Skip Navigation Links
 

Microsoft - MD-100: Windows 10

Sample Questions

Question: 229
Measured Skill: Manage devices and data (35-40%)

Your network contains an Active Directory domain. The domain contains a computer named Computer1 that runs Windows 10.

The domain contains the users shown in the following table.



Computer1 contains the shared folders shown in the following table.



The shared folders have the permissions shown in the following table.



For each of the following statements, select Yes if the statement is true. Otherwise, select No.

(NOTE: Each correct selection is worth one point.)

www.cert2brain.com

AWhen User1 connects to \\Computer1, Share1$ is visible: Yes
When User2 connects to \\Computer1\Share1$, the contents of D:\Folder1 are accessible: Yes
When User1 connects to \\Computer1\Share2, the contents of D:\Folder2 are accessible: Yes
B When User1 connects to \\Computer1, Share1$ is visible: Yes
When User2 connects to \\Computer1\Share1$, the contents of D:\Folder1 are accessible: Yes
When User1 connects to \\Computer1\Share2, the contents of D:\Folder2 are accessible: No
C When User1 connects to \\Computer1, Share1$ is visible: Yes
When User2 connects to \\Computer1\Share1$, the contents of D:\Folder1 are accessible: No
When User1 connects to \\Computer1\Share2, the contents of D:\Folder2 are accessible: No
D When User1 connects to \\Computer1, Share1$ is visible: No
When User2 connects to \\Computer1\Share1$, the contents of D:\Folder1 are accessible: Yes
When User1 connects to \\Computer1\Share2, the contents of D:\Folder2 are accessible: Yes
E When User1 connects to \\Computer1, Share1$ is visible: No
When User2 connects to \\Computer1\Share1$, the contents of D:\Folder1 are accessible: Yes
When User1 connects to \\Computer1\Share2, the contents of D:\Folder2 are accessible: No
F When User1 connects to \\Computer1, Share1$ is visible: No
When User2 connects to \\Computer1\Share1$, the contents of D:\Folder1 are accessible: No
When User1 connects to \\Computer1\Share2, the contents of D:\Folder2 are accessible: No

Correct answer: E

Explanation:

Share1$ is a hidden share ($ sign appended). The share is not visible when a user lists the shares of Computer1. This applies regardless of the user's permissions.

User2 is a member of Group1 and Group2. User2 has full access to \\Computer1\Share1$ and all its contents.

User1 is a member of Group1 only. User1 has read permissions for \\Computer1\Share2 but no security permissions (NTFS or ReFS permissions) for D:\Folder2. Since access-based enumeration is enabled for \\Computer1\Share2, the contents of D:\Folder2 are not visible to User1 and are not accessible.

Question: 230
Measured Skill: Configure connectivity (15-20%)

You have a computer named Computer1 that runs Windows 10.

On Computer1, you create a VPN connection as shown in the following exhibit.



The corporate network contains a single IP subnet.

Use the drop-down menus to select the answer choice that completes each statement based on the information presented in the graphic.

(NOTE: Each correct selection is worth one point.)

www.cert2brain.com

AVPN1 can use protocols PPTP, L2TP, SSTP, and IKEv2 to establish a VPN connection.
Only traffic for the Internet will be routed through the VPN conection.
B VPN1 can use protocols L2TP and SSTP only to establish a VPN connection.
Only traffic for the Internet will be routed through the VPN conection.
C VPN1 can use protocols L2TP, SSTP, and IKEv2 only to establish a VPN connection.
Only traffic for the corporate network will be routed through the VPN conection.
D VPN1 can use protocols PPTP, L2TP, SSTP, and IKEv2 to establish a VPN connection.
Only traffic for the corporate network will be routed through the VPN conection.
E VPN1 can use protocols PPTP and L2TP only to establish a VPN connection.
Traffic for the Internet and for the corporate network will be routed through the VPN conection.
F VPN1 can use protocols L2TP and SSTP only to establish a VPN connection.
Traffic for the Internet and for the corporate network will be routed through the VPN conection.

Correct answer: D

Explanation:

The TunnelType parameter is set to Automatic. The Automatic option means that the device will try each of the built-in tunneling protocols until one succeeds. It will attempt from most secure to least secure.

The SplitTunneling parameter is set to True. This means, traffic that is not destined for the corporate network will be sent to the internet directly.

Question: 231
Measured Skill: Deploy Windows (15-20%)

Your network contains an Active Directory domain. The domain contains a computer named Computer1 that runs Windows 10.

The domain contains the users shown in the following table.



Computer1 has the local users shown in the following table.



All users have Microsoft accounts.

Which two users can be configured to sign in by using their Microsoft account?

(Each correct answer presents part of the solution. NOTE: Each correct selection is worth one point.)

AUser1
B User2
C User3
D User4
E User5

Correct answer: D, E

Explanation:

Local users can specify a Microsoft account for sign-in in the Accounts settings of the Settings app. This is not possible for domain users. It does not matter whether the computer belongs to a domain or not.



Question: 232
Measured Skill: Manage devices and data (35-40%)

Your office has a dedicated wireless network for guests.

You plan to provide access cards that will have a QR code for guests. The QR code will link to a network configuration file stored on a publicly accessible website and provide the wireless network settings for Windows 10 devices.

Which tool should you use to create the configuration file and which file type should you use for the configuration file?

(To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point.)

www.cert2brain.com

ATool: Connection Manager Administration Kit (CMAK)
File type: CAB
B Tool: Local Group Policy Editor
File type: ADMX
C Tool: Microsoft Deployment Toolkit (MDT)
File type: WIM
D Tool: Windows Autopilot
File type: XML
E Tool: Windows Configuration Designer
File type: PPKG
F Tool: Connection Manager Administration Kit (CMAK)
File type: XML

Correct answer: E

Explanation:

We can use Windows Configuration Designer to create a provisioning package (.ppkg) that creates the wireless network connection. The deployment package can then be published on the website.

When opening the provisioning package, the user receives the following message:



Question: 233
Measured Skill: Manage devices and data (35-40%)

Your network contains an Active Directory domain that contains the objects shown in the following table.



Computer1 contains the shared folders shown in the following table.



The computers have the network configurations shown in the following table.



For each of the following statements, select Yes if the statement is true. Otherwise, select No.

(NOTE: Each correct selection is worth one point.)

www.cert2brain.com

AShare1 is listed if User1 connects to \\Computer1 from Computer2: Yes
Share1 is listed if User2 connects to \\Computer1 from Computer2: Yes
Share2$ is listed if User2 connects to \\Computer1 from Computer2: Yes
B Share1 is listed if User1 connects to \\Computer1 from Computer2: Yes
Share1 is listed if User2 connects to \\Computer1 from Computer2: Yes
Share2$ is listed if User2 connects to \\Computer1 from Computer2: No
C Share1 is listed if User1 connects to \\Computer1 from Computer2: Yes
Share1 is listed if User2 connects to \\Computer1 from Computer2: No
Share2$ is listed if User2 connects to \\Computer1 from Computer2: No
D Share1 is listed if User1 connects to \\Computer1 from Computer2: No
Share1 is listed if User2 connects to \\Computer1 from Computer2: Yes
Share2$ is listed if User2 connects to \\Computer1 from Computer2: Yes
E Share1 is listed if User1 connects to \\Computer1 from Computer2: No
Share1 is listed if User2 connects to \\Computer1 from Computer2: Yes
Share2$ is listed if User2 connects to \\Computer1 from Computer2: No
F Share1 is listed if User1 connects to \\Computer1 from Computer2: No
Share1 is listed if User2 connects to \\Computer1 from Computer2: No
Share2$ is listed if User2 connects to \\Computer1 from Computer2: No

Correct answer: B

Explanation:

If network discovery is turned off, the computer will not be displayed in other computers' network neighborhoods. Conversely, a computer on which network discovery is disabled cannot crawl the network.

If a user calls up the shared resources of a computer whose network discovery option is turned off by calling \\Computer1, all shared resources are displayed except for the hidden shares ($ sign at the end).

Note: Access-based enumeration has no effect on the visibility of the share for which the option is activated. Access based enumeration only controls the visibility of the content within the share depending on the permissions of the accessing user.



 
Tags: exam, examcollection, exam simulation, exam questions, questions & answers, training course, study guide, vce, braindumps, practice test
 
 

© Copyright 2014 - 2020 by cert2brain.com