What Validated 98-368 Actual Exam Is

Exam Code: 98-368 (Practice Exam Latest Test Questions VCE PDF)
Exam Name: Mobility and Devices Fundamentals
Certification Provider: Microsoft
Free Today! Guaranteed Training- Pass 98-368 Exam.

Check 98-368 free dumps before getting the full version:

NEW QUESTION 1
You manage desktop computers for your university’s computer labs. You recently upgraded these computers to Windows 8.1. You need to modify the configuration of the new computers to increase the number of items displayed in jump lists.
Which configuration tool should you use?

  • A. Display Options
  • B. Control Panel Personalization applet
  • C. Device Manager
  • D. Taskbar properties

Answer: D

Explanation:
By default up to 10 items can be added to a button's Jump List. For privacy reasons you may wish to reduce or eliminate this number. Conversely, if you find Jump Lists extremely useful you may wish to increase the number of displayed items.
1. Right-click an empty area of the taskbar and choose "Properties".
2. The "Taskbar and Start Menu Properties" multi-tabbed dialog box appears. Click the "Start Menu" tab.
3. Click the "Customize" button.
4. The "Customize Start Menu" dialog box appears. Underneath "Start menu size", next to "Number of recent items to display in Jump Lists", enter/select a value from 0-60.
Reference: Adjust Size of Jump Lists on Windows 7 Taskbar
http://malektips.com/windows-7-jump-list-size-increase-decrease.html#.VWf-4M-qpBc

NEW QUESTION 2
Which Microsoft cloud service can perform virtual video conferences?

  • A. Azure
  • B. Intune
  • C. Skype for Business
  • D. OneDrive

Answer: C

Explanation:
References:
https://www.skype.com/en/business/
https://www.lynda.com/SharePoint-tutorials/Microsoft-Cloud-Services-SharePoint-Online-OneDrive- Skype-Business-Online/618724-2.html

NEW QUESTION 3
This question requires that you evaluate the underlined text to determine if it is correct.
When BitLocker is enabled and and protecting a local drive, Trusted Platform Module (TPM) provides "pre-start system integrity verification for system and operating system drives".
Instructions: Review the underlined text. If it makes the statement correct, select “No change is needed”. If the statement is incorrect, select the answer choice than makes the statement correct.

  • A. No change is needed
  • B. 256-bit encryption that uses Advanced Encryption Standard (AES)
  • C. a location that stores recovery keys for removable drives
  • D. boot sector mapping for the startup process

Answer: C

Explanation:
Computers that incorporate a TPM have the ability to create cryptographic keys and encrypt them so that they can be decrypted only by the TPM. This process, often called "wrapping" or "binding" a key, can help protect the key from disclosure. Each TPM has a root "wrapping" key, called the Storage Root Key (SRK), which is stored within the TPM itself. The private portion of a key created in a TPM is never exposed to any other component, software, process, or person.
Reference: Windows Trusted Platform Module Management Step-by-Step Guide
https://technet.microsoft.com/en-us/library/cc749022%28v=ws.10%29.aspx

NEW QUESTION 4
This question requires that you evaluate the underlined text to determine if it is correct. You manage Windows 8.1 desktop and laptop computers in your university’s computer lab.
The university’s IT team recently implemented an active directory environment.
You need to join the desktop and laptop computers to a new Active Directory domain. You should use the "Network and Internet" Control Panel applet to achieve this goal.
Instructions: Review the underlined text. If it makes the statement correct, select “No change is needed”. If the statement is incorrect, select the answer choice than makes the statement correct.

  • A. No change is needed
  • B. User Accounts
  • C. Administrative Tools
  • D. System

Answer: D

Explanation:
Join a domain, workgroup, or homegroup
Open System by swiping in from the right edge of the screen, tapping Search (or if you're using a mouse, pointing to the upper-right corner of the screen, moving the mouse pointer down, and then clicking Search), entering System in the search box, and tapping or clicking System.
Under Computer name, domain, and workgroup settings, click Change settings. 98-368 dumps exhibitYou might be asked for an admin password or to confirm your choice.
Click Network ID and follow the steps on your screen.
Reference: http://windows.microsoft.com/en-us/windows-8/join-domain-workgroup-homegroup

NEW QUESTION 5
You need to create an Azure storage account through Azure Storage Services to support an Azure Windows virtual machine (VM). You want to keep subscription costs to a minimum.
What type of storage account should you create?

  • A. Standard storage performance tier
  • B. Blob cool access tier
  • C. Premium storage performance tier
  • D. Blob hot access tier

Answer: D

Explanation:
References:
https://www.petri.com/choosing-azure-storage-account-type https://docs.microsoft.com/en-us/azure/storage/common/storage-introduction

NEW QUESTION 6
What is an example of the way in which a Trojan horse commonly spreads to other computers?

  • A. It inserts copies of itself into other computer programs
  • B. It traverses a network by exploiting a vulnerability
  • C. It pretends to be a document from a friend
  • D. It downloads from an infected web page

Answer: D

Explanation:
Trojan horses are commonly found on websites that offer free software, such as shareware programs. These communal gathering spots on the Web give Trojan horse writers a degree of anonymity along with the chance of attacking as many random victims as possible. Since website operators rarely have time to thoroughly examine every file posted, an occasional Trojan horse can slip through the checking procedures unnoticed. -
Reference: HOW TROJAN HORSES SPREAD
http://etutorials.org/Misc/computer+book/Part+2+Dangerous+Threats+on+the+Internet/Chapter+8
+Trojan+Horses-+Beware+of+Geeks+Bearing+Gifts/HOW+TROJAN+HORSES+SPREAD/

NEW QUESTION 7
This question requires that you evaluate the underlined text to determine if it is correct. Microsoft Azure storage solutions replicates "four" copies of your data within a single region.
Instructions: Review the underlined text. If it makes the statement correct, select “No change is needed”. If the statement is incorrect, select the answer choice than makes the statement correct.

  • A. No change is needed
  • B. two
  • C. three
  • D. six

Answer: C

Explanation:
Geo-redundant storage (GRS). Geo-redundant storage is enabled for your storage account by default when you create it. GRS maintains six copies of your data. With GRS, your data is replicated three times within the primary region, and is also replicated three times in a secondary region hundreds of miles away from the primary region, providing the highest level of durability.
Reference: Introduction to Microsoft Azure Storage
https://azure.microsoft.com/en-gb/documentation/articles/storage-introduction/

NEW QUESTION 8
You have an external monitor connected to a laptop computer that is running Windows 10. The monitors are configured to provide a panoramic display that continues across both monitors.
You want to move the system tray to the secondary monitor. Both monitors must continue to display screen data.
Which Display setting you select?

  • A. Custom scaling
  • B. Show only on 2
  • C. Extend desktop to this display
  • D. Make this my main display

Answer: D

Explanation:
References:
https://www.tenforums.com/tutorials/3871-change-main-display-windows-10-a.html

NEW QUESTION 9
HOTSPOT
You use a laptop running Microsoft Windows 10. You connect to the Internet using the Wi-Fi connections at a coffee shop.
You plan to visit several websites while doing a research project and want to verify that your computer is configured for safe communication.
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
98-368 dumps exhibit

  • A. Mastered
  • B. Not Mastered

Answer: A

Explanation:
References:
https://thenextweb.com/insider/2015/08/08/how-to-stop-hackers-from-stealing-your-information- on-public-wi-fi/
https://www.lifewire.com/how-to-connect-to-a-wi-fi-network-2378229

NEW QUESTION 10
You are tracking hardware and software inventory on various devices.
You need to determine which devices can be managed by Microsoft Intune.
To communicate back to Microsoft Intune administration console, what is a requirement of each device?

  • A. Microsoft Intune agent installed
  • B. Windows Phone 8 devices
  • C. an organizational unit that has all the Microsoft Intune device objects
  • D. a security policy

Answer: A

Explanation:
The devices need the Microsoft Intune client installed. This software is also known as Microsoft Intune agent.

NEW QUESTION 11
Your sister is taking a video editing class at school. She purchased a 2-TB USB hard drive to store video files.
She wants to connect it to her Windows 10 computer at home. Video file will exceed 5 GB in size. You need to prepare the new hard drive by formatting it with the appropriate file system.
Which file system should you choose?

  • A. FAT
  • B. HFS
  • C. NTFS
  • D. FAT32

Answer: C

Explanation:
References:
https://answers.microsoft.com/en-us/windows/forum/windows_7-files/what-is-the-maximum-file- size-fat-fat32-ntfs-file/1663db6b-490e-4021-9e36-f7a6976ac0c0

NEW QUESTION 12
This requires that you evaluate the underlined text to determine if it is correct. You are personalizing the Start screen on a Windows 10 computer.
To create a new group of tiles on the Start Screen, select a tile and press F12.
Review the underlined text. If it makes the statement correct, select “No change is needed”. If the statement is incorrect, select the answer choice than makes the statement correct.

  • A. No change is needed
  • B. access Settings > Personalize > Start
  • C. right-click a tile and close Add to new group
  • D. drag a tile to the far-right side of the Start screen and drop it

Answer: D

NEW QUESTION 13
Your new Windows 8.1 computer is connected to your home wireless network.
You want to share music and photos on your new computer with other members of your family. You want to avoid setting up separate user accounts for each member of your family. A single password for all the shared files will suffice.
Which Windows 8.1 networking feature satisfies these requirements?

  • A. Network Discovery
  • B. HomeGroup
  • C. Virtual Private Network
  • D. Broadband (PPPoE)

Answer: B

Explanation:
A homegroup makes it easier to share files and printers on a home network. You can share pictures, music, videos, documents, and printers with other people in your homegroup. Other people can't change the files that you share, unless you give them permission to do so.
Reference: http://windows.microsoft.com/en-us/windows7/what-is-a-homegroup

NEW QUESTION 14
DRAG DROP
You are setting up the networking for a single-site motel. For three different classes of users, you need to specify the most privileged network segment each can access.
Match each network to the class of users that cam access it.
Instructions: To answer, drag the appropriate network from the column of the left to the class of users on the right. Each network may be used once, more than once, or not at all. Each correct match is worth one point.
98-368 dumps exhibit

  • A. Mastered
  • B. Not Mastered

Answer: A

Explanation:
* Guest have only public access.
* Only the Employees have access to the private network.
* An extranet is a private network that uses Internet technology and the public telecommunication system to securely share part of a business's information or operations with suppliers, vendors, partners, customers, or other businesses.
Reference: http://en.wikipedia.org/wiki/Extranet

NEW QUESTION 15
Which type of information about users does biometrics evaluate?

  • A. phrases a user has memorized
  • B. where a user is located
  • C. physical characteristics of a user
  • D. objects a user carries with him or her

Answer: C

Explanation:
Biometrics refers to authentication techniques that rely on measurable physical characteristics that can be automatically checked.
Note: There are several types of biometric identification schemes: face: the analysis of facial characteristics
fingerprint: the analysis of an individual's unique fingerprints
hand geometry: the analysis of the shape of the hand and the length of the fingers retina: the analysis of the capillary vessels located at the back of the eye
iris: the analysis of the colored ring that surrounds the eye's pupil signature: the analysis of the way a person signs his name.
vein: the analysis of pattern of veins in the back if the hand and the wrist
voice: the analysis of the tone, pitch, cadence and frequency of a person's voice. Reference: http://www.webopedia.com/TERM/B/biometrics.html

NEW QUESTION 16
Your sister is taking a video editing class at school. She purchased a 2-TB USB hard drive to store
video files. She wants to connect it to her Windows 8.1 computer at home and to a Mac OSX 10.3 computer at school. Video file will exceed 5 GB in size.
You need to prepare a new hard drive by formatting it with the appropriate file system. Which file system should you choose?

  • A. FAT
  • B. ReFS
  • C. NTFS
  • D. FAT32

Answer: C

Explanation:
Mac OSX 10.3 supports NTFS.
NTFS supports large files well above 5 GB. Incorrect answers:
Not A: FAT does not support a 5 GB file size.
Not B: ReFS is only supported by Microsoft Windows. Not C:
Not D: FAT32 works fine if file sizes are smaller than 4GB.

NEW QUESTION 17
This question requires that you evaluate the underlined text to determine if it is correct.
You have a Windows 8.1 computer in a WorkGroup. To share the C:\Work folder and make it available to offline users, you need to use the "public" share option.
Instructions: Review the underlined text. If it makes the statement correct, select “No change is needed”. If the statement is incorrect, select the answer choice than makes the statement correct.

  • A. No change is needed
  • B. advanced
  • C. HomeGroup
  • D. basic

Answer: B

Explanation:
In the advanced sharing dialog box Click on “Caching” button. In “Offline settings” dialog box, you can set up caching for files and programs which are offline.
98-368 dumps exhibit
You have the following options:
i) Only the files and programs that users specify are available offline: If you select this option then, users specify the files and programs which can be accessed offline. It is the default option.
ii) No files or programs from the share are available offline: If you select this option then, caching will be turned off.
iii) All files and programs that users open from the share are automatically available offline: If you select this option then, caching is turned on for all files and programs and they can be accessed offline. Check option “Optimize for performance”.
98-368 dumps exhibit
Reference: How to set advanced sharing options, custom permissions, caching for folder in Windows
7?
http://www.moreprocess.com/operating-systems/windows-7/how-to-set-advanced-sharing-options- custom-permissions-caching-for-folder-in-windows-7

NEW QUESTION 18
When you copy a file from one NTFS file system partition to a different NTFS partition, what happens to the file permissions of the copied file?

  • A. They are the combined permissions of the original file and destination folder
  • B. They inherit the permissions of the destination folder
  • C. They remain the same as the original
  • D. They are removed, and only the creator is given full control

Answer: B

Explanation:
When you copy a protected file to a folder on the same, or a different volume, it inherits the permissions of the target directory.
Reference: http://www.ntfs.com/ntfs-permissions-files-moving.htm

NEW QUESTION 19
This question requires that you evaluate the underlined text to determine if it is correct.
"Redundant" Microsoft Azure applications are able to meet increased demand with consistent results in acceptable time window.
Instructions: Review the underlined text. If it makes the statement correct, select “No change is needed”. If the statement is incorrect, select the answer choice than makes the statement correct.

  • A. No change is needed
  • B. Highly Available
  • C. Fault Tolerant
  • D. Scalable

Answer: D

Explanation:
Scalable applications are able to meet increased demand with consistent results in acceptable time windows.
When a system is scalable, it scales horizontally or vertically to manage increases in load while maintaining consistent performance. In basic terms, horizontal scaling adds more machines of the same size (processor, memory, bandwidth) while vertical scaling increases the size of the existing machines.
Reference: Disaster Recovery and High Availability for Azure Applications
https://msdn.microsoft.com/en-us/library/azure/dn251004.aspx

NEW QUESTION 20
This requires that you evaluate the underlined text to determine if it is correct. The OneDrive service is used to create a private, enterprise-based social network.
Review the underlined text. If it makes the statement correct, select “No change is needed”. If the statement is incorrect, select the answer choice than makes the statement correct.

  • A. No change is needed
  • B. Skype for Business
  • C. Yammer
  • D. Azure

Answer: C

Explanation:
References:
https://products.office.com/en-za/yammer/yammer-overview

NEW QUESTION 21
You are using dual monitors on a Windows 8.1 computer. You want to move system tray to the secondary monitor. Which Display option in Control Panel should you select?

  • A. Make this my main display
  • B. Landscape orientation
  • C. PC Screen only
  • D. Extend desktop to this display

Answer: A

Explanation:
98-368 dumps exhibit

NEW QUESTION 22
This question requires that you evaluate the underlined text to determine if it is correct.
The "Simple Spaces" resiliency type in Windows 8.1 Storage Spaces requires at least five drives in order to protect a system from a single-drive failure.
Instructions: Review the underlined text. If it makes the statement correct, select “No change is needed”. If the statement is incorrect, select the answer choice than makes the statement correct.

  • A. No change is needed
  • B. two-way mirror
  • C. Parity Spaces
  • D. three-way mirror

Answer: D

Explanation:
Two-way mirror spaces require at least two drives, and three-way mirror spaces require at least five. Mirror spaces are designed for increased performance and protect your files from drive failure by keeping more than one copy. Two-way mirror spaces make two copies of your files and can tolerate one drive failure, while three-way mirror spaces can tolerate two drive failures.
Reference: Storage Spaces: FAQ
http://windows.microsoft.com/en-us/windows-8/storage-spaces-pools

NEW QUESTION 23
Your company is deploying a new application on employee’s personal Windows RT devices. The devices are registered with Microsoft Intune.
You need to publish the new application to Microsoft Intune cloud storage so that the employees can install the published application.
What are requirements of the published installation files?

  • A. In order to publish the files, Internet speed must be at least 50 kbps
  • B. The cumulative total file size for the published applications must be smaller than 2 GB
  • C. In order to upload the software, the files must be a .zip format
  • D. As many files as necessary may be uploaded, but no single file may be larger than 2 GB

Answer: D

Explanation:
Before you publish computer apps to Microsoft Intune cloud storage make sure no single file size is
larger than 2 GB.
Reference: Deploy apps to computers in Microsoft Intune
https://technet.microsoft.com/en-us/library/dn646961.aspx

NEW QUESTION 24
......

Recommend!! Get the Full 98-368 dumps in VCE and PDF From Allfreedumps.com, Welcome to Download: https://www.allfreedumps.com/98-368-dumps.html (New 66 Q&As Version)