Practical of 98-368 exam guide materials and study guides for Microsoft certification for IT examinee, Real Success Guaranteed with Updated 98-368 pdf dumps vce Materials. 100% PASS Mobility and Devices Fundamentals exam Today!
Q11. Which is a feature Active Directory Rights Management Services (AD RMS)?
A. manages Digital Rights Media (DRM) for digital media
B. provides a permissions system that works with any cloud-based storage solution
C. manages share and file permissions on all servers in enterprise
D. allow users to define who can open, modify, print, or forward a document
Answer: D
Explanation: Windows Rights Management Services (also called Rights Management Services, Active Directory Rights Management Services or RMS) is a form of Information Rights Management used on Microsoft Windows that uses encryption and a form of selective functionality denial for limiting access to documents such as corporate e-mail, Word documents, and web pages, and the operations authorized users can perform on them. Companies can use this technology to encrypt information stored in such document formats, and through policies embedded in the documents, prevent the protected content from being decrypted except by specified people or groups, in certain environments, under certain conditions, and for certain periods of time.
Reference: http://en.wikipedia.org/wiki/Active_Directory_Rights_Management_Services
Q12. When you copy a file from one NTFS file system partition to a different NTFS partition, what happens to the file permissions of the copied file?
A. They are the combined permissions of the original file and destination folder
B. They inherit the permissions of the destination folder
C. They remain the same as the original
D. They are removed, and only the creator is given full control
Answer: B
Explanation: When you copy a protected file to a folder on the same, or a different volume, it inherits the permissions of the target directory.
Reference: http://www.ntfs.com/ntfs-permissions-files-moving.htm
Q13. You manage desktop computers for your university’s computer labs. You recently upgraded these computers to Windows 8.1. You need to modify the configuration of the new computers to increase the number of items displayed in jump lists.
Which configuration tool should you use?
A. Display Options
B. Control Panel Personalization applet
C. Device Manager
D. Taskbar properties
Answer: D
Explanation: By default up to 10 items can be added to a button's Jump List. For privacy reasons you may wish to reduce or eliminate this number. Conversely, if you find Jump Lists extremely useful you may wish to increase the number of displayed items.1. Right-click an empty area of the taskbar and choose "Properties".2. The "Taskbar and Start Menu Properties" multi-tabbed dialog box appears. Click the "Start Menu" tab.3. Click the "Customize" button.4. The "Customize Start Menu" dialog box appears. Underneath "Start menu size", next to "Number of recent items to display in Jump Lists", enter/select a value from 0-60..
Reference: Adjust Size of Jump Lists on Windows 7 Taskbar
http://malektips.com/windows-7-jump-list-size-increase-decrease.html#.VWf-4M-qpBc
Q14. OTSPOT
Instructions: For each of the following statements, select Yes if the statement is true. Otherwise, select No. Each correct selection is worth one point.
Answer:
Q15. This question requires that you evaluate the underlined text to determine if it is correct.
You manage Windows 8.1 desktop and laptop computers in your university’s computer lab. The university’s IT team recently implemented an active directory environment.
You need to join the desktop and laptop computers to a new Active Directory domain.
You should use the "Network and Internet" Control Panel applet to achieve this goal.
Instructions: Review the underlined text. If it makes the statement correct, select “No change is needed”. If the statement is incorrect, select the answer choice than makes the statement correct.
A. No change is needed
B. User Accounts
C. Administrative Tools
D. System
Answer: D
Explanation: Join a domain, workgroup, or homegroup
. Open System by swiping in from the right edge of the screen, tapping.Search.(or if you're using a mouse, pointing to the upper-right corner of the screen, moving the mouse pointer down, and then clicking.Search), entering.System.in the search box, and tapping or clicking.System.
. Under Computer name, domain, and workgroup settings, click.Change settings..Administrator permission required.You might be asked for an admin password or to confirm your choice.
. Click.Network ID.and follow the steps on your screen.
Reference: http://windows.microsoft.com/en-us/windows-8/join-domain-workgroup-homegroup
Q16. This question requires that you evaluate the underlined text to determine if it is correct.
Microsoft Azure storage solutions replicates "four" copies of your data within a single region.
Instructions: Review the underlined text. If it makes the statement correct, select “No change is needed”. If the statement is incorrect, select the answer choice than makes the statement correct.
A. No change is needed
B. two
C. three
D. six
Answer: C
Explanation: Geo-redundant storage (GRS). Geo-redundant storage is enabled for your storage account by default when you create it. GRS maintains six copies of your data. With GRS, your data is replicated three times within the primary region, and is also replicated three times in a secondary region hundreds of miles away from the primary region, providing the highest level of durability.
Reference: Introduction to Microsoft Azure Storage
https://azure.microsoft.com/en-gb/documentation/articles/storage-introduction/
Q17. Your university’s IT department currently has no Active Directory strategy.
The university needs a solution that allows you to manage users and groups to secure access to Microsoft online services such as Microsoft Office 365.
A. Active Directory Federation services
B. Active Directory Lightweight Directory services
C. Active Directory Certificate services
D. Azure Active Directory
Answer: D
Explanation: Azure Active Directory is preintegrated with Salesforce.com, Office 365, Box and many more.
Q18. This question requires that you evaluate the underlined text to determine if it is correct.
When you access a file located on a shared resource, the "most restrictive" permissions take precedence.
Instructions: Review the underlined text. If it makes the statement correct, select “No change is needed”. If the statement is incorrect, select the answer choice than makes the statement correct.
A. No change is needed.
B. ACL
C. NTFS
D. share
Answer: A
Explanation: When using share permissions and NTFS permissions together, if there is a conflict in the configuration, the most restrictive permission prevails.
Reference: http://www.ntfs.com/ntfs-permissions-combined.htm
Q19. This question requires that you evaluate the underlined text to determine if it is correct.
When BitLocker is enabled and and protecting a local drive, Trusted Platform Module (TPM) provides "pre-start system integrity verification for system and operating system drives".
Instructions: Review the underlined text. If it makes the statement correct, select “No change is needed”. If the statement is incorrect, select the answer choice than makes the statement correct.
A. No change is needed
B. 256-bit encryption that uses Advanced Encryption Standard (AES)
C. a location that stores recovery keys for removable drives
D. boot sector mapping for the startup process
Answer: C
Explanation: Computers that incorporate a TPM have the ability to create cryptographic keys and encrypt them so that they can be decrypted only by the TPM. This process, often called "wrapping" or "binding" a key, can help protect the key from disclosure. Each TPM has a root "wrapping" key, called the Storage Root Key (SRK), which is stored within the TPM itself. The private portion of a key created in a TPM is never exposed to any other component, software, process, or person.
Reference: Windows Trusted Platform Module Management Step-by-Step Guide
https://technet.microsoft.com/en-us/library/cc749022%28v=ws.10%29.aspx
Q20. RAG DROP
Match each Microsoft cloud service to the feature it provides.
Instructions: To answer, drag the appropriate Microsoft cloud service from the column of the left to its feature on the right. Each service may be used once, more than once, or not at all. Each correct match is worth one point.
Answer: