Download Microsoft.98-368.PracticeTest.2019-04-10.20q.vcex

Download Exam

File Info

Exam Mobility and Devices Fundamentals
Number 98-368
File Name Microsoft.98-368.PracticeTest.2019-04-10.20q.vcex
Size 19 KB
Posted Apr 10, 2019
Download Microsoft.98-368.PracticeTest.2019-04-10.20q.vcex

How to open VCEX & EXAM Files?

Files with VCEX & EXAM extensions can be opened by ProfExam Simulator.

Purchase

Coupon: MASTEREXAM
With discount: 20%






Demo Questions

Question 1

You are tracking hardware and software inventory on various devices. 
You need to determine which devices can be managed by Microsoft Intune. 
To communicate back to Microsoft Intune administration console, what is a requirement of each device?


  1. Microsoft Intune agent installed
  2. Windows Phone 8 devices
  3. an organizational unit that has all the Microsoft Intune device objects
  4. a security policy
Correct answer: A
Explanation:
The devices need the Microsoft Intune client installed. This software is also known as Microsoft Intune agent.
The devices need the Microsoft Intune client installed. This software is also known as Microsoft Intune agent.



Question 2

This question requires that you evaluate the underlined text to determine if it is correct. 
Microsoft Azure storage solutions replicates "four" copies of your data within a single region. 
Instructions: Review the underlined text. If it makes the statement correct, select “No change is needed”. If the statement is incorrect, select the answer choice than makes the statement correct.


  1. No change is needed
  2. two
  3. three
  4. six
Correct answer: C
Explanation:
Geo-redundant storage (GRS). Geo-redundant storage is enabled for your storage account by default when you create it. GRS maintains six copies of your data. With GRS, your data is replicated three times within the primary region, and is also replicated three times in a secondary region hundreds of miles away from the primary region, providing the highest level of durability. Reference: Introduction to Microsoft Azure Storagehttps://azure.microsoft.com/en-gb/documentation/articles/storage-introduction/
Geo-redundant storage (GRS). Geo-redundant storage is enabled for your storage account by default when you create it. GRS maintains six copies of your data. With GRS, your data is replicated three times within the primary region, and is also replicated three times in a secondary region hundreds of miles away from the primary region, providing the highest level of durability. 
Reference: Introduction to Microsoft Azure Storage
https://azure.microsoft.com/en-gb/documentation/articles/storage-introduction/



Question 3

You manage 200 desktop computers at your school’s main computer lab. The computers run Microsoft Windows 10. 
A critical update was released. 
You need to determine if the update was installed on one of the computers in the lab. 
What should you do?


  1. View the Event Viewer Security log
  2. Check System Status in Control Panel
  3. View Windows update history
  4. Go to the System Action Center
Correct answer: C
Explanation:
Follow these steps to see which Windows updates are installed on your computer. Open Windows Update by clicking the Start button Picture of the Start button. In the search box, type Update, and then, in the list of results, click Windows Update. In the left pane, click View update history. Reference: See which Windows updates are installedhttp://windows.microsoft.com/en-us/windows/which-windows-updates-installed#1TC=windows-7
Follow these steps to see which Windows updates are installed on your computer. 
  1. Open Windows Update by clicking the Start button Picture of the Start button. In the search box, type Update, and then, in the list of results, click Windows Update. 
  2. In the left pane, click View update history. 
Reference: See which Windows updates are installed
http://windows.microsoft.com/en-us/windows/which-windows-updates-installed#1TC=windows-7



Question 4

This question requires that you evaluate the underlined text to determine if it is correct. 
When BitLocker is enabled and and protecting a local drive, Trusted Platform Module (TPM) provides "pre-start system integrity verification for system and operating system drives". 
Instructions: Review the underlined text. If it makes the statement correct, select “No change is needed”. If the statement is incorrect, select the answer choice than makes the statement correct.


  1. No change is needed
  2. 256-bit encryption that uses Advanced Encryption Standard (AES)
  3. a location that stores recovery keys for removable drives
  4. boot sector mapping for the startup process
Correct answer: C
Explanation:
Computers that incorporate a TPM have the ability to create cryptographic keys and encrypt them so that they can be decrypted only by the TPM. This process, often called "wrapping" or "binding" a key, can help protect the key from disclosure. Each TPM has a root "wrapping" key, called the Storage Root Key (SRK), which is stored within the TPM itself. The private portion of a key created in a TPM is never exposed to any other component, software, process, or person. Reference: Windows Trusted Platform Module Management Step-by-Step Guidehttps://technet.microsoft.com/en-us/library/cc749022%28v=ws.10%29.aspx
Computers that incorporate a TPM have the ability to create cryptographic keys and encrypt them so that they can be decrypted only by the TPM. This process, often called "wrapping" or "binding" a key, can help protect the key from disclosure. Each TPM has a root "wrapping" key, called the Storage Root Key (SRK), which is stored within the TPM itself. The private portion of a key created in a TPM is never exposed to any other component, software, process, or person. 
Reference: Windows Trusted Platform Module Management Step-by-Step Guide
https://technet.microsoft.com/en-us/library/cc749022%28v=ws.10%29.aspx



Question 5

You manage desktop computers for your university’s computer labs. You recently upgraded these computers to Windows 8.1. You need to modify the configuration of the new computers to increase the number of items displayed in jump lists. 
Which configuration tool should you use?


  1. Display Options
  2. Control Panel Personalization applet
  3. Device Manager
  4. Taskbar properties
Correct answer: D
Explanation:
By default up to 10 items can be added to a button's Jump List. For privacy reasons you may wish to reduce or eliminate this number. Conversely, if you find Jump Lists extremely useful you may wish to increase the number of displayed items. Right-click an empty area of the taskbar and choose "Properties". The "Taskbar and Start Menu Properties" multi-tabbed dialog box appears. Click the "Start Menu" tab. Click the "Customize" button. The "Customize Start Menu" dialog box appears. Underneath "Start menu size", next to "Number of recent items to display in Jump Lists", enter/select a value from 0-60.  Reference: Adjust Size of Jump Lists on Windows 7 Taskbarhttp://malektips.com/windows-7-jump-list-size-increase-decrease.html#.VWf-4M-qpBc
By default up to 10 items can be added to a button's Jump List. For privacy reasons you may wish to reduce or eliminate this number. Conversely, if you find Jump Lists extremely useful you may wish to increase the number of displayed items. 
  1. Right-click an empty area of the taskbar and choose "Properties". 
  2. The "Taskbar and Start Menu Properties" multi-tabbed dialog box appears. Click the "Start Menu" tab. 
  3. Click the "Customize" button. 
  4. The "Customize Start Menu" dialog box appears. Underneath "Start menu size", next to "Number of recent items to display in Jump Lists", enter/select a value from 0-60.  
Reference: Adjust Size of Jump Lists on Windows 7 Taskbar
http://malektips.com/windows-7-jump-list-size-increase-decrease.html#.VWf-4M-qpBc



Question 6

Your new Windows 8.1 computer is connected to your home wireless network. 
You want to share music and photos on your new computer with other members of your family. You want to avoid setting up separate user accounts for each member of your family. A single password for all the shared files will suffice. 
Which Windows 8.1 networking feature satisfies these requirements?


  1. Network Discovery
  2. HomeGroup
  3. Virtual Private Network
  4. Broadband (PPPoE)
Correct answer: B
Explanation:
A homegroup makes it easier to share files and printers on a home network. You can share pictures, music, videos, documents, and printers with other people in your homegroup. Other people can't change the files that you share, unless you give them permission to do so. Reference: http://windows.microsoft.com/en-us/windows7/what-is-a-homegroup
A homegroup makes it easier to share files and printers on a home network. You can share pictures, music, videos, documents, and printers with other people in your homegroup. Other people can't change the files that you share, unless you give them permission to do so. 
Reference: http://windows.microsoft.com/en-us/windows7/what-is-a-homegroup



Question 7

You have several Windows 8.1 Pro computers in your college dorm. 
You want to share music library files across these computers in a simple way by using a single password for access. 
What should you do?


  1. Share the folder with the Everyone group
  2. Change the permissions of all music files to Everyone read
  3. Share the music library through a HomeGroup and join each computer to it
  4. Rename each computer to a single, common name and enable the Administrator
Correct answer: C
Explanation:
A homegroup is a group of PCs on a home network that can share devices (such as printers), and libraries (such as your Documents, Pictures, Music, and Video libraries). Using a homegroup makes sharing easier. Your homegroup is protected with a password, which you can change at any time. Reference: Homegroup Password - View in Windows 8http://www.eightforums.com/tutorials/15855-homegroup-password-view-windows-8-a.html
A homegroup is a group of PCs on a home network that can share devices (such as printers), and libraries (such as your Documents, Pictures, Music, and Video libraries). Using a homegroup makes sharing easier. Your homegroup is protected with a password, which you can change at any time. 
Reference: Homegroup Password - View in Windows 8
http://www.eightforums.com/tutorials/15855-homegroup-password-view-windows-8-a.html



Question 8

This question requires that you evaluate the underlined text to determine if it is correct. 
The "ExFAT" file system  can automatically verify and auto correct data to avoid file system errors. 
Instructions: Review the underlined text. If it makes the statement correct, select “No change is needed”. If the statement is incorrect, select the answer choice than makes the statement correct.


  1. No change is needed
  2. NTFS
  3. FAT32
  4. ReFS
Correct answer: D
Explanation:
Resilient File System (ReFS) is a Microsoft proprietary file system introduced with Windows Server 2012 with the intent of becoming the "next generation" file system after NTFS. ReFS key design advantages are intended to include automatic integrity checking and data scrubbing, removing the need for chkdsk and protecting against data degradation. Incorrect answers:Not A: exFAT (Extended File Allocation Table) is a Microsoft file system optimized for flash drives. exFAT can be used where the NTFS file system is not a feasible solution (due to data structure overhead), or where the file size limit of the standard FAT32 file system is unacceptable.Reference: http://en.wikipedia.org/wiki/ReFS
Resilient File System (ReFS) is a Microsoft proprietary file system introduced with Windows Server 2012 with the intent of becoming the "next generation" file system after NTFS. ReFS key design advantages are intended to include automatic integrity checking and data scrubbing, removing the need for chkdsk and protecting against data degradation. 
Incorrect answers:
Not A: exFAT (Extended File Allocation Table) is a Microsoft file system optimized for flash drives. exFAT can be used where the NTFS file system is not a feasible solution (due to data structure overhead), or where the file size limit of the standard FAT32 file system is unacceptable.
Reference: http://en.wikipedia.org/wiki/ReFS



Question 9

What are two ways to lower the risk of a virus or malware infection? Choose two.


  1. Enable the Windows firewall
  2. Use only HTTPS while web surfing
  3. Keep the system updated
  4. Install a download manager
Correct answer: AC



Question 10

When you copy a file from one NTFS file system partition to a different NTFS partition, what happens to the file permissions of the copied file?


  1. They are the combined permissions of the original file and destination folder
  2. They inherit the permissions of the destination folder
  3. They remain the same as the original
  4. They are removed, and only the creator is given full control
Correct answer: B
Explanation:
When you copy a protected file to a folder on the same, or a different volume, it inherits the permissions of the target directory. Reference: http://www.ntfs.com/ntfs-permissions-files-moving.htm
When you copy a protected file to a folder on the same, or a different volume, it inherits the permissions of the target directory. 
Reference: http://www.ntfs.com/ntfs-permissions-files-moving.htm









CONNECT US

Facebook

Twitter

PROFEXAM WITH A 20% DISCOUNT

You can buy ProfExam with a 20% discount!



HOW TO OPEN VCEX FILES

Use ProfExam Simulator to open VCEX files