Skip Navigation Links
 

Microsoft - MD-100: Windows 10

Sample Questions

Question: 165
Measured Skill: Manage devices and data (35-40%)

You have a workgroup computer named Computer1 that runs Windows 10 and has the users shown in the following table.



User Account Control (UAC) on Computer1 is configured as shown in the following exhibit.



For each of the following statements, select Yes if the statement is true. Otherwise, select No.

(NOTE: Each correct selection is worth one point.)

www.cert2brain.com

AWhen Administrator opens a command prompt by using the "Run as administrator" option...: Yes
When User1 opens a command prompt by using the "Run as administrator" option, the...: Yes
When User2 opens a command prompt by using the "Run as administrator" option, the...: Yes
B When Administrator opens a command prompt by using the "Run as administrator" option...: Yes
When User1 opens a command prompt by using the "Run as administrator" option, the...: Yes
When User2 opens a command prompt by using the "Run as administrator" option, the...: No
C When Administrator opens a command prompt by using the "Run as administrator" option...: No
When User1 opens a command prompt by using the "Run as administrator" option, the...: Yes
When User2 opens a command prompt by using the "Run as administrator" option, the...: No
D When Administrator opens a command prompt by using the "Run as administrator" option...: Yes
When User1 opens a command prompt by using the "Run as administrator" option, the...: No
When User2 opens a command prompt by using the "Run as administrator" option, the...: Yes
E When Administrator opens a command prompt by using the "Run as administrator" option...: No
When User1 opens a command prompt by using the "Run as administrator" option, the...: No
When User2 opens a command prompt by using the "Run as administrator" option, the...: Yes
F When Administrator opens a command prompt by using the "Run as administrator" option...: No
When User1 opens a command prompt by using the "Run as administrator" option, the...: No
When User2 opens a command prompt by using the "Run as administrator" option, the...: No

Correct answer: F

Explanation:

The "User Account Control: Run all administrators in Admin Approval Mode" policy setting controls the behavior of all User Account Control (UAC) policy settings for the computer. The policy is disabled.

The options are:
  • Enabled: (Default) Admin Approval Mode is enabled. This policy must be enabled and related UAC policy settings must also be set appropriately to allow the built-in Administrator account and all other users who are members of the Administrators group to run in Admin Approval Mode.

  • Disabled: Admin Approval Mode and all related UAC policy settings are disabled. Note: If this policy setting is disabled, the Security Center notifies you that the overall security of the operating system has been reduced.

Because this policy is disabled, administrators are not prompted for approval.

Non-administrators are not prompted to enter administrator credentials when starting the command prompt with elevated rights. Instead, the command prompt is started in standard user mode without any prompts or notes.

Note: If this policy were activated, all three statements would be correct and answered with "yes".

Question: 166
Measured Skill: Configure connectivity (15-20%)

Note: This question is part of a series of questions that present the same scenario. Each questions in the series contains a unique solution that might meet the stated goals. Some questions sets might have more than one correct solution, while others might not have a correct solution. Determine whether the solution meets the stated goals.

You have two computers named Computer1 and Computer2 that run Windows 10.

You have an Azure Active Directory (Azure AD) user account named admin@contoso.com that is in the local Administrators group on each computer.

You sign in to Computer1 by using admin@contoso.com.

You need to ensure that you can use Event Viewer on Computer1 to connect to the event logs on Computer2.

Solution: On Computer2, you run the winrm quickconfig command.

Does this meet the goal?

AYes
B No

Correct answer: B

Explanation:

To use the event viewer to access the logs on a remote computer, the following inbound rules must be enabled in the Windows firewall on the remote computer:
  • All rules in the group "Remote Event Log Management
Running winrm quickconfig does not activate these rules.

Another barrier is the user account used for remote access. The Azure AD user account cannot be authenticated by Computer2 and therefore cannot be authorized for access.

Note: Administrator rights are required to access the security event log. Standard user rights are sufficient to access the other protocols.

Question: 167
Measured Skill: Configure connectivity (15-20%)

Note: This question is part of a series of questions that present the same scenario. Each questions in the series contains a unique solution that might meet the stated goals. Some questions sets might have more than one correct solution, while others might not have a correct solution. Determine whether the solution meets the stated goals.

You have two computers named Computer1 and Computer2 that run Windows 10.

You have an Azure Active Directory (Azure AD) user account named admin@contoso.com that is in the local Administrators group on each computer.

You sign in to Computer1 by using admin@contoso.com.

You need to ensure that you can use Event Viewer on Computer1 to connect to the event logs on Computer2.

Solution: On Computer2, you run the Enable-PSRemoting cmdlet.

Does this meet the goal?

AYes
B No

Correct answer: B

Explanation:

To use the event viewer to access the logs on a remote computer, the following inbound rules must be enabled in the Windows firewall on the remote computer:
  • All rules in the group "Remote Event Log Management
Running Enable-PSRemoting does not activate these rules.

Another barrier is the user account used for remote access. The Azure AD user account cannot be authenticated by Computer2 and therefore cannot be authorized for access.

Note: Administrator rights are required to access the security event log. Standard user rights are sufficient to access the other protocols.

Question: 168
Measured Skill: Manage devices and data (35-40%)

You deploy Windows 10 to several computers. The computers will be used by users who frequently present their desktop to other users.

You need to prevent applications from generating toast notifications in the notification area.

Which settings should you configure from the Settings app?

AShared experiences
B Privacy
C Focus assist
D Tablet mode

Correct answer: C

Explanation:

Focus Assist will automatically hide incoming notifications, so they don't pop up and distract you while you're playing a game, giving a presentation, or using a full-screen application.



Question: 169
Measured Skill: Manage devices and data (35-40%)

You have a computer named Computer1 that runs Windows 10. Computer1 is in a workgroup.

Computer1 contains the local users shown in the following table.



Computer1 contains the folders shown in the following table.



The Users group has Full control permissions to Folder1, Folder2, and Folder3.

User1 encrypts two files named File1.docx and File2.docx in Folder1 by using the Encrypring File System (EFS).

Which users can move each file?

(To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point.)

www.cert2brain.com

AUsers who can move File1.docx to Folder2: User1 only
Users who can move File.2docx to Folder3: User1 only
B Users who can move File1.docx to Folder2: User1 only
Users who can move File.2docx to Folder3: User1, User2, and Administrator
C Users who can move File1.docx to Folder2: User1 and Administrator only
Users who can move File.2docx to Folder3: User1 and Administrator only
D Users who can move File1.docx to Folder2: User1 and Administrator only
Users who can move File.2docx to Folder3: User1 and Administrator only
E Users who can move File1.docx to Folder2: User1, User2, and Administrator
Users who can move File.2docx to Folder3: User1, User2, and Administrator
F Users who can move File1.docx to Folder2: User1, User2, and Administrator
Users who can move File.2docx to Folder3: User1 only

Correct answer: F

Explanation:

When you move a file within the boundaries of a volume, permissions are retained. Moving a file to another volume is a deletion and a copy process. The copied file inherits the permissions of the target folder.

If a file is protected by EFS encryption, the protection is temporarily removed when copying or moving to another volume. This is only possible for the user(s) who have a decryption key for the file.



 
Tags: exam, examcollection, exam simulation, exam questions, questions & answers, training course, study guide, vce, braindumps, practice test
 
 

© Copyright 2014 - 2020 by cert2brain.com