MTA Mobility And Devices Fundamentals 98-368

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Myron0576
M
Myron0576
Community Contributor
Quizzes Created: 2 | Total Attempts: 7,572
Questions: 39 | Attempts: 7,278

SettingsSettingsSettings
MTA Mobility And Devices Fundamentals 98-368 - Quiz


Questions and Answers
  • 1. 

    This question requires that you evaluate the underlined text to determine if it is correct. The "Simple Spaces" resiliency type in Windows 8.1 Storage Spaces requires at least five drives in order to protect a system from a single-drive failure. Instructions: Review the underlined text. If it makes the statement correct, select No change is needed. If the statement is incorrect, select the answer choice than makes the statement correct.

    • A.

      No change is needed

    • B.

      Two-way mirror

    • C.

      Parity Spaces

    • D.

      Three-way mirror

    Correct Answer
    D. Three-way mirror
    Explanation
    Explanation: Two-way mirror spaces require at least two drives, and three-way mirror spaces require at least five. Mirror spaces are designed for increased performance and protect your files from drive failure by keeping more than one copy. Two-way mirror spaces make two copies of your files and can tolerate one drive failure, while three-way mirror spaces can tolerate two drive failures. Reference: Storage Spaces: FAQ http://windows.microsoft.com/en-us/windows-8/storage-spaces-pools

    Rate this question:

  • 2. 

    Your sister is taking a video editing class at school. She purchased a 2-TB USB hard drive to store video files. She wants to connect it to her Windows 8.1 computer at home and to a Mac OSX 10.3 computer at school. Video file will exceed 5 GB in size. You need to prepare a new hard drive by formatting it with the appropriate file system. Which file system should you choose?

    • A.

      FAT

    • B.

      ReFS

    • C.

      NTFS

    • D.

      FAT32

    Correct Answer
    C. NTFS
    Explanation
    Explanation: Mac OSX 10.3 supports NTFS. NTFS supports large files well above 5 GB

    Rate this question:

  • 3. 

    Which Microsoft Intune Company Portal App platform requires IT deployment?

    • A.

      Android

    • B.

      Windows Phone 8.1

    • C.

      IOS

    • D.

      Windows RT

    Correct Answer
    B. Windows Phone 8.1
    Explanation
    Explanation: Windows Intune Company Portal for Windows Phone 8/8.1 requires IT deployment Reference: Windows Intune Company Portals for iOS and Android Now Available http://blogs.technet.com/b/windowsintune/archive/2013/11/25/windows-intune-company- portals-for-ios-and-android-now-available.aspx

    Rate this question:

  • 4. 

    Your company needs a service that eliminates a single point of failure on any provisioned service. Which feature can Microsoft Azure offer to lower the probability of a failure that disrupts business operations?

    • A.

      HDInsight

    • B.

      Scalability

    • C.

      high availability

    • D.

      backup

    Correct Answer
    C. high availability
    Explanation
    Explanation: A highly available cloud application implements strategies to absorb the outage of the dependencies like the managed services offered by the cloud platform. Despite possible failures of the cloud platforms capabilities, this approach permits the application to continue to exhibit the expected functional and non-functional systemic characteristics. Reference: Disaster Recovery and High Availability for Azure Applications https://msdn.microsoft.com/en-us/library/azure/dn251004.aspx

    Rate this question:

  • 5. 

    Which feature on Windows Phone 8.1 provides secure encryption of all user data stored locally on internal data partitions?

    • A.

      Secure Boot

    • B.

      Encrypted File System

    • C.

      BitLocker

    • D.

      TrueCrypt

    Correct Answer
    C. BitLocker
    Explanation
    Explanation: The Windows Phone OS supports using BitLocker technology to encrypt all user data stored locally on internal data partitions. Reference: Secure boot and device encryption overview https://dev.windowsphone.com/en-US/OEM/docs/Phone_Bring- Up/Secure_boot_and_device_encryption_overview

    Rate this question:

  • 6. 

    What is an example of the way in which a Trojan horse commonly spreads to other computers?

    • A.

      It inserts copies of itself into other computer programs

    • B.

      It traverses a network by exploiting a vulnerability

    • C.

      It pretends to be a document from a friend

    • D.

      It downloads from an infected web page

    Correct Answer
    D. It downloads from an infected web page
    Explanation
    Explanation: Trojan horses are commonly found on websites that offer free software, such as shareware programs. These communal gathering spots on the Web give Trojan horse writers a degree of anonymity along with the chance of attacking as many random victims as possible. Since website operators rarely have time to thoroughly examine every file posted, an occasional Trojan horse can slip through the checking procedures unnoticed. - Reference: HOW TROJAN HORSES SPREAD http://etutorials.org/Misc/computer+book/Part+2+Dangerous+Threats+on+the+Internet/Cha pter+8+Trojan+Horses- +Beware+of+Geeks+Bearing+Gifts/HOW+TROJAN+HORSES+SPREAD

    Rate this question:

  • 7. 

    This question requires that you evaluate the underlined text to determine if it is correct. You manage Windows 8.1 desktop and laptop computers in your universitys computer lab. The universitys IT team recently implemented an active directory environment. You need to join the desktop and laptop computers to a new Active Directory domain. You should use the "Network and Internet" Control Panel applet to achieve this goal. Instructions: Review the underlined text. If it makes the statement correct, select No change is needed. If the statement is incorrect, select the answer choice than makes the statement correct

    • A.

      No change is needed

    • B.

      User Accounts

    • C.

      Administrative Tools

    • D.

      System

    Correct Answer
    D. System
    Explanation
    Explanation: Join a domain, workgroup, or homegroup ✑ Open System by swiping in from the right edge of the screen, tapping Search (or if you're using a mouse, pointing to the upper-right corner of the screen, moving the mouse pointer down, and then clicking Search), entering System in the search box, and tapping or clicking System. ✑ Under Computer name, domain, and workgroup settings, click Change settings. Administrator permission required You might be asked for an admin password or to confirm your choice. ✑ Click Network ID and follow the steps on your screen. Reference: http://windows.microsoft.com/en-us/windows-8/join-domain-workgroup- homegroup

    Rate this question:

  • 8. 

    This question requires that you evaluate the underlined text to determine if it is correct. Microsoft Azure storage solutions replicates "four" copies of your data within a single region. Instructions: Review the underlined text. If it makes the statement correct, select No change is needed. If the statement is incorrect, select the answer choice than makes the statement correct.

    • A.

      No change is needed

    • B.

      Two

    • C.

      Three

    • D.

      Six

    Correct Answer
    C. Three
    Explanation
    Geo-redundant storage (GRS). Geo-redundant storage is enabled for your storage account by default when you create it. GRS maintains six copies of your data. With GRS, your data is replicated three times within the primary region, and is also replicated three times in a secondary region hundreds of miles away from the primary region, providing the highest level of durability. Reference: Introduction to Microsoft Azure Storage https://azure.microsoft.com/en-gb/documentation/articles/storage-introduction/

    Rate this question:

  • 9. 

    You manage Windows 8 Pro desktop and laptop computers. Which volume types can you encrypt by using BitLocker?

    • A.

      Dynamic volumes

    • B.

      Simple volumes

    • C.

      Virtual hard disks

    • D.

      Software-used RAID

    Correct Answer
    B. Simple volumes
    Explanation
    Bitlocker supports Basic (simple) volumes. Reference: BitLocker Frequently Asked Questions (FAQ) https://technet.microsoft.com/en-us/library/hh831507.aspx

    Rate this question:

  • 10. 

    This question requires that you evaluate the underlined text to determine if it is correct. "Redundant" Microsoft Azure applications are able to meet increased demand with consistent results in acceptable time window. Instructions: Review the underlined text. If it makes the statement correct, select No change is needed. If the statement is incorrect, select the answer choice than makes the statement correct.

    • A.

      No change is needed

    • B.

      Highly Available

    • C.

      Fault Tolerant

    • D.

      Scalable

    Correct Answer
    D. Scalable
    Explanation
    Scalable applications are able to meet increased demand with consistent results in acceptable time windows. When a system is scalable, it scales horizontally or vertically to manage increases in load while maintaining consistent performance. In basic terms, horizontal scaling adds more machines of the same size (processor, memory, bandwidth) while vertical scaling increases the size of the existing machines. Reference: Disaster Recovery and High Availability for Azure Applications https://msdn.microsoft.com/en-us/library/azure/dn251004.aspx

    Rate this question:

  • 11. 

    This question requires that you evaluate the underlined text to determine if it is correct. In order to install Microsoft Intune client software on a computer, you need to be a member of that computers "Administrators" group. Instructions: Review the underlined text. If it makes the statement correct, select No change is needed. If the statement is incorrect, select the answer choice than makes the statement correct.

    • A.

      No change is needed

    • B.

      Remote Management users

    • C.

      Power users

    • D.

      Remote Desktop users

    Correct Answer
    A. No change is needed
    Explanation
    The account that installs the Intune client software must have local administrator permissions to that computer. Reference: Requirements for Microsoft Intune https://technet.microsoft.com/en-us/library/dn646950.aspx

    Rate this question:

  • 12. 

    You are tracking hardware and software inventory on various devices. You need to determine which devices can be managed by Microsoft Intune. To communicate back to Microsoft Intune administration console, what is a requirement of each device?

    • A.

      Microsoft Intune agent installed

    • B.

      Windows Phone 8 devices

    • C.

      An organizational unit that has all the Microsoft Intune device objects

    • D.

      A security policy

    Correct Answer
    A. Microsoft Intune agent installed
    Explanation
    The devices need the Microsoft Intune client installed. This software is also known as Microsoft Intune agent.

    Rate this question:

  • 13. 

    Which type of information about users does biometrics evaluate?

    • A.

      Phrases a user has memorized

    • B.

      Where a user is located

    • C.

      Physical characteristics of a user

    • D.

      Objects a user carries with him or her

    Correct Answer
    C. Physical characteristics of a user
    Explanation
    Biometrics refers to authentication techniques that rely on measurable physical characteristics that can be automatically checked. Note: There are several types of biometric identification schemes: face: the analysis of facial characteristics fingerprint: the analysis of an individual's unique fingerprints hand geometry: the analysis of the shape of the hand and the length of the fingers retina: the analysis of the capillary vessels located at the back of the eye iris: the analysis of the colored ring that surrounds the eye's pupil signature: the analysis of the way a person signs his name. vein: the analysis of pattern of veins in the back if the hand and the wrist voice: the analysis of the tone, pitch, cadence and frequency of a person's voice. Reference: http://www.webopedia.com/TERM/B/biometrics.html

    Rate this question:

  • 14. 

    This question requires that you evaluate the underlined text to determine if it is correct. You have a Windows 8.1 computer in a WorkGroup. To share the C:\Work folder and make it available to offline users, you need to use the "public" share option. Instructions: Review the underlined text. If it makes the statement correct, select No change is needed. If the statement is incorrect, select the answer choice than makes the statement correct.

    • A.

      No change is needed

    • B.

      Advanced

    • C.

      HomeGroup

    • D.

      Basic

    Correct Answer
    B. Advanced
    Explanation
    In the advanced sharing dialog box Click on Caching button. In Offline settings dialog box, you can set up caching for files and programs which are offline.Advanced Sharing dialog box in Windows 7 You have the following options: i) Only the files and programs that users specify are available offline: If you select this option then, users specify the files and programs which can be accessed offline. It is the default option. ii) No files or programs from the share are available offline: If you select this option then, caching will be turned off. iii) All files and programs that users open from the share are automatically available offline: If you select this option then, caching is turned on for all files and programs and they can be accessed offline. Check option Optimize for performance.Offline settings dialog box for Caching in Windows 7 Reference: How to set advanced sharing options, custom permissions, caching for folder in Windows 7? http://www.moreprocess.com/operating-systems/windows-7/how-to-set-advanced-sharing- options-custom-permissions-caching-for-folder-in-windows-7

    Rate this question:

  • 15. 

    When you copy a file from one NTFS file system partition to a different NTFS partition, what happens to the file permissions of the copied file?

    • A.

      They are the combined permissions of the original file and destination folder

    • B.

      They inherit the permissions of the destination folder

    • C.

      They remain the same as the original

    • D.

      They are removed, and only the creator is given full control

    Correct Answer
    B. They inherit the permissions of the destination folder
    Explanation
    When you copy a protected file to a folder on the same, or a different volume, it inherits the permissions of the target directory. Reference: http://www.ntfs.com/ntfs-permissions-files-moving.htm

    Rate this question:

  • 16. 

    You are using dual monitors on a Windows 8.1 computer. You want to move system tray to the secondary monitor. Which Display option in Control Panel should you select?

    • A.

      Make this my main display

    • B.

      Landscape orientation

    • C.

      PC Screen only

    • D.

      Extend desktop to this display

    Correct Answer
    A. Make this my main display
    Explanation
    To move the system tray to the secondary monitor on a Windows 8.1 computer, you should select the option "Make this my main display" in the Display options in Control Panel. This option will set the secondary monitor as the primary display, causing the system tray and other elements to appear on that monitor.

    Rate this question:

  • 17. 

    This question requires that you evaluate the underlined text to determine if it is correct. "The Windows Store" allows users of Windows 8 and Windows 8.1 computers to view and install applications that the users administrators make available to them. The computers must be attached to the domain, and the user must be logged in with domain credentials. Instructions: Review the underlined text. If it makes the statement correct, select No change is needed. If the statement is incorrect, select the answer choice than makes the

    • A.

      The System Center Configuration Manager Company Portal App

    • B.

      No change is needed

    • C.

      Microsoft SharePoint

    • D.

      The Microsoft Intune Company Portal App

    Correct Answer
    A. The System Center Configuration Manager Company Portal App
    Explanation
    The System Center Configuration Manager Company Portal app allows users of Windows 8, Windows 8.1 and Windows 10 machines to view and install applications made available to the user by their administrators. The machine must be managed by Microsoft System Center 2012 R2 Configuration Manager, or later, with the agent installed. End User Machines requirements: * Windows 8 Pro, Windows 8 Enterprise, Windows 8.1 Pro, Windows 8.1 Enterprise, Windows 10 Pro or Windows 10 Enterprise * Machine must be domain-joined * User must be logged on with domain credentials * System Center 2012 R2 Configuration Manager (or later) client agent must be installed Reference: System Center Configuration Manager Company Portal App https://www.microsoft.com/en-us/download/details.aspx?id=40795

    Rate this question:

  • 18. 

    You manage 200 desktop computers at your schools main computer lab. A critical update was released. You need to determine if the update was installed on one of the computers in the lab. What should you do?

    • A.

      View Windows update history

    • B.

      View the Event Viewer Security log

    • C.

      Check System Status in Control Panel

    • D.

      Go to the System Action Center

    Correct Answer
    A. View Windows update history
    Explanation
    Follow these steps to see which Windows updates are installed on your computer. 1. Open Windows Update by clicking the Start button Picture of the Start button. In the search box, type Update, and then, in the list of results, click Windows Update. 2. In the left pane, click View update history. Reference: See which Windows updates are installed http://windows.microsoft.com/en-us/windows/which-windows-updates- installed#1TC=windows-7

    Rate this question:

  • 19. 

    This question requires that you evaluate the underlined text to determine if it is correct. The "ExFAT" file system can automatically verify and auto correct data to avoid file system errors. Instructions: Review the underlined text. If it makes the statement correct, select No change is needed. If the statement is incorrect, select the answer choice than makes the statement correct.

    • A.

      ReFS

    • B.

      No change is needed

    • C.

      NTFS

    • D.

      FAT32

    Correct Answer
    A. ReFS
    Explanation
    Resilient File System (ReFS) is a Microsoft proprietary file system introduced with Windows Server 2012 with the intent of becoming the "next generation" file system after NTFS. ReFS key design advantages are intended to include automatic integrity checking and data scrubbing, removing the need for chkdsk and protecting against data degradation. Reference: http://en.wikipedia.org/wiki/ReFS

    Rate this question:

  • 20. 

    What are two ways to lower the risk of a virus or malware infection? Choose two.

    • A.

      Enable the Windows firewal

    • B.

      Keep the system updated

    • C.

      Use only HTTPS while web surfing

    • D.

      Install a download manager

    Correct Answer(s)
    A. Enable the Windows firewal
    B. Keep the system updated
    Explanation
    Enabling the Windows firewall helps to block unauthorized access to the system, preventing viruses or malware from entering. Keeping the system updated ensures that the latest security patches and fixes are installed, closing any vulnerabilities that could be exploited by viruses or malware. Using only HTTPS while web surfing helps to encrypt the communication between the user and the website, reducing the risk of data interception by malware. However, this option is not mentioned in the question. Installing a download manager may help in organizing and managing downloads efficiently, but it does not directly lower the risk of virus or malware infection.

    Rate this question:

  • 21. 

    You are a desktop support engineer for an advertising company that uses Windows 8.1 workstations. An employee who manages video content for the company website recently lost important video files due to a single-drive failure on a Windows 8.1 workstation. You need to prevent a single-drive failure from occurring again on this employees workstation, which only has a capacity for three physical hard drivers. Additionally, the employee requires optimal performance when manipulating and streaming video files. Which Storage Space solution should you implement?

    • A.

      Three-way mirror

    • B.

      Parity spaces

    • C.

      Simple spaces

    • D.

      two-way mirror

    Correct Answer
    B. Parity spaces
    Explanation
    Parity spaces (also known as RAID-5) are designed for storage efficiency and protect your files from drive failure by keeping more than one copy. Parity spaces are best for archival data and streaming media, like music and videos. This storage layout requires at least three drives to protect you from a single drive failure and at least seven drives to protect you from two drive failures. Reference: Storage Spaces: FAQ http://windows.microsoft.com/en-us/windows-8/storage-spaces-pools

    Rate this question:

  • 22. 

    This question requires that you evaluate the underlined text to determine if it is correct. When you access a file located on a shared resource, the "most restrictive" permissions take precedence. Instructions: Review the underlined text. If it makes the statement correct, select No change is needed. If the statement is incorrect, select the answer choice than makes the statement correct.

    • A.

      No change is needed.

    • B.

      ACL

    • C.

      NTFS

    • D.

      Share

    Correct Answer
    A. No change is needed.
    Explanation
    When using share permissions and NTFS permissions together, if there is a conflict in the configuration, the most restrictive permission prevails. Reference: http://www.ntfs.com/ntfs-permissions-combined.htm

    Rate this question:

  • 23. 

    Your company is deploying a new application on employees personal Windows RT devices. The devices are registered with Microsoft Intune. You need to publish the new application to Microsoft Intune cloud storage so that the employees can install the published application. What are requirements of the published installation files?

    • A.

      In order to publish the files, Internet speed must be at least 50 kbps

    • B.

      The cumulative total file size for the published applications must be smaller than 2 GB

    • C.

      In order to upload the software, the files must be a .zip format

    • D.

      As many files as necessary may be uploaded, but no single file may be larger than 2 GB

    Correct Answer
    D. As many files as necessary may be uploaded, but no single file may be larger than 2 GB
    Explanation
    Before you publish computer apps to Microsoft Intune cloud storage make sure no single file size is larger than 2 GB. Reference: Deploy apps to computers in Microsoft Intune https://technet.microsoft.com/en-us/library/dn646961.aspx

    Rate this question:

  • 24. 

    This question requires that you evaluate the underlined text to determine if it is correct. If you need to make storage space available for an update on a Windows Phone 8.1 device, you should use "Action Center" to move installed programs to and other data from the phone to the SD card. Instructions: Review the underlined text. If it makes the statement correct, select No change is needed. If the statement is incorrect, select the answer choice than makes the statement correct.

    • A.

      No change is needed

    • B.

      File Explorer

    • C.

      Phone Update

    • D.

      Storage Sense

    Correct Answer
    D. Storage Sense
    Explanation
    To uninstall apps and games or move them to an SD card using Storage Sense You can uninstall apps and games to free up space on your phone, or move them to an SD card (if you have one installed). 1. In the App list, go to Storage Sense Storage Sense Tile. 2. Go to Phone > Apps+games. 3. Tap an app or game file, and then tap Uninstall or Move to SD. Reference: Make room on my phone to update it https://www.windowsphone.com/en-us/how-to/wp8/basics/make-room-on-my-phone-to- update-i

    Rate this question:

  • 25. 

    This question requires that you evaluate the underlined text to determine if it is correct. When BitLocker is enabled and and protecting a local drive, Trusted Platform Module (TPM) provides "pre-start system integrity verification for system and operating system drives". Instructions: Review the underlined text. If it makes the statement correct, select No change is needed. If the statement is incorrect, select the answer choice than makes the statement correct.

    • A.

      No change is needed

    • B.

      256-bit encryption that uses Advanced Encryption Standard (AES)

    • C.

      A location that stores recovery keys for removable drives

    • D.

      Boot sector mapping for the startup process

    Correct Answer
    C. A location that stores recovery keys for removable drives
    Explanation
    Computers that incorporate a TPM have the ability to create cryptographic keys and encrypt them so that they can be decrypted only by the TPM. This process, often called "wrapping" or "binding" a key, can help protect the key from disclosure. Each TPM has a root "wrapping" key, called the Storage Root Key (SRK), which is stored within the TPM itself. The private portion of a key created in a TPM is never exposed to any other component, software, process, or person. Reference: Windows Trusted Platform Module Management Step-by-Step Guide https://technet.microsoft.com/en-us/library/cc749022%28v=ws.10%29.aspx

    Rate this question:

  • 26. 

    You have several Windows 8.1 Pro computers in your college dorm. You want to share music library files across these computers in a simple way by using a single password for access. What should you do?

    • A.

      Share the folder with the Everyone group

    • B.

      Change the permissions of all music files to Everyone read

    • C.

      Share the music library through a HomeGroup and join each computer to it

    • D.

      Rename each computer to a single, common name and enable the Administrator

    Correct Answer
    C. Share the music library through a HomeGroup and join each computer to it
    Explanation
    A homegroup is a group of PCs on a home network that can share devices (such as printers), and libraries (such as your Documents, Pictures, Music, and Video libraries). Using a homegroup makes sharing easier. Your homegroup is protected with a password, which you can change at any time. Reference: Homegroup Password - View in Windows 8 http://www.eightforums.com/tutorials/15855-homegroup-password-view-windows-8-a.html

    Rate this question:

  • 27. 

    Which is a feature Active Directory Rights Management Services (AD RMS)?

    • A.

      Manages Digital Rights Media (DRM) for digital media

    • B.

      provides a permissions system that works with any cloud-based storage solution

    • C.

      Manages share and file permissions on all servers in enterprise

    • D.

      Allow users to define who can open, modify, print, or forward a document

    Correct Answer
    D. Allow users to define who can open, modify, print, or forward a document
    Explanation
    Windows Rights Management Services (also called Rights Management Services, Active Directory Rights Management Services or RMS) is a form of Information Rights Management used on Microsoft Windows that uses encryption and a form of selective functionality denial for limiting access to documents such as corporate e-mail, Word documents, and web pages, and the operations authorized users can perform on them. Companies can use this technology to encrypt information stored in such document formats, and through policies embedded in the documents, prevent the protected content from being decrypted except by specified people or groups, in certain environments, under certain conditions, and for certain periods of time. Reference: http://en.wikipedia.org/wiki/Active_Directory_Rights_Management_Services

    Rate this question:

  • 28. 

    Your new Windows 8.1 computer is connected to your home wireless network. You want to share music and photos on your new computer with other members of your family. You want to avoid setting up separate user accounts for each member of your family. A single password for all the shared files will suffice. Which Windows 8.1 networking feature satisfies these requirements?

    • A.

      Network Discovery

    • B.

      HomeGroup

    • C.

      Virtual Private Network

    • D.

      Broadband (PPPoE)

    Correct Answer
    B. HomeGroup
    Explanation
    A homegroup makes it easier to share files and printers on a home network. You can share pictures, music, videos, documents, and printers with other people in your homegroup. Other people can't change the files that you share, unless you give them permission to do so. Reference: http://windows.microsoft.com/en-us/windows7/what-is-a-homegroup

    Rate this question:

  • 29. 

    You manage desktop computers for your universitys computer labs. You recently upgraded these computers to Windows 8.1. You need to modify the configuration of the new computers to increase the number of items displayed in jump lists. Which configuration tool should you use?

    • A.

      Display Options

    • B.

      Control Panel Personalization applet

    • C.

      Device Manager

    • D.

      Taskbar properties

    Correct Answer
    D. Taskbar properties
    Explanation
    By default up to 10 items can be added to a button's Jump List. For privacy reasons you may wish to reduce or eliminate this number. Conversely, if you find Jump Lists extremely useful you may wish to increase the number of displayed items.1. Right- click an empty area of the taskbar and choose "Properties".2. The "Taskbar and Start Menu Properties" multi-tabbed dialog box appears. Click the "Start Menu" tab.3. Click the "Customize" button.4. The "Customize Start Menu" dialog box appears. Underneath "Start menu size", next to "Number of recent items to display in Jump Lists", enter/select a value from 0-60. Reference: Adjust Size of Jump Lists on Windows 7 Taskbar http://malektips.com/windows-7-jump-list-size-increase-decrease.html#.VWf-4M-qpBc

    Rate this question:

  • 30. 

    This question requires that you evaluate the underlined text to determine if it is correct. "Windows Server Active Directory" enables single sign-on, which simplifies user access to thousands of cloud applications on Windows, Mac and iOS devices. Instructions: Review the underlined text. If it makes the statement correct, select No change is needed. If the statement is incorrect, select the answer choice than makes the statement correct.

    • A.

      No change is needed

    • B.

      Microsoft Account

    • C.

      Active Directory Rights Manager

    • D.

      Azure Active Directory

    Correct Answer
    D. Azure Active Directory
    Explanation
    Azure Active Directory is a comprehensive identity and access management cloud solution that provides a robust set of capabilities to manage users and groups. Azure Active Directory enables single sign-on to simplify user access to thousands of cloud applications from Windows, Mac, Android and iOS devices. Reference: Identity and Access Management for the Cloud http://azure.microsoft.com/en-us/services/active-directory/

    Rate this question:

  • 31. 

    Your universitys IT department currently has no Active Directory strategy. The university needs a solution that allows you to manage users and groups to secure access to Microsoft online services such as Microsoft Office 365.

    • A.

      Active Directory Federation services

    • B.

      Active Directory Lightweight Directory services

    • C.

      Active Directory Certificate services

    • D.

      Azure Active Directory

    Correct Answer
    D. Azure Active Directory
    Explanation
    Azure Active Directory is preintegrated with Salesforce.com, Office 365, Box and many more.

    Rate this question:

  • 32. 

    SSL can be used to secure network connection to websites?

    • A.

      Yes

    • B.

      No

    • C.

      Option 3

    • D.

      Option 4

    Correct Answer
    A. Yes
    Explanation
    SSL (Secure Sockets Layer) is a protocol that encrypts the communication between a web server and a client, ensuring that the data transmitted between them remains secure and protected from unauthorized access. By using SSL, websites can establish a secure network connection, preventing any potential eavesdropping or tampering of data. Therefore, the statement "SSL can be used to secure network connection to websites" is correct.

    Rate this question:

  • 33. 

    You can use SSL for both encryption and autherntication?

    • A.

      Yes

    • B.

      No

    • C.

      Option 3

    • D.

      Option 4

    Correct Answer
    B. No
    Explanation
    SSL (Secure Sockets Layer) can be used for encryption to secure the data transmission between a client and a server. It ensures that the data exchanged cannot be intercepted and read by unauthorized parties. However, SSL alone does not provide authentication. Authentication is the process of verifying the identity of the communicating parties. SSL can be used in combination with other protocols or methods, such as certificates, to achieve authentication. Therefore, the statement that SSL can be used for both encryption and authentication is incorrect.

    Rate this question:

  • 34. 

    SSL requires both the client and server to have certificates?

    • A.

      Yes

    • B.

      No

    • C.

      Option 3

    • D.

      Option 4

    Correct Answer
    A. Yes
    Explanation
    SSL (Secure Sockets Layer) is a protocol that ensures secure communication between a client and a server. In order to establish this secure connection, both the client and the server need to have certificates. These certificates contain cryptographic keys that are used to encrypt and decrypt data during the SSL handshake process. Without certificates on both sides, the SSL connection cannot be established, and the communication will not be secure. Therefore, the given answer "Yes" is correct.

    Rate this question:

  • 35. 

    Your company uses Windows 8.1 work folders on personal devices. The devices are all registered in Microsoft Intune. You need to enforce the following security requirements on the personal devices: Company data can be removed if an employee is terminated. Company data cannot be accessed if a devise is lost or stolen. What should you do

    • A.

      Enable selective wipe, and enforce a lock screen and password

    • B.

      Enable selective wipe, and secure files transfers with SSL

    • C.

      Enable selective wipe, and enforce encryption

    • D.

      Enforce encryption and enforce a lock screen and password

    Correct Answer
    C. Enable selective wipe, and enforce encryption
    Explanation
    * Microsoft Intune provides selective wipe, full wipe, remote lock, and passcode reset capabilities. A selective wipe to remove only company data. * Encryption on Mobile Devices can be managed with Configuration Manager and Intune Reference: Help protect your data with remote wipe, remote lock, or passcode reset using Microsoft Intune https://technet.microsoft.com/en-us/library/jj676679.aspx Reference: Managing Encryption on Mobile Devices with Configuration Manager and Intune http://blogs.technet.com/b/pauljones/archive/2014/08/04/managing-encryption-on-mobile- devices-with-configuration-manager-and-intune.aspx

    Rate this question:

  • 36. 

    The president of your university asks you to set up a service website for students who live in dorms. The websites official launch date is in two days, and you do not have the resources needed to set up the server infrastructure and develop the system. You need a cloud-based solution than can have the servers and storage available in two days. Which Microsoft cloud solution achieves this goal?

    • A.

      Microsoft Intune

    • B.

      Microsoft Azure

    • C.

      Achieve Directory

    • D.

      Microsoft OneDrive

    Correct Answer
    B. Microsoft Azure
    Explanation
    Microsoft Azure is a cloud computing platform and infrastructure, created by Microsoft, for building, deploying and managing applications and services through a global network of Microsoft-managed datacenters. Microsoft Azure services include: Websites: High density hosting of websites. Reference: http://en.wikipedia.org/wiki/Microsoft_Azure#Services

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Aug 25, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Aug 28, 2018
    Quiz Created by
    Myron0576
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.