Objective 7.3 Exchange 2010 Flashcards
Objective 7.3: Configure message integrity. (35 cards)
The exam might check that you know how to configure S/MIME to ______ emails and attachments so that only the intended recipient can open and read them.
encrypt
You can obtain a certificate either from your organization’s internal CA or from a trusted third-party CA. An internal certificate can be used in-house only. Typically, S/MIME clients require the installation of a certificate before permitting users to send ______ messages.
encrypted
OWA users can use S/MIME to encrypt ______ messages and attachments.
outgoing
OWA users can digitally sign a message such that its recipients can verify the identity of the sender and that the message has not been ______.
tampered with
Users must have a digital ID and must install the ______ control for OWA before they can send encrypted and digitally signed messages or read encrypted messages by using the OWA client.
Secure Multipurpose Internet Mail Extensions (S/MIME)
You can use the EMS ______ cmdlet to enable or disable S/MIME in OWA. You must use Internet Explorer 7 or higher and ensure that SSL is used by the OWA directory.
Set-OWAVirtualDirectory
The following command enables S/MIME for OWA: ______.
Set-OWAVirtualDirectory -Identity “owa (Default Web Site)” -SMimeEnabled $true
You can enable or disable S/MIME for OWA by configuring the OWA (Default Web Site) ______ dialog box in the EMC.
Properties
By default, S/MIME is enabled. You can also use the EMS. The following command disables S/MIME on the OWA virtual directory, in the default IIS website, on the local server: ______.
Set-OWAVirtualDirectory -Identity “owa (Default Web Site)” -SMimeEnabled $false
You are expected to know that connections between SMTP servers on an organizational internetwork or the Internet rely on ______ for mutual authentication.
MTLS
You should be aware that in an MTLS connection, the server originating a message and the server receiving it exchange ______ from a mutually trusted CA.
certificates
There are five steps required to implement MTLS. You need to: ______.
- generate a certificate request for the required certificates;
- import certificates to the Edge Transport servers;
- configure outbound domain security;
- configure inbound domain security; and
- test domain-secure mail flow.
You can test for the proper configuration of MTLS by enabling ______ logging on the connectors used to send and receive domain-secured emails.
verbose
For example, the following command enables verbose logging on a Receive connector named Internet: ______.
Set-ReceiveConnector Internet -ProtocolLoggingLevel Verbose
The following command enables verbose logging on a Send connector named InternetSend: ______.
Set-SendConnector InternetSend -ProtocolLoggingLevel Verbose
You can generate certificate requests by using the EMS ______ cmdlet. You can configure the request so that other services can use the same certificate and key pair. Issuing the cmdlet without parameters generates a selfsigned certificate. This certificate can be used for direct trust authentication and encryption between Edge Transport servers and Hub Transport servers.
New-ExchangeCertificate
You can use the ______ tool to test the certificate structure. It can also be used to verify a CRL.
Certutil
The following command issued at an elevated command prompt verifies a certificate chain: ______.
Certutil -verify c:<certificatefilename>.cer</certificatefilename>
______ organizations manage the accounts used to access shared resources.
Account
______ organizations, on the other hand, form the partnerships in single-sign on (SSO) scenarios.
Resource
An organization that has resources can use AD FS to simplify the authentication process to these resources by forming ______ that account organizations then join.
partnerships
A ______ is a statement that the federation server makes about a user or client.
claim
Claims can be based on several different values, such as user names, certificate keys, membership of security groups, and so on. They are included in the signed security token that AD FS sends to the web application and are used for ______.
authorization
AD FS communications must be encrypted at all times, and this requires several ______ types.
certificate