Act now and download your Microsoft 98-368 test today! Do not waste time for the worthless Microsoft 98-368 tutorials. Download Rebirth Microsoft Mobility and Devices Fundamentals exam with real questions and answers and begin to learn Microsoft 98-368 with a classic professional.

Q1. When you copy a file from one NTFS file system partition to a different NTFS partition, what happens to the file permissions of the copied file? 

A. They are the combined permissions of the original file and destination folder 

B. They inherit the permissions of the destination folder 

C. They remain the same as the original 

D. They are removed, and only the creator is given full control 

Answer:

Explanation: When you copy a protected file to a folder on the same, or a different volume, it inherits the permissions of the target directory. 

Reference: http://www.ntfs.com/ntfs-permissions-files-moving.htm 


Q2. You manage 200 desktop computers at your school’s main computer lab. 

A critical update was released. 

You need to determine if the update was installed on one of the computers in the lab. 

What should you do? 

A. View the Event Viewer Security log 

B. Check System Status in Control Panel 

C. View Windows update history 

D. Go to the System Action Center 

Answer:

Explanation: Follow these steps to see which Windows updates are installed on your computer. 

1.

 Open Windows Update by clicking the Start button Picture of the Start button. In the search box, type Update, and then, in the list of results, click Windows Update. 

2.

 In the left pane, click View update history. 

Reference: See which Windows updates are installed 

http://windows.microsoft.com/en-us/windows/which-windows-updates-installed#1TC=windows-7 


Q3. RAG DROP 

You are setting up the networking for a single-site motel. For three different classes of 

users, you need to specify the most privileged network segment each can access. 

Match each network to the class of users that cam access it. 

Instructions: To answer, drag the appropriate network from the column of the left to the class of users on the right. Each network may be used once, more than once, or not at all. Each correct match is worth one point. 

Answer: 


Q4. Your company is deploying a new application on employee’s personal Windows RT devices. The devices are registered with Microsoft Intune. 

You need to publish the new application to Microsoft Intune cloud storage so that the employees can install the published application. 

What are requirements of the published installation files? 

A. In order to publish the files, Internet speed must be at least 50 kbps 

B. The cumulative total file size for the published applications must be smaller than 2 GB 

C. In order to upload the software, the files must be a .zip format 

D. As many files as necessary may be uploaded, but no single file may be larger than 2 GB 

Answer:

Explanation: Before you publish computer apps to Microsoft Intune cloud storage make sure no single file size is larger than 2 GB. 

Reference: Deploy apps to computers in Microsoft Intune 

https://technet.microsoft.com/en-us/library/dn646961.aspx 


Q5. You manage Windows 8 Pro desktop and laptop computers. 

Which volume types can you encrypt by using BitLocker? 

A. dynamic volumes 

B. simple volumes 

C. virtual hard disks 

D. software-used RAID 

Answer:

Explanation: Bitlocker supports Basic (simple) volumes. 

Reference: BitLocker Frequently Asked Questions (FAQ) 

https://technet.microsoft.com/en-us/library/hh831507.aspx 


Q6. Your new Windows 8.1 computer is connected to your home wireless network. 

You want to share music and photos on your new computer with other members of your family. You want to avoid setting up separate user accounts for each member of your family. A single password for all the shared files will suffice. 

Which Windows 8.1 networking feature satisfies these requirements? 

A. Network Discovery 

B. HomeGroup 

C. Virtual Private Network 

D. Broadband (PPPoE) 

Answer:

Explanation: A homegroup makes it easier to share files and printers on a home network. You can share pictures, music, videos, documents, and printers with other people in your homegroup. Other people can't change the files that you share, unless you give them permission to do so. 

Reference: http://windows.microsoft.com/en-us/windows7/what-is-a-homegroup 


Q7. Which type of information about users does biometrics evaluate? 

A. phrases a user has memorized 

B. where a user is located 

C. physical characteristics of a user 

D. objects a user carries with him or her 

Answer:

Explanation: Biometrics refers to authentication techniques that rely on measurable physical characteristics that can be automatically checked. 

Note: There are several types of biometric identification schemes: face: the analysis of facial characteristics fingerprint: the analysis of an individual's unique fingerprints hand geometry: the analysis of the shape of the hand and the length of the fingers retina: the analysis of the capillary vessels located at the back of the eye iris: the analysis of the colored ring that surrounds the eye's pupil signature: the analysis of the way a person signs his name. vein: the analysis of pattern of veins in the back if the hand and the wrist 

voice: the analysis of the tone, pitch, cadence and frequency of a person's voice. Reference: http://www.webopedia.com/TERM/B/biometrics.html 


Q8. OTSPOT 

Instructions: For each of the following statements, select Yes if the statement is true. Otherwise, select No. Each correct selection is worth one point. 

Answer: