Friday, November 22, 2013

Exchange Server 2007 Interview Questions & Answers

Microsoft Exchange Server 2007 Interview Questions & Answers

21. How Messages Get to Exchange from the Internet?
To follow the flow of messages in an Exchange 2007 environment with all of the various
Server roles, the following flow occurs:
  • An incoming message from the Internet first goes to the Edge Transport server.
  • The Edge Transport server performs first-level recipient validation as well as spam and virus filtering. The message is then passed on to the Hub Transport server.
  • The Hub Transport server performs compliance content assessment and then looks at the internal routing for messages and forwards the message to another Hub Transport server or directly to a Mailbox server.
  • The Mailbox server places the incoming message into the user’s mailbox and notifies the user that a message has arrived.
  • The user launches Outlook, OWA, their Windows Mobile device, or another client System and connects to the Client Access server. The Client Access server confirms the destination point of the user’s mailbox and provides the user access to their mailbox data.
  • In parallel, if a voice mail message comes in for a user, the Unified Messaging server processes the incoming voice message, and then takes the message and places the voice message into the user’s mailbox residing on the Mailbox server for the recipient.

22. What is Mail Exchange Record?
A mail exchange (MX) specifies a mail forwarder or delivery server for SMTP servers. MX records are the cornerstone of a successful Internet mail routing strategy.

23. File structures in exchange server 2007?
.CHK – check point file, keeps track of which transactional logs moves into database files. Keep on check the log file entering the database in a current order
.LOG - 2 types of transactional logs –
  • Current Transactional log – eoo.log file which write the current transactions into transactional logs. If it reaches 1 MB, it will rename the log file into E00000001.log
  • Transactional log – If Current Transactional log reaches 1 MB , it will rename the log file into E00000001.log

.EDB – Stores the database files
Temp.EDB – Temporary database file, which will process the transactional logs that are to be to write in .EDB Database file
.JRS – Reserved Log files – if the size of the disk is full and you can’t write any mails as transactional logs these files will help into action

24. Explain the difference between Exchange Management shell and windows Power shell?
The Exchange Management Shell is based on Microsoft Power Shell, which provides access to all .NET objects and classes. When the administrator installs Exchange Server 2007, the setup program automatically installs the .NET Framework and Power Shell. It also installs all the Exchange 2007 specific cmdlets.
The cmdlets were written by the Exchange 2007 team to perform Exchange-specific tasks.
There are over 350 cmdlets unique to Exchange and each cmdlet has its own set of help.

25. What is Viruses or Trojan horse messages?
Viruses have existed in the computer world long before the first email message was sent. However, just as email provides users with an easy method of communication, it also is an extremely efficient method of spreading malicious or troublesome code. Once considered the largest problem that email administrators had to face, viruses have been combated by an entire industry devoted to their prevention.

26. What is Spam?
The proliferation of unsolicited messages, often referred to as “spam” mail, has truly become the bane of the messaging world with recent estimates stating that spam accounts for 85%–90% of the messaging traffic on the Internet today. These unsolicited, usually unwanted, and often offensive advertisements cost companies and users billions of dollars annually in lost time and productivity. Unfortunately, because sending bulk messages to thousands (or millions) of recipients can be accomplished with very little expense, offending companies do not need a large response to maintain profitability. It is sad to note that as long as this method of advertising is profitable and effective, spam will be with us to stay. Fortunately, Exchange 2007 has several features to help alleviate the problem.

27. What is Address spoofing?
One tool that is commonly used by the distributors of both viruses and spam is known as address spoofing. By changing the From line in a Simple Mail Transfer Protocol (SMTP) message, users can often be fooled into opening a message that they think is from a friend or co-worker, only to find that the message originated somewhere else entirely. This method has been especially effective in the distribution of email worms. Because the message appears to come from a known associate, and often has an intriguing Subject line, the unwitting recipient opens the message and, if not properly protected, becomes a distributor of the virus to others.

28. What is Phishing?
Over the past several years, a relatively new type of fraudulent email has emerged. Known as phishing, this attack comes in the form of an official looking email message, often appearing to be from a reputable organization, such as a credit card company or a large electronics retailer. The message usually contains a link that, once clicked, brings up an official looking website—often an exact replica of the official site that is being mimicked. However, the fraudulent site has one purpose, to fool you into giving away personal information, such as passwords, credit card numbers, or Social Security numbers. With this information in hand, the offending party can steal your identity, make charges to your credit card, or otherwise profit from your loss.
29. What are the planning considerations in installing Edge transport Server?
  • Edge Transport Should not be included in Active Directory
  • Should be installed in a Standalone Server
  • Edge Transport Should not be Part of the domain
  • ADAM Should be installed
  • Prerequisites .Net framework, Windows Management Shell, MMC 3.0 to be installed
  • Two networks cards

30. What are the options available in Edge transport Server to configure?
  • Anti Spam / Anti Virus
  • Transport Rules and Accepted Domain
  • Address Rewriting

31. What is Edge Sync in Exchange Server 2007?
Edge Sync – it’s a one way replication from Hub Transport Server to Edge Transport Server, while Edge Sync happens the recipient configuration will be replicated from Active Directory to ADAM in Edge Transport Server

32. What is Address Rewriting?
Address Rewriting Agent runs in Edge Transport Server. The main purpose of Edge Transport Server is to rewrite the Address the address to some other address. This plays an important role, consider if there are 5 Sub domain inside a forest and the entire sub domain want send mail outside with a unique address space.

33. What happen if mails come into exchange server?
Once the mail comes into the exchange server it writes the mails as transactional logs and also the same in system memory simultaneously. What the transactional log will do in the sense, it will hold the mails for a while until the mailbox database is freed up. The transactional logs are 1 MB in size and if the mail comes with size of 5 MB, the transaction log will first write the 1Mb log and creates a another transactional log, it will write the log files until the mails have completed.

34. Suggest a good Storage solution for Exchange Server?
Operating System: System files to be backed up. RAID 0 or RAID1
Database Files: if we move the database to different disk and if you are making backup the transactional logs will be added into the Backup. Provides better recoverability, RAID5 (Stripe set with Parity)
Transactional Log Files: in order to handle load, it’s good to have Transactional log files in different disk. If both the log file and database file are in same disk, increase performance and reliability. RAID1 (Mirroring)

35. What are the preparation switches used in while installing exchange Server 2007? Why?
  • /prepare legacy exchange permissions – when we are having exchange 2000 or 2003 in our existing environment
  • /prepare schema – this will add various objects and attributes related to that object
  • /prepare AD – prepare the current domain and prepare a universal security group for the new exchange 2007 installation
  • /prepare domain “domain name”– only in the domain on the remote sites, or in the different domain going to have Exchange Server 2007

<< Page 1

No comments:

Post a Comment