Skip Navigation Links

Microsoft - MS-220: Troubleshooting Microsoft Exchange Online

Sample Questions

Question: 73
Measured Skill: Troubleshoot Exchange Online configuration issues (15–20%)

A company uses Exchange Online.

A user named User1 schedules a meeting with a conference room mailbox named Conf1. Conf1 is already reserved for another meeting but does not automatically decline the conflicting meeting request.

You need to ensure that conflicting meeting requests sent to Conf1 are declined.

What should you do?

ARemove User1 from the RequestlnPolicy property list.
B Set the value of the AddNewRequestsTentatively property for the room mailbox to True.
C Remove User1 from the RequestOutOfPolicy property list.
D Remove User1 from the BooklnPolicy property list.

Correct answer: C


Exchange resource mailboxes can be defined as conference rooms or equipment.  Each of these mailboxes have a booking attendant service that is turned on by default.  Sending a scheduling request (a meeting invite) to a resource mailbox will trigger the booking attendant, and the booking attendant will respond to the scheduling request (approved or denied) based on the configured scheduling options.  The booking attendant can also be configured to forward scheduling requests to one or more delegates for approval or denial.

Automated Booking Policies are used to determine how the booking attendant responds to a scheduling request:

  • In Policy means the request does not violate any of the configured scheduling options.
  • Out of Policy means the request violated a configured scheduling option.  For example, the scheduled time is already booked by another user, or the duration is too long.

The scheduling options and automated booking policies can be used to configure how the booking attendant responds to a scheduling request.

The RequestOutOfPolicy parameter specifies users who are allowed to submit out-of-policy requests. We have to ensure that the parameter does not contain any users.

Reference: Set-CalendarProcessing

Question: 74
Measured Skill: Troubleshoot mail client issues (20–25%)

A company uses Exchange Online. The Exchange ActiveSync access setting is configured to quarantine.

A user named User1 removes a mobile device from Exchange.

When User1 tries to connect the same device to Exchange, the device is not quarantined.

You need to ensure that the device is quarantined.

How should you complete the command?

(To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point.)

ASet-Mailbox -Identity "User1" -ActiveSyncAllowedDeviceIDs $null
B Set-Mailbox -Identity "User1" -ActiveSyncBlockedDeviceIDs $null
C Set-User -Identity "User1" -ActiveSyncEnabled $null
D Set-ClientAccessRule -Identity "User1" -ActiveSyncMailboxPolicy $null
E Set-ClientAccessRule -Identity "User1" -ActiveSyncEnabled $null
F Set-CASMailbox -Identity "User1" -ActiveSyncAllowedDeviceIDs $null

Correct answer: F


Exchange ActiveSync access settings control what happens when a user connects a new mobile device to Exchange Online.

User1's mobile device was previously connected to Exchange Online and is known to the tenant. We need to use the ActiveSyncAllowedDeviceIDs parameter of the Set-CasMailbox cmdlet to reset the list of mobile devices that are allowed to sync with User1's mailbox. If the device subsequently tries to connect again, it will be subject to the Exchange ActiveSync access setting and quarantined.

Reference: Set-CASMailbox

Question: 75
Measured Skill: Troubleshoot Exchange Online configuration issues (15–20%)

A company uses Exchange Online.

A user named User1 reports that they are unable to add new delegates to and remove them from their calendar.

You need to resolve the issue.

How should you complete the command?

(To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point.)

ARemove-MailboxFolderPermission -Identity User1:\Calendar -ResetDelegateUserCollection
B Remove-MailboxFolderPermission -Identity User1:\Calendar -SharingPermissionFlags
C Set-MailboxFolderPermission -Identity User1:\Calendar -AccessRights
D Set-MailboxFolderPermission -Identity User1:\Calendar -SharingPermissionFlags
E Add-MailboxFolderPermission -Identity User1:\Calendar -ResetDelegateUserCollection
F Add-MailboxFolderPermission -Identity User1:\Calendar -AccessRights

Correct answer: A


We should make use of the Remove-MailboxFolderPermission cmdlet to reset the delegates configuration of User1's mailbox.

The ResetDelegateUserCollection parameter is available only in the cloud-based service.

The ResetDelegateUserCollection switch forces the removal of the LocalFreeBusy or the PR_FREEBUSY_ENTRYIDs files in case of corruption. You don't need to specify a value with this switch.

Use this switch if you encounter problems trying add, change, or remove delegate permissions. Using this switch deletes those files and downgrades any existing delegates to Editor permissions. You'll need to grant delegate permissions again using -SharingPermissionFlag Delegate.

When you use this switch, the value of Identity should be the user's primary calendar folder (for example,\Calendar).

Reference: Remove-MailboxFolderPermission

Question: 76
Measured Skill: Troubleshoot mail flow issues (20–25%)

A company uses Exchange Online.

The company configures an SMTP relay device. Users report they are unable to send email through the relay device.

You need to ensure that the relay device can send email by using SMTP AUTH.

Which two actions should you perform?

(Each correct answer presents part of the solution. NOTE: Each correct selection is worth one point.)

AInstruct users to specify a different email address when sending email.
B Configure the network firewall to allow traffic on port 443.
C Configure a licensed Microsoft 365 mailbox on the relay device.
D Configure the network firewall to allow traffic on port 587.

Correct answer: C, D


Client SMTP email submissions (also known as authenticated SMTP submissions) are used in the following scenarios in Office 365 and Microsoft 365:

  • POP3 and IMAP4 clients. These protocols only allow clients to receive email messages, so they need to use authenticated SMTP to send email messages.
  • Applications, reporting servers, and multifunction devices that generate and send email messages.

The SMTP AUTH protocol is used for client SMTP email submission, typically on TCP port 587. SMTP AUTH supports modern authentication (Modern Auth).

Features of SMTP AUTH client submission

  • SMTP AUTH client submission allows you to send email to people in your organization and outside your company.
  • This method bypasses most spam checks for email sent to people in your organization. This bypass can help protect your company IP addresses from being blocked by a spam list.
  • With this method, you can send email from any location or IP address, including your (on-premises) organization's network, or a third-party cloud hosting service, like Microsoft Azure.

Requirements for SMTP AUTH client submission

  • Authentication: If possible, we recommend using Modern Authentication in the form of OAuth. Otherwise, you'll need to use Basic Authentication (which is simply a username and password) to send email from the device or application.
  • Mailbox: You must have a licensed Microsoft 365 or Office 365 mailbox to send email from.
  • Transport Layer Security (TLS): Your device must be able to use TLS version 1.2 and above.
  • Port: Port 587 (recommended) or port 25 is required and must be unblocked on your network. Some network firewalls or ISPs block ports, especially port 25, because that's the port that email servers use to send mail.
  • DNS: Use the DNS name Do not use an IP address for the Microsoft 365 or Office 365 server, as IP Addresses are not supported.


How to set up a multifunction device or application to send email using Microsoft 365 or Office 365

Enable or disable authenticated client SMTP submission (SMTP AUTH) in Exchange Online

Question: 77
Measured Skill: Troubleshoot mail flow issues (20–25%)

A company uses Exchange Online.

Users report that emails sent to external recipients are not being received by the external recipients. The users do not receive nondelivery report (NDR) notifications.

You plan to perform a message trace. The trace report must meet the following requirements:
  • Display only emails sent to the external recipients.
  • Return email addresses for recipients. The recipients are unknown.
  • Display up to 40,000 results.
  • Identify emails up to 60 days.
You need to configure the trace definition. You select the sender.

Which three parts of the trace definition must you configure?

(To answer, select the appropriate options in the dialog box in the answer area. NOTE: Each correct selection is worth one point.)

B Recipients
C Time range
D Delivery status
E Message ID
F Direction

Correct answer: C, D, F


The message trace requires to set either the Senders option, the Recipients option, or the Message ID option. From the question, we know that the Senders option has been configured already. 

Note: From the Exchange Admin Center it is not possible to select external recipients only. Using PowerShell, we could use the following example to restrict tracing to email messages for external recipients:

Get-MessageTrackingLog -Sender | Where-Object {$_.recipients -notmatch ""}

We have to configure the time range to include the last 60 days. To achieve this we need to set a custom time period. If you select a period longer than 10 days, you can only view the results in a downloadable CSV file. The report type is automatically switched to Enhanced Summary Report when configuring the time range.

We should also set the Delivery status field to "Failed" and change the direction of messages to be searched from "All" to "Outbound" to exclude incoming messages for recipients within our organization from the trace.


Message trace in the modern Exchange admin center in Exchange Online

Message Trace FAQ in Exchange Online


Tags: exam, examcollection, exam simulation, exam questions, questions & answers, training course, study guide, vce, braindumps, practice test


© Copyright 2014 - 2022 by