a link to a presentation with a salesperson.
The salesperson will share the link with potential customers.
You have the following requirements:

– Make a read-only version of the presentation available to anonymous users.
– Notify the salesperson by email when the presentation is available.

You need to configure the sharing settings.
How should you configure the sharing settings? To answer, configure the appropriate options in the dialog box in the answer area.

Answer:

Explanation:
“Require sign-in” should not be checked.

QUESTION 6
Drag and Drop Question
Your company uses Microsoft SharePoint Online.
You create a subsite in an existing site collection.
The subsite will serve as a document repository from which anyone can download documents. External sharing is turned off globally.
You plan to share documents with users by emailing document links.
Users must not be required to sign in to the subsite to download the documents.
You need to configure the environment to allow document sharing with external users.
Which three actions should you perform in sequence? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.

Answer:

Explanation:
Step 1. To be able to share documents, we first need to enable sharing at the top level, the Tenant.
The question states: “You plan to share documents with users by emailing document links. Users must not be required to sign in to the subsite to download the documents”.
To do this, we need to select the following sharing option:
“Allow both external users who accept sharing invitations and guest links”.
Step 2. The second step is to allow sharing at the Site Collection level.
Again, we need to configure the following sharing option:
“Allow both external users who accept sharing invitations and guest links”.
Step 3. The final step after sharing has been enabled is to share the required documents.
https://support.office.com/en-in/article/Manage-external-sharing-for-your-SharePoint-Online-environment-c8a462eb-0723-4b0b-8d0a-70feafe4be85

QUESTION 7
Drag and Drop Question
You are the Office 365 administrator for your company.
The company wants to increase the retention age for deleted email items to 90 days.
You need to modify the retention age.
How should you complete the relevant Windows PowerShell script? To answer, drag the appropriate command segments to the correct locations. Each segment may be used once, more than once, or not at all.
You may need to drag the split bar between panes or scrollto view content.

Answer:

Explanation:
Retention Policy Tags are used to apply retention settings to folders and individual items such as e-mail messages. These settings specify how long a message remains in a mailbox and the action to be taken when the message reaches the specified retention age.
The Set-RetentionPolicyTag is used to modify the settings of a retention policy tag. In this question, we use the AgeLimitForRetention parameter to set the retention period to 90 days.
Incorrect Answers:
Set-RetentionPolicy: a retention policy is a group of retention tags. The retention policy is applied to mailboxes or mailbox folders but it is the retention tag in the retention policy that specifies how long the email should be retained for. Therefore, to increase the retention period, we need to modify the retention policy tag, not the retention policy itself.
RetentionAge is not a valid parameter in either the Set-RetentionPolicyTag or Set-RetentionPolicy cmdlets.
https://technet.microsoft.com/en-gb/library/dd298042%28v=exchg.150%29.aspx

QUESTION 8
You are the Office 365 administrator for your company.
The company uses Microsoft Exchange Online and Microsoft Lync Online.
An employee named User1 has the user name, email address, and Lync address [email protected].
The employee requests that you change only his Lync address to User1- [email protected].
You start a Windows PowerShell session and run the following commands, providing your admin account credentials when prompted:
You need to complete the process of updating the employee’s Lync address without affecting any other addresses.
Which Windows PowerShell command should you run next?

A.    Set-MsolUser -UserPrincipalName $ID -ProxyAddresses@{add =
“$NewAddress”; remove = “$OldAddress”>
B.    Set-Mailbox -Identity $ID -EmailAddresses@{add = “$NewAddress”;
remove = “$Old Address”}
C.    Set-Mailbox -Identity $ID -WindowsEmailAddress $NewAddress
D.    Set-CsUser -Identity $ID -ProxyAddresses@{add = M$NewAddress”;
remove=”$OldAddress”>

Answer: B
Explanation:
D = wrong: The set-csUser CMDLet doesn’t have the parameter Proxyaddress
A = wrong: The set-MsolUser doesn’t have the parameter ProxyAddress either
C = wrong: This would set the primary mailaddress to the new address (I doubt even if it wouldn’t give you an error since you try to set the sip as default reply address)
B = the only right answer! You try to do something with mail addresses, the hang on a mailbox, so you should set one of the the mailbox properties
http://community.office365.com/en-us/f/166/t/37089.aspx

QUESTION 9
Your company uses Microsoft Exchange Online and Microsoft Lync Online.
You are planning the compliance strategy for electronic correspondence.
You need to archive Lync communications for mailboxes that are placed on an in-place hold.
Which two forms of Lync communications should you archive? Each correct answer presents part of the solution.

A.    Multiparty instant messages
B.    Peer-to-peer file transfers
C.    Audio and video for peer-to-peer conferences
D.    Whiteboards and polls shared during conferences
E.    Desktop sharing sessions

Answer: AD
Explanation:
The following types of content are not archived: peer-to-peer file transfers, audio/video for peer-to-peer instant messages and conferences, application sharing for peer-to-peer instant messages and conferences, conferencing annotations and polls, conference content including uploaded content (for example, hand outs), and event-related content (for example, joining, leaving, uploading, sharing, and changes in visibility).
https://technet.microsoft.com/en-us/library/dn194461.aspx

QUESTION 10
Drag and Drop Question
Your company has an Office 365 subscription and uses Microsoft Exchange Online.
You are creating several Exchange objects to meet different requirements.
You need to ascertain the correct recipient type for each object based on the description.
Which recipient type best matches each description? To answer, drag the appropriate recipient types to the correct targets. Each recipient type may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.

Answer:

Explanation:
A mail contact is a mail-enabled Active Directory contact that contains information about people or organizations that exist outside the Exchange organization. Each mail contact has an external email address. All messages sent to the mail contact are routed to this external email address.

A mail user is a mail-enabled Active Directory user that represents a user outside the Exchange organization. Each mail user has an external email address. All messages sent to the mail user are routed to this external email address. A mail user is similar to a mail contact, except that a mail user has Active Directory logon credentials and can access resources (can log in to the Office 365 portal).

A shared mailbox is a mailbox that is not primarily associated with a single user and is generally configured to allow access for multiple users.

A distribution group or distribution list is a mail-enabled Active Directory distribution group object that can be used only to distribute messages to a group of recipients.

References:
https://technet.microsoft.com/en-us/library/bb201680%28v=exchg.150%29.aspx

QUESTION 11
Drag and Drop Question
Your company, Coho Vineyard, uses Microsoft Exchange Online.
Coho Vineyard employees have email addresses on the domain cohovineyard.com.
Coho Vineyard recently purchased the domain cohowinery.com.
All employees of Coho Vineyard who work in the winery department should have an additional email address combining their current email alias with the domain cohowinery.com.
Outgoing email messages must be sent from the existing cohovineyard.com email addresses.
You need to add the cohowinery.com email addresses.
Which three Windows PowerShell commands should you run in sequence? To answer, move the appropriate commands from the list of commands to the answer area and arrange them in the correct order.

Answer:

Explanation:
Box 1: This command is used to return a list of users who work in the winery department and store the results in the $Users variable.

Box 2: This command says for each user name, take the user’s alias, prepend SMTP: and append @cohowinery.com and add the new address to any existing addresses ($_.EmailAddresses). For example, for a user with an alias of John.Smith, the following email address would be created: SMTP:[email protected]. That would then be added to his existing email address.

Box 3: The following PowerShell cmdlet can be used to define the email address for User1’s mailbox:
Set-Mailbox -Identity user1 –EmailAddresses <list of email addresses>.
As Box 2 added the new @cohowinery.com address to the existing @cohovineyard.com address, we can use the $_.EmailAddresses value with the –EmailAddresses parameter instead of manually listing the addresses.

References:
https://technet.microsoft.com/en-gb/library/bb123981%28v=exchg.150%29.aspx

QUESTION 12
Drag and Drop Question
Your company uses Microsoft Exchange Online.
End users access their mailboxes by using Outlook Web App (OWA).
The company is deploying an end-user request process for new shared mailboxes.
When a user requests a shared mailbox, a corresponding group must also be created.
The requestor will manage the group membership in OWA to allow other users access I the shared mailbox.
You are creating a Windows PowerShell script to meet the following requirements:

– Create a shared mailbox that has the requested display name and email address.
– Create a group and make the requestor both the owner and a member of the group.
– Assign full control for the shared mailbox to the group.

The script currently includes the following Windows PowerShell script segment:

You need to complete the Windows PowerShell script.
How should you complete the script? To answer, drag the appropriate cmdlets to the correct targets. Each cmdlet may be used once, more than once, or not at all.
You may need to drag the split bar between panes or scroll to view content.

Answer:

Explanation:
The script asks the user for the following information: RequestorUPN, DisplayName, Alias and Domain.
The RequestorUPN is the name of the user requesting the mailbox. This value is stored in the $requestorUPN variable.
The DisplayName is the display name of the mailbox. This value is stored in the $displayname variable.
The Alias is the alias for the mailbox, for example: Jane.Doe. This value is stored in the $Alias variable.
The domain is the domain required for the mailbox, for example: contoso.com. The value is stored in the $domain variable.
The script uses the $alias variable and the $domain variable to construct an email address. For example: [email protected]. This value is stored in the $SmbName variable.

For the group information, the group display name is constructed from the $displayname variable and “-group”. This value is stored in the $GroupDisplayName variable.
The group alias is constructed from the $alias variable and “-group”. This value is stored in the $GroupAlias variable.
The group name is constructed from the $GroupAlias variable and the $domain variable. This value is stored in the $GroupName variable.

Box 1: The New-Mailbox cmdlet is used to create a new mailbox. The values stored in the variables provide the information required to complete the command.

Box 2: The New-DistributionGroup cmdlet is used to create a new distribution group. The values stored in the variables provide the information required to complete the command.

Box 3: The Add-MailboxPermission cmdlet is used to assign the distribution group full control access to the shared mailbox. The values stored in the variables provide the information required to complete the command.

Box 4: The Add-DistributionGroupMember cmdlet is used to add the mailbox requestor to the distribution group. The values stored in the variables provide the information required to complete the command.

References:
https://technet.microsoft.com/en-us/library/aa997663%28v=exchg.150%29.aspx
https://technet.microsoft.com/en-us/library/aa998856%28v=exchg.150%29.aspx
https://technet.microsoft.com/en-us/library/bb124097%28v=exchg.150%29.aspx
https://technet.microsoft.com/en-GB/library/bb124340%28v=exchg.150%29.aspx

QUESTION 13
Hotspot Question
You are the Office 365 administrator for your company.
An employee with the user name User1 requests a shared mailbox named Sales1.
User1 must be able to send messages from the Sales1 mailbox.
You need to create and configure the online mailbox.
How should you complete the relevant Windows PowerShell script? To answer, select the correct answer from each list in the answer area.

Answer:

Explanation:
We use the New-Mailbox cmdlet to create a new mailbox. Then we use the Add-RecipientPermission cmdlet to grant the SendAs permission on the mailbox to [email protected].
Box 1: We use the –Shared option to create a shared mailbox with the name of Sales1.
Box 2. We use the Add-RecipientPermission to add a permission (in this case SendAs permission) to the Sales1 mailbox.
Box 3. We need to select the SendAs permission to enable User1 to send messages from the Sales1 mailbox
Box 4. We need the –Trustee option to enable us to specify that we’re granting the SendAs permission to a user ([email protected]).
https://technet.microsoft.com/en-gb/library/ff935839(v=exchg.150).aspx

QUESTION 14
Your company subscribes to an Office 365 Plan E3.
A user named User1 installs Office Professional Plus for Office 365 on a client computer.
From the Microsoft Online Services portal, you assign User1 an Office Professional Plus license. One month after installing Office, User1 can no longer save and edit Office documents on the client computer.
User1 can open and view Office documents.
You need to ensure that User1 can save and edit documents on the client computer by using office.
What should you do?

A.    Install the Office Customization Tool.
B.    Reinstall Office Professional Plus.
C.    Install the Microsoft Online Services Sign-in Assistant.
D.    Upgrade the subscription to Plan E4.

Answer: C

QUESTION 15
Your company has a hybrid deployment of Office 365.
You need to identify which certificate is used for token signing between the on-premises environment and Office 365.
Which tool should you use?

A.    the Exchange Management Console
B.    the AD FS 2.0 Management console
C.    the Active Directory Domains and Trusts snap-in
D.    the Office 365 portal
E.     the Certificates snap-in

Answer: B
Explanation:
AD FS creates a self-signed certificate by default. You are able to modify this certificate to a CA-issued certificate by using the AD FS management snap-in. Therefore it stands to reason that to identify which certificate is used for token signing between the on-premises environment and Office 365, you would have to access the AD FS 2.0 Management console.
Incorrect Answers:
A: The Exchange Management Console is a graphical representation of all the resources and components of an Exchange organization. It will not, however, identify which certificate is used for token signing between the on-premises environment and Office 365.
C: The Active Directory Domains and Trusts snap-in is used manage domain trusts, domain and forest functional levels, and user principal name (UPN) suffixes. It will not, however, identify which certificate is used for token signing between the on-premises environment and Office 365.
D: The Office 365 portal is used for sing-in and deployment, but not to identify which certificate is used for token signing between the on-premises environment and Office 365.
E: The Certificates snap-in can be used to view certificates linked to Active Directory Domain Services (AD DS). It will not, however, identify which certificate is used for token signing between the on-premises environment and Office 365
https://support.office.com/en-us/article/Plan-for-third-party-SSL-certificates-for-Office-365-b48cdf63-07e0-4cda-8c12-4871590f59ce?ui=en-US&rs=en-US&ad=US
https://msdn.microsoft.com/en-us/library/cc505909.aspx
https://technet.microsoft.com/en-us/library/cc770299.aspx
https://technet.microsoft.com/en-us/library/cc725751.aspx

QUESTION 16
Your company has an Office 365 subscription.
A user named Test5 has a mailbox.
You need to ensure that all of the email messages sent and received by Test5 are accessible to members of the audit department for 60 days, even if Test5 permanently deletes the messages. What should you do?

A.    Run the Set-User cmdlet.
B.    Run the Set-Mailbox cmdlet.
C.    Run the Set-RetentionPolicyTag cmdlet.
D.    Run the Set-MailboxDatabase cmdlet.
E.    Run the Set-RetentionPolicy cmdlet.

Answer: B
Explanation:
The AuditLogAgeLimit parameter of the Set-Mailbox cmdlet allows you to stipulate how long audit logs for a mailbox are retained. Logs older than the specified period are removed. The default value is 90 days.
Incorrect Answers:
A: The Set-User cmdlet is used to alter user attributes in Active Directory.
C: The Set-RetentionPolicyTag cmdlet is used to alter the properties of a retention tag, which is used to apply message retention settings to folders and items in a mailbox.
D: The Set-MailboxDatabase cmdlet is used to configure a variety of properties for a mailbox database, not the mailbox itself.
E: The Set-RetentionPolicy cmdlet is used to alter the properties of the current retention policy.
https://technet.microsoft.com/en-us/library/bb123981(v=exchg.150).aspx
https://technet.microsoft.com/en-us/library/aa998221(v=exchg.150).aspx
https://technet.microsoft.com/en-us/library/dd298042(v=exchg.150).aspx
https://technet.microsoft.com/en-us/library/bb123971(v=exchg.150).aspx
https://technet.microsoft.com/en-us/library/dd335196(v=exchg.150).aspx

QUESTION 17
You deploy Office 365. All the members of a team named Sales have full access to a shared mailbox named Sales.
You enable auditing for all shared mailboxes.
From the Sales mailbox, an email message that contains inappropriate content is sent.
You need to identify which user sent the message.
What should you do?

A.    From the Exchange Control Panel, run an administrator role group report.
B.    From Windows PowerShell, run the Get-SharingPolicy cmdlet.
C.    From Windows PowerShell, run the Write-AdminAuditLog cmdlet.
D.    From Windows PowerShell, run the New-MailboxAuditLogSearch cmdlet.

Answer: D
Explanation:
By process of elimination:
The Write-AdminAuditLog cmdlet will write a comment to the administrator audit log.
The Get-SharingPolicy cmdlet allows you to view the settings of sharing policies
The administrator role group report in EOP will list changes to the management role groups within a particular time frame.
The New-MailboxAuditLogSearch cmdlet performs an async search of mailbox audit logs for the specified mailboxes and sends the search results by email to the specified recipients.
https://technet.microsoft.com/en-us/library/ff522362%28v=exchg.150%29.aspx

QUESTION 18
Your company deploys Microsoft Lync Online.
You deploy the Microsoft Lync 2010 client to all client computers.
All users log on to the local domain.
You need to prevent users from modifying the Advanced Connection Settings on the Lync 2010 client.
What should you do?

A.    Deploy a Group Policy object (GPO) that uses the Communicator.adm administrative
template.
B.    Deploy a Group Policy object (GPO) that removes all of the members of the local
Administrators group.
C.    From the Lync Server Management Shell, run the Set-CsClientPolicy cmdlet.
D.    From the Lync Server Management Shell, run the Set-CsUserServicesConfiguration cmdlet.

Answer: A
Explanation:
A group policy object (GPO) is used to configure client and server settings in an Active Directory domain. For client computer settings, the settings are applied when the computer starts up.
By installing Communicator.adm administrative template, you will add Lync specific client settings to a group policy. This will enable you to configure Lync client settings and deploy the settings to all client computers that run the Lync Client software. By configuring the Advanced Connection Settings using a group policy object, you will prevent the users from modifying the settings.
Incorrect Answers:
B: You should not deploy a GPO that removes all members from the Local Administrators group. Some users need to be members of the Local Administrators group.  For example, in an Active Directory domain, the Domain Admins group needs to be a member of the local Administrators group on all computers. Therefore, this answer is incorrect.
C: The Set-CsClientPolicy cmdlet is used to configure client policies. Client policies are applied each time a user accesses the Lync system, regardless of where the user logs on from and regardless of the type of device the user logs on with. The client policy is applied after the client connects which means the advanced connection settings of the Lync client are already configured to allow the client to connect. The client policy does not affect the advanced connection settings of the client. Therefore, this answer is incorrect.
D: The Set-CsUserServicesConfiguration cmdlet modifies an existing collection of User Services configuration settings. The User Services service is used to help maintain presence information and manage conferencing. It does not affect the advanced connection settings of the client. Therefore, this answer is incorrect.
https://www.microsoft.com/en-in/download/details.aspx?id=27217
https://technet.microsoft.com/en-us/library/gg398340.aspx
https://technet.microsoft.com/en-us/library/gg398300.aspx

QUESTION 19
Drag and Drop Question
You are the Office 365 administrator for your company.
User1 has shared a link to edit a document with an external user.
The shared document must not be modified.
You need to update the sharing permissions so that the external user can display, but not modify, the document.
In which order should you perform the actions? To answer, move all actions from the list of actions to the answer area and arrange them in the correct order.

Answer:

Explanation:
The external user has already been invited to access the document. Therefore, the name of the external user will be listed under Access Requests and Invitations in the Site Settings page of the document library. We can select the user and modify the permissions to the document to Read only. After modifying the permission, we need to resend the invitation.

QUESTION 20
Drag and Drop Question
Your company uses Office 365 and Microsoft SharePoint Online.
You are the SharePoint Online administrator.
You need to set up resource monitoring and quota monitoring for the environment.
What should you do? To answer, drag the appropriate terms to the correct targets. Each term may be used once, more than once, or not at all.
You may need to drag the split bar between panes or scroll to view content.

Answer:

Explanation:
To set the server resource quota
1.    Browse to the SharePoint Online admin center.
2.    On the Site Collections tab, choose one or more site collections.
3.    Click Server Resource Quota.
4.    In the Limit server resource quota dialog box, enter a maximum number of resources. The default number of available resources for a site collection depends on the number of users in your tenant. (Notice that this dialog lists the total number of resources that are available to you.)
5.    Check the box to send an email alert that notifies you when the resource usage level is nearing its limit. Enter a number from 1 to 100 for the percentage of server resource limit to reach before an email alert is triggered.
https://support.office.com/en-gb/article/Manage-SharePoint-Online-server-resource-quotas-for-sandboxed-solutions-90e4eaaa-899a-48d6-b850-f272366bf8cc

All Microsoft 70-347 exam questions are the new checked and updated! In recent years, the 70-347 certification has become a global standard for many successful IT companies. Want to become a certified Microsoft professional? Download Lead2pass 2017 latest released 70-347 exam dumps full version and pass 70-347 100%!

70-347 new questions on Google Drive: https://drive.google.com/open?id=0B3Syig5i8gpDalV6YXc3bU0wZlk

2017 Microsoft 70-347 exam dumps (All 208 Q&As) from Lead2pass:

http://www.lead2pass.com/70-347.html [100% Exam Pass Guaranteed]