Pass Your Exam With 100% Verified MD-100 Exam Questions [Q134-Q157]

Rate this post

Pass Your Exam With 100% Verified MD-100 Exam Questions

MD-100 Dumps PDF – MD-100 Real Exam Questions Answers

Exam MD-100: Windows 10

The content of this exam will be updated on August 5, 2021. Please download the skills measured document below to see what will be changing.

If you passed Exam 70-698 before it expired on March 31, 2019, you only need to take MD-101 to earn the Modern Desktop certification. Candidates for this exam are Administrators who deploy, configure, secure, manage, and monitor devices and client applications in an enterprise environment. Candidates manage identity, access, policies, updates, and apps.

As an Administrator, candidates typically collaborate with the Microsoft 365 Enterprise Administrator to design and implement a device strategy that meets the business needs of a modern organization.

Candidates must be familiar with Microsoft 365 workloads and must be proficient and experienced in deploying, configuring, and maintaining Windows 10 and non-Windows devices and technologies.

You may be eligible for ACE college credit if you pass this certification exam. See ACE college credit for certification exams for details.

Part of the requirements for: Microsoft 365 Certified: Modern Desktop Administrator Associate

Download exam skills outline

 

QUESTION 134
Your company has a computer named Computer1 that runs Windows 10. Computer1 is used to provide guests with access to the Internet. Computer1 is a member of a workgroup.
You want to configure Computer1 to use a user account sign in automatically when the computer is started. The user must not be prompted for a user name and password.
What should you do?

 
 
 
 

QUESTION 135
You have a computer named Computer1 that runs Windows 10. Computer1 has an IP address of 10.10.1.200 and a subnet mask of 255.255.255.0.
You configure the proxy settings on Computer1 as shown in the following exhibit.

Use the drop-down menus to select the answer choice that completes each statement based on the information presented in the graphic.
NOTE: Each correct selection is worth one point.

QUESTION 136
You have a computer named Computer1 that runs Windows 10. Computer1 is in a workgroup.
Computer1 contains the folders shown in the following table.

On Computer1, you create the users shown in the following table.

User1 encrypts a file named File1.txt that is in a folder named C:Folder1.
What is the effect of the configuration? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.

QUESTION 137
You have a computer named Computer1 that runs Windows 10. Computer1 contains a registry key named Key1 that has the values shown in the exhibit. (Click the Exhibit tab.).

You have a Registration Entries (.reg) file named File1.reg that contains the following text.
Windows Registry Editor Version 5.00
[HKEY_LOCAL_MACHINESOFTWAREKey1]
“String1″=-
@=”2″
You need to identify the effect of importing File1.reg to Computer1.
What should you identify? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.

QUESTION 138
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
You have a computer named Computer1 that runs Windows10.
A service named Application1 is configured as shown in the exhibit.

You discover that a user used the Service1 account to sign in to Computer1 and deleted some files.
You need to ensure that the identity used by Application1 cannot be used by a user to sign in to sign in to the desktop on Computer1. The solution must use the principle of least privilege.
Solution: On Computer1, you configure Application1 to sign in as the LocalSystem account and select the Allow service to interact with desktop check box. You delete the Service1 account.
Does this meet the goal?

 
 

QUESTION 139
You have a computer named Computer1 that runs Windows 10.
You need to configure User Account Control (UAC) to prompt administrators for their credentials.
Which settings should you modify?

 
 
 
 

QUESTION 140
Your network contains an Active Directory domain. The domain contains three computers named Computer1, Computer2, and Computer3 that run Windows 10. The computers are on the same network and have network connectivity.
Windows Defender Firewall on Computer1 has the server-to-server connection security rule shown in the following table.

Windows Defender Firewall on Computer2 has the server-to-server connection security rule shown in the following table.

Windows Defender Firewall on Computer3 has the server-to-server connection security rule shown in the following table.

All the connection security rules are enabled and configured to use only the Computer (Kerberos VS) authentication method.
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
NOTE: Each correct selection is worth one point.

QUESTION 141
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
You deploy Windows 10 to a computer named Computer1.
Computer1 contains a folder named C:Folder1. Folder1 contains multiple documents.
You need to ensure that you can recover the files in Folder1 by using the Previous Versions tab.
Solution: You enable File History and add Folder1 to File History.
Does this meet the goal?

 
 

QUESTION 142
Your network contains an Active Director domain. The domain contains a group named Group1.
All the computers in the domain run Windows 10. Each computer contains a folder named C:Document that has the default NTFS permission set.
You add a folder named C:DocumentTemplates to each computer.
You need to configure the NTFS permission to meet the following requirements:
All domain users must be able to open the files in the templates folder.
Only the member of Group must be allowed to edit the files in the Templates folder.
How should you configure the NTFS settings on the Templates folder? To answer select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.

QUESTION 143
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
A user named User1 has a computer named Computer1 that runs Windows 10. Computer1 is joined to an Azure Active Directory (Azure AD) tenant named contoso.com. User1 joins Computer1 to contoso.com by using [email protected].
Computer1 contains a folder named Folder1. Folder1 is in drive C and is shared as Share1. Share1 has the permission shown in the following table.

A user named User2 has a computer named Computer2 that runs Windows 10. User2 joins Computer2 to contoso.com by using [email protected].
User2 attempts to access Share1 and receives the following error message: “The username or password is incorrect.” You need to ensure that User2 can connect to Share1.
Solution: In Azure AD, you create a group named Group1 that contains User1 and User2. You grant Group1 Change access to Share1.
Does this meet the goal?

 
 

QUESTION 144
Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2016 and a computer named Computer1 that runs Windows 10.
Server1 contains a share named Backup. All users can read and write data in Backup.
On Monday at 13:00, you configure Backup and Restore (Windows 7) on Computer1 to use the following settings:
Backup Destination:\Server1Backup
What do you want to back up?:Local Disk (D:), Include a system image of drives: System Reserved, (C:) Schedule: Daily at 23:00 You need to identify how many backups will be available on Thursday at 17:00.
What should you identify? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.

QUESTION 145
You have a Microsoft Azure Active Directory (Azure AD) tenant.
Some users signs in to that computer by using Windows hello for Business.
A user User1 purchases a new computer and joins the computer to Azure AD.
User1 attempts to configure the sign-in options and receives the error message shown in the exhibit. (Click the Exhibit tab.)

You open device Manager and confirmed that all the hardware works correctly.
You need to ensure that user1 can use Windows Hello for Business facial recognition to sign in to the computer.
What should you do first.

 
 
 
 

QUESTION 146
Please wait while the virtual machine loads. Once loaded, you may proceed to the lab section. This may take a few minutes, and the wait time will not be deducted from your overall test time.
When the Next button is available, click it to access the lab section. In this section, you will perform a set of tasks in a live environment. While most functionality will be available to you as it would be in a live environment, some functionality (e.g., copy and paste, ability to navigate to external websites) will not be possible by design.
Scoring is based on the outcome of performing the tasks stated in the lab. In other words, it doesn’t matter how you accomplish the task, if you successfully perform it, you will earn credit for that task.
Labs are not timed separately, and this exam may more than one lab that you must complete. You can use as much time as you would like to complete each lab. But, you should manage your time appropriately to ensure that you are able to complete the lab(s) and all other sections of the exam in the time provided.
Please note that once you submit your work by clicking the Next button within a lab, you will NOT be able to return to the lab.
Username and password

Use the following login credentials as needed:
To enter your password, place your cursor in the Enter password box and click on the password below.
Username: Contoso/Administrator
Password: Passw0rd!
The following information is for technical support purposes only:
Lab Instance: 10921597

You need to enable the Prohibit User from manually redirecting Profile Folders Group Policy setting only for the administrative users of Client3.
To complete this task, sign in to the required computer or computers.

QUESTION 147
Your network contains an Active Directory domain. The domain contains 10 computers that run Windows 10.
On a different computer named Computer1, you plan to create a collector-initiated subscription to gather the event logs from the Windows 10 computers.
You need to configure the environment to support the event log collection.
Which two actions should you perform? Each correct answer presents part of the solution.
NOTE: Each correct selection is worth one point.

 
 
 
 
 

QUESTION 148
Please wait while the virtual machine loads. Once loaded, you may proceed to the lab section. This may take a few minutes, and the wait time will not be deducted from your overall test time.
When the Next button is available, click it to access the lab section. In this section, you will perform a set of tasks in a live environment. While most functionality will be available to you as it would be in a live environment, some functionality (e.g., copy and paste, ability to navigate to external websites) will not be possible by design.
Scoring is based on the outcome of performing the tasks stated in the lab. In other words, it doesn’t matter how you accomplish the task, if you successfully perform it, you will earn credit for that task.
Labs are not timed separately, and this exam may more than one lab that you must complete. You can use as much time as you would like to complete each lab. But, you should manage your time appropriately to ensure that you are able to complete the lab(s) and all other sections of the exam in the time provided.
Please note that once you submit your work by clicking the Next button within a lab, you will NOT be able to return to the lab.
Username and password

Use the following login credentials as needed:
To enter your password, place your cursor in the Enter password box and click on the password below.
Username: Contoso/Administrator
Password: Passw0rd!
The following information is for technical support purposes only:
Lab Instance: 11145882


You need to ensure that all the current and future users in the Active Directory domain can establish Remote Desktop connections to Client1. The solution must use the principle of least privilege.
To complete this task, sign in to the required computer or computers.

QUESTION 149
You plan to deploy Windows 10 Enterprise to company-owned devices.
You capture a Windows 10 image file from a reference device.
You need to generate catalog files and answer files for the deployment.
What should you use for each file? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.

QUESTION 150
You have a Microsoft Azure Active Directory (Azure AD) tenant.
Some users signs in to that computer by using Windows hello for Business.
A user User1 purchases a new computer and joins the computer to Azure AD.
User1 attempts to configure the sign-in options and receives the error message shown in the exhibit. (Click the Exhibit tab.)

You open device Manager and confirmed that all the hardware works correctly.
You need to ensure that user1 can use Windows Hello for Business facial recognition to sign in to the computer.
What should you do first.

 
 
 
 

QUESTION 151
You have a computer named Computer1 that runs Windows 10. Computer1 is in a workgroup.
Computer1 contains the local users shown in the following table.

The Users group has Modify permissions to a folder named D:Folder1.
User3 creates a file named File1.docx in Folder1.
Which users can take ownership of File1.docx?

 
 
 
 

QUESTION 152
You have a computer that runs Windows 10.
From the Settings app, you view the connection properties shown in the following exhibit.

Use the drop-down menus to select the answer choice that completes each statement based on the information presented in the graphic.
NOTE: Each correct selection is worth one point.

QUESTION 153
Use the drop-down menus to select the answer choice that completes each statement based on the information presented on the graphic.

NOTE: Each correct selection is worth one point.

QUESTION 154
You have a computer named Computer 1 that runs Windows 10.
You turn on System Protection and create a restore point named Point1.
You perform the following changes:
Add four files named File1.txt, File2.dll, File3.sys, and File4.exe to the desktop.
Run a configuration script that adds the following four registry keys:
– Key1 to HKEY_CURRENT_USER
– Key2 to HKEY_CLASSES_ROOT
– Key3 to HKEY_LOCAL_MACHINESYSTEM
– Key4 to HKEY_CURRENT_CONFIG
You restore Point1.
Which files and registry keys are removed? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.

QUESTION 155
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
A user named User1 has a computer named Computer1 that runs Windows 10. Computer1 is joined to an Azure Active Directory (Azure AD) tenant named contoso.com. User1 joins Computer1 to contoso.com by using [email protected].
Computer1 contains a folder named Folder1. Folder1 is in drive C and is shared as Share1. Share1 has the permission shown in the following table.

A user named User2 has a computer named Computer2 that runs Windows 10. User2 joins Computer2 to contoso.com by using [email protected].
User2 attempts to access Share1 and receives the following error message: “The username or password is incorrect.” You need to ensure that User2 can connect to Share1.
Solution: In Azure AD, you create a group named Group1 that contains User1 and User2. You grant Group1 Change access to Share1.
Does this meet the goal?

 
 

QUESTION 156
You have a computer named Computer1 that runs Windows 10. Computer1 contains a folder named Data on drive C.
The Advanced Security Settings for the Data folder are shown in the exhibit. (Click the Exhibit tab.)

You share C:Data as shown in the following table.

User1 is a member of the Users group.
Administrators are assigned Full control NTFS permissions to C:Data.
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
NOTE: Each correct selection is worth one point.

QUESTION 157
You have the computers shown in the following table.
You need to identify which computers support the features.
BitLocker Drive Encryption (BitLocker)
Microsoft Application Virtualization (App-V)
Which computers support the features? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.


MD-100 Dumps 100 Pass Guarantee With Latest Demo: https://www.examslabs.com/Microsoft/Windows-10/best-MD-100-exam-dumps.html