MD-100
Free trial
Verified
Question 1
Your network contains an Active Directory domain. All users have been issued with new computers that run Windows 10 Enterprise. All users have Microsoft 365
E3 licenses.
A user named Mia Hamm has an Active Directory user account named MHamm and a computer named Computer1. Mia Hamm reports that Computer1 is not activated.
You need to ensure that Mia Hamm can activate Computer1.
What should you do?
- A: Assign a Windows 10 Enterprise license to MHamm, and then activate Computer1.
- B: From the Microsoft Deployment Toolkit (MDT), redeploy Computer1.
- C: From System Properties on Computer1, enter a Volume License Key, and then activate Computer1.
- D: Instruct Mia Hamm to perform a local AutoPilot Reset on Computer1, and then activate Computer1.
Question 2
SIMULATION -
You have a computer named Computer1 that runs Windows 10.
Computer1 has a folder named C:\Folder1.
You need to meet the following requirements:
✑ Provide a user named Jon Ross with the ability to modify the permissions of C:\Folder1.
✑ Ensure that the principle of least privilege is maintained.
What should you do?
To complete this task, sign in to the required computer or computers.
Question 3
Your network contains an Active Directory domain. The domain contains computers that run Windows 10.
You must ensure that Windows BitLocker Drive Encryption is enabled on all client computers, even though a Trusted Platform Module (TPM) chip is installed in only some of them.
You need to accomplish this goal by using one Group Policy object (GPO).
What should you do?
- A: Enable the Allow enhanced PINs for startup policy setting, and select the Allow BitLocker without a compatible TPM check box.
- B: Enable the Enable use of BitLocker authentication requiring preboot keyboard input on slates policy setting, and select the Allow BitLocker without a compatible TPM check box.
- C: Enable the Require additional authentication at startup policy setting, and select the Allow BitLocker without a compatible TPM check box.
- D: Enable the Control use of BitLocker on removable drives policy setting, and select the Allow BitLocker without a compatible TPM check box.
Question 4
SIMULATION -
You have a computer named Computer1. Computer1 runs Windows 10 Pro.
You have a mobile device. You use Bluetooth to pair the mobile device to Computer1.
You want to enable dynamic lock on Computer1.
What should you do?
To complete this task, sign in to the required computer or computers.
Question 5
HOTSPOT -
Your network contains an Active Directory domain. The domain contains computers that run Windows 10.
A user named Mia Hamm has a computer named Computer1. Mia Hamm reports that when she logs on to Computer1, she cannot access servers on the network but she can access computers on the internet.
You run the ipconfig command on Computer1 and receive the following output.
You successfully ping the default gateway, the DNS servers, and the DHCP server.
You need to resolve the connectivity problem on Computer1.
Which setting should you configure? To answer, select the appropriate options in the answer area.
Hot Area:
Question 6
SIMULATION -
You have a computer named Computer1. Computer1 runs Windows 10 Pro. Computer1 has a cellular connection and a Wi-Fi connection.
You want to prevent Computer1from using the cellular connection unless a you manually connects to the cellular network.
What should you do?
To complete this task, sign in to the required computer or computers.
Question 7
You have a computer named Computer1. Computer1 runs Windows 10 Pro.
Computer1 is experiencing connectivity issues.
You need to view the IP addresses of any remote computer that Computer1 has an active TCP connection to.
Should you do?
- A: In Windows Administrative Tools, open Performance Monitor.
- B: In the Control Panel, open Network and Internet. Then select Network and Sharing Center.
- C: In Windows Administrative Tools, open Resource Monitor.
- D: In the Setting app, open Update and Security. Then open Windows Security and select Firewall and Network protection.
Question 8
You have a computer named Computer1. Computer1 runs Windows 10 Pro.
You attempt to start Computer1 but you receive the following error message:
Bootmgr is missing.
You need to be able to start Computer1.
What should you do?
- A: Start the computer in recovery mode and run the bootrec /rebuildbcd command.
- B: Start the computer in recovery mode and run the diskpart /repair command.
- C: Start the computer in recovery mode and run the bcdboot /s command.
- D: Start the computer in recovery mode and run the bootcfg /debug command.
Question 9
Your company has several mobile devices that run Windows 10.
You need configure the mobile devices to meet the following requirements:
✑ Windows updates may only be download when mobile devices are connect to Wi-Fi.
✑ Access to email and the Internet must be possible at all times.
What should you do?
- A: Open the Setting app and select Update & Security. Then select and configure Change active hours.
- B: Open the Setting app and select Network & Internet. Then select Change connection properties, and set the Metered connection option for cellular network connections to On.
- C: Open the Setting app and select Network & Internet. Then select Data Usage and set a data limit.
- D: Open the Setting app and select Update & Security. Then select and configure Delivery Optimization.
Question 10
Your company has an on-premises network that contains an Active Directory domain. The domain is synced to Microsoft Azure Active Directory (Azure AD). All computers in the domain run Windows 10 Enterprise.
You have a computer named Computer1 that has a folder named C:\Folder1.
You want to use File History to protect C:\Folder1.
Solution: You enable File History on Computer1. You then enable archiving for Folder1.
Does this meet the goal?
- A: Yes
- B: No
Question 11
Your company has an on-premises network that contains an Active Directory domain. The domain is synced to Microsoft Azure Active Directory (Azure AD). All computers in the domain run Windows 10 Enterprise.
You have a computer named Computer1 that has a folder named C:\Folder1.
You want to use File History to protect C:\Folder1.
Solution: You enable File History on Computer1. You then encrypt the contents of Folder1.
Does this meet the goal?
- A: Yes
- B: No
Question 12
Your network contains an Active Directory domain that is synced to a Microsoft Azure Active Directory (Azure AD) tenant.
The company plans to purchase computers preinstalled with Windows 10 Pro for all users.
The company the following requirements:
✑ The new computers must be upgraded to Windows 10 Enterprise automatically.
✑ The new computers must be joined to Azure AD automatically when the user starts the new computers for the first time.
✑ The users must not be required to accept the End User License Agreement (EULA).
You need to deploy the new computers.
What should you do?
- A: Make use of the wipe and load refresh deployment method.
- B: Perform in-place upgrade on the new computers.
- C: Provide provisioning packages for the new computers.
- D: Make use of Windows Autopilot.
Question 13
HOTSPOT -
You have a computer named Computer1. Computer1 runs Windows 10 Pro. You want to use Computer1to test new Windows features.
You need to configure Computer1to receive preview builds of Windows 10 as soon as they are available.
You open the Update & Security section in the Settings app.
What should you configure? To answer, select the appropriate options in the answer area.
Hot Area:
Question 14
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
Your company has an on-premises network that contains an Active Directory domain. The domain is synced to Microsoft Azure Active Directory (Azure AD). All computers in the domain run Windows 10 Enterprise.
You are logged on as the local administrator on a Computer named Computer1.
A user named Mia Hamm has a computer named Computer2. Mia Hamm reports that she is experiencing problems with Computer2.
You want to use Event Viewer on Computer1 to view the event logs on Computer2.
What should you do?
- A: On Computer1, run the Connect-WSMan -ComputerName "Computer1" cmdlet.
- B: On Computer1, run the Get-Eventlog -List -ComputerName "Computer1" cmdlet.
- C: On Computer1, log on as a domain administrator, then open Event Viewer and select the Connect to another computer ג€¦ option.
- D: On Computer1, open the Windows Defender Firewall and enable the Remote Event Log Management inbound rule.
Question 15
Your company is not connected to the internet. The company purchases several new computers with Windows 10 Pro for its users.
None of the new computers are activated.
You need to activate the computers without connecting the network to the Internet.
What should you do?
- A: Make use of the Volume Activation Management Tool (VAMT).
- B: Make use of the Key Management Service (KMS).
- C: Make use of the Windows Process Activation Service.
- D: Run the Get-WmiObject -query cmdlet.
Question 16
Your network contains an Active Directory domain. All users have been issued with computers that run Windows 8.1.
A user named Mia Hamm has a computer named Computer1. You upgrade Computer1 to Windows 10 by performing a clean installation of Windows 10 without formatting the drives.
You need to migrate the settings for Mia Hamm from Windows 8.1 to Windows 10.
Which two actions should you perform?
NOTE: Each correct selection is worth one point.
- A: Run scanstate.exe and specify the C:\Users folder
- B: Run loadstate.exe and specify the C:\Windows.old folder
- C: Run usmultils.exe and specify the C:\Users folder
- D: Run scanstate.exe and specify the C:\Windows.old folder
- E: Run loadstate.exe and specify the C:\Users folder
- F: Run usmultils.exe and specify the C:\Windows.old folder
Question 17
You have a computer named Computer1 that runs Windows 10.
You deploy an application named Application1 to Computer1.
You need to assign credentials to Application1.
You need to meet the following requirements:
✑ Ensure that the credentials for Application1 cannot be used by any user to log on to Computer1.
✑ Ensure that the principle of least privilege is maintained.
What should you do?
- A: Configure Application1 to sign in as the Local System account and select the Allow service to interact with desktop check box.
- B: Create a user account for Application1 and assign that user account the Deny log on locally user right
- C: Create a user account for Application1 and assign that user account the Deny log on as a service user right
- D: Configure Application1 to sign in as the Local Service account and select the Allow service to interact with desktop check box.
Question 18
Your network contains an Active Directory domain that is synced to a Microsoft Azure Active Directory (Azure AD) tenant. All users have been issued with laptop computers as well as desktop computers that run Windows 10 Enterprise. All users have Microsoft 365 E3 licenses.
A user named Mia Hamm informs you that she must perform a BitLocker recovery on her laptop but she does not have her BitLocker recovery key.
You need to ensure that Mia Hamm can perform a BitLocker recovery on her laptop.
What should you do?
- A: Instruct Mia Hamm to log on to her desktop computer and run the repair-bde.exe command.
- B: Instruct Mia Hamm to use the BitLocker Recovery Password Viewer to view the computer object of the laptop.
- C: Instruct Mia Hamm to log on to her desktop computer and go to https://account.activedirectory.windowsazure.com and view the user account profile.
- D: Instruct Mia Hamm to run the Enable-BitLocker cmdlet on her laptop.
Question 19
Your company has an on-premises network that contains an Active Directory domain. The domain is synced to Microsoft Azure Active Directory (Azure AD). All computers in the domain run Windows 10 Enterprise.
You have a computer named Computer1 that has a folder named Folder1.
You must provide users in group named Group1 with the ability to view the list of files in Folder1. Your solution must ensure that the principle of least privilege is maintained.
What should you do?
- A: Assign the Full control permissions for the Folder1 folder to Group1.
- B: Assign the Read permissions for the Folder1 folder to Group1.
- C: Assign the List folder permissions for the Folder1 folder to Group1.
- D: Assign the Take ownership permissions for the Folder1 folder to Group1.
Question 20
You have a computer named Computer1 that runs Windows 10.
Computer1 has a folder named C:\Folder1.
You need to meet the following requirements:
✑ Log users that access C:\Folder1.
✑ Log users that modify and delete files in C:\Folder1.
Which two actions should you perform?
- A: From the properties of C:\Folder1, configure the Auditing settings.
- B: From the properties of C:\Folder1, select the Encryption contents to secure data option.
- C: From the Audit Policy in the local Group Policy, configure Audit directory service access.
- D: From the Audit Policy in the local Group Policy, you configure Audit object access.
- E: From the Audit Policy in the local Group Policy, you configure Audit system events.
Question 21
Your company has a computer named Computer1 that runs Windows 10. Computer1 is used to provide guests with access to the Internet. Computer1 is a member of a workgroup.
You want to configure Computer1 to use a user account sign in automatically when the the computer is started. The user must not be prompted for a user name and password.
What should you do?
- A: Configure Group Policy preferences.
- B: Run the BCDBoot command.
- C: Edit the Registry.
- D: Run the MSConfig command.
Question 22
You need to configure Delivery Optimization to meet the technical requirements.
Which download mode should you use?
- A: Simple (99)
- B: Group (2)
- C: Internet (3)
- D: HTTP Only (0)
- E: Bypass (100)
Question 23
Which users can create a new group on Computer3?
- A: User31 and User32 only
- B: Admin1, User31, and User32 only
- C: User31 only
- D: Admin1 and User31 only
Question 24
On Computer1, you need to configure the custom Visual Effects performance settings.
Which user accounts can you use?
- A: Admin1, User11, and User13 only
- B: Admin1 only
- C: Admin1, User11, User12, and User13
- D: Admin1, User11, and User12 only
- E: Admin1 and User 11 only
Question 25
Which users can sign in to Computer2 by using Remote Desktop?
- A: User2 only
- B: Admin1 only
- C: User1 only
- D: Admin1 and User2 only
- E: Admin1, User1, User2, and User3
Free preview mode
Enjoy the free questions and consider upgrading to gain full access!