Proper study guides for Leading Microsoft Cloud Fundamentals certified begins with Microsoft 98-369 preparation products which designed to deliver the Vivid 98-369 questions by making you pass the 98-369 test at your first time. Try the free 98-369 demo right now.
Q11. Which three items are required in order to create a new user in Microsoft Intune? Choose three.
A. last name
B. user role
C. user name
D. display name
E. user location
Answer: C,D
Explanation: CD: For each user you must include the user name (like bob@contoso.com) and a display name (like Bob Kelly).
E: To manually add individual user accounts . In the.Microsoft Intune account portal, click.Users.>.New. . Click.User.to start the New users wizard.
The new user account now appears in the.Users.node of the account portal. When the user signs-in for the first time, the user must specify a new password for the account.
Reference: Set up Microsoft Intune
https://technet.microsoft.com/en-us/library/dn646983.aspx#BKMK_AddUsers
Q12. You are an intern for an organization that wants to improve its security. The organization
wants multi-factor authentication enforced for all of its users.
You suggest implementing Microsoft Office 365 Business Premium.
Which two types of secondary authentication does this solution support? Choose two.
A. notification through a smartphone application
B. entering a username and password
C. entering a text code sent to the user’s mobile phone
D. the insertion of a smart card into a reader attached to the user’s computer
Answer: A,C
Explanation: Multi-Factor Authentication for Office 365 offers the following subset of Azure Multi-Factor Authentication capabilities:
*
Use of a mobile app (online and one-time password [OTP]) as a second authentication factor
*
Use of a phone call as a second authentication factor
*
Use of an SMS message as a second authentication factor
Reference: Multi-Factor Authentication for Office 365
https://msdn.microsoft.com/en-us/library/azure/dn383636.aspx
Q13. You are an intern for a company that has all of its hardware and software on-site. Due to a severe storm, the company did not have power for several days, and important data was lost.
How should this problem best have been avoided?
A. by providing greater storage capacity
B. by distributing component services across multiple systems
C. by providing physical and data redundancy
D. by allowing for more scalability
Answer: B
Q14. This question requires that you evaluate the underlined text to determine if it is
correct.
You are an IT intern assigned to implement Microsoft Office 365 and Microsoft Intune.
You have not created any Intune policies. You want to control endpoint protection, software updates, and a policy check schedule for a group of devices.
You must deploy a mobile device security policy template.
Instructions: Review the underlined text. If it makes the statement correct, select “No change is needed.” If the statement is incorrect, select the answer choice that makes the statement correct.
A. No change is needed.
B. Windows Firewall Settings
C. Microsoft Intune Agent Settings
D. Microsoft Intune Center Settings
Answer: A
Explanation: Microsoft Intune Policies are groups of settings that control features on mobile devices and computers. You create policies using templates that contain recommended or customized settings, and then deploy them to device or user groups.
Reference: Use policies to manage computers and mobile devices with Microsoft Intune
https://technet.microsoft.com/en-gb/library/dn743712.aspx
Q15. What is the minimum version of Internet Explorer needed to ensure that Microsoft Office 365 web-based applications have full functionality?
A. Internet Explorer 8
B. Internet Explorer 9
C. Internet Explorer 10
D. Internet Explorer 11
Answer: C
Explanation: Office 365 is designed to work with the current or immediately previous version of Internet Explorer. Office 365 does not offer code fixes to resolve problems you encounter when using the service with Internet Explorer 9. You should expect the quality of the user experience to diminish over time, and that many new Office 365 experiences might not work at all.
Reference: Office 365 system requirements
https://support.office.com/en-us/article/Office-365-system-requirements-719254C0-2671-4648-9C84-C6A3D4F3BE45
Q16. A small law firm wants to implement Microsoft Office 365 and requires the ability to conduct In-Place eDiscovery.
Which two Office 365 Business Plans meet these requirements? Choose two.
A. Office 365 Business Premium
B. Office 365 Enterprise E1
C. Office 365 Enterprise E3
D. Office 365 Enterprise E4
Answer: C,D
Explanation: Office 365 Enterprise E3 include eDiscovery Center tools to support
compliance.
Office 365 Business Premium and Office 365 Enterprise E1 do not include eDiscovery
Center tools to support compliance.
Reference: https://products.office.com/en-us/business/compare-more-office-365-for-business-plans
Q17. You are a network administrator for a company that uses Microsoft Lync.
You need to ensure that users can access conferencing from mobile phones even if the phones do not support the Lync mobile client.
What should you set up?
A. Web Conferencing tools
B. dial-in conferencing
C. multi-party audio and video
D. Skype
Answer: B
Explanation: With dial-in conferencing, you can add telephone access to Lync Online meetings for users who can’t get to a computer. Here’s how to set it up:
1.
Contact an audio conferencing provider for dial-in numbers, conference codes, and personal identification numbers (PIN).
2.
Add, change, or remove dial-in conferencing settingsfor meeting organizers and conference call leaders.
Reference: Set up dial-in conferencing so people can join meetings by phone [Small Business]
https://support.office.com/en-us/article/Set-up-dial-in-conferencing-so-people-can-join-meetings-by-phone-Small-Business-476d751e-2094-46ed-8c46-4a7a18217953
Q18. You are the help desk technician for a local real estate firm that uses Microsoft Exchange Online.
A former employee is sending unwanted emails to employees within the firm.
You need to prevent this employee from sending emails to anyone at the firm.
What should you do?
A. Create a malware filter policy.
B. Configure a message trace.
C. Create a content filter policy.
D. Create a transport rule.
Answer: D
Explanation: You can use Exchange transport rules to look for specific conditions in messages that pass through your organization and take action on them. Transport rules are similar to the Inbox rules that are available in many email clients. The main difference between transport rules and rules you would set up in a client application such as Outlook is that transport rules take action on messages while they’re in transit as opposed to after the message is delivered. Transport rules also contain a richer set of conditions, exceptions, and actions, which provides you with the flexibility to implement many types of messaging policies.
Reference: Transport rules
https://technet.microsoft.com/en-us/library/jj919238%28v=exchg.150%29.aspx
Q19. You are the Microsoft Lync Online administrator for your company. A customer has reported an issue when signing in to the company’s Lync Online Service. When the customer attempts to sign in, the following error message is returned:
“The server is temporarily unavailable”.
The server is up, and other customers are connected to it.
What is likely causing the connection issue?
A. The user has the incorrect Lync version
B. The user has entered the wrong user name
C. DNS is configured incorrectly
D. The user does not have a Lync license
Answer: D
Explanation: This issue occurs for one of the following reasons: Cause 1: You are not entitled for Lync Online.
Cause 2: You lack connectivity to the Lync Online service. Cause 3: You are running a 64-bit Windows operating system.
Reference: "Cannot sign in because the server is temporarily unavailable" error when you try to sign in to Lync Online in Office 365 dedicated
https://support.microsoft.com/en-us/kb/2619522
Q20. This question requires that you evaluate the underlined text to determine if it is correct.
Your company is implementing Microsoft Office 365 and Exchange Online. You plan to configure the necessary public DNS settings. You need to create an SPF record to authorize the email service and present spoofing.
Instructions: Review the underlined text. If it makes the statement correct, select “No change is needed”. If the statement is incorrect, select the answer choice that makes the statement correct.
A. No change is needed
B. a PTR record
C. an MX record
D. a CNAME record
Answer: A
Explanation: The SPF (TXT) record helps to prevent other people from using your domain to send spam or other malicious email. Sender policy framework (SPF) records work by identifying the servers that are authorized to send email from your domain.
Reference: External DNS records required for Exchange Online
http://howtonetworking.com/msapps/office365-11.htm