getcertified4sure.com

Top 10 prep 98-368 for IT candidates (11 to 20)




We provide real 98-368 exam questions and answers braindumps in two formats. Download PDF & Practice Tests. Pass Microsoft 98-368 Exam quickly & easily. The 98-368 PDF type is available for reading and printing. You can print more and practice many times. With the help of our Microsoft 98-368 dumps pdf and vce product and material, you can easily pass the 98-368 exam.

Q11. RAG DROP 

You are setting up the networking for a single-site motel. For three different classes of 

users, you need to specify the most privileged network segment each can access. 

Match each network to the class of users that cam access it. 

Instructions: To answer, drag the appropriate network from the column of the left to the class of users on the right. Each network may be used once, more than once, or not at all. Each correct match is worth one point. 

Answer: 


Q12. What are two ways to lower the risk of a virus or malware infection? Choose two. 

A. Enable the Windows firewall 

B. Use only HTTPS while web surfing 

C. Keep the system updated 

D. Install a download manager 

Answer: A,C 


Q13. This question requires that you evaluate the underlined text to determine if it is correct. 

"The Windows Store" allows users of Windows 8 and Windows 8.1 computers to view and install applications that the users’ administrators make available to them. The computers must be attached to the domain, and the user must be logged in with domain credentials. 

Instructions: Review the underlined text. If it makes the statement correct, select “No change is needed”. If the statement is incorrect, select the answer choice than makes the statement correct. 

A. No change is needed 

B. Microsoft SharePoint 

C. The Microsoft Intune Company Portal App 

D. The System Center Configuration Manager Company Portal App 

Answer:

Explanation: The System Center Configuration Manager Company Portal app allows users of Windows 8, Windows 8.1 and Windows 10 machines to view and install applications made available to the user by their administrators. The machine must be managed by Microsoft System Center 2012 R2 Configuration Manager, or later, with the agent installed. 

End User Machines requirements: 

*

 Windows 8 Pro, Windows 8 Enterprise, Windows 8.1 Pro, Windows 8.1 Enterprise, Windows 10 Pro or Windows 10 Enterprise 

*

 Machine must be domain-joined 

*

 User must be logged on with domain credentials 

*

 System Center 2012 R2 Configuration Manager (or later) client agent must be installed 

Reference: System Center Configuration Manager Company Portal App 

https://www.microsoft.com/en-us/download/details.aspx?id=40795 


Q14. This question requires that you evaluate the underlined text to determine if it is correct. 

When BitLocker is enabled and and protecting a local drive, Trusted Platform Module (TPM) provides "pre-start system integrity verification for system and operating system drives". 

Instructions: Review the underlined text. If it makes the statement correct, select “No change is needed”. If the statement is incorrect, select the answer choice than makes the statement correct. 

A. No change is needed 

B. 256-bit encryption that uses Advanced Encryption Standard (AES) 

C. a location that stores recovery keys for removable drives 

D. boot sector mapping for the startup process 

Answer:

Explanation: Computers that incorporate a TPM have the ability to create cryptographic keys and encrypt them so that they can be decrypted only by the TPM. This process, often called "wrapping" or "binding" a key, can help protect the key from disclosure. Each TPM has a root "wrapping" key, called the Storage Root Key (SRK), which is stored within the TPM itself. The private portion of a key created in a TPM is never exposed to any other component, software, process, or person. 

Reference: Windows Trusted Platform Module Management Step-by-Step Guide 

https://technet.microsoft.com/en-us/library/cc749022%28v=ws.10%29.aspx 


Q15. You manage Windows 8 Pro desktop and laptop computers. 

Which volume types can you encrypt by using BitLocker? 

A. dynamic volumes 

B. simple volumes 

C. virtual hard disks 

D. software-used RAID 

Answer:

Explanation: Bitlocker supports Basic (simple) volumes. 

Reference: BitLocker Frequently Asked Questions (FAQ) 

https://technet.microsoft.com/en-us/library/hh831507.aspx 


Q16. Your company is deploying a new application on employee’s personal Windows RT devices. The devices are registered with Microsoft Intune. 

You need to publish the new application to Microsoft Intune cloud storage so that the employees can install the published application. 

What are requirements of the published installation files? 

A. In order to publish the files, Internet speed must be at least 50 kbps 

B. The cumulative total file size for the published applications must be smaller than 2 GB 

C. In order to upload the software, the files must be a .zip format 

D. As many files as necessary may be uploaded, but no single file may be larger than 2 GB 

Answer:

Explanation: Before you publish computer apps to Microsoft Intune cloud storage make sure no single file size is larger than 2 GB. 

Reference: Deploy apps to computers in Microsoft Intune 

https://technet.microsoft.com/en-us/library/dn646961.aspx 


Q17. You manage desktop computers for your university’s computer labs. You recently upgraded these computers to Windows 8.1. You need to modify the configuration of the new computers to increase the number of items displayed in jump lists. 

Which configuration tool should you use? 

A. Display Options 

B. Control Panel Personalization applet 

C. Device Manager 

D. Taskbar properties 

Answer:

Explanation: By default up to 10 items can be added to a button's Jump List. For privacy reasons you may wish to reduce or eliminate this number. Conversely, if you find Jump Lists extremely useful you may wish to increase the number of displayed items.1. Right-click an empty area of the taskbar and choose "Properties".2. The "Taskbar and Start Menu Properties" multi-tabbed dialog box appears. Click the "Start Menu" tab.3. Click the "Customize" button.4. The "Customize Start Menu" dialog box appears. Underneath "Start menu size", next to "Number of recent items to display in Jump Lists", enter/select a value from 0-60..

Reference: Adjust Size of Jump Lists on Windows 7 Taskbar 

http://malektips.com/windows-7-jump-list-size-increase-decrease.html#.VWf-4M-qpBc 


Q18. RAG DROP 

Match each Microsoft cloud service to the feature it provides. 

Instructions: To answer, drag the appropriate Microsoft cloud service from the column of the left to its feature on the right. Each service may be used once, more than once, or not at all. Each correct match is worth one point. 

Answer: 


Q19. This question requires that you evaluate the underlined text to determine if it is correct. 

The "ExFAT" file system can automatically verify and auto correct data to avoid file system errors. 

Instructions: Review the underlined text. If it makes the statement correct, select “No change is needed”. If the statement is incorrect, select the answer choice than makes the statement correct. 

A. No change is needed 

B. NTFS 

C. FAT32 

D. ReFS 

Answer:

Explanation: Resilient File System (ReFS) is a Microsoft proprietary file system introduced with Windows Server 2012 with the intent of becoming the "next generation" file system after NTFS. ReFS key design advantages are intended to include automatic integrity checking and data scrubbing, removing the need for chkdsk and protecting against data degradation. 

Reference: http://en.wikipedia.org/wiki/ReFS 


Q20. Which type of information about users does biometrics evaluate? 

A. phrases a user has memorized 

B. where a user is located 

C. physical characteristics of a user 

D. objects a user carries with him or her 

Answer:

Explanation: Biometrics refers to authentication techniques that rely on measurable physical characteristics that can be automatically checked. 

Note: There are several types of biometric identification schemes: face: the analysis of facial characteristics fingerprint: the analysis of an individual's unique fingerprints hand geometry: the analysis of the shape of the hand and the length of the fingers retina: the analysis of the capillary vessels located at the back of the eye iris: the analysis of the colored ring that surrounds the eye's pupil signature: the analysis of the way a person signs his name. vein: the analysis of pattern of veins in the back if the hand and the wrist 

voice: the analysis of the tone, pitch, cadence and frequency of a person's voice. Reference: http://www.webopedia.com/TERM/B/biometrics.html