Certification Exam Prep Questions For Mobility and Devices Fundamentals (98-368)

QuickStart is now offering assessment questions for Mobility and Devices Fundamentals (98-368). Whether you are deciding which exam to sign up for, or simply want to practice the materials necessary to complete certification for this course, we have provided a practice assessment to better aid in certification. 100% of the questions are real questions; from a recent version of the test you will take for Mobility and Devices Fundamentals (98-368)


Arrow
 

1

In a school, the students are asked to bring their own tablet devices. They can use one of these three operating systems: Windows 8.1, iOS, or Android devices. The school has an Azure Active Directory and students are authorized to access the Azure AD and other cloud resources. They can login using Microsoft accounts. In order to make sure similar configurations and data sets are available to students, applications must be made available via a virtual desktop environment. Identify an option from below that will help you implement this.

2

You have a Microsoft account and a two step verification is enabled for it. The network has an Azure Active Directory Domain Services (AD DS) domain to which you connect using Windows RT 8.1 device. The device stays in your continuous use and so you want to avoid an additional verification screen. What step would you take to ensure what you want?

3

There is a Marketing group and the ProjectX group. JChen is a member of both the groups. A Full Control access is provided to the Marketing group on the Campaigns folder while Read access is provided to the ProjectX group on the Campaigns folder. The Campaigns folder is shared. There is also a Change permission granted to the Marketing group on the share but share access is not provided to the ProjectX group. In the Campaigns folder, there is a file called ColorScheme.docx. A drive is mapped to the Campaigns folder by JChen. Can you identify the options that qualify as the appropriate actions JCheb can perform when accessing Campaigns through the mapped drive? (opt ALL options that apply)

4

You have bought a computer workstation that has Windows 8.1 as the operating system. You login for the first time. You already have a Microsoft account that you plan on using with this new workstation. Can you identify using which accounts can you log in to Windows 8.1? (opt THREE)

A. Microsoft SQL Server Express
Incorrect.
B. Xbox
Correct!
C. Hotmail
Correct!
D. Microsoft Skype
Correct!
5

You want to set up an extranet for your organization. At the same time, you want to control access to your private network. Which of the following will you use?

A. A private cloud.
Incorrect.
B. A public cloud.
Incorrect.
C. A network firewall
Correct!
D. A host firewall.
Incorrect.
6

A user wants to take ownership of a file. Can you identify the minimum NTFS permission required for that purpose?

A. Full control
Correct!
B. Write
Incorrect.
C. Modify
Incorrect.
D. Write
Incorrect.
7

You have bought a new tablet. You are running Windows 8.1 RT on that tablet. A Microsoft account is used to log on to the device. Identify which two statements are true. (opt any TWO)

8

While setting up your Windows Phone 8.1 you are communicated by an error message that you are unable to connect using your Microsoft Account. Can you identify which two statements justify what is most likely wrong? (opt any TWO)

9

Work Folders are used by your company. Can you identify three devices that can access the stored data in a Work Folder? (opt any THREE)

10

You are required to make sure only personnel in the HR department can access the files containing personally identifiable information (PII) when they are using a managed device and get connected to the network. There should be central policy implemented to ensure protection. What do you think you would use?

11

The devices in use require a username and a password to connect to the local network. In hopes of ensuring more stringent security measure, multifactor authentication is decided to be enforced. Identify which of the following would you use. (opt any TWO)

A. Smart card
Correct!
B. Fingerprint scan
Correct!
C. Swipe pattern
Incorrect.
D. PIN
Incorrect.
12

In event of a failure in Azure, which of the following Microsoft Azure storage replication option can be expected to provide the greatest level of accessibility and durability?

A. RA-GRS
Correct!
B. LRS
Incorrect.
C. ZRS
Incorrect.
D. GRS
Incorrect.
13

You are asked to provide business work file access and you plan to use Work Folders. Can you identify which of the following will be needed to use Work Folders?

14

There are common disk errors occurring. There is a Microsoft Windows 8.1 file system that offers automated repair of those errors. Can you identify which of the following could it be?

A. UDF
Incorrect.
B. ReFS
Correct!
C. FAT32
Incorrect.
D. NTFS
Incorrect.
15

There is a workstation that has Windows 8.1 with a default installation. You plan to run command line tool on that workstation. Can you identify the procedures that are expected to open a command prompt? (opt any THREE)

16

You are asked to suggest two actions that must be taken in order to minimize the possibility of malware infection? You have four options below to choose from. Which two would you suggest? (opt any TWO)

17

You work for an organization where all users use iOS devices. There has been a custom IOS app developed by the company, and Microsoft Intune App Wrapping Tool for iOS is used for distribution. What would you do to deploy the app to iOS devices? (opt any TWO)

18

You are required to protect the operating system using BitLocker. It will also help you check the integrity of boot components during startup. The PC is running Windows 8.1 Pro and has a legacy BIOS. Can you identify from the options below the minimum disk partition requirements?

19

You protect emails and files on your network with the help of Azure Rights Management (Azure RMS). It is required to share files with individuals outside the network sometimes. When sending the files, it is important to ensure individuals receiving them are able to read these files. Any and all additional potential risks to network security from your solution must be minimized. Can you identify what is required to support this?

20

You are using Work Folders in your company. There is data stored in the Work Folders. Can you identify three devices that can be used to access that data?

21

You upgrade a workstation to Windows 8.1. It is decided to use BitLocker device encryption on the workstation. This workstation is not part of a domain. Can you identify the BitLocker device encryption requirements? (opt any TWO)

A. Virtual smart card
Incorrect.
B. TPM 1.2 or later
Correct!
C. Windows Account
Correct!
D. Dynamic hard disks
Incorrect.
22

In order to support mobile devices, you plan configuring Active Directory Rights Management Services (AD RMS). What would be your step of action?

23

You are using Microsoft Intune in your organization. When issuing a passcode reset from the Microsoft Intune Administration Console, there is a temporary passcode provided. Can you identify which devices will be protected by that temporary passcode? (opt any TWO)

A. iOS
Correct!
B. Windows Phone 8.1
Correct!
C. Android
Correct!
D. Windows RT 8.1
Incorrect.

Sample Question - Mobility and Devices Fundamentals (98-368)

$99.00

More Information:

  • Learning Style: On Demand
  • Learning Style: Practice Exam
  • Difficulty: Beginner
  • Course Duration: 1 Hour
  • Course Info: Download PDF
  • Certificate: See Sample

Need Training for 5 or More People?

Customized to your team's need:

  • Annual Subscriptions
  • Private Training
  • Flexible Pricing
  • Enterprise LMS
  • Dedicated Customer Success Manager

Outline

Reviews

Write Your Own Review
Only registered users can write reviews. Please Sign in or create an account

Hit button to validate captcha