Limited Time Discount Offer 30% Off - Ends in 02:00:00

×

Microsoft 70-284 Exam - Installing, Configuring, and Administering Microsoft Exchange 2003 Server

Questions & Answers for Microsoft 70-284

Showing 1-15 of 209 Questions

Question #1 - Topic 1

You are the Exchange administrator for your company. All seven servers in the Exchange
organization run Exchange Server 2003. Your company acquires another company that
uses a single Novell GroupWise server that runs on NetWare. The GroupWise mailboxes
are assigned SMTP addresses in a namespace that is different from the namespace used
by the Exchange mailboxes. For business reasons, it is not possible for you to migrate the
GroupWise users to Exchange immediately. You configure one of the Exchange servers,
which has no local mailboxes, as a dedicated bridgehead server for communications to the
GroupWise server. Exchange users can see the GroupWise users in the Exchange global
address list (GAL) and can send messages to them. However, when the Exchange users
want to send meeting requests, they cannot view the free or busy status of GroupWise
users. You need to ensure that the Exchange users can view the free or busy status of the
GroupWise users. What should you do?

A. On the Exchange bridgehead server, create an SMTP connector to one of the GroupWise SMTP bridgehead servers.

B. On the Exchange bridgehead server, add a replica of the Schedule+ Free Busy folder.

C. On the Exchange bridgehead server, install the Gateway Service for NetWare.

D. On all Exchange servers, install the Microsoft Exchange Connector for Novell GroupWise.

E. On the Exchange bridgehead server, configure the Calendar Connector.

Explanation:
The Calendar Connector always stores free and busy information in its administrative
group's public folder, specifically the Schedule+ Free Busy public folder. If there are
multiple administrative groups on an Exchange 2003 server, each administrative group has
its own public folder. In this case, free and busy information for Exchange 2003 users may
be stored in a different public folder than the free and busy information for users on partner
computers. You cannot initiate real-time queries to downstream Exchange 2003 routing
groups. Exchange users in routing groups that are not directly connected by the Calendar
Connector to a partner system (routing groups downstream of the routing group in which
the Calendar Connector is installed) are not able to initiate real-time queries. Instead, they
receive the calendar data that has been replicated from the Calendar Connectors site
(routing group). If you want to provide real-time free and busy access to all Exchange
users, install and configure a Calendar Connector in each Exchange site (routing group).
There is no way to relay a real-time free and busy query over a Site Connector or Routing
Group connector.
You cannot use the Calendar Connector as a free and busy switch between Notes and
GroupWise. Exchange does not support free and busy switches or queries from one
partner computer to another by using Exchange as a backbone. In addition, you cannot use
a partner computer as a backbone between two Exchange computers.
You cannot configure multiple Calendar Connectors in a single administrative group that
connects to the same partner post office
Reference
Appendix B - Configuration Procedures for Migrating from Novell Groupwise Messaging
Functionality

Question #2 - Topic 1

You are the Exchange administrator for your company. The company's network consists of
a single Active Directory domain. You attempt to install Exchange Server 2003 on your
existing Exchange Server 5.5 computer. Setup fails, and you receive the following error
message: "This version of Microsoft Exchange does not support upgrading from Exchange
Server 5.5." You need to ensure that Exchange Server 2003 can be installed on the
existing Exchange 5.5 server. What should you do?

A. Run the commands to clean and prepare the forest and to prepare the domain for Exchange Server 2003.

B. Install the Exchange Server 2003 Active Directory Connector (ADC).

C. Upgrade the operating system of the Exchange 5.5 server to Microsoft Windows Server 2003.

D. Upgrade the Exchange 5.5 server to Exchange 2000 Server.

Explanation: Explanation
An in-place upgrade from Exchange Server 5.5 to Exchange 2003 is not supported.
Because they ask to us for an in-place upgrade, an upgrade to Exchange 2000 is required.
After migrate to Exchange 2000 migrate from Exchange 2000 to Exchange 2003.
References
Considerations When You Upgrade to Exchange Server 2003 822942
Overview of Operating System and Active Directory Requirements for Exchange Server
2003 822179
XADM: Description of Exchange Server Migration Methods 327928

Question #3 - Topic 1

You are the Exchange administrator for your company. All Exchange servers run Exchange
Server 2003. The company's new written security policies require encryption for all internal
e-mail messages that contain confidential information. A domain administrator installs and
configures a certification authority (CA) on the network and uses a self-signed certificate to

A. Use the CA to create and publish a Certificate Trust List (CTL) on a network share that is accessible to all users.

B. Instruct all users to send a digitally signed message to the Everyone distribution list.

C. Request a domain administrator to create a Group Policy object (GPO) that configures all client computers to trust the CA.

D. Export the root certificate of the CA to a file. Send the file in e-mail to all users and instruct them to save it on their client computers.

Explanation:
A CTL is a list of trusted certification authorities (CAs) for a particular
Web site. You can use CTLs to configure your Web server to accept
certificates from a specific list of CAs, and automatically verify client
certificates against this list. Only users with a client authentication
certificate that is issued by a CA in the CTL can gain access to the server.
Each Web site on your server can be configured to accept certificates from a
different CTL. You may want to do this if you need a different list of
trusted CAs for each Web site.
Incorrect answers
* All client computers request a domain administrator to create a Group
Policy object (GPO) that configures the computer policy.
* Exporting the root certificate to a file and sending the file in e-mail
to all users will expose your PKI Root certificate.
Reference
Encryption and Message Security Overview 286159
Quick Start Guide for SMIME for Exchange Server 2003 MS white paper
HOW TO: Configure Certificate Trust Lists in Internet Information Services
5.0 313071

Question #4 - Topic 1

You are the Exchange administrator for Fabrikam, Inc. The network consists of a single
Active Directory domain named fabrikam.com. Exchange Server 2003 is used as the
companywide messaging system. The Exchange organization includes two mailbox
servers. The perimeter network contains one front-end server named owa1.fabrikam.com,
which hosts Microsoft Outlook Web Access. The relevant portion of the network is
configured as shown in the exhibit. (Click the Exhibit button.) The external firewall is
configured to allow limited access to the servers on the perimeter network and the internal
network. Internet users access all servers behind the external firewall by using the IP
address of the firewall's external interface. The internal firewall is configured to allow limited
access to the servers on the internal network by using the actual IP address of each
internal server. Users report that they cannot access owa1.fabrikam.com from the internal
network or the Internet. You need to ensure that all users can access e-mail by using
Outlook Web Access on owa1.fabrikam.com. Which two actions should you perform?
(Each correct answer presents part of the solution. Choose two.)

A. On the internal DNS server, configure a new host (A) resource record that maps owa1.fabrikam.com to the actual IP address of the server.

B. On the perimeter DNS server, configure a new host (A) resource record that maps owa1.fabrikam.com to the actual IP address of the server.

C. On the internal DNS server, configure a new host (A) resource record that maps owa1.fabrikam.com to the IP address of the external interface of the external firewall.

D. On the perimeter DNS server, configure a new host (A) resource record that maps owa1.fabrikam.com to the IP address of the external interface of the external firewall.

Explanation: Explanation
In this scenario, we have OWA in the perimeter zone. We have two network cards, one is
connected to internal network, and the other is the external IP address that is accessed
from Internet.
If we would like to provide access to the OWA in the perimeter zone, we need to provide
DNS resolution for their IP address in the internal network, to do that we just need to add
their IP address to our internal DNS.
If we would like to provide external access from internet we need to provide DNS resolution
form our external DNS to the external IP address of the OWA server.
References
Planning an Exchange Server 2003 http://www.microsoft.com/exchange/library

Question #5 - Topic 1

You are the Exchange administrator for your company. The network consists of a single
Active Directory domain. Exchange Server 2003 is used as the companywide messaging
system. The relevant portion of the network is configured as shown in the exhibit. (Click the
Exhibit button.) ISA1 runs Microsoft Internet Security and Acceleration Server. OWA1 is
configured as a front-end server that runs Microsoft Outlook Web Access. ISA1 is
configured to permit Internet users to access their e-mail by using Outlook Web Access on
OWA1. ISA1 also permits Internet mail servers to send SMTP mail to Exch1. Users report
that they cannot access OWA1 from the Internet. However, the same users can
successfully access OWA1 from the internal network. You discover that all Internet mail
servers can successfully send SMTP mail to Exch1. You need to ensure that all users can
access OWA1 from the Internet and from the internal network. What should you do?

A. Configure the perimeter network adapter on ISA1 to use 192.168.1.1 as the default gateway. Configure the Internet-facing network adapter to use 10.1.1.254 as the default gateway.

B. Configure the Internet-facing network adapter on ISA1 to use 10.1.1.254 as the default gateway. On the perimeter network adapter, configure a static route to the 172.16.1.0/16 network by using 192.168.1.1 as the gateway.

C. Configure the network adapter on OWA1 to use 192.168.1.254 as the default gateway. Configure a static route to the 172.16.1.0/16 network by using 192.168.1.1 as the gateway.

D. Configure the network adapter on OWA1 to use both 192.168.1.254 and 192.168.1.1 as default gateways.

Explanation:
After you set the external NIC on the ISA Server computer to use an Internet IP address,
you need to configure ISA Server to listen on that IP address for incoming Web requests.
This configuration is necessary for ISA Server to respond to Web page requests such as
Outlook Web Access or Outlook Mobile Access traffic.
Make sure the IP address of the ISA Server computer's internal NIC is static. This
configuration is necessary because you need to configure secure network address
translation (SecureNAT) clients, such as your inbound SMTP server, and point them to the
internal IP address of your ISA Server. If the IP address on your internal NIC changes, you
need to manually update those clients. When you use a static IP address, you avoid this
problem.
After you place your ISA Server computer in the perimeter network and configure your
internal and external NICs, ISA Server is ready to start acting as the gatekeeper for
inbound and outbound Internet traffic. To do this, you need to configure inbound and
outbound e-mail traffic to go through ISA Server.
All inbound Internet traffic bound to your Exchange servers, such as Microsoft Office
Outlook Web Access, RPC over HTTP communication from Microsoft Office
Outlook 2003 clients, Outlook Mobile Access, Post Office Protocol version 3 (POP3),
Internet Message Access Protocol version 4rev1 (IMAP4), and so on are processed by ISA
Server. When ISA Server receives a request from a client application such as Outlook 2003
to access information on an Exchange server, ISA Server routes the request to the
appropriate Exchange servers on your internal network. The internal Exchange servers
return the requested data to ISA Server, and then ISA Server sends the information to the
client through the Internet.

Question #6 - Topic 1

You are the Exchange administrator for your company. The Exchange organization
contains 10 servers that run Exchange Server 2003. All users send and receive e-mail
messages by using Microsoft Outlook. Your company has many different departments and
a total of 10,000 users. For each department, management asks you to create one address
list that contains all users in that department. Management also asks you to create a
confidential address list. The membership of the confidential address list will consist of
several users from every department. For each department, you create an address list that
uses the department attribute. Now you need to create the confidential address list. You
must ensure that members of the Managers group are the only users who can identify the
members of the list by using Outlook. You must not affect any existing e-mail functionality.
What should you do?

A. Modify the permissions on the user accounts of individuals in the confidential address list so that only the Managers group has permission to send e-mail messages to these accounts. Create a confidential address list that includes the required user accounts.

B. Modify the permissions on the user accounts of individuals in the confidential address list so that only the Managers group has permission to view these accounts. Create a confidential address list that includes the required user accounts.

C. Configure the department attribute as Confidential for the user accounts of individuals in the confidential address list. Create an address list that uses the department attribute. Modify the permissions on the address list so that only the Managers group has permission to view its membership.

D. Configure a custom attribute as Confidential for the user accounts of individuals in the confidential address list. Create an address list that uses the custom attribute. Modify the permissions on the address list so that only the Managers group has permission to view its membership.

Explanation:
In order to prevent affecting the current e-mail functionality, the use of a custom attribute is
required. There are 15 custom attributes available in Exchange 2003 for defining things
such as special memberships. Enabling and grouping based on these attributes will not
affect any other distribution lists.

Question #7 - Topic 1

You are the Exchange administrator for your company. The network consists of a single
Active Directory domain that contains two domain controllers. Each domain controller runs
Microsoft Windows Server 2003 and is configured as a DNS server. Each DNS server is
configured with root hints for resolving Internet host names. The Exchange organization
contains two servers that run Exchange Server 2003. One Exchange server is configured
with two network adapters and two SMTP virtual servers. One SMTP virtual server is
configured for internal e-mail, and the other is the bridgehead server for an SMTP
connector that delivers all Internet e-mail messages. The Internet SMTP virtual server is
configured to use a DNS server at an ISP as an external DNS server. The firewall
configuration for your company is modified to permit only domain controllers to make DNS
queries to the Internet. Users report that they can no longer send e-mail messages to
recipients on the Internet. However, they can receive e-mail messages from the Internet.
You need to ensure that users can use the Internet to send and receive e-mail messages.
What should you do?

A. Configure the Internet SMTP virtual server to use a smart host to deliver e-mail messages. Use the fully qualified domain name (FQDN) of an SMTP server managed by the ISP as the smart host.

B. Configure the SMTP connector to use a smart host to deliver e-mail messages. Use the fully qualified domain name (FQDN) of an SMTP server managed by the ISP as the smart host.

C. Reconfigure the Internet SMTP virtual server to not use an external DNS server.

D. Reconfigure the network adapter used by the Internet SMTP virtual server to use the DNS server at the ISP.

Explanation: Explanation
This would mean that the internal DNS servers (which have root hints) would be used and
this would send and resolve MX records.

Question #8 - Topic 1

You are the Exchange administrator for your company. One front-end server and three
back-end servers run Exchange Server 2003. The front-end server provides remote users
with access to Microsoft Outlook Web Access. The only server that is accessible from the
Internet is the front-end server. Many users report problems to the help desk when using
Outlook Web Access for the first time. You discover that the majority of the problems are a
result of the users' lack of familiarity with Outlook Web Access. You need to ensure that
users are automatically presented with a customizable Help and Outlook Web Access
logon Web page. Which two actions should you perform? (Each correct answer presents
part of the solution. Choose two.)

A. Create an Active Server Pages (ASP) sign-on page for each back-end server.

B. Enable forms-based authentication on the front-end server.

C. Enable SSL on the front-end server. Require all users to use SSL when they connect.

D. Enable SSL on all the back-end servers. Require all users to use SSL when they connect.

E. Set the HTTP Exchange virtual directory's Execute permissions to allow scripts.

Explanation: Explanation
Enabling forms based authentication on the SMTP virtual server will allow the form to be
displayed when the user attempts to connect to the OWA server. Enabling Forms Based
Authentication requires that you configure SSL and restart the IIS service.

Question #9 - Topic 1

You are the Exchange administrator for your company. The company's network consists of
a single Active Directory forest. The forest contains three domains named Domain1,
Domain2, and Domain3. The functional level of the domains is Windows 2000 mixed.
Domain1 contains a single Exchange 2000 Server computer named Exch1. Domain2
contains a single Exchange 2000 Server computer named Exch2. Domain3 contains a
single Exchange Server 5.5 computer named Exch3, which runs Windows 2000 Server.
Exchange 2000 Server Active Directory Connector (ADC) is installed on Exch1 and Exch2.
There is a two-way connection agreement on Exch1. This connection agreement replicates
changes between Domain1 and Exch3. There is also a two-way connection agreement on
Exch2. This connection agreement replicates changes between Domain2 and Exch3. You
upgrade ADC on Exch1 to Exchange Server 2003 ADC. The connection agreement
updates and replicates normally. Then you notice that the connection agreements on
Exch2 stop replicating. You need to ensure that all connection agreements are replicating
properly. What are two possible ways to achieve this goal? (Each correct answer presents
a complete solution. Choose two.)

A. Promote Exch2 to a domain controller and a global catalog server.

B. Raise the functional level on Domain3 to Windows 2000 native.

C. Move all connection agreements from Exch2 to Exch1.

D. Upgrade ADC on Exch2 to Exchange Server 2003 ADC.

Explanation: Explanation
Because Exch1 is already working, we can achieve the solution by moving the agreements
from Exch2 to Exch1. Because of the different ADC versions are running, they also need to
upgrade ADC in the Exch2 domain.
Reference
Exchange 2003 Administration guide

Question #10 - Topic 1

You are the Exchange administrator for your company. All network computers are
members of a single Active Directory domain. The relevant portion of the network is
configured as shown in the exhibit. (Click the Exhibit button.) DC1 is a domain controller.
Mail1 and Mail2 run Exchange Server 2003. Users at each office use the local Exchange
server for e-mail. Users at the branch office report that when they create e-mail messages,
there are occasionally problems resolving e-mail addresses to names. When these
problems occur, an administrator at the branch office restarts Mail2. If the administrator
tries to restart Mail2 immediately, the Exchange services fail to start. If the administrator
waits 10 minutes before restarting Mail2, the Exchange services usually start correctly and
the problems disappear. When these problems occur, users can still log on to their client
computers. You receive no response when you attempt to ping Mail1 from Mail2. You need
to prevent these e-mail problems and server problems from occurring. What are two
possible ways to achieve this goal? (Each correct answer presents a complete solution.
Choose two.)

A. Configure Mail2 as a front-end server only. Move all user mailboxes to Mail1.

B. Configure the routers between the main office and the branch office to place a high priority on LDAP traffic.

C. Create a VLAN that places both office networks in a single logical IP address range.

D. Install a domain controller at the branch office. Configure the new domain controller to host the global catalog.

E. Install a backup frame-relay line between the main office and the branch office.

Explanation:
* Adding an additional frame relay line will help since the issue lies with the Global Catalog
not responding in a timely manner. When the administrator reboots the server immediately,
the probable cause for it not coming back successfully is that the WAN link is saturated and
Exchange cant contact a Global Catalog. Adding a line will lessen the load and allow the
contact of the GC.
* Adding a Global Catalog server to the branch office will allow the name attributes to be
looked up quicker and locally in the GC. Since the resolution would not be dependent upon
the WAN connection, the name resolution would occur, and if the Exchange server had to
be restarted, it could be using the local GC as its contact.

Question #11 - Topic 1

You are the Exchange administrator for Fabrikam, Inc. The network consists of a single
Active Directory forest. The forest root domain is named domain.root. The domain structure
is shown in the work area. You plan to implement Exchange Server 2003 as the
companywide messaging system. Exchange servers must be deployed only in the
fabrikam.com and london.fabrikam.com domains. Each domain in the fabrikam.com tree
must contain mailbox-enabled users and mail-enabled groups. You need to run the
appropriate command or commands to ensure that the Active Directory infrastructure is
prepared to support this implementation. Your solution must require the minimum amount
of administrative effort. Which setup command or commands should you run, and in which
domains? To answer, drag the appropriate setup command or commands to the correct
domain or domains in the work area.

Question #12 - Topic 1

You are the Exchange administrator for your company. The relevant portion of the network
is configured as shown in the following diagram. The network serves two offices, one in
London and one in Paris. Each office contains a single Exchange Server 2003 computer in
its own routing group. The routing groups are connected by a routing group connector. The
only network traffic between the two offices is e-mail messages. There is a permanent
WAN link that connects the two offices. The WAN link is connected to a hardware router in
each office. The two hardware routers each also have an ISDN dial-up interface. Demand-
dial routing is defined between the two offices. You view network utilization statistics in the
Paris office, and you discover that traffic from the Paris Exchange server frequently causes
the ISDN link to connect. There is little utilization of the permanent WAN link between the
two offices. The WAN link has been very reliable and has suffered no downtime. You need
to ensure that the ISDN link is used only when the permanent WAN link fails. What should
you do in the Paris office?

A. On the Exchange server, replace the routing group connector with an SMTP connector that uses the London Exchange server as a smart host.

B. On the Exchange server, replace the routing group connector with an SMTP connector that uses the ETRN command.

C. On the Exchange server, create a TCP/IP static route to the London Exchange server.

D. Request the network administrator to remove the IP route that uses the ISDN link from the routers.

E. Request the network administrator to reconfigure the routers, so that the IP route that uses the ISDN link is assigned a higher cost than the permanent WAN link.

F. Request the network administrator to reconfigure the routers, so that the IP route that uses the ISDN link is assigned a lower cost than the permanent WAN link.

Explanation:
When you assign a higher cost to a route, that route will only be used if the primary line
fails.

Question #13 - Topic 1

You are the Exchange administrator for your company. Exchange Server 2003 is
implemented as the companywide messaging system. The Exchange server runs on
Windows 2000 Server. The relevant portion of the network is configured as shown in the
exhibit. (Click the Exhibit button.) Company e-mail policies state that Internet users must be
able to securely download e-mail messages, view downloaded e-mail messages on their
local computers, send outbound e-mail messages, and access the company's internal e-
mail address list. You need to configure the firewall to meet these requirements. Which
three ports should you make accessible to Internet users? (Each correct answer presents
part of the solution. Choose three.)

A. Global catalog LDAP

B. HTTPS

C. RPC endpoint mapper

D. IMAP4 SSL

E. SMTP

Explanation:
Lets dissect this question first. The question states 4 requirements here :
Requirement 1 : Internet user must be able to securely download email
messages.
Requirement 2 : View downloaded email messages on their local computers.
Requirement 3 : Send outbound email messages
Requirement 4 : Access the companies Global Address List (GAL)
One other important piece of information is that the server is running
Windows 2000 as operating system. Now RPC over HTTPS only works if you have
Outlook 2003 running on Windows XP with SP1 (or higher) connected to a
windows 2003 Server with Exchange 2003. So answer B and C can be crossed out
since we can not use them seperately, otherwise requirement 1 will not be
met.
We should open up the GC LDAP port since we need to have the GAL list
available. (requirement 4)
We should also open up the IMAP4 SSL port since we need to SECURELY DOWNLOAD
email messages. As an result we can see the DOWNLOADED messages on our local
computers (requirement 1)
Finaly we need to open up the SMTP port since we need to send outbound
messages from our client to the exchange server. (requirement 3)
Some people might think that answer A,B,E would be correct. We could setup
OWA running over HTTPS, however we would not meet requirement 1 and 2.
Because we would not DOWNLOAD email messages to our LOCAL computer, but only
VIEWING them on the OWA Exchange server.

Question #14 - Topic 1

A. Start the Microsoft Exchange Information Store service and mount the default mailbox store.

B. Create an SMTP connector and associate the connector with the namespace of adatum.com. Specify Mail1 as a smart host.

C. Configure the default SMTP virtual server to forward all mail with unresolved recipients to Mail1.

D. Configure the default SMTP virtual server to send a copy of the NDRs to the e-mail address of administrator@adatum.com.

Explanation: Dismount and delete stores if necessary:If you are not running SMTP,
dismount and delete all mailbox stores.If you are running SMTP, leave a mailbox store
mounted, but make sure the mailbox store does not contain any mailboxes. If you receive
large amounts of external e-mail for public folders, you can mount a public store, as this will
improve mail delivery to public folders...."
http://www.microsoft.com/technet/prodtechnol/exchange/guides/E2k3FrontBack/54fe7ee5-
c35d-4cfa-a7c8-28955a191942.mspx

Question #15 - Topic 1

You are the Exchange administrator for Wingtip Toys. Wingtip Toys acquires a company
named Tailspin Toys. Wingtip Toys has a single Active Directory forest named
wingtiptoys.com. Tailspin Toys has a single Active Directory forest named tailspintoys.com.
Wingtip Toys uses a directory synchronization tool to synchronize identity information
between the directory services. For business reasons, you cannot decommission either of
the two forests. Users will continue to use either wingtiptoys.com or tailspintoys.com as
their primary logon domain. Users in each forest have mailboxes on servers in their local
Exchange organization. When users in both forests search the global address list (GAL),
they must be able to see recipients from both forests. You need to create the required
directory objects in the two forests. For security reasons, you must create objects that have
only the minimum necessary rights and permissions. What should you do?

A. For every mailbox-enabled user object in the tailspintoys.com domain, create a mail- enabled enabled user object in the wingtiptoys.com domain. For every mailbox-enabled user object in the wingtiptoys.com domain, create a mail-enabled enabled user object in the tailspintoys.com domain.

B. For every mailbox-enabled user object in the tailspintoys.com domain, create a mail- enabled contact object in the wingtiptoys.com domain. For every mailbox-enabled user object in the wingtiptoys.com domain, create a mail-enabled contact object in the tailspintoys.com domain.

C. For every mailbox-enabled user object in the tailspintoys.com domain, create a mail- enabled disabled user object in the wingtiptoys.com domain. For every mailbox-enabled user object in the wingtiptoys.com domain, create a mail-enabled disabled user object in the tailspintoys.com domain.

D. For every mailbox-enabled user object in the tailspintoys.com domain, create a mail- enabled inetOrgPerson object in the wingtiptoys.com domain. For every mailbox-enabled user object in the wingtiptoys.com domain, create a mail-enabled inetOrgPerson object in the tailspintoys.com domain.

Explanation:
By creating contacts in each organization for the users in the other domain, the users can
access any users contact from their own GAL without requiring permissions.

WINTER SALE: 30% DISCOUNT
This is ONE TIME OFFER

You save
30%

Enter Your Email Address to Receive Your 30% Discount Code

WINTER SALE: 30% DISCOUNT

You save
30%

Use Discount Code:

A confirmation link was sent to your e-mail.

Please check your mailbox for a message from support@exam-labs.com and follow the directions.

Download Free Demo of VCE Exam Simulator

Experience Avanset VCE Exam Simulator for yourself.

Simply submit your e-mail address below to get started with our interactive software demo of your free trial.

  • Realistic exam simulation and exam editor with preview functions
  • Whole exam in a single file with several different question types
  • Customizable exam-taking mode & detailed score reports