Exam2pass
0 items Sign In or Register
  • Home
  • IT Exams
  • Guarantee
  • FAQs
  • Reviews
  • Contact Us
  • Demo
Exam2pass > Microsoft > Microsoft Certifications > 98-368 > 98-368 Online Practice Questions and Answers

98-368 Online Practice Questions and Answers

Questions 4

For each of the following statements, select Yes if the statement is true. Otherwise, select No. NOTE: Each correct selection is worth one point.

Hot Area:

Buy Now

Correct Answer:

Questions 5

Your company is deploying a new application on employee's personal Windows RT devices. The devices are registered with Microsoft Intune. You need to publish the new application to Microsoft Intune cloud storage so that the employees

can install the published application.

What are requirements of the published installation files?

A. In order to publish the files, Internet speed must be at least 50 kbps

B. The cumulative total file size for the published applications must be smaller than 2 GB

C. In order to upload the software, the files must be a .zip format

D. As many files as necessary may be uploaded, but no single file may be larger than 2 GB

Buy Now

Correct Answer: D

Before you publish computer apps to Microsoft Intune cloud storage make sure no single file size is larger than 2 GB.

Reference: Deploy apps to computers in Microsoft Intune https://technet.microsoft.com/en-us/library/dn646961.aspx

Questions 6

This question requires that you evaluate the underlined text to determine if it is correct.

"Windows Server Active Directory" enables single sign-on, which simplifies user access to thousands of cloud applications on Windows, Mac and iOS devices. Instructions: Review the underlined text. If it makes the statement correct, select

"No change is needed". If the statement is incorrect, select the answer choice than makes the statement correct.

A. No change is needed

B. Microsoft Account

C. Active Directory Rights Manager

D. Azure Active Directory

Buy Now

Correct Answer: D

Azure Active Directory is a comprehensive identity and access management cloud solution that provides a robust set of capabilities to manage users and groups. Azure Active Directory enables single sign-on to simplify user access to thousands of cloud applications from Windows, Mac, Android and iOS devices.

Reference: Identity and Access Management for the Cloud http://azure.microsoft.com/en-us/services/active-directory/

Questions 7

Which feature on Windows Phone 8.1 provides secure encryption of all user data stored locally on internal data partitions?

A. Secure Boot

B. Encrypted File System

C. BitLocker

D. TrueCrypt

Buy Now

Correct Answer: C

The Windows Phone OS supports using BitLocker technology to encrypt all user data stored locally on internal data partitions.

Reference: Secure boot and device encryption overview https://dev.windowsphone.com/en-US/OEM/docs/Phone_Bring-Up/Secure_boot_and_device_encryption_overview

Questions 8

You manage desktop computers for your university's computer labs. You recently upgraded these computers to Windows 8.1. You need to modify the configuration of the new computers to increase the number of items displayed in jump lists. Which configuration tool should you use?

A. Display Options

B. Control Panel Personalization applet

C. Device Manager

D. Taskbar properties

Buy Now

Correct Answer: D

By default up to 10 items can be added to a button's Jump List. For privacy reasons you may wish to reduce or eliminate this number. Conversely, if you find Jump Lists extremely useful you may wish to increase the number of displayed items.

1.

Right-click an empty area of the taskbar and choose "Properties".

2.

The "Taskbar and Start Menu Properties" multi-tabbed dialog box appears. Click the "Start Menu" tab.

3.

Click the "Customize" button.

4.

The "Customize Start Menu" dialog box appears. Underneath "Start menu size", next to "Number of recent items to display in Jump Lists", enter/select a value from 0-60.

Reference: Adjust Size of Jump Lists on Windows 7 Taskbar http://malektips.com/windows-7-jump-list-size-increase-decrease.html#.VWf-4M-qpBc

Questions 9

You are a desktop support engineer for an advertising company that uses Windows 8.1 workstations.

An employee who manages video content for the company website recently lost important video files due to a single-drive failure on a Windows 8.1 workstation. You need to prevent a single-drive failure from occurring again on this

employee's workstation, which only has a capacity for three physical hard drivers. Additionally, the employee requires optimal performance when manipulating and streaming video files.

Which Storage Space solution should you implement?

A. three-way mirror

B. parity spaces

C. simple spaces

D. two-way mirror

Buy Now

Correct Answer: B

Parity spaces (also known as RAID-5) are designed for storage efficiency and protect your files from drive failure by keeping more than one copy. Parity spaces are best for archival data and streaming media, like music and videos. This storage layout requires at least three drives to protect you from a single drive failure and at least seven drives to protect you from two drive failures.

Reference: Storage Spaces: FAQ http://windows.microsoft.com/en-us/windows-8/storage-spaces-pools

Questions 10

When you copy a file from one NTFS file system partition to a different NTFS partition, what happens to the file permissions of the copied file?

A. They are the combined permissions of the original file and destination folder

B. They inherit the permissions of the destination folder

C. They remain the same as the original

D. They are removed, and only the creator is given full control

Buy Now

Correct Answer: B

When you copy a protected file to a folder on the same, or a different volume, it inherits the permissions of the target directory.

Reference: http://www.ntfs.com/ntfs-permissions-files-moving.htm

Questions 11

Which type of information about users does biometrics evaluate?

A. phrases a user has memorized

B. where a user is located

C. physical characteristics of a user

D. objects a user carries with him or her

Buy Now

Correct Answer: C

Biometrics refers to authentication techniques that rely on measurable physical characteristics that can be automatically checked.

Note: There are several types of biometric identification schemes: face: the analysis of facial characteristics fingerprint: the analysis of an individual's unique fingerprints hand geometry: the analysis of the shape of the hand and the length of the fingers retina: the analysis of the capillary vessels located at the back of the eye iris: the analysis of the colored ring that surrounds the eye's pupil signature: the analysis of the way a person signs his name. vein: the analysis of pattern of veins in the back if the hand and the wrist voice: the analysis of the tone, pitch, cadence and frequency of a person's voice.

Reference: http://www.webopedia.com/TERM/B/biometrics.html

Questions 12

This question requires that you evaluate the underlined text to determine if it is correct.

When you access a file located on a shared resource, the "most restrictive" permissions take precedence.

Instructions: Review the underlined text. If it makes the statement correct, select "No change is needed". If the statement is incorrect, select the answer choice than makes the statement correct.

A. No change is needed.

B. ACL

C. NTFS

D. share

Buy Now

Correct Answer: A

When using share permissions and NTFS permissions together, if there is a conflict in the configuration, the most restrictive permission prevails.

Reference: http://www.ntfs.com/ntfs-permissions-combined.htm

Questions 13

Which is a feature Active Directory Rights Management Services (AD RMS)?

A. manages Digital Rights Media (DRM) for digital media

B. provides a permissions system that works with any cloud-based storage solution

C. manages share and file permissions on all servers in enterprise

D. allow users to define who can open, modify, print, or forward a document

Buy Now

Correct Answer: D

Windows Rights Management Services (also called Rights Management Services, Active Directory Rights Management Services or RMS) is a form of Information Rights Management used on Microsoft Windows that uses encryption and a form of selective functionality denial for limiting access to documents such as corporate e-mail, Word documents, and web pages, and the operations authorized users can perform on them. Companies can use this technology to encrypt information stored in such document formats, and through policies embedded in the documents, prevent the protected content from being decrypted except by specified people or groups, in certain environments, under certain conditions, and for certain periods of time.

Reference: http://en.wikipedia.org/wiki/Active_Directory_Rights_Management_Services

Exam Code: 98-368
Exam Name: Mobility and Devices Fundamentals
Last Update: Jul 08, 2025
Questions: 66

PDF (Q&A)

$45.99
ADD TO CART

VCE

$49.99
ADD TO CART

PDF + VCE

$59.99
ADD TO CART

Exam2Pass----The Most Reliable Exam Preparation Assistance

There are tens of thousands of certification exam dumps provided on the internet. And how to choose the most reliable one among them is the first problem one certification candidate should face. Exam2Pass provide a shot cut to pass the exam and get the certification. If you need help on any questions or any Exam2Pass exam PDF and VCE simulators, customer support team is ready to help at any time when required.

Home | Guarantee & Policy |  Privacy & Policy |  Terms & Conditions |  How to buy |  FAQs |  About Us |  Contact Us |  Demo |  Reviews

2025 Copyright @ exam2pass.com All trademarks are the property of their respective vendors. We are not associated with any of them.