Skip Navigation Links
 

Microsoft - MD-100: Windows 10

Sample Questions

Question: 89
Measured Skill: Maintain Windows (25-30%)

Your company has a main office and a branch office. The offices connect to each other by using a WAN link. Access to the Internet is provided through the main office.

The branch office contains 25 computers that run Windows 10. The computers contain small hard drives that have very little free disk space.

You need to prevent the computers in the branch office from downloading updates from peers on the network.

What should you do?

AFrom the Settings app, modify the Delivery Optimizations settings.
B Configure the network connections as metered connections.
C Configure the computers to use BranchCache in hosted cache mode.
D Configure the updates to use the Semi-Annual Channel (Targeted) channel.

Correct answer: A

Explanation:

Windows updates, upgrades, and applications can contain packages with very large files. Downloading and distributing updates can consume quite a bit of network resources on the devices receiving them. You can use Delivery Optimization to reduce bandwidth consumption by sharing the work of downloading these packages among multiple devices in your deployment. Delivery Optimization can accomplish this because it is a self-organizing distributed cache that allows clients to download those packages from alternate sources (such as other peers on the network) in addition to the traditional Internet-based servers. You can use Delivery Optimization in conjunction with Windows Update, Windows Server Update Services (WSUS), Windows Update for Business, or System Center Configuration Manager (when installation of Express Updates is enabled).

Delivery Optimization is a cloud-managed solution. Access to the Delivery Optimization cloud services is a requirement. This means that in order to use the peer-to-peer functionality of Delivery Optimization, devices must have access to the internet.

In order to ensure that computers do not download updates from peers, we need to configure Delivery Optimization and disallow downloads from other PCs.



Question: 90
Measured Skill: Manage devices and data (35-40%)

Your network contains an Active Directory domain. The domain contains the users shown in the following table.



The domain contains a computer named Computer1 that runs Windows 10. Computer1 contains a folder named Folder1 that has the following permissions:



Folder1 is shared as Share1$. Share1$ has the following configurations:
  • Everyone: Allow Full control
  • Access-based enumeration: Enabled
For each of the following statements, select Yes if the statement is true. Otherwise, select No.

(NOTE: Each correct selection is worth one point.)

www.cert2brain.com

AUser1 can list files in \\Computer1\Share1$: Yes
User2 can list files in \\Computer1\Share1$: Yes
If User3 connects to \\Computer1 from File Explorer, Share1$ will be visible: Yes
B User1 can list files in \\Computer1\Share1$: Yes
User2 can list files in \\Computer1\Share1$: Yes
If User3 connects to \\Computer1 from File Explorer, Share1$ will be visible: No
C User1 can list files in \\Computer1\Share1$: Yes
User2 can list files in \\Computer1\Share1$: No
If User3 connects to \\Computer1 from File Explorer, Share1$ will be visible: Yes
D User1 can list files in \\Computer1\Share1$: No
User2 can list files in \\Computer1\Share1$: Yes
If User3 connects to \\Computer1 from File Explorer, Share1$ will be visible: No
E User1 can list files in \\Computer1\Share1$: No
User2 can list files in \\Computer1\Share1$: Yes
If User3 connects to \\Computer1 from File Explorer, Share1$ will be visible: Yes
F User1 can list files in \\Computer1\Share1$: No
User2 can list files in \\Computer1\Share1$: No
If User3 connects to \\Computer1 from File Explorer, Share1$ will be visible: No

Correct answer: B

Explanation:

With access-based enumeration (ABE) ou can ensure that information in shared folders is only visible to users who have access to it. The user must have at least Read permission for a file to see it in the share.

Only NTFS permissions are used for evaluating. Permissions at the share level are not relevant.

User1 is a member of Group1. Group1 has Read permissions to Folder1.

User2 is a member of Group1 and Group2. User2 has Modify permissions to Folder1.

Share1$ is hidden on the network. If User3 connects to \\Computer1 from File Explorer, he can not see the file share.

Question: 91
Measured Skill: Maintain Windows (25-30%)

You are an administrator for a company. You run dsregcmd on a Windows 10 device and retrieve the information shown in the following exhibit:



Use the drop-down menus to select the answer choice that completes each statement based on the information presented on the graphic.

(NOTE: Each correct selection is worth one point.)

www.cert2brain.com

AMicrosoft Edge is configured by using a Group Policy object (GPO)
. The computer is managed by using Microsoft System Center Configuration Manager.
B Microsoft Edge is configured by using a Group Policy object (GPO)
. The computer is joined to an on-premises Active Directory Domain.
C Microsoft Edge is configured by using Microsoft Intune
. The computer is managed by using Microsoft System Center Configuration Manager.
D Microsoft Edge is configured by using Microsoft Intune
. The computer is enrolled in Microsoft Intune.
E Microsoft Edge is configured by using the Internet Explorer Administration Kit (IEAK)
. The computer is joined to an on-premises Active Directory Domain.
F Microsoft Edge is configured by using the Internet Explorer Administration Kit (IEAK)
. The computer is enrolled in Microsoft Intune.

Correct answer: D

Explanation:

The computer belongs to an Azure Active Directory tenant (AzureAdJoined = Yes) but not to an Active Directory domain (DomainJoined = No).

Note: The EnterpriseJoined setting (here = NO) indicates whether the computer is configured for Active Directory Federation Services (AD FS). The SettingsUrl setting refers to the Enterprise State roaming configuration.

The Mobile Device Management (MDM) URLs indicate that the device is registered for Intune.

Note: Internet Explorer Administration Kit (IEAK) is used to configure Internet Explorer. It is not suitable for the configuration of Microsoft Edge.

Reference: Troubleshooting hybrid Azure Active Directory joined Windows 10 and Windows Server 2016 devices

Question: 92
Measured Skill: Manage devices and data (35-40%)

You have a computer that runs Windows 10 and contains the folders shown in the following table.



You create the groups shown in the following table.



On FolderA, you remove permission inheritance. To each folder, you assign the NTFS permissions shown in the following table.



For each of the following statements, select Yes if the statement is true. Otherwise, select No.

(NOTE: Each correct selection is worth one point.)

www.cert2brain.com

AUser1 can read and write all files in FolderC: Yes
User2 can delete all files in FolderB: Yes
User3 can delete all files in FolderC: Yes
B User1 can read and write all files in FolderC: Yes
User2 can delete all files in FolderB: Yes
User3 can delete all files in FolderC: No
C User1 can read and write all files in FolderC: Yes
User2 can delete all files in FolderB: No
User3 can delete all files in FolderC: Yes
D User1 can read and write all files in FolderC: No
User2 can delete all files in FolderB: Yes
User3 can delete all files in FolderC: Yes
E User1 can read and write all files in FolderC: Yes
User2 can delete all files in FolderB: No
User3 can delete all files in FolderC: No
F User1 can read and write all files in FolderC: No
User2 can delete all files in FolderB: No
User3 can delete all files in FolderC: No

Correct answer: B

Explanation:

Permission inheritance is disabled at FolderA level. The permissions configured for FolderA are inherited to FolderB, and extended by the permissions configured for FolderB. The combination of the permissions of FolderA and FolderB are inherited to FolderC and extended by the permissions configured for FolderC.

User1 is a member of Group1 and Group3. User1 has the effective permission Modify on FolderC and can read and write all files in FolderC.

User2 is a member of Group1 and Group2. User2 has the effective permission Modify for FolderB. The Modify permission includes the right to delete files.

User3 is a member of Group2 and Group3. User3 has Read and Write permissions for FolderC. User3 can not delete files in FolderC.

Question: 93
Measured Skill: Maintain Windows (25-30%)

You are a network administrator at your company.

A user attempts to start a computer and receives the following error message: "Bootmgr is missing."

You need to resolve the issue.

You start the computer in recovery mode.

Which command should you run next?

(To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point.)

www.cert2brain.com

ABootrec /FixMbr
B Bootrec /RebuildBcd
C Diskpart /OffbootDir
D Diskpart /FixMbr
E Sfc /ScanNow
F Sfc /RebuildBcd

Correct answer: B

Explanation:

Bootrec /RebuildBcd scans all disks for installations that are compatible with Windows. Additionally, it lets you select the installations that you want to add to the BCD store. Use this option when you must completely rebuild the BCD store or to troubleshoot a "Bootmgr Is Missing" error.



Use Bootrec.exe in the Windows RE to troubleshoot startup issues



 
Tags: exam, examcollection, exam simulation, exam questions, questions & answers, training course, study guide, vce, braindumps, practice test
 
 

© Copyright 2014 - 2019 by cert2brain.com