Our pass rate is high to 98.9% and the similarity percentage between our 98-368 study guide and real exam is 90% based on our seven-year educating experience. Do you want achievements in the Microsoft 98-368 exam in just one try? I am currently studying for the Microsoft 98-368 exam. Latest Microsoft 98-368 Test exam practice questions and answers, Try Microsoft 98-368 Brain Dumps First.
♥♥ 2021 NEW RECOMMEND ♥♥
Free VCE & PDF File for Microsoft 98-368 Real Exam (Full Version!)
★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions
Free Instant Download NEW 98-368 Exam Dumps (PDF & VCE):
Available on:
http://www.surepassexam.com/98-368-exam-dumps.html
Q11. Which feature on Windows Phone 8.1 provides secure encryption of all user data stored locally on internal data partitions?
A. Secure Boot
B. Encrypted File System
C. BitLocker
D. TrueCrypt
Answer: C
Explanation: The Windows Phone OS supports using BitLocker technology to encrypt all user data stored locally on internal data partitions.
Reference: Secure boot and device encryption overview
https://dev.windowsphone.com/en-US/OEM/docs/Phone_Bring-Up/Secure_boot_and_device_encryption_overview
Q12. This question requires that you evaluate the underlined text to determine if it is correct.
The "Simple Spaces" resiliency type in Windows 8.1 Storage Spaces requires at least five drives in order to protect a system from a single-drive failure.
Instructions: Review the underlined text. If it makes the statement correct, select “No change is needed”. If the statement is incorrect, select the answer choice than makes the statement correct.
A. No change is needed
B. two-way mirror
C. Parity Spaces
D. three-way mirror
Answer: D
Explanation: Two-way mirror spaces require at least two drives, and three-way mirror spaces require at least five.
Mirror spaces are designed for increased performance and protect your files from drive failure by keeping more than one copy. Two-way mirror spaces make two copies of your files and can tolerate one drive failure, while three-way mirror spaces can tolerate two drive failures.
Reference: Storage Spaces: FAQ
http://windows.microsoft.com/en-us/windows-8/storage-spaces-pools
Q13. Your company uses Windows 8.1 work folders on personal devices. The devices are all registered in Microsoft Intune.
You need to enforce the following security requirements on the personal devices:
.
Company data can be removed if an employee is terminated.
.
Company data cannot be accessed if a devise is lost or stolen.
What should you do?
A. Enable selective wipe, and enforce a lock screen and password
B. Enable selective wipe, and secure files transfers with SSL
C. Enable selective wipe, and enforce encryption
D. Enforce encryption and enforce a lock screen and password
Answer: C
Explanation: * Microsoft Intune provides selective wipe, full wipe, remote lock, and passcode reset capabilities. A selective wipe to remove only company data.
* Encryption on Mobile Devices can be managed with Configuration Manager and Intune
Reference: Help protect your data with remote wipe, remote lock, or passcode reset using Microsoft Intune
https://technet.microsoft.com/en-us/library/jj676679.aspx
Reference: Managing Encryption on Mobile Devices with Configuration Manager and Intune
http://blogs.technet.com/b/pauljones/archive/2014/08/04/managing-encryption-on-mobile-devices-with-configuration-manager-and-intune.aspx
Q14. Your company needs a service that eliminates a single point of failure on any provisioned service.
Which feature can Microsoft Azure offer to lower the probability of a failure that disrupts business operations?
A. HDInsight
B. scalability
C. high availability
D. backup
Answer: C
Explanation: A highly available cloud application implements strategies to absorb the outage of the dependencies like the managed services offered by the cloud platform. Despite possible failures of the cloud platform’s capabilities, this approach permits the application to continue to exhibit the expected functional and non-functional systemic characteristics.
Reference: Disaster Recovery and High Availability for Azure Applications
https://msdn.microsoft.com/en-us/library/azure/dn251004.aspx
Q15. What are two ways to lower the risk of a virus or malware infection? Choose two.
A. Enable the Windows firewall
B. Use only HTTPS while web surfing
C. Keep the system updated
D. Install a download manager
Answer: A,C
Q16. This question requires that you evaluate the underlined text to determine if it is correct.
When BitLocker is enabled and and protecting a local drive, Trusted Platform Module (TPM) provides "pre-start system integrity verification for system and operating system drives".
Instructions: Review the underlined text. If it makes the statement correct, select “No change is needed”. If the statement is incorrect, select the answer choice than makes the statement correct.
A. No change is needed
B. 256-bit encryption that uses Advanced Encryption Standard (AES)
C. a location that stores recovery keys for removable drives
D. boot sector mapping for the startup process
Answer: C
Explanation: Computers that incorporate a TPM have the ability to create cryptographic keys and encrypt them so that they can be decrypted only by the TPM. This process, often called "wrapping" or "binding" a key, can help protect the key from disclosure. Each TPM has a root "wrapping" key, called the Storage Root Key (SRK), which is stored within the TPM itself. The private portion of a key created in a TPM is never exposed to any other component, software, process, or person.
Reference: Windows Trusted Platform Module Management Step-by-Step Guide
https://technet.microsoft.com/en-us/library/cc749022%28v=ws.10%29.aspx
Q17. RAG DROP
You are setting up the networking for a single-site motel. For three different classes of
users, you need to specify the most privileged network segment each can access.
Match each network to the class of users that cam access it.
Instructions: To answer, drag the appropriate network from the column of the left to the class of users on the right. Each network may be used once, more than once, or not at all. Each correct match is worth one point.
Answer:
Q18. This question requires that you evaluate the underlined text to determine if it is correct.
"The Windows Store" allows users of Windows 8 and Windows 8.1 computers to view and install applications that the users’ administrators make available to them. The computers must be attached to the domain, and the user must be logged in with domain credentials.
Instructions: Review the underlined text. If it makes the statement correct, select “No change is needed”. If the statement is incorrect, select the answer choice than makes the statement correct.
A. No change is needed
B. Microsoft SharePoint
C. The Microsoft Intune Company Portal App
D. The System Center Configuration Manager Company Portal App
Answer: D
Explanation: The System Center Configuration Manager Company Portal app allows users of Windows 8, Windows 8.1 and Windows 10 machines to view and install applications made available to the user by their administrators. The machine must be managed by Microsoft System Center 2012 R2 Configuration Manager, or later, with the agent installed.
End User Machines requirements:
*
Windows 8 Pro, Windows 8 Enterprise, Windows 8.1 Pro, Windows 8.1 Enterprise, Windows 10 Pro or Windows 10 Enterprise
*
Machine must be domain-joined
*
User must be logged on with domain credentials
*
System Center 2012 R2 Configuration Manager (or later) client agent must be installed
Reference: System Center Configuration Manager Company Portal App
https://www.microsoft.com/en-us/download/details.aspx?id=40795
Q19. This question requires that you evaluate the underlined text to determine if it is correct.
When you access a file located on a shared resource, the "most restrictive" permissions take precedence.
Instructions: Review the underlined text. If it makes the statement correct, select “No change is needed”. If the statement is incorrect, select the answer choice than makes the statement correct.
A. No change is needed.
B. ACL
C. NTFS
D. share
Answer: A
Explanation: When using share permissions and NTFS permissions together, if there is a conflict in the configuration, the most restrictive permission prevails.
Reference: http://www.ntfs.com/ntfs-permissions-combined.htm
Q20. This question requires that you evaluate the underlined text to determine if it is correct.
You manage Windows 8.1 desktop and laptop computers in your university’s computer lab. The university’s IT team recently implemented an active directory environment.
You need to join the desktop and laptop computers to a new Active Directory domain.
You should use the "Network and Internet" Control Panel applet to achieve this goal.
Instructions: Review the underlined text. If it makes the statement correct, select “No change is needed”. If the statement is incorrect, select the answer choice than makes the statement correct.
A. No change is needed
B. User Accounts
C. Administrative Tools
D. System
Answer: D
Explanation: Join a domain, workgroup, or homegroup
. Open System by swiping in from the right edge of the screen, tapping.Search.(or if you're using a mouse, pointing to the upper-right corner of the screen, moving the mouse pointer down, and then clicking.Search), entering.System.in the search box, and tapping or clicking.System.
. Under Computer name, domain, and workgroup settings, click.Change settings..Administrator permission required.You might be asked for an admin password or to confirm your choice.
. Click.Network ID.and follow the steps on your screen.
Reference: http://windows.microsoft.com/en-us/windows-8/join-domain-workgroup-homegroup
