This page was exported from Exams Labs Braindumps [ http://blog.examslabs.com ] Export date:Wed Dec 4 8:38:51 2024 / +0000 GMT ___________________________________________________ Title: Pass Your Exam With 100% Verified MD-100 Exam Questions [Q134-Q157] --------------------------------------------------- Pass Your Exam With 100% Verified MD-100 Exam Questions MD-100 Dumps PDF - MD-100 Real Exam Questions Answers Exam MD-100: Windows 10 The content of this exam will be updated on August 5, 2021. Please download the skills measured document below to see what will be changing. If you passed Exam 70-698 before it expired on March 31, 2019, you only need to take MD-101 to earn the Modern Desktop certification. Candidates for this exam are Administrators who deploy, configure, secure, manage, and monitor devices and client applications in an enterprise environment. Candidates manage identity, access, policies, updates, and apps. As an Administrator, candidates typically collaborate with the Microsoft 365 Enterprise Administrator to design and implement a device strategy that meets the business needs of a modern organization. Candidates must be familiar with Microsoft 365 workloads and must be proficient and experienced in deploying, configuring, and maintaining Windows 10 and non-Windows devices and technologies. You may be eligible for ACE college credit if you pass this certification exam. See ACE college credit for certification exams for details. Part of the requirements for: Microsoft 365 Certified: Modern Desktop Administrator Associate Download exam skills outline   QUESTION 134Your company has a computer named Computer1 that runs Windows 10. Computer1 is used to provide guests with access to the Internet. Computer1 is a member of a workgroup.You want to configure Computer1 to use a user account sign in automatically when the computer is started. The user must not be prompted for a user name and password.What should you do?  Configure Group Policy preferences.  Run the BCDBoot command.  Edit the Registry.  Run the MSConfig command. In the registry, add a default user name and a default password in the HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionWinlogon sbukey.Reference:https://support.microsoft.com/en-us/help/324737/how-to-turn-on-automatic-logon-in-windowsQUESTION 135You have a computer named Computer1 that runs Windows 10. Computer1 has an IP address of 10.10.1.200 and a subnet mask of 255.255.255.0.You configure the proxy settings on Computer1 as shown in the following exhibit.Use the drop-down menus to select the answer choice that completes each statement based on the information presented in the graphic.NOTE: Each correct selection is worth one point. Reference:https://www.howtogeek.com/tips/how-to-set-your-proxy-settings-in-windows-8.1/QUESTION 136You have a computer named Computer1 that runs Windows 10. Computer1 is in a workgroup.Computer1 contains the folders shown in the following table.On Computer1, you create the users shown in the following table.User1 encrypts a file named File1.txt that is in a folder named C:Folder1.What is the effect of the configuration? To answer, select the appropriate options in the answer area.NOTE: Each correct selection is worth one point. Explanation:References:https://support.microsoft.com/en-za/help/310316/how-permissions-are-handled-when-you-copy-and-move-files-and-foldersQUESTION 137You have a computer named Computer1 that runs Windows 10. Computer1 contains a registry key named Key1 that has the values shown in the exhibit. (Click the Exhibit tab.).You have a Registration Entries (.reg) file named File1.reg that contains the following text.Windows Registry Editor Version 5.00[HKEY_LOCAL_MACHINESOFTWAREKey1]“String1″=-@=”2″You need to identify the effect of importing File1.reg to Computer1.What should you identify? To answer, select the appropriate options in the answer area.NOTE: Each correct selection is worth one point. ExplanationBox 1: String1 will be deleted.To delete a value, append equals and then minus to the value. For example:“String1″=-Box 2: Value1 will have a value of 1@=”2″ sets the default value to 1 but Value1 already has a DWORD value.A DWORD (32-bit) value is a hexadecimal value. Value1 is 0x00000001 which is 1.References:https://www.computerhope.com/issues/ch000848.htmhttps://www.computerperformance.co.uk/vista/reg-create/QUESTION 138Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.You have a computer named Computer1 that runs Windows10.A service named Application1 is configured as shown in the exhibit.You discover that a user used the Service1 account to sign in to Computer1 and deleted some files.You need to ensure that the identity used by Application1 cannot be used by a user to sign in to sign in to the desktop on Computer1. The solution must use the principle of least privilege.Solution: On Computer1, you configure Application1 to sign in as the LocalSystem account and select the Allow service to interact with desktop check box. You delete the Service1 account.Does this meet the goal?  Yes  No QUESTION 139You have a computer named Computer1 that runs Windows 10.You need to configure User Account Control (UAC) to prompt administrators for their credentials.Which settings should you modify?  Administrators Properties in Local Users and Groups  User Account Control Settings in Control Panel  Security Options in Local Group Policy Editor  User Rights Assignment in Local Group Policy Editor References:https://docs.microsoft.com/en-us/windows/security/identity-protection/user-account-control/user-account-control-security-policy-settingsQUESTION 140Your network contains an Active Directory domain. The domain contains three computers named Computer1, Computer2, and Computer3 that run Windows 10. The computers are on the same network and have network connectivity.Windows Defender Firewall on Computer1 has the server-to-server connection security rule shown in the following table.Windows Defender Firewall on Computer2 has the server-to-server connection security rule shown in the following table.Windows Defender Firewall on Computer3 has the server-to-server connection security rule shown in the following table.All the connection security rules are enabled and configured to use only the Computer (Kerberos VS) authentication method.For each of the following statements, select Yes if the statement is true. Otherwise, select No.NOTE: Each correct selection is worth one point. Reference:https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-firewall/create-an-authentication-request-ruleQUESTION 141Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.You deploy Windows 10 to a computer named Computer1.Computer1 contains a folder named C:Folder1. Folder1 contains multiple documents.You need to ensure that you can recover the files in Folder1 by using the Previous Versions tab.Solution: You enable File History and add Folder1 to File History.Does this meet the goal?  Yes  No ExplanationExplanation/Reference:https://support.microsoft.com/en-za/help/17128/windows-8-file-historyQUESTION 142Your network contains an Active Director domain. The domain contains a group named Group1.All the computers in the domain run Windows 10. Each computer contains a folder named C:Document that has the default NTFS permission set.You add a folder named C:DocumentTemplates to each computer.You need to configure the NTFS permission to meet the following requirements:All domain users must be able to open the files in the templates folder.Only the member of Group must be allowed to edit the files in the Templates folder.How should you configure the NTFS settings on the Templates folder? To answer select the appropriate options in the answer area.NOTE: Each correct selection is worth one point. ExplanationEnable inheritanceAllow ModifyQUESTION 143Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.A user named User1 has a computer named Computer1 that runs Windows 10. Computer1 is joined to an Azure Active Directory (Azure AD) tenant named contoso.com. User1 joins Computer1 to contoso.com by using user1@contoso.com.Computer1 contains a folder named Folder1. Folder1 is in drive C and is shared as Share1. Share1 has the permission shown in the following table.A user named User2 has a computer named Computer2 that runs Windows 10. User2 joins Computer2 to contoso.com by using user2@contoso.com.User2 attempts to access Share1 and receives the following error message: “The username or password is incorrect.” You need to ensure that User2 can connect to Share1.Solution: In Azure AD, you create a group named Group1 that contains User1 and User2. You grant Group1 Change access to Share1.Does this meet the goal?  Yes  No ExplanationReferences:https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/cc75417QUESTION 144Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2016 and a computer named Computer1 that runs Windows 10.Server1 contains a share named Backup. All users can read and write data in Backup.On Monday at 13:00, you configure Backup and Restore (Windows 7) on Computer1 to use the following settings:Backup Destination:Server1BackupWhat do you want to back up?:Local Disk (D:), Include a system image of drives: System Reserved, (C:) Schedule: Daily at 23:00 You need to identify how many backups will be available on Thursday at 17:00.What should you identify? To answer, select the appropriate options in the answer area.NOTE: Each correct selection is worth one point. Reference:https://www.windowscentral.com/how-make-full-backup-windows-10#create_system_image_windows10https://www.bleepingcomputer.com/tutorials/create-system-image-in-windows-7-8/QUESTION 145You have a Microsoft Azure Active Directory (Azure AD) tenant.Some users signs in to that computer by using Windows hello for Business.A user User1 purchases a new computer and joins the computer to Azure AD.User1 attempts to configure the sign-in options and receives the error message shown in the exhibit. (Click the Exhibit tab.)You open device Manager and confirmed that all the hardware works correctly.You need to ensure that user1 can use Windows Hello for Business facial recognition to sign in to the computer.What should you do first.  Purchase an infrared (IR) camera.  Install a virtual TPM driver.  Enable UEF Secure Boot.  Upgrade the computer to windows 10 Enterprise. Topic 1, Contoso, LtdOverviewContoso, Ltd. is a consulting company that has a main office in Montreal and two branch offices in Seattle and New York.Contoso has IT, human resources (HR), and finance departments.Contoso recently opened a new branch office in San Diego. All the users in the San Diego office work from home.Existing environmentContoso uses Microsoft 365.The on-premises network contains an Active Directory domain named contoso.com. The domain is synced to Microsoft Azure Active Directory (Azure AD).All computers run Windows 10 Enterprise.You have four computers named Computer1, Computer2, Computer3, and ComputerA. ComputerA is in a workgroup on an isolated network segment and runs the Long Term Servicing Channel version of Windows10. ComputerA connects to a manufacturing system and is business critical. All the other computers are joined to the domain and run the Semi-Annual Channel version of Windows 10.In the domain, you create four groups named Group1, Group2, Group3, and Group4.Computer2 has the local Group Policy settings shown in the following table.The computers are updated by using Windows Update for Business.The domain has the users shown in the following table.Computer1 has the local users shown in the following table.RequirementsPlanned ChangesContoso plans to purchase computers preinstalled with Windows 10 Pro for all the San Diego office users.Technical requirementsContoso identifies the following technical requirements:* The computers in the San Diego office must be upgraded automatically to Windows 10 Enterprise and must be joined to Azure AD the first time a user starts each new computer. End users must not be required to accept the End User License Agreement (EULA).* Helpdesk users must be able to troubleshoot Group Policy object (GPO) processing on the Windows 10 computers. The helpdesk users must be able to identify which Group Policies are applied to the computers.* Users in the HR department must be able to view the list of files in a folder named D:Reports on Computer3.* ComputerA must be configured to have an Encrypting File System (EFS) recovery agent.* Quality update installations must be deferred as long as possible on ComputerA.* Users in the IT department must use dynamic look on their primary device.* User6 must be able to connect to Computer2 by using Remote Desktop.* The principle of least privilege must be used whenever possible.* Administrative effort must be minimized whenever possible.* Assigned access must be configured on Computer1.QUESTION 146Please wait while the virtual machine loads. Once loaded, you may proceed to the lab section. This may take a few minutes, and the wait time will not be deducted from your overall test time.When the Next button is available, click it to access the lab section. In this section, you will perform a set of tasks in a live environment. While most functionality will be available to you as it would be in a live environment, some functionality (e.g., copy and paste, ability to navigate to external websites) will not be possible by design.Scoring is based on the outcome of performing the tasks stated in the lab. In other words, it doesn’t matter how you accomplish the task, if you successfully perform it, you will earn credit for that task.Labs are not timed separately, and this exam may more than one lab that you must complete. You can use as much time as you would like to complete each lab. But, you should manage your time appropriately to ensure that you are able to complete the lab(s) and all other sections of the exam in the time provided.Please note that once you submit your work by clicking the Next button within a lab, you will NOT be able to return to the lab.Username and passwordUse the following login credentials as needed:To enter your password, place your cursor in the Enter password box and click on the password below.Username: Contoso/AdministratorPassword: Passw0rd!The following information is for technical support purposes only:Lab Instance: 10921597You need to enable the Prohibit User from manually redirecting Profile Folders Group Policy setting only for the administrative users of Client3.To complete this task, sign in to the required computer or computers. See explanation below.Explanation1. Open the Administrator Group Local Group Policy Editor.2. In the left pane, click on User Configuration, Administrative Templates, and Desktop.3. In the right pane, right click on Prohibit User from Manually redirecting Profile Folders and click on Properties.4. To Prevent User Profile Folders Location ChangeSelect (dot) Enabled and click on OK.5. Close the Local Group Policy Editor window.References:https://www.vistax64.com/threads/user-profile-folders-prevent-or-allow-location-change.180719/QUESTION 147Your network contains an Active Directory domain. The domain contains 10 computers that run Windows 10.On a different computer named Computer1, you plan to create a collector-initiated subscription to gather the event logs from the Windows 10 computers.You need to configure the environment to support the event log collection.Which two actions should you perform? Each correct answer presents part of the solution.NOTE: Each correct selection is worth one point.  Add Computer1 to the Event Log Readers group on the Windows 10 computers  Add Computer1 to the Event Log Readers group on Computer1  On the Windows 10 computers, change the Startup Type of Windows Event Collector to Automatic  Enable Windows Remote Management (WinRM) on the Windows 10 computers  Enable Windows Remote Management (WinRM) on Computer1 Explanation/Reference:https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/ cc748890(v=ws.11)QUESTION 148Please wait while the virtual machine loads. Once loaded, you may proceed to the lab section. This may take a few minutes, and the wait time will not be deducted from your overall test time.When the Next button is available, click it to access the lab section. In this section, you will perform a set of tasks in a live environment. While most functionality will be available to you as it would be in a live environment, some functionality (e.g., copy and paste, ability to navigate to external websites) will not be possible by design.Scoring is based on the outcome of performing the tasks stated in the lab. In other words, it doesn’t matter how you accomplish the task, if you successfully perform it, you will earn credit for that task.Labs are not timed separately, and this exam may more than one lab that you must complete. You can use as much time as you would like to complete each lab. But, you should manage your time appropriately to ensure that you are able to complete the lab(s) and all other sections of the exam in the time provided.Please note that once you submit your work by clicking the Next button within a lab, you will NOT be able to return to the lab.Username and passwordUse the following login credentials as needed:To enter your password, place your cursor in the Enter password box and click on the password below.Username: Contoso/AdministratorPassword: Passw0rd!The following information is for technical support purposes only:Lab Instance: 11145882You need to ensure that all the current and future users in the Active Directory domain can establish Remote Desktop connections to Client1. The solution must use the principle of least privilege.To complete this task, sign in to the required computer or computers. Step 1. Add Remote Desktop Users to the Remote Desktop Users Group.Open Server Manager.From Tools menu, select Active Directory Users and ComputersDouble click at your domain on the left and then select Builtin.Open Remote Desktop Users on the right pane.At Members tab, click Add.Type the AD users that you want to give Remote access to the RDS Server and click OK.After selecting the remote desktop users, click OK again to close the window.Step 2. Allow the log on through remote desktop Services.1. Open Group Policy Editor. To do that:b. Type gpedit.msc and press Enter.2. In Group Policy Editor navigate to: Computer Configuration > Windows Settings > Security Settings > Local Policies > User Rights Assignment.3. At the right Pane: double click at Allow log on through Remote Desktop Services.4. Click Add User or Group.5. Type remote and then click Check Names.6. Select the Remote Desktop Users and click OK.7. Click OK at ‘Select users, computers…’ window.8. Finally click OK again and close Group Policy Editor.Reference:https://www.wintips.org/fix-to-sign-in-remotely-you-need-the-right-to-sign-in-through-remote-desktop-services-server-2016/QUESTION 149You plan to deploy Windows 10 Enterprise to company-owned devices.You capture a Windows 10 image file from a reference device.You need to generate catalog files and answer files for the deployment.What should you use for each file? To answer, select the appropriate options in the answer area.NOTE: Each correct selection is worth one point. References:https://docs.microsoft.com/en-us/windows-hardware/customize/desktop/wsim/open-a-windows-image-or-catalog-fileQUESTION 150You have a Microsoft Azure Active Directory (Azure AD) tenant.Some users signs in to that computer by using Windows hello for Business.A user User1 purchases a new computer and joins the computer to Azure AD.User1 attempts to configure the sign-in options and receives the error message shown in the exhibit. (Click the Exhibit tab.)You open device Manager and confirmed that all the hardware works correctly.You need to ensure that user1 can use Windows Hello for Business facial recognition to sign in to the computer.What should you do first.  Purchase an infrared (IR) camera.  Install a virtual TPM driver.  Enable UEF Secure Boot.  Upgrade the computer to windows 10 Enterprise. QUESTION 151You have a computer named Computer1 that runs Windows 10. Computer1 is in a workgroup.Computer1 contains the local users shown in the following table.The Users group has Modify permissions to a folder named D:Folder1.User3 creates a file named File1.docx in Folder1.Which users can take ownership of File1.docx?  Administrator and User1 only  Administrator only  Administrator, User1, and User2  Administrator and User2 only Only a member of the Administrator’s group can take ownership of a file or folder.QUESTION 152You have a computer that runs Windows 10.From the Settings app, you view the connection properties shown in the following exhibit.Use the drop-down menus to select the answer choice that completes each statement based on the information presented in the graphic.NOTE: Each correct selection is worth one point. QUESTION 153Use the drop-down menus to select the answer choice that completes each statement based on the information presented on the graphic.NOTE: Each correct selection is worth one point. ExplanationQUESTION 154You have a computer named Computer 1 that runs Windows 10.You turn on System Protection and create a restore point named Point1.You perform the following changes:Add four files named File1.txt, File2.dll, File3.sys, and File4.exe to the desktop.Run a configuration script that adds the following four registry keys:– Key1 to HKEY_CURRENT_USER– Key2 to HKEY_CLASSES_ROOT– Key3 to HKEY_LOCAL_MACHINESYSTEM– Key4 to HKEY_CURRENT_CONFIGYou restore Point1.Which files and registry keys are removed? To answer, select the appropriate options in the answer area.NOTE: Each correct selection is worth one point. References:https://www.maketecheasier.com/what-system-restore-can-and-cannot-do-to-your-windows-system/https://superuser.com/questions/343112/what-does-windows-system-restore-exactly-back-up-and-restoreQUESTION 155Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.A user named User1 has a computer named Computer1 that runs Windows 10. Computer1 is joined to an Azure Active Directory (Azure AD) tenant named contoso.com. User1 joins Computer1 to contoso.com by using user1@contoso.com.Computer1 contains a folder named Folder1. Folder1 is in drive C and is shared as Share1. Share1 has the permission shown in the following table.A user named User2 has a computer named Computer2 that runs Windows 10. User2 joins Computer2 to contoso.com by using user2@contoso.com.User2 attempts to access Share1 and receives the following error message: “The username or password is incorrect.” You need to ensure that User2 can connect to Share1.Solution: In Azure AD, you create a group named Group1 that contains User1 and User2. You grant Group1 Change access to Share1.Does this meet the goal?  Yes  No ExplanationReferences:https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/cc75417QUESTION 156You have a computer named Computer1 that runs Windows 10. Computer1 contains a folder named Data on drive C.The Advanced Security Settings for the Data folder are shown in the exhibit. (Click the Exhibit tab.)You share C:Data as shown in the following table.User1 is a member of the Users group.Administrators are assigned Full control NTFS permissions to C:Data.For each of the following statements, select Yes if the statement is true. Otherwise, select No.NOTE: Each correct selection is worth one point. QUESTION 157You have the computers shown in the following table.You need to identify which computers support the features.BitLocker Drive Encryption (BitLocker)Microsoft Application Virtualization (App-V)Which computers support the features? To answer, select the appropriate options in the answer area.NOTE: Each correct selection is worth one point. Reference:https://www.microsoft.com/en-us/windowsforbusiness/compare Loading … MD-100 Dumps 100 Pass Guarantee With Latest Demo: https://www.examslabs.com/Microsoft/Windows-10/best-MD-100-exam-dumps.html --------------------------------------------------- Images: https://blog.examslabs.com/wp-content/plugins/watu/loading.gif https://blog.examslabs.com/wp-content/plugins/watu/loading.gif --------------------------------------------------- --------------------------------------------------- Post date: 2023-04-08 11:48:02 Post date GMT: 2023-04-08 11:48:02 Post modified date: 2023-04-08 11:48:02 Post modified date GMT: 2023-04-08 11:48:02