Microsoft 98-368 exam Interview Questions

  1. Home
  2. Microsoft 98-368 exam Interview Questions
Microsoft 98-368 exam Interview Questions

If you are looking forward to acing the Microsoft 98-368 interview, you must know that to ace an interview, you need to have the technical knowledge and the confidence, and the ability to portray the answers in the best possible manner. The Microsoft 98-368 Mobility and Device Fundamentals help in validating the knowledge of fundamental Windows devices and mobility. It is highly recommended to become familiar with the concepts and technologies and possess some hands-on experience with Windows devices, Windows-based networking, Active Directory, anti-malware products, firewalls, network topologies, and devices network ports. However, to help you out, we have brought for you the collection of the best possible and frequently asked Microsoft 98-368 exam interview questions for your ease. So, before moving towards the questions, let’s take a brief of the exam.

Let’s move towards the interview questions now.

1. What is a Microsoft account?

A Microsoft account that is free of cost that is used to access many Microsoft devices and services, be it the web-based email service Outlook.com, Office Online apps, OneDrive, Skype, Xbox Live, Windows, Bing or the Microsoft Store.

2. What do you know about the BitLocker feature?

So, BitLocker is basically an encryption feature that is built-in for the computers running Windows 10 Pro ( not for Windows 10 Home). BitLocker creates a safe and secure environment for data while requiring zero extra effort. In fact, once it’s set up, one might even forget that it’s there and working.

3. What are critical updates?

Well, as the name sounds, Microsoft’s critical Windows updates are not just updates but more than that. They keep your system running efficiently and also plug up security holes that Microsoft detects in its own operating systems.

4. Mention the main areas on Control Panel.

The main areas on the Control Panel that optimize one’s computer are:

  1. Ease of access – Optimizes the display settings.
  2. System and Security – A section to check the status of the computer and its backup and restore.
  3. Hardware and Sound – View which devices are on your computer and add devices.
  4. Network and Internet – View network status.
  5. Programs – Uninstall programs.
  6. Appearance and Personalization – Change desktop options, like fonts and screen readers.
  7. User Accounts – Change user accessibility.
  8. Clock and Region – Change date and time.

5. Describe OneDrive.

Microsoft OneDrive is a file hosting and synchronization service that is operated by Microsoft as part of its web version of Office. It was first launched in August 2007. OneDrive allows its users to store files as well as personal data such as Windows settings or BitLocker recovery keys in the cloud, share files, and sync files across Android, Windows Phone, iOS mobile devices and Windows Phone, Windows and macOS computers, the Xbox 360 and Xbox One consoles. Moreover, users can upload their Microsoft Office documents to OneDrive.

6. What is the purpose of Microsoft Azure storage?

Cloud storage is a service that allows you to save data by moving it to an offsite storage system that is managed by a third party through the Internet or another network. It includes everything from personal storage, which stores and/or backs up an individual’s emails, pictures, videos, and other personal files, to enterprise storage, which allows businesses to use cloud storage as a commercially supported remote backup solution for securely transferring and storing data files or sharing them between locations.

7. What are the three models of storage service?

The major models of Microsoft’s storage service are:

  • a public cloud storage service suitable for unstructured data
  • hybrid cloud storage service that allows the blending of public and private cloud services together for increased flexibility
  • and a private cloud storage service that can be secured behind a company firewall for more control over data

8. Explain the features of OneNote.

OneNote is a digital notebook that saves and syncs your notes automatically as you work. Moreover, it has the following features:

  • Type information in your notebook and even insert it from other apps and web pages.
  • Accesses your notebooks from any device.
  • Uses highlights and tags for easy follow-up.
  • Takes handwritten notes and draws your ideas.
  • Shares notebooks so as to collaborate with others.

9. What is Microsoft Outlook?

Microsoft Outlook is a software system from Microsoft that manages personal information. It is available as a part of the Microsoft Office suite. Apart from being an email client, it also includes functions like calendaring, managing tasks, contacts, note-taking, journal logging, as well as web browsing. People can use Outlook as a stand-alone application; organizations can deploy it as a multi-user software for shared functions such as mailboxes, calendars, folders, data aggregation, and appointment scheduling. Microsoft has released apps for most mobile platforms, including Android and iOS.

10. What does Microsoft 365 apps for businesses include?

Microsoft 365 apps for business include-

  • Up-to-date desktop and mobile versions of Office apps: Outlook, Excel, Word, PowerPoint, OneNote, plus Access and Publisher (only for PC).
  • Storage of and sharing with 1 TB of OneDrive cloud storage.
  • Web versions of Excel, Word, and PowerPoint.
  • One license inclusive of fully-installed Office apps on 5 phones, 5 tablets, and 5 PCs or Macs per user

11. What is a storage pool?

Well, a storage pool is a collection of physical disks. It enables aggregation of storage, expansion of elastic capacity, and delegated administration. You can create one or more virtual disks with the use of a storage pool. These virtual disks are also known as storage spaces

12. Define Web Storage.

Web Storage is usually compared with HTTP cookies. Web developers can store per-session or domain-specific data as name/value pairs on the client using Web Storage, like cookies. However, unlike cookies, Web Storage also makes it comparatively easier to control how information that is stored by one window visible to another.

13. What is the full form of FAT?

FAT stands for File Allocation Table

14. Describe File Allocation Table.

FAT is one of the most simplistic of the file systems that are supported by Windows NT. The FAT file system is usually characterized by the file allocation table, which is a table that resides at the very “top” of the volume. So, in order to protect the volume, two copies of the FAT are kept in case anyone damages. Additionally, the FAT tables and the root directory must be stored in a fixed location so that the boot files of the system can be located correctly.

15. What does the HPFS system do?

Initially, the HPFS file system allowed greater access to the larger hard drives that were then appearing on the market. However, it was necessary for a new file system to extend the naming system, organization, and security for the growing demands of the network server market. Thus, HPFS maintains the directory organization of FAT and adds automatic sorting of the directory based on filenames. These filenames are extended to up to 254 double-byte characters.

16. What is Hot fixing?

If an error occurs as a result of a bad sector, the file system copies the data to a different sector and classifies the original sector as bad. This happens invisibly to any apps that conduct disc I/O. When you use a file system that enables hot repair, you’ll be able to avoid error messages like the FAT “Abort, Retry, or Fail?” warning, which appears if a defective sector is detected.

17. What is the role of NTFS?

Considering the point of view of users, NTFS continues to organize files into directories that are sorted. However, unlike FAT or HPFS, there are no “special” objects on the disk and also there is no dependence on the underlying hardware, such as 512-byte sectors. Additionally, there are no special locations on the disk, like FAT tables or HPFS Super Blocks.

18. Mention the goals of NTFS.

The goals of NTFS are:

  • Provision of Reliability, which is most desirable for high-end systems and file servers
  • Support POSIX requirements
  • A platform for added functionality
  • Elimination of the drawbacks of the FAT and HPFS file systems

19. When do we use the internet, intranet, and extranet?

We use-

  • Internet to refer to the worldwide collection of networks that make use of open protocols such as TCP/IP to communicate with each other.
  • Intranet to refer to a communications network based on web technology but that’s available only to certain people, such as the employees of a company.
  • Extranet to refer to an extension of an intranet that uses internet protocols to give authorized outside users limited access to the intranet.

20. What do you mean by Malware?

Malware is used to describe malicious applications and code that can cause damage and disrupt the normal use of devices. It can allow unauthorized access, use system resources, lock you out of your computer, steal passwords and even ask for ransom, and more.

21. Name some types of Malware.

There are various types of malware such as:

  • Coin miners
  • Macro malware
  • Exploits and exploit kits
  • Phishing
  • Rootkits
  • Ransomware
  • Supply chain attacks
  • Trojans
  • Tech support scams
  • Unwanted software
  • Worms

22. Explain SaaS.

Software as a service(SaaS) is a method for delivering software applications over the Internet, typically on a subscription basis. With SaaS, cloud providers can host and manage their software application and underlying infrastructure and also handle any sort of maintenance, like software upgrades and security patching. Users usually connect to the application over the Internet, with a web browser on their phone, or PC.

23. What do MDM and MAM stand for?

MDM and MAM stand for Mobile Device Management and Mobile Application Management respectively.

24. What is Microsoft Intune?

Microsoft Intune is cloud-based mobile device management (MDM) and mobile application management solution (MAM). As a result, you have control over how your company’s devices, such as mobile phones, tablets, and laptops, are utilized. You may also set up special policies to control certain applications. You can, for example, block emails from being sent to persons outside your company. People in your business may also use their personal devices for education or work thanks to Microsoft Intune.

25. How would you describe Azure?

The Azure cloud platform is a combination of more than 200 products and cloud services that are designed to help you bring new solutions to life, solve today’s challenges, and create the future. Also, it allows you to build, run and manage applications across multiple clouds, on-premises, and at the edge, with the tools and frameworks of your own choice.

26. What does the term BYOD mean?

BYOD stands for Bring Your Own Device. It is an idea of allowing employees to use their own laptops, smartphones, tablets, or any other devices in the work environment.  So, instead of the IT department mandating specific hardware or technologies, users are absolutely free to use the platforms and gadgets that they prefer.

27. What is Azure AD Connect?

Azure AD Connect is a tool of Microsoft that is used to meet and hence accomplish your hybrid identity goals. You may also utilize Azure AD to give users a single identity for Microsoft 365, Azure, and SaaS services.

28. Mention the features of Azure AD Connect.

Azure AD Connect provides the following features:

  • Synchronization
  • Pass-through authentication
  • AD FS and federation integration
  • Monitoring of Health

29. How does Microsoft 365 support MFA?

Well, both Microsoft 365 and Office 365 support MFA for user accounts using:

  • A text message sent to a phone requires the user to type a verification code.
  • The Microsoft Authenticator smartphone app.
  • A phone call.

30. What is the role of Dynamic Access Control?

Domain-based Dynamic Access Control allows administrators to apply access-control permissions and restrictions based on well-defined rules that include the sensitivity of the resources, the job or role of the user, and also the configuration of the device used to access these resources.

31. What is Azure Active Directory?

Azure Active Directory Identity Protection is a monitoring and reporting tool. You can configure risk-based policies that automatically respond to detected issues when a specified risk level has been reached, to protect the identity of the organization. In addition to other Conditional Access controls provided by Azure Active Directory and EMS, these policies, can either automatically block or initiate adaptive remediation actions including password resets and,multi-factor authentication enforcement.

Exam 98-368: Mobility and Device Fundamentals practice tests
Menu