This page was exported from Exams Labs Braindumps [ http://blog.examslabs.com ] Export date:Sat Sep 21 14:54:57 2024 / +0000 GMT ___________________________________________________ Title: [Q141-Q159] Get New 2023 Microsoft MD-100 Exam Dumps Bundle On flat Updated Dumps! --------------------------------------------------- Get New 2023 Microsoft exam MD-100 Dumps Bundle On flat Updated Dumps! Full MD-100 Practice Test and 345 unique questions with explanations waiting just for you, get it now! Q141. Your network contains an Active Directory domain. The domain contains 1,000 computers that run Windows 10.You discover that when users are on their lock screen, they see a different background image every day, along with tips for using different features in Windows 10.You need to disable the tips and the daily background image for all the Windows 10 computers.Which Group Policy settings should you modify?  Turn off the Windows Welcome Experience  Turn off Windows Spotlight on Settings  Do not suggest third-party content in Windows spotlight  Turn off all Windows spotlight features Explanation/Reference:References:https://docs.microsoft.com/en-us/windows/configuration/windows-spotlightQ142. Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.You have a computer named Computer1 that runs Windows 10. The computer contains a folder. The folder contains sensitive data.You need to log which user reads the contents of the folder and modifies and deletes files in the folder.Solution: From the properties of the folder, you configure the Auditing settings and from the Audit Policy in the local Group Policy, you configure Audit directory service access.Does this meet the goal?  Yes  No ExplanationExplanation/Reference:References:https://www.netwrix.com/how_to_detect_who_changed_file_or_folder_owner.htmlQ143. You have a computer named Computer1 that runs Windows 10.Computer1 contains the folders shown in the following table.You include Folder1, Folder2, and Folder3 in the Documents library.You configure File History to run every 15 minutes, and then turn on File History.For each of the following statements, select Yes if the statement in true. Otherwise, select No.NOTE: Each correct selection is worth one point. ExplanationQ144. You have a computer named Computer 1 that runs Windows 10.You turn on System Protection and create a restore point named Point1.You perform the following changes:* Add four files named File1.txt, File2.dll, File3.sys, and File4.exe to the desktop.Run a configuration script that adds the following four registry keys:– Key1 to HKEY_CURRENT_USER– Key2 to HKEY_CLASSES_ROOT– Key3 to HKEY_LOCAL_MACHINESYSTEM– Key4 to HKEY_CURRENT_CONFIGYou restore Point1.Which files and registry keys are removed? To answer, select the appropriate options in the answer area.NOTE: Each correct selection is worth one point. ExplanationReferences:https://www.maketecheasier.com/what-system-restore-can-and-cannot-do-to-your-windows-system/https://superuser.com/questions/343112/what-does-windows-system-restore-exactly-back-up-and-restoreQ145. Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.You have a laptop named Computer1 that runs Windows 10.When in range, Computer1 connects automatically to a Wi-Fi network named Wireless1.You need to prevent Computer1 from automatically connecting to Wireless1.Solution: From the Settings app, you modify the properties of the Wireless1 known Wi-Fi network.Does this meet the goal?  Yes  No Explanation/Reference:Explanation:Removing Wireless1 as a known Wi-Fi network on Computer1 will prevent it from automatically connecting.Note: You can also type netsh wlan show profiles in the Command Prompt to manage and delete wireless network profiles.References:https://kb.netgear.com/29889/How-to-delete-a-wireless-network-profile-in-Windows-10 Maintain Windows Testlet 1 Case Study This is a case study. Case studies are not timed separately. You can use as much exam times as you would like to complete each case. However, there may be additional studies and sections on this exam. You must manage your time to ensure that you are able to complete all questions included on this exam in the time provided.To answer the questions included in a case study, you will need to reference information that is provided in the case study. Case studies might contain exhibits and other resources that provide more information about the scenario that is described in the case study. Each question is independent of the other questions in this case study.At the end of this case study, a review screen will appear. This screen allows you to review your answers and to make changes before you move to the next section of the exam. After you begin a new section, you cannot return to this section.To start the case studyTo display the first question in this case study, click the Next button. Use the buttons in the left pane to explore the content of the case study before you answer the questions. Clicking these buttons displays information such as business requirements, existing environment, and problem statements. When you are ready to answer a question, click the Question button to return to the question.OverviewExisting EnvironmentFabrikam, Inc. is a distribution company that has 500 employees and 100 contractors.Active DirectoryThe network contains an Active Directory forest named fabrikam.com. The forest is synced to Microsoft Azure Active Directory (Azure AD). All the employees are assigned Microsoft 365 E3 licenses.The domain contains a user account for an employee named User10.Client ComputersAll the employees have computers that run Windows 10 Enterprise. All the computers are installed without Volume License Keys. Windows 10 license keys are never issued.All the employees register their computer to Azure AD when they first receive the computer.User10 has a computer named Computer10.All the contractors have their own computer that runs Windows 10. None of the computers are joined to Azure AD.Operational ProceduresFabrikam has the following operational procedures:* Updates are deployed by using Windows Update for Business.* When new contractors are hired, administrators must help the contactors configure the following settings on their computer:– User certificates– Browser security and proxy settings– Wireless network connection settingsSecurity policiesThe following security policies are enforced on all the client computers in the domain:* All the computers are encrypted by using BitLocker Drive Encryption (BitLocker). BitLocker recovery information is stored in Active Directory and Azure AD.* The local Administrators group on each computer contains an enabled account named LocalAdmin.* The LocalAdmin account is managed by using Local Administrator Password Solution (LAPS).Problem StatementsFabrikam identifies the following issues:* Employees in the finance department use an application named Application1. Application1 frequently crashes due to a memory error. When Application1 crashes, an event is written to the application log and an administrator runs a script to delete the temporary files and restart the application.* When employees attempt to connect to the network from their home computer, they often cannot establish a VPN connection because of misconfigured VPN settings.* An employee has a computer named Computer11. Computer11 has a hardware failure that prevents the computer from connecting to the network.* User10 reports that Computer10 is not activated.Technical requirementsFabrikam identifies the following technical requirements for managing the client computers:Provide employees with a configuration file to configure their VPN connection.* Use the minimum amount of administrative effort to implement the technical requirements.* Identify which employees’ computers are noncompliant with the Windows Update baseline of the company.* Ensure that the service desk uses Quick Assist to take remote control of an employee’s desktop during support calls.* Automate the configuration of the contractors’ computers. The solution must provide a configuration file that the contractors can open from a Microsoft SharePoint site to apply the required configurations.Q146. You have two workgroup computers named Computer1 and Computer2 that run Windows 10. The Guest account is enabled on both computers.The computers contain the users shown in the following table.The computers contain the shared folders shown in the following table.Computer1 has password-protected sharing turned on. Computer2 has password-protected sharing turned off.For each of the following statements, select Yes if the statement is true. Otherwise, select No.NOTE: Each correct selection is worth one point. Reference:https://docs.microsoft.com/en-us/troubleshoot/windows-server/networking/guest-access-in-smb2-is-disabled-by-defaultQ147. You have a workgroup computer named Computer1 that runs Windows 10. Computer1 has the users accounts shown in the following table:Computer1 has the local Group Policy shown in the following table.You create the Local ComputerAdministrators policy shown in the following table.You create the Local ComputerNon-Administrators policy shown in the following table.For each of the following statements, select Yes if the statement is true. Otherwise, select No. ExplanationReference:https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-vista/cc766291(v=ws.10)Q148. You have a computer named Computer1 that runs Windows 10.Computer1 has the local users shown in the following table.Which users can analyze the event logs on Computer1? To answer, select the appropriate options in the answer area.NOTE: Each correct selection is worth one point. ExplanationReferences:https://docs.microsoft.com/en-us/windows/security/identity-protection/access-control/local-accounts#sec-localsyQ149. You have a computer named Computer1 that runs Windows 10.Computer contains the folders shown in the following table.You include Folder1, Folder2 and Folder3 in the Documents library.You configure File History to run every 15 minutes, and then turn on file History.For each of the following statements, select YES if the statements is true. Otherwise, select No.NOTE: Each correct selection is worth one point. ExplanationYes > No > NoQ150. You have a computer named Computer5 that runs Windows 10 that is used to share documents in a workgroup.You create three users named User-a, User-b, User-c. The users plan to access Computer5 from the network only.You have a folder named Data. The Advanced Security Settings for the Data folder are shown in the Security exhibit. (Click the Security Exhibit tab).You share the Data folder. The permission for User-a are shown in the User-a exhibit (Click the User-a tab.)The permissions for user-b are shown in the User-b exhibit. (Click the User-b tab.)The permissions for user-c are shown in the User-c exhibit. (Click the User-c tab.)For each of the following statements, select Yes if the statements is true. Otherwise, select No.NOTE: Reach correct selection is worth one point. Q151. You have a computer that runs Windows 10.From the Settings app, you view the connection properties shown in the following exhibit.Use the drop-down menus to select the answer choice that completes each statement based on the information presented in the graphic.NOTE: Each correct selection is worth one point. ExplanationQ152. Your company deploys Windows 10 Enterprise to all computers. All the computers are joined to Microsoft Azure Active Directory (Azure AD).The company purchases a new computer for a new user and creates an Azure AD account for the user.The user signs in to the computer by using the Azure AD account. The user discovers the activation error shown in the following exhibit.You need to activate Windows 10 Enterprise on the computer.What should you do?  In Azure AD. assign a Windows 10 Enterprise license to the user.  At the command prompt, run slmgr /ltc.  Reinstall Windows as Windows 10 Enterprise.  At the command prompt, run slmgr /ato. Reference:https://docs.microsoft.com/en-us/windows/deployment/windows-10-subscription-activationQ153. Your network contains an Active Directory domain. The domain contains a user named User1.User1 creates a Microsoft account.User1 needs to sign in to cloud resources by using the Microsoft account without being prompted for credentials.Which settings should User1 configure?  User Accounts in Control Panel  Email & app accounts in the Settings app  Users in Computer Management  Users in Active Directory Users and Computers References:https://support.microsoft.com/en-za/help/4028195/microsoft-account-how-to-sign-inQ154. You have a Microsoft Azure Active Directory (Azure AD) tenant.Some users signs in to that computer by using Windows hello for Business.A user User1 purchases a new computer and joins the computer to Azure AD.User1 attempts to configure the sign-in options and receives the error message shown in the exhibit. (Click the Exhibit tab.)You open device Manager and confirmed that all the hardware works correctly.You need to ensure that user1 can use Windows Hello for Business facial recognition to sign in to the computer.What should you do first.  Purchase an infrared (IR) camera.  Install a virtual TPM driver.  Enable UEF Secure Boot.  Upgrade the computer to windows 10 Enterprise. Q155. You have a computer named Computer5 that runs Windows 10 that is used to share documents in a workgroup.You create three users named User-a, User-b, User-c. The users plan to access Computer5 from the network only.You have a folder named Data. The Advanced Security Settings for the Data folder are shown in the Security exhibit. (Click the Security Exhibit tab).You share the Data folder. The permission for User-a are shown in the User-a exhibit (Click the User-a tab.)The permissions for user-b are shown in the User-b exhibit. (Click the User-b tab.)The permissions for user-c are shown in the User-c exhibit. (Click the tab.)For each of the following statements, select Yes if the statements is true. Otherwise, select No.NOTE: Reach correct selection is worth one point. ExplanationNo No YesQ156. Please wait while the virtual machine loads. Once loaded, you may proceed to the lab section. This may take a few minutes, and the wait time will not be deducted from your overall test time.When the Next button is available, click it to access the lab section. In this section, you will perform a set of tasks in a live environment. While most functionality will be available to you as it would be in a live environment, some functionality (e.g., copy and paste, ability to navigate to external websites) will not be possible by design.Scoring is based on the outcome of performing the tasks stated in the lab. In other words, it doesn’t matter how you accomplish the task, if you successfully perform it, you will earn credit for that task.Labs are not timed separately, and this exam may more than one lab that you must complete. You can use as much time as you would like to complete each lab. But, you should manage your time appropriately to ensure that you are able to complete the lab(s) and all other sections of the exam in the time provided.Please note that once you submit your work by clicking the Next button within a lab, you will NOT be able to return to the lab.Username and passwordUse the following login credentials as needed:To enter your password, place your cursor in the Enter password box and click on the password below.Username: Contoso/AdministratorPassword: Passw0rd!The following information is for technical support purposes only:Lab Instance: 10921597You need to create a file named File1.txt in a folder named Folder1 on the C drive of Client2. You need to ensure that a user named User1 can read the contents of File1.txt. The solution must prevent User1 from modifying the file.To complete this task, sign in to Client2 and perform the required action. See explanation below.* After creating File1.txt in Folder1, right-click the file and select Properties.* Access the Security tab, click Disable inheritance* Click on Remove all inherited permissions from this object, click Apply, and select Yes in the dialog box that appears.* Click OK* Back on the Security tab select Edit to change permissions.* Click Add, then enter User1 in the Enter the object names to select section.* Click Check Names, and then click OK.* Check only the Read box in the Allow column.* Click apply, Ok, and OKQ157. You have a Microsoft Azure Active Directory (Azure AD) tenant.Some users signs in to that computer by using Windows hello for Business.A user User1 purchases a new computer and joins the computer to Azure AD.User1 attempts to configure the sign-in options and receives the error message shown in the exhibit. (Click the Exhibit tab.)You open device Manager and confirmed that all the hardware works correctly.You need to ensure that user1 can use Windows Hello for Business facial recognition to sign in to the computer.What should you do first.  Purchase an infrared (IR) camera.  Install a virtual TPM driver.  Enable UEF Secure Boot.  Upgrade the computer to windows 10 Enterprise. Topic 1, Contoso, LtdOverviewContoso, Ltd. is a consulting company that has a main office in Montreal and two branch offices in Seattle and New York.Contoso has IT, human resources (HR), and finance departments.Contoso recently opened a new branch office in San Diego. All the users in the San Diego office work from home.Existing environmentContoso uses Microsoft 365.The on-premises network contains an Active Directory domain named contoso.com. The domain is synced to Microsoft Azure Active Directory (Azure AD).All computers run Windows 10 Enterprise.You have four computers named Computer1, Computer2, Computer3, and ComputerA. ComputerA is in a workgroup on an isolated network segment and runs the Long Term Servicing Channel version of Windows10. ComputerA connects to a manufacturing system and is business critical. All the other computers are joined to the domain and run the Semi-Annual Channel version of Windows 10.In the domain, you create four groups named Group1, Group2, Group3, and Group4.Computer2 has the local Group Policy settings shown in the following table.The computers are updated by using Windows Update for Business.The domain has the users shown in the following table.Computer1 has the local users shown in the following table.RequirementsPlanned ChangesContoso plans to purchase computers preinstalled with Windows 10 Pro for all the San Diego office users.Technical requirementsContoso identifies the following technical requirements:* The computers in the San Diego office must be upgraded automatically to Windows 10 Enterprise and must be joined to Azure AD the first time a user starts each new computer. End users must not be required to accept the End User License Agreement (EULA).* Helpdesk users must be able to troubleshoot Group Policy object (GPO) processing on the Windows 10 computers. The helpdesk users must be able to identify which Group Policies are applied to the computers.* Users in the HR department must be able to view the list of files in a folder named D:Reports on Computer3.* ComputerA must be configured to have an Encrypting File System (EFS) recovery agent.* Quality update installations must be deferred as long as possible on ComputerA.* Users in the IT department must use dynamic look on their primary device.* User6 must be able to connect to Computer2 by using Remote Desktop.* The principle of least privilege must be used whenever possible.* Administrative effort must be minimized whenever possible.* Assigned access must be configured on Computer1.Q158. Your network contains an Active Directory domain named adatum.com, a workgroup, and computers that run Windows 10. The computers are configured as shown in the following table.The local Administrator accounts on Computer1, Computer2, and Computer3 have the same user name and password.On Computer1, Windows Defender Firewall is configured as shown in the following exhibit.The services on Computer1 have the following states.For each of the following statements, select Yes if the statement is true. Otherwise, select No.NOTE: Each correct selection is worth one point. Q159. You have a computer named Computer1 that runs Windows 10. Computer1 is in a workgroup.Computer1 contains the local users shown in the following table.Computer1 contains the folders shown in the following table.The Users group has Full control permissions to Folder1, Folder2, and Folder3.User1 encrypts two files named File1.docx and File2.docx in Folder1 by using EFS.Which users can move each file? To answer, select the appropriate options in the answer area.NOTE: Each correct selection is worth one point. ExplanationEFS works by encrypting a file with a bulk symmetric key. The symmetric key that is used to encrypt the file is then encrypted with a public key that is associated with the user who encrypted the file. Because the encryption & decryption operations are performed at a layer below NTFS, it is transparent to the user and all their applications.Box 1: User1, User2, and AdministratorBox 2: User1, User2, and AdministratorAll three are members of the Users group that has Full control permissions to Folder1, Folder2, and Folder3. Loading … Reduce Your Chance of Failure in MD-100 Exam: https://www.examslabs.com/Microsoft/Windows-10/best-MD-100-exam-dumps.html --------------------------------------------------- Images: https://blog.examslabs.com/wp-content/plugins/watu/loading.gif https://blog.examslabs.com/wp-content/plugins/watu/loading.gif --------------------------------------------------- --------------------------------------------------- Post date: 2023-02-12 15:41:20 Post date GMT: 2023-02-12 15:41:20 Post modified date: 2023-02-12 15:41:20 Post modified date GMT: 2023-02-12 15:41:20