Top 10 study guides 98-368 for consumer (11 to 20)

Our pass rate is high to 98.9% and the similarity percentage between our 98-368 study guide and real exam is 90% based on our seven-year educating experience. Do you want achievements in the Microsoft 98-368 exam in just one try? I am currently studying for the Microsoft 98-368 exam. Latest Microsoft 98-368 Test exam practice questions and answers, Try Microsoft 98-368 Brain Dumps First.


♥♥ 2021 NEW RECOMMEND ♥♥

Free VCE & PDF File for Microsoft 98-368 Real Exam (Full Version!)

★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions

Free Instant Download NEW 98-368 Exam Dumps (PDF & VCE):
Available on: http://www.surepassexam.com/98-368-exam-dumps.html

Q11. Which feature on Windows Phone 8.1 provides secure encryption of all user data stored locally on internal data partitions? 

A. Secure Boot 

B. Encrypted File System 

C. BitLocker 

D. TrueCrypt 

Answer:

Explanation: The Windows Phone OS supports using BitLocker technology to encrypt all user data stored locally on internal data partitions. 

Reference: Secure boot and device encryption overview 

https://dev.windowsphone.com/en-US/OEM/docs/Phone_Bring-Up/Secure_boot_and_device_encryption_overview 


Q12. This question requires that you evaluate the underlined text to determine if it is correct. 

The "Simple Spaces" resiliency type in Windows 8.1 Storage Spaces requires at least five drives in order to protect a system from a single-drive failure. 

Instructions: Review the underlined text. If it makes the statement correct, select “No change is needed”. If the statement is incorrect, select the answer choice than makes the statement correct. 

A. No change is needed 

B. two-way mirror 

C. Parity Spaces 

D. three-way mirror 

Answer:

Explanation: Two-way mirror spaces require at least two drives, and three-way mirror spaces require at least five. 

Mirror spaces are designed for increased performance and protect your files from drive failure by keeping more than one copy. Two-way mirror spaces make two copies of your files and can tolerate one drive failure, while three-way mirror spaces can tolerate two drive failures. 

Reference: Storage Spaces: FAQ 

http://windows.microsoft.com/en-us/windows-8/storage-spaces-pools 


Q13. Your company uses Windows 8.1 work folders on personal devices. The devices are all registered in Microsoft Intune. 

You need to enforce the following security requirements on the personal devices: 

.

Company data can be removed if an employee is terminated. 

.

Company data cannot be accessed if a devise is lost or stolen. 

What should you do? 

A. Enable selective wipe, and enforce a lock screen and password 

B. Enable selective wipe, and secure files transfers with SSL 

C. Enable selective wipe, and enforce encryption 

D. Enforce encryption and enforce a lock screen and password 

Answer:

Explanation: * Microsoft Intune provides selective wipe, full wipe, remote lock, and passcode reset capabilities. A selective wipe to remove only company data. 

* Encryption on Mobile Devices can be managed with Configuration Manager and Intune 

Reference: Help protect your data with remote wipe, remote lock, or passcode reset using Microsoft Intune 

https://technet.microsoft.com/en-us/library/jj676679.aspx 

Reference: Managing Encryption on Mobile Devices with Configuration Manager and Intune 

http://blogs.technet.com/b/pauljones/archive/2014/08/04/managing-encryption-on-mobile-devices-with-configuration-manager-and-intune.aspx 


Q14. Your company needs a service that eliminates a single point of failure on any provisioned service. 

Which feature can Microsoft Azure offer to lower the probability of a failure that disrupts business operations? 

A. HDInsight 

B. scalability 

C. high availability 

D. backup 

Answer:

Explanation: A highly available cloud application implements strategies to absorb the outage of the dependencies like the managed services offered by the cloud platform. Despite possible failures of the cloud platform’s capabilities, this approach permits the application to continue to exhibit the expected functional and non-functional systemic characteristics. 

Reference: Disaster Recovery and High Availability for Azure Applications 

https://msdn.microsoft.com/en-us/library/azure/dn251004.aspx 


Q15. What are two ways to lower the risk of a virus or malware infection? Choose two. 

A. Enable the Windows firewall 

B. Use only HTTPS while web surfing 

C. Keep the system updated 

D. Install a download manager 

Answer: A,C 


Q16. This question requires that you evaluate the underlined text to determine if it is correct. 

When BitLocker is enabled and and protecting a local drive, Trusted Platform Module (TPM) provides "pre-start system integrity verification for system and operating system drives". 

Instructions: Review the underlined text. If it makes the statement correct, select “No change is needed”. If the statement is incorrect, select the answer choice than makes the statement correct. 

A. No change is needed 

B. 256-bit encryption that uses Advanced Encryption Standard (AES) 

C. a location that stores recovery keys for removable drives 

D. boot sector mapping for the startup process 

Answer:

Explanation: Computers that incorporate a TPM have the ability to create cryptographic keys and encrypt them so that they can be decrypted only by the TPM. This process, often called "wrapping" or "binding" a key, can help protect the key from disclosure. Each TPM has a root "wrapping" key, called the Storage Root Key (SRK), which is stored within the TPM itself. The private portion of a key created in a TPM is never exposed to any other component, software, process, or person. 

Reference: Windows Trusted Platform Module Management Step-by-Step Guide 

https://technet.microsoft.com/en-us/library/cc749022%28v=ws.10%29.aspx 


Q17. RAG DROP 

You are setting up the networking for a single-site motel. For three different classes of 

users, you need to specify the most privileged network segment each can access. 

Match each network to the class of users that cam access it. 

Instructions: To answer, drag the appropriate network from the column of the left to the class of users on the right. Each network may be used once, more than once, or not at all. Each correct match is worth one point. 

Answer: 


Q18. This question requires that you evaluate the underlined text to determine if it is correct. 

"The Windows Store" allows users of Windows 8 and Windows 8.1 computers to view and install applications that the users’ administrators make available to them. The computers must be attached to the domain, and the user must be logged in with domain credentials. 

Instructions: Review the underlined text. If it makes the statement correct, select “No change is needed”. If the statement is incorrect, select the answer choice than makes the statement correct. 

A. No change is needed 

B. Microsoft SharePoint 

C. The Microsoft Intune Company Portal App 

D. The System Center Configuration Manager Company Portal App 

Answer:

Explanation: The System Center Configuration Manager Company Portal app allows users of Windows 8, Windows 8.1 and Windows 10 machines to view and install applications made available to the user by their administrators. The machine must be managed by Microsoft System Center 2012 R2 Configuration Manager, or later, with the agent installed. 

End User Machines requirements: 

*

 Windows 8 Pro, Windows 8 Enterprise, Windows 8.1 Pro, Windows 8.1 Enterprise, Windows 10 Pro or Windows 10 Enterprise 

*

 Machine must be domain-joined 

*

 User must be logged on with domain credentials 

*

 System Center 2012 R2 Configuration Manager (or later) client agent must be installed 

Reference: System Center Configuration Manager Company Portal App 

https://www.microsoft.com/en-us/download/details.aspx?id=40795 


Q19. This question requires that you evaluate the underlined text to determine if it is correct. 

When you access a file located on a shared resource, the "most restrictive" permissions take precedence. 

Instructions: Review the underlined text. If it makes the statement correct, select “No change is needed”. If the statement is incorrect, select the answer choice than makes the statement correct. 

A. No change is needed. 

B. ACL 

C. NTFS 

D. share 

Answer:

Explanation: When using share permissions and NTFS permissions together, if there is a conflict in the configuration, the most restrictive permission prevails. 

Reference: http://www.ntfs.com/ntfs-permissions-combined.htm 


Q20. This question requires that you evaluate the underlined text to determine if it is correct. 

You manage Windows 8.1 desktop and laptop computers in your university’s computer lab. The university’s IT team recently implemented an active directory environment. 

You need to join the desktop and laptop computers to a new Active Directory domain. 

You should use the "Network and Internet" Control Panel applet to achieve this goal. 

Instructions: Review the underlined text. If it makes the statement correct, select “No change is needed”. If the statement is incorrect, select the answer choice than makes the statement correct. 

A. No change is needed 

B. User Accounts 

C. Administrative Tools 

D. System 

Answer:

Explanation: Join a domain, workgroup, or homegroup 

. Open System by swiping in from the right edge of the screen, tapping.Search.(or if you're using a mouse, pointing to the upper-right corner of the screen, moving the mouse pointer down, and then clicking.Search), entering.System.in the search box, and tapping or clicking.System. 

. Under Computer name, domain, and workgroup settings, click.Change settings..Administrator permission required.You might be asked for an admin password or to confirm your choice. 

. Click.Network ID.and follow the steps on your screen. 

Reference: http://windows.microsoft.com/en-us/windows-8/join-domain-workgroup-homegroup