Certification Exam Prep Questions For Mobility and Devices Fundamentals (98-368)


QuickStart is now offering assessment questions for Mobility and Devices Fundamentals (98-368). Whether you are deciding which exam to sign up for, or simply want to practice the materials necessary to complete certification for this course, we have provided a practice assessment to better aid in certification. 100% of the questions are real questions; from a recent version of the test you will take for Mobility and Devices Fundamentals (98-368)


Arrow
 

1

Students are required to provide their own tablet devices for class, but have a choice of whether they user Windows 8.1, iOS, or Android devices. Students are authorized access to the school's Azure Active Directory and cloud resources. Microsoft accounts are used for login. Teachers want to make applications available to the students through a virtual desktop environment to ensure consistent configurations and data sets for all students. How can you implement this?

2

You have enabled two-step verification for your Microsoft account. You use a Windows RT 8.1 device while connected to your Active Directory Directory Services (AD DS) domain at work. You use the device regularly and do not want to be prompted with an additional verification screen. What should you do?

3

JChen is a member of the Marketing group and the ProjectX group. The Marketing group is granted Full Control access on the Campaigns folder. The ProjectX group is granted Read access on the Campaigns folder. The Campaigns folder is shared. The Marketing group is granted Change permission on the share. The ProjectX group is not granted access to the share. A file named ColorScheme.docx is located in the Campaigns folder. JChen maps a drive to the Campaigns folder. What actions can JChen perform when accessing Campaigns through the mapped drive? (Choose all that apply.)

4

A user has purchased a computer that runs Windows 8.1 and is logging on for the first time. The user plans to use a Microsoft account, but does not want to create a new one if he already has one. Which accounts can be used to log in to Windows 8.1? (Each correct answer presents part of the solution. (Choose three.)

A. Hotmail
Correct!
B. Xbox
Correct!
C. Microsoft Skype
Correct!
D. Microsoft SQL Server Express
Incorrect.
5

When setting up an extranet. what is used to control access to your private network?

A. A network firewall
Correct!
B. A public cloud.
Incorrect.
C. A host firewall.
Incorrect.
D. A private cloud.
Incorrect.
6

The Azure Active Directory Sync tool is used to allow users to log on to Office 365 with an Active Directory Domain Services (AD DS) domain user name and password. Choose whether the statement is correct as stated or choose the text that should replace the underlined text to make the statement correct.

7

What is the minimum NTFS permission Required for a user to take ownership of a file?

A. Modify
Incorrect.
B. Write
Incorrect.
C. Full control
Correct!
D. Write
Incorrect.
8

A user has a new tablet running Windows 8.1 RT. The user has logged on to the tablet using a Microsoft account. Which two statements are true? (Each correct answer presents part of the solution. (Choose two.)

9

You are setting up a Windows Phone 8.1. You get an error message that you cannot connect using your Microsoft Account. What is most likely wrong? (Each correct answer presents a complete solution.( Choose two.)

10

The ReFS file system does not support CHKDSK. Choose whether the statement is correct as stated or choose the text that should replace the underlined text to make the statement correct.

A. The statement is correct as written and does not need changes.
Correct!
B. FAT32
Incorrect.
C. ExFAT
Incorrect.
D. NTFS
Incorrect.
11

Your company uses Work Folders. Which three devices can access data stored in a Work Folder? (Each correct answer presents part of the solution. (Choose three.)

12

You need to ensure that files that contain personally identifiable information (PII) are only accessed by members of the HR department when they are connected to the network using a managed device. The protection must be implemented by a central policy. What should you use?

13

A two-way mirror space protects against failure of two drives and requires at least five drives. Choose whether the statement is correct as stated or choose the text that should replace the underlined text to make the statement correct.

14

A user name and password are currently required for devices connecting to the local network. You want to force multifactor authentication to provide greater security. What should you use? (Each correct answer presents a complete solution. (Choose two.)

A. Swipe pattern
Incorrect.
B. Fingerprint scan
Correct!
C. PIN
Incorrect.
D. Smart card
Correct!
15

Which Microsoft Azure Storage replication option provides the highest level of durability and accessibility in case of a failure?

A. ZRS
Incorrect.
B. LRS
Incorrect.
C. GRS
Incorrect.
D. RA-GRS
Correct!
16

You want to use Work Folders to provide access to business work files. What is required to use Work Folders?

17

Which Microsoft Windows 8.1 file system provides automated repair of common disk errors?

A. FAT32
Incorrect.
B. ReFS
Correct!
C. NTFS
Incorrect.
D. UDF
Incorrect.
18

You need to run a command-line tool on a computer running a default installation of Windows 8.1. Which procedures will open a command prompt? (Each correct answer presents a complete solution. (Choose three.)

19

What actions should you take to minimize the possibility of malware infection? (Each correct answer presents part of the solution. (Choose two.)

20

Evaluate the underlined text and determine the best answer. File permissions do not change on the destination file when you copy a file to a different folder on the same NTFS volume. Choose whether the statement is correct as stated or choose the text that should replace the underlined text to make the statement correct.

21

Employees in your company use iOS devices. Your company has developed a custom iOS app and prepared it for distribution using the Microsoft Intune App Wrapping Tool for iOS. You need to deploy the app to iOS devices. What should you do? (Each correct answer presents part of the solution. (Choose two.)

22

You plan to use BitLocker to protect the operating system and check the integrity of boot components during startup. The computer has a legacy BIOS and is running Windows 8.1 Pro. What are the minimum disk partition requirements?

23

You are using Azure Rights Management (Azure RMS) on your network to protect files and emails. You sometimes need to send files to individuals outside of your network. You need to make sure that these individuals are able to read the files. You must minimize any additional risks to network security arising from your solution. What is needed to support this?

24

Your company uses Work Folders. Which three devices can access data stored in a Work Folder? (Each correct answer presents part of the solution. (Choose three.)

25

A computer is being upgraded to Windows 8.1. You want to use BitLocker device encryption on the computer. The computer is not part of a domain. What are requirements for BitLocker device encryption? (Each correct answer presents part of the solution. (Choose two.)

A. Virtual smart card
Incorrect.
B. Dynamic hard disks
Incorrect.
C. TPM 1.2 or later
Correct!
D. Windows Account
Correct!
26

JChen is a member of the Marketing group and the ProjectX group. The Marketing group is granted Full Control access on the Campaigns folder. The ProjectX group is granted Read access on the Campaigns folder. The Campaigns folder is shared. The Marketing group is granted Change permission on the share. The ProjectX group is not granted access to the share. A file named ColorScheme.docx is located in the Campaigns folder. JChen maps a drive to the Campaigns folder. What actions can JChen perform when accessing Campaigns through the mapped drive? (Choose all that apply.)

27

You want to configure Active Directory Rights Management Services (AD RMS) to support mobile devices. What should you do?

28

Your company uses Microsoft Intune. Which devices will be protected by a temporary passcode after you issue a passcode reset from the Microsoft Intune Administration Console? (Choose two.)

A. Android
Correct!
B. Windows Phone 8.1
Correct!
C. Windows RT 8.1
Incorrect.
D. iOS
Correct!
29

An extranet allows multiple users or companies to subscribe to services using a pay-as-you-go model. Choose whether the statement is correct as stated or choose the text that should replace the underlined text to make the statement correct

30

Microsoft Power BI provides for interactive data analysis that supports natural language queries. Choose whether the statement is correct as stated or choose the text that should replace the underlined text to make the statement correct.

PDP Url

Sample Question - Mobility and Devices Fundamentals (98-368)


Self-Paced

Learning Style

Beginner

Difficulty

1 Hour

Course Duration

Certificate

See Sample

Buy Individually
About Individual Course:
  • Individual course plan gives you access to this course
$109.00
$109.00
/ Each

Outline

More Information

More Information
Lab Access No
Learning Style Self-Paced Learning
Difficulty Beginner
Course Duration 1 Hour
Language English

Reviews

Write Your Own Review
Only registered users can write reviews. Please Sign in or create an account

Contact A Learning Consultant


click here