Published: January 5, 2015
Languages: English, Chinese (Simplified), Chinese (Traditional), French, German, Italian, Japanese, Korean, Portuguese (Brazil), Russian, Spanish, Spanish (Latin America)
Audiences: IT professionals
Technology: Office 365, Microsoft Intune
Credit toward certification: MTA
Skills measured
This exam measures your ability to accomplish the technical tasks listed below. The percentages indicate the relative weight of each major topic area on the exam. The higher the percentage, the more questions you are likely to see on that content area on the exam. View video tutorials about the variety of question types on Microsoft exams.
Please note that the questions may test on, but will not be limited to, the topics described in the bulleted text.
Do you have feedback about the relevance of the skills measured on this exam? Please send Microsoft your comments. All feedback will be reviewed and incorporated as appropriate while still maintaining the validity and reliability of the certification process. Note that Microsoft will not respond directly to your feedback. We appreciate your input in ensuring the quality of the Microsoft Certification program.
If you have concerns about specific questions on this exam, please submit an exam challenge.
If you have other questions or feedback about Microsoft Certification exams or about the certification program, registration, or promotions, please contact your Regional Service Center.
Understand the cloud (20–25%)
Describe cloud principles and delivery mechanisms
Differentiate between on-premises IT service models; differentiate between subscription or pay-as-you-go versus upfront CapEx/OpEx funding model; use cloud services to expand capacity (elasticity of the cloud), scalability, redundancy, and availability; differentiate between cloud services that are configurable versus on-premises services that are customizable
Describe cloud security requirements and policies
Describe how cloud services manage privacy, how compliance goals are met, how data is secured at rest or on-the-wire, and how data and operations transparency requirements are met
Describe how a cloud service stays up to date and available
Describe the service/feature improvement process; monitor service health, service maintenance, and future roadmap publishing; identify guarantees, service level agreements (SLA), and capping of liability of the cloud service provider
Describe the different types of cloud services
Differentiate between types of cloud services and their characteristics, including infrastructure as a service (IaaS), platform as a service (PaaS), and software as a service (SaaS); integrate the cloud with on-premises services in hybrid scenarios
Enable Microsoft cloud services (20–25%)
Identify the requirements and dependencies for using Office 365 and Microsoft Intune
Plan networking and domains, firewall rule, client requirements, bandwidth implications, and DNS
Select a cloud service plan
Understand the different options and plans available for Office 365 and Microsoft Intune
Sign up for cloud services
Name your tenant, set up your first administrator, determine tenant location
Set up the initial configuration of cloud services
Register domains, verify domains, choose the domain purpose; identify required DNS record types
Administer Office 365 and Microsoft Intune (15–20%)
Create users and groups, and assign services and licenses
Differentiate between cloud identities (Online identity, Synchronized identities, Federated identities), create and manage users and identities, delete and restore users (soft delete), create and manage groups, assign and revoke licenses, determine user locations
Assign permissions in Office 365 and Microsoft Intune
Assign or revoke administrative roles; manage delegated admins; manage password policies, subscriptions, and licenses
Monitor service health in Office 365 and Microsoft Intune
Monitor the Service Health dashboard, subscribe to RSS feeds, monitor the maintenance schedule, monitor the message center, log service support requests, configure alerts
Use and configure Microsoft cloud services (20–25%)
Configure Exchange Online
Manage recipients (mailboxes, shared mailboxes, resources, contacts, groups), manage anti-spam and antivirus settings
Configure SharePoint Online, including OneDrive
Create SharePoint team sites, configure external sharing, set up social features using newsfeeds or Yammer, apply themes, set storage and resource limits
Configure Skype for Business Online
Manage Skype for Business user options, manage external communication settings, configure dial-in settings and meeting invitation options, configure Skype for Business Online DNS
Configure Microsoft Intune
Install Microsoft Intune client management software, create and deploy policies, automate installs, identify software requirements, set up notifications, identify mobile device management policies
Support cloud users (15–20%)
Resolve sign-in and Office application installation issues
Troubleshoot sign-in issues, forgotten passwords, connection problems, difficulty activating Office applications, and difficulty connecting mobile devices to Office 365 or Microsoft Intune; choose between 32-bit and 64-bit; identify when an Office repair is required; identify operating system requirements for Office 365 ProPlus; browser requirements and specific versions of Internet Explorer
Resolve email and calendar issues
Troubleshoot issues receiving and sending email, troubleshoot issues accessing a delegated mailbox
Resolve SharePoint and OneDrive issues
Identify storage limits, troubleshoot “Open with Explorer” not working and OneDrive not syncing, recover deleted files
Resolve Skype for Business issues
Troubleshoot Skype for Business sign-in issues, troubleshoot connection issues to Skype for Business Online, troubleshoot communicating to Skype consumer users and users in other companies using Skype for Business
QUESTION 1
What is an example of the way in which a Trojan horse commonly spreads to other computers?
A. It inserts copies of itself into other computer programs
B. It traverses a network by exploiting a vulnerability
C. It pretends to be a document from a friend
D. It downloads from an infected web page
Answer: D
Explanation: Trojan horses are commonly found on websites that offer free software, such as shareware programs. These
communal gathering spots on the Web give Trojan horse writers a degree of anonymity along with the chance of
attacking as many random victims as possible. Since website operators rarely have time to thoroughly examine every file
posted, an occasional Trojan horse can slip through the checking procedures unnoticed. –
Reference: HOW TROJAN HORSES SPREAD
https://etutorials.org/Misc/computer+book/Part+2+Dangerous+Threats+on+the+Internet/Cha pter+8+Trojan+Horses-
+Beware+of+Geeks+Bearing+Gifts/HOW+TROJAN+HORSES+SPREAD/
QUESTION 2
Your company uses Windows 8.1 work folders on personal devices. The devices are all registered in Microsoft Intune.
You need to enforce the following security requirements on the personal devices:
•Company data can be removed if an employee is terminated.
•Company data cannot be accessed if a devise is lost or stolen.
What should you do?
A. Enable selective wipe, and enforce a lock screen and password
B. Enable selective wipe, and secure files transfers with SSL
C. Enable selective wipe, and enforce encryption
D. Enforce encryption and enforce a lock screen and password
Answer: C
Explanation: * Microsoft Intune provides selective wipe, full wipe, remote lock, and passcode reset capabilities. A
selective wipe to remove only company data.
* Encryption on Mobile Devices can be managed with Configuration Manager and Intune
Reference: Help protect your data with remote wipe, remote lock, or passcode reset using
Microsoft Intune
https://technet.microsoft.com/en-us/library/jj676679.aspx
Reference: Managing Encryption on Mobile Devices with Configuration Manager and Intune
https://blogs.technet.com/b/pauljones/archive/2014/08/04/managing-encryption-on-mobile-devices-with-configurationmanager-
and-intune.aspx
QUESTION 3
This question requires that you evaluate the underlined text to determine if it is correct.
The “ExFAT” file system can automatically verify and auto correct data to avoid file system errors.
Instructions: Review the underlined text. If it makes the statement correct, select “No change is needed”. If the statement
is incorrect, select the answer choice than makes the statement correct.
A. No change is needed
B. NTFS
C. FAT32
D. ReFS
Answer: D
Explanation: Resilient File System (ReFS) is a Microsoft proprietary file system introduced with Windows Server 2012
with the intent of becoming the “next generation” file system after NTFS. ReFS key design advantages are intended to
include automatic integrity checking and data scrubbing, removing the need for chkdsk and protecting against data degradation.
Reference: https://en.wikipedia.org/wiki/ReFS
QUESTION 4
This question requires that you evaluate the underlined text to determine if it is correct.
The “Simple Spaces” resiliency type in Windows 8.1 Storage Spaces requires at least five drives in order to protect a
system from a single-drive failure.
Instructions: Review the underlined text. If it makes the statement correct, select “No change is needed”. If the statement
is incorrect, select the answer choice than makes the statement correct.
A. No change is needed
B. two-way mirror
C. Parity Spaces
D. three-way mirror
Answer: D
Explanation: Two-way mirror spaces require at least two drives, and three-way mirror spaces require at least five.
Mirror spaces are designed for increased performance and protect your files from drive failure by keeping more than one
copy. Two-way mirror spaces make two copies of your files and can tolerate one drive failure, while three-way mirror
spaces can tolerate two drive failures.
Click here to view complete Q&A of 98-368 exam
Certkingdom Review, Certkingdom PDF Torrents
Best Microsoft Technology Associate 98-368 Certification, MTA 98-368 Training at certkingdom.com