Certification Exam Prep Questions For Mobility and Devices Fundamentals (98-368)
QuickStart is now offering assessment questions for Mobility and Devices Fundamentals (98-368). Whether you are deciding which exam to sign up for, or simply want to practice the materials necessary to complete certification for this course, we have provided a practice assessment to better aid in certification. 100% of the questions are real questions; from a recent version of the test you will take for Mobility and Devices Fundamentals (98-368)
In a school, the students are asked to bring their own tablet devices. They can use one of these three operating systems: Windows 8.1, iOS, or Android devices. The school has an Azure Active Directory and students are authorized to access the Azure AD and other cloud resources. They can login using Microsoft accounts. In order to make sure similar configurations and data sets are available to students, applications must be made available via a virtual desktop environment. Identify an option from below that will help you implement this.
- A. Azure RemoteApp
-
Correct!
- B. Microsoft App-V 5.0
-
Incorrect.
- C. Azure Application Proxy
-
Incorrect.
- D. Microsoft User Experience Virtualization (UE-V)
-
Incorrect.
You have a Microsoft account and a two step verification is enabled for it. The network has an Azure Active Directory Domain Services (AD DS) domain to which you connect using Windows RT 8.1 device. The device stays in your continuous use and so you want to avoid an additional verification screen. What step would you take to ensure what you want?
- A. Restrict use of the account on the domain.
-
Incorrect.
- B. Create an additional Microsoft account
-
Incorrect.
- C. Connect the Microsoft account to a domain user account.
-
Incorrect.
- D. Identify the device as a trusted device.
-
Correct!
There is a Marketing group and the ProjectX group. JChen is a member of both the groups. A Full Control access is provided to the Marketing group on the Campaigns folder while Read access is provided to the ProjectX group on the Campaigns folder. The Campaigns folder is shared. There is also a Change permission granted to the Marketing group on the share but share access is not provided to the ProjectX group. In the Campaigns folder, there is a file called ColorScheme.docx. A drive is mapped to the Campaigns folder by JChen. Can you identify the options that qualify as the appropriate actions JCheb can perform when accessing Campaigns through the mapped drive? (opt ALL options that apply)
- A. Read the ColorScheme.docx file
-
Correct!
- B. Change the contents of the ColorScheme.docx file
-
Correct!
- C. Create a new file
-
Correct!
- D. Take ownership of the ColorScheme.docx file
-
Incorrect.
You have bought a computer workstation that has Windows 8.1 as the operating system. You login for the first time. You already have a Microsoft account that you plan on using with this new workstation. Can you identify using which accounts can you log in to Windows 8.1? (opt THREE)
- A. Microsoft SQL Server Express
-
Incorrect.
- B. Xbox
-
Correct!
- C. Hotmail
-
Correct!
- D. Microsoft Skype
-
Correct!
You want to set up an extranet for your organization. At the same time, you want to control access to your private network. Which of the following will you use?
- A. A private cloud.
-
Incorrect.
- B. A public cloud.
-
Incorrect.
- C. A network firewall
-
Correct!
- D. A host firewall.
-
Incorrect.
A user wants to take ownership of a file. Can you identify the minimum NTFS permission required for that purpose?
You have bought a new tablet. You are running Windows 8.1 RT on that tablet. A Microsoft account is used to log on to the device. Identify which two statements are true. (opt any TWO)
- B. The recovery key is stored on OneDrive.
-
Correct!
While setting up your Windows Phone 8.1 you are communicated by an error message that you are unable to connect using your Microsoft Account. Can you identify which two statements justify what is most likely wrong? (opt any TWO)
- A. You do not have a data connection
-
Correct!
- D. Your Microsoft account is connected to a domain account.
-
Incorrect.
Work Folders are used by your company. Can you identify three devices that can access the stored data in a Work Folder? (opt any THREE)
- A. iPad running iOS 8
-
Correct!
- B. Laptop running Windows 7 Starter
-
Incorrect.
- C. Laptop running Windows 8.1
-
Correct!
- D. Tablet running Windows RT 8.1
-
Correct!
You are required to make sure only personnel in the HR department can access the files containing personally identifiable information (PII) when they are using a managed device and get connected to the network. There should be central policy implemented to ensure protection. What do you think you would use?
- A. Dynamic Access Control
-
Correct!
- B. Rights Management Services
-
Incorrect.
- C. NTFS permissions
-
Incorrect.
- D. Network Access Protection
-
Incorrect.
The devices in use require a username and a password to connect to the local network. In hopes of ensuring more stringent security measure, multifactor authentication is decided to be enforced. Identify which of the following would you use. (opt any TWO)
In event of a failure in Azure, which of the following Microsoft Azure storage replication option can be expected to provide the greatest level of accessibility and durability?
You are asked to provide business work file access and you plan to use Work Folders. Can you identify which of the following will be needed to use Work Folders?
- A. Cloud storage
-
Incorrect.
- B. File server running Windows Server 2012 R2
-
Correct!
- C. SharePoint server
-
Incorrect.
- D. Windows-only clients
-
Incorrect.
There are common disk errors occurring. There is a Microsoft Windows 8.1 file system that offers automated repair of those errors. Can you identify which of the following could it be?
There is a workstation that has Windows 8.1 with a default installation. You plan to run command line tool on that workstation. Can you identify the procedures that are expected to open a command prompt? (opt any THREE)
- A. Open the Search charm and type Command
-
Correct!
- C. Click the Command Prompt app from the Start screen.
-
Incorrect.
You are asked to suggest two actions that must be taken in order to minimize the possibility of malware infection? You have four options below to choose from. Which two would you suggest? (opt any TWO)
- A. Encrypt the operating system hard disk.
-
Incorrect.
- C. Initialize the TPM on client computers.
-
Incorrect.
You work for an organization where all users use iOS devices. There has been a custom IOS app developed by the company, and Microsoft Intune App Wrapping Tool for iOS is used for distribution. What would you do to deploy the app to iOS devices? (opt any TWO)
- A. Use the Microsoft Intune administrator console to add the installer as managed software.
-
Correct!
- B. Sign the package with a code-signing certificate.
-
Incorrect.
- D. Use Group Policy to deploy the app.
-
Incorrect.
You are required to protect the operating system using BitLocker. It will also help you check the integrity of boot components during startup. The PC is running Windows 8.1 Pro and has a legacy BIOS. Can you identify from the options below the minimum disk partition requirements?
- A. One disk partition formatted as FAT32.
-
Incorrect.
- C. Two disk partitions, both formatted as NTFS.
-
Correct!
- D. One disk partition formatted as NTFS.
-
Incorrect.
You protect emails and files on your network with the help of Azure Rights Management (Azure RMS). It is required to share files with individuals outside the network sometimes. When sending the files, it is important to ensure individuals receiving them are able to read these files. Any and all additional potential risks to network security from your solution must be minimized. Can you identify what is required to support this?
- C. Outside individuals must be running the Lync client
-
Incorrect.
You are using Work Folders in your company. There is data stored in the Work Folders. Can you identify three devices that can be used to access that data?
- A. Tablet running Windows RT 8.1
-
Correct!
- B. iPad running iOS 8
-
Correct!
- C. Laptop running Windows 8.1
-
Correct!
- D. Windows Phone 8.1
-
Incorrect.
You upgrade a workstation to Windows 8.1. It is decided to use BitLocker device encryption on the workstation. This workstation is not part of a domain. Can you identify the BitLocker device encryption requirements? (opt any TWO)
- A. Virtual smart card
-
Incorrect.
- B. TPM 1.2 or later
-
Correct!
- C. Windows Account
-
Correct!
- D. Dynamic hard disks
-
Incorrect.
In order to support mobile devices, you plan configuring Active Directory Rights Management Services (AD RMS). What would be your step of action?
- A. Require all mobile devices to use Microsoft Accounts.
-
Incorrect.
- B. Configure Work Folders for all mobile devices.
-
Incorrect.
- D. Create a new child domain for mobile devices
-
Incorrect.
You are using Microsoft Intune in your organization. When issuing a passcode reset from the Microsoft Intune Administration Console, there is a temporary passcode provided. Can you identify which devices will be protected by that temporary passcode? (opt any TWO)
- Home
- Sample Question - Mobility and Devices Fundamentals (98-368)
Sample Question - Mobility and Devices Fundamentals (98-368)
More Information:
- Learning Style: On Demand
- Learning Style: Practice Exam
- Difficulty: Beginner
- Course Duration: 1 Hour
- Course Info: Download PDF
- Certificate: See Sample
Contact a Learning Consultant
Need Training for 5 or More People?
Customized to your team's need:
- Annual Subscriptions
- Private Training
- Flexible Pricing
- Enterprise LMS
- Dedicated Customer Success Manager
Course Information