we provide Highest Quality Microsoft 98-368 exam answers which are the best for clearing 98-368 test, and to get certified by Microsoft Mobility and Devices Fundamentals. The 98-368 Questions & Answers covers all the knowledge points of the real 98-368 exam. Crack your Microsoft 98-368 Exam with latest dumps, guaranteed!

Q11. This question requires that you evaluate the underlined text to determine if it is correct. 

When BitLocker is enabled and and protecting a local drive, Trusted Platform Module (TPM) provides "pre-start system integrity verification for system and operating system drives". 

Instructions: Review the underlined text. If it makes the statement correct, select “No change is needed”. If the statement is incorrect, select the answer choice than makes the statement correct. 

A. No change is needed 

B. 256-bit encryption that uses Advanced Encryption Standard (AES) 

C. a location that stores recovery keys for removable drives 

D. boot sector mapping for the startup process 


Explanation: Computers that incorporate a TPM have the ability to create cryptographic keys and encrypt them so that they can be decrypted only by the TPM. This process, often called "wrapping" or "binding" a key, can help protect the key from disclosure. Each TPM has a root "wrapping" key, called the Storage Root Key (SRK), which is stored within the TPM itself. The private portion of a key created in a TPM is never exposed to any other component, software, process, or person. 

Reference: Windows Trusted Platform Module Management Step-by-Step Guide 


Q12. You have several Windows 8.1 Pro computers in your college dorm. 

You want to share music library files across these computers in a simple way by using a 

single password for access. 

What should you do? 

A. Share the folder with the Everyone group 

B. Change the permissions of all music files to Everyone read 

C. Share the music library through a HomeGroup and join each computer to it 

D. Rename each computer to a single, common name and enable the Administrator 


Explanation: A homegroup is a group of PCs on a home network that can share devices (such as printers), and libraries (such as your Documents, Pictures, Music, and Video libraries). Using a homegroup makes sharing easier. Your homegroup is protected with a password, which you can change at any time. 

Reference: Homegroup Password - View in Windows 8 


Q13. You manage 200 desktop computers at your school’s main computer lab. 

A critical update was released. 

You need to determine if the update was installed on one of the computers in the lab. 

What should you do? 

A. View the Event Viewer Security log 

B. Check System Status in Control Panel 

C. View Windows update history 

D. Go to the System Action Center 


Explanation: Follow these steps to see which Windows updates are installed on your computer. 


 Open Windows Update by clicking the Start button Picture of the Start button. In the search box, type Update, and then, in the list of results, click Windows Update. 


 In the left pane, click View update history. 

Reference: See which Windows updates are installed 


Q14. This question requires that you evaluate the underlined text to determine if it is correct. 

In order to install Microsoft Intune client software on a computer, you need to be a member of that computer’s "Administrators" group. 

Instructions: Review the underlined text. If it makes the statement correct, select “No change is needed”. If the statement is incorrect, select the answer choice than makes the statement correct. 

A. No change is needed 

B. Remote Management users 

C. Power users 

D. Remote Desktop users 


Explanation: The account that installs the Intune client software must have local administrator permissions to that computer. 

Reference: Requirements for Microsoft Intune 


Q15. You are tracking hardware and software inventory on various devices. 

You need to determine which devices can be managed by Microsoft Intune. 

To communicate back to Microsoft Intune administration console, what is a requirement of each device? 

A. Microsoft Intune agent installed 

B. Windows Phone 8 devices 

C. an organizational unit that has all the Microsoft Intune device objects 

D. a security policy 


Explanation: The devices need the Microsoft Intune client installed. This software is also known as Microsoft Intune agent. 


Instructions: For each of the following statements, select Yes if the statement is true. Otherwise, select No. Each correct selection is worth one point. 


Q17. Your company uses Windows 8.1 work folders on personal devices. The devices are all registered in Microsoft Intune. 

You need to enforce the following security requirements on the personal devices: 


Company data can be removed if an employee is terminated. 


Company data cannot be accessed if a devise is lost or stolen. 

What should you do? 

A. Enable selective wipe, and enforce a lock screen and password 

B. Enable selective wipe, and secure files transfers with SSL 

C. Enable selective wipe, and enforce encryption 

D. Enforce encryption and enforce a lock screen and password 


Explanation: * Microsoft Intune provides selective wipe, full wipe, remote lock, and passcode reset capabilities. A selective wipe to remove only company data. 

* Encryption on Mobile Devices can be managed with Configuration Manager and Intune 

Reference: Help protect your data with remote wipe, remote lock, or passcode reset using Microsoft Intune 


Reference: Managing Encryption on Mobile Devices with Configuration Manager and Intune 


Q18. What are two ways to lower the risk of a virus or malware infection? Choose two. 

A. Enable the Windows firewall 

B. Use only HTTPS while web surfing 

C. Keep the system updated 

D. Install a download manager 

Answer: A,C 

Q19. Which type of information about users does biometrics evaluate? 

A. phrases a user has memorized 

B. where a user is located 

C. physical characteristics of a user 

D. objects a user carries with him or her 


Explanation: Biometrics refers to authentication techniques that rely on measurable physical characteristics that can be automatically checked. 

Note: There are several types of biometric identification schemes: face: the analysis of facial characteristics fingerprint: the analysis of an individual's unique fingerprints hand geometry: the analysis of the shape of the hand and the length of the fingers retina: the analysis of the capillary vessels located at the back of the eye iris: the analysis of the colored ring that surrounds the eye's pupil signature: the analysis of the way a person signs his name. vein: the analysis of pattern of veins in the back if the hand and the wrist 

voice: the analysis of the tone, pitch, cadence and frequency of a person's voice. Reference: http://www.webopedia.com/TERM/B/biometrics.html 

Q20. Your company is deploying a new application on employee’s personal Windows RT devices. The devices are registered with Microsoft Intune. 

You need to publish the new application to Microsoft Intune cloud storage so that the employees can install the published application. 

What are requirements of the published installation files? 

A. In order to publish the files, Internet speed must be at least 50 kbps 

B. The cumulative total file size for the published applications must be smaller than 2 GB 

C. In order to upload the software, the files must be a .zip format 

D. As many files as necessary may be uploaded, but no single file may be larger than 2 GB 


Explanation: Before you publish computer apps to Microsoft Intune cloud storage make sure no single file size is larger than 2 GB. 

Reference: Deploy apps to computers in Microsoft Intune