Microsoft MD-100 Testing Material 2021

Exam Code: MD-100 (Practice Exam Latest Test Questions VCE PDF)
Exam Name: Windows 10
Certification Provider: Microsoft
Free Today! Guaranteed Training- Pass MD-100 Exam.

NEW QUESTION 1

You have a computer named LON-CL1.Adatum.com that runs Windows 10.
From Event Viewer, you create a custom view named View1 that has the following filter:
MD-100 dumps exhibit User: User1
MD-100 dumps exhibit Logged: Any time
MD-100 dumps exhibit Event logs: System
MD-100 dumps exhibit Computer: LON-CL1
MD-100 dumps exhibit Event IDs: 10000 – 11000
MD-100 dumps exhibit Event level: Error, Verbose
You open Event Viewer and discover the event shown in the exhibit. (Click the Exhibit tab.)
MD-100 dumps exhibit
The event does not appear in View1.
You need to ensure that the event appears in View1. What should you do?

  • A. Add a Task Category setting to the filter.
  • B. Add the computer account to the Event Log Readers group.
  • C. Create an event subscription.
  • D. Modify the Computer setting in the filter.

Answer: A

Explanation:
References:
https://www.techrepublic.com/article/how-to-use-custom-views-in-windows-10s-event-viewer/

NEW QUESTION 2

You have a Microsoft Azure Active Directory (Azure AD) tenant named contoso.com that contain the users shown in the following table.
MD-100 dumps exhibit
You have a computer named Computer1 that runs Windows 10.
MD-100 dumps exhibit
User1 joins Computer1 to Azure AD by using user1@contoso.com.
For each of the following statements, select Yes if the statement is true. Otherwise, select No. NOTE: Each correct selection is worth one point.
MD-100 dumps exhibit

  • A. Mastered
  • B. Not Mastered

Answer: A

Explanation:
MD-100 dumps exhibit

NEW QUESTION 3

You have a computer named Computer1 that runs Windows 7. Computer1 has a local user named User1 who has a customized profile.
On Computer1, you perform a clean installation of Windows 10 without formatting the drives. You need to migrate the settings of User1 from Windows7 to Windows 10.
Which two actions should you perform? To answer, drag the appropriate actions to the correct targets. Each action may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.
NOTE: Each correct selection is worth one point.
MD-100 dumps exhibit

  • A. Mastered
  • B. Not Mastered

Answer: A

Explanation:
References:
https://docs.microsoft.com/en-us/windows/deployment/usmt/usmt-how-it-works

NEW QUESTION 4

Your company has an isolated network used for testing. The network contains 20 computers that run Windows 10. The computers are in a workgroup. During testing, the computers must remain in the workgroup.
You discover that none of the computers are activated.
You need to recommend a solution to activate the computers without connecting the network to the Internet. What should you include in the recommendation?

  • A. Volume Activation Management Tool (VAMT)
  • B. Key Management Service (KMS)
  • C. Active Directory-based activation
  • D. the Get-WindowsDeveloperLicense cmdlet

Answer: B

Explanation:
References:
https://docs.microsoft.com/en-us/windows/deployment/volume-activation/activate-using-key-management-servi

NEW QUESTION 5
ComputerA connects to a manufacturing system and is business critical. All the other computers are joined to the domain and run the Semi-Annual Channel version of Windows 10.
In the domain, you create four groups named Group1, Group2, Group3, and Group4. Computer2 has the local Group Policy settings shown in the following table.
MD-100 dumps exhibit
The computers are updated by using Windows Update for Business. The domain has the users shown in the following table.
MD-100 dumps exhibit
Computer1 has the local users shown in the following table.
MD-100 dumps exhibit
Requirements Planned Changes
Contoso plans to purchase computers preinstalled with Windows 10 Pro for all the San Diego office users.
Technical requirements
Contoso identifies the following technical requirements:
MD-100 dumps exhibit The computers in the San Diego office must be upgraded automatically to Windows 10 Enterprise and must be joined to Azure AD the first time a user starts each new computer. End users must not be required to accept the End User License Agreement (EULA).
MD-100 dumps exhibit Helpdesk users must be able to troubleshoot Group Policy object (GPO) processing on the Windows 10 computers. The helpdesk users must be able to identify which Group Policies are applied to the computers.
MD-100 dumps exhibit Users in the HR department must be able to view the list of files in a folder named D:Reports on Computer3.
MD-100 dumps exhibit ComputerA must be configured to have an Encrypting File System (EFS) recovery agent.
MD-100 dumps exhibit Quality update installations must be deferred as long as possible on ComputerA.
MD-100 dumps exhibit Users in the IT department must use dynamic look on their primary device.
MD-100 dumps exhibit User6 must be able to connect to Computer2 by using Remote Desktop.
MD-100 dumps exhibit The principle of least privilege must be used whenever possible.
MD-100 dumps exhibit Administrative effort must be minimized whenever possible.
MD-100 dumps exhibit Assigned access must be configured on Computer1.
6.
You need to meet the technical requirements for EFS on ComputerA. What should you do?

  • A. Run certutil.exe, and then add a certificate to the local computer certificate store.
  • B. Run cipher.exe, and then add a certificate to the local computer certificate store.
  • C. Run cipher.exe, and then add a certificate to the local Group Policy.
  • D. Run certutil.exe, and then add a certificate to the local Group Policy.

Answer: B

Explanation:
References:
https://www.online-tech-tips.com/computer-tips/set-file-folder-permissions-windows/
9. - (Exam Topic 2)
You need to meet the technical requirements for the helpdesk users.
What should you do? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point.
MD-100 dumps exhibit
Answer:
MD-100 dumps exhibit
10. - (Exam Topic 2)
You need to meet the technical requirement for User6. What should you do?
A. Add User6 to the Remote Desktop Users group in the domain.
B. Remove User6 from Group2 in the domain.
C. Add User6 to the Remote Desktop Users group on Computer2.
D. And User6 to the Administrators group on Computer2.
Answer: B

NEW QUESTION 6

Your network contains an Active Directory domain. The domain contains 1,000 computers that run Windows 10.
You discover that when users are on their lock screen, they see a different background image every day, along with tips for using different features in Windows 10.
You need to disable the tips and the daily background image for all the Windows 10 computers. Which Group Policy settings should you modify?

  • A. Turn off the Windows Welcome Experience
  • B. Turn off Windows Spotlight on Settings
  • C. Do not suggest third-party content in Windows spotlight
  • D. Turn off all Windows spotlight features

Answer: D

Explanation:
References:
https://docs.microsoft.com/en-us/windows/configuration/windows-spotlight

NEW QUESTION 7

You have 20 computers that run Windows 10.
You configure all the computers to forward all the events from all the logs to a computer named Computer1 that runs Windows 10.
When you sign in to Computer1, you cannot see any security events from other computers. You can see all the other forwarded events from the other computers.
You need to ensure that the security events are forwarded to Computer1. What should you do?

  • A. On each computer, run wecutil ac /q.
  • B. On each computer, add the NETWORK SERVICE account to the Event Log Readers group.
  • C. On each computer, run winrm qc –q.
  • D. On Computer1, add the account of Computer1 to the Event Log Readers group.

Answer: D

Explanation:
References:
https://docs.microsoft.com/en-us/windows/security/threat-protection/use-windows-event-forwarding-to-assistin-

NEW QUESTION 8

You have several computers that run Windows 10. The computers are in a workgroup. You need to prevent users from using Microsoft Store apps on their computer.
What are two possible ways to achieve the goal? Each correct answer presents part of the solution. NOTE: Each correct selection is worth one point.

  • A. From Security Settings in the local Group Policy, configure Security Options.
  • B. From Administrative Templates in the local Group Policy, configure the Store settings.
  • C. From Security Settings in the local Group Policy, configure Software Restriction Policies.
  • D. From Security Settings in the local Group Policy, configure Application Control Policies.

Answer: BD

Explanation:
References:
https://www.techrepublic.com/article/how-to-manage-your-organizations-microsoft-store-group-policy/

NEW QUESTION 9

You have a computer named Computer1 that runs Windows 10. Computer1 contains a folder named Data on drive C. The Advanced Security Settings for the Data folder are shown in the exhibit. (Click the Exhibit tab.)
You share C:Data as shown in the following table. User1 is a member of the Users group.
Administrators are assigned Full control NTFS permissions to C:Data.
For each of the following statements, select Yes if the statement is true. Otherwise, select No. NOTE: Each correct selection is worth one point.
MD-100 dumps exhibit

  • A. Mastered
  • B. Not Mastered

Answer: A

Explanation:
MD-100 dumps exhibit

NEW QUESTION 10

You have a computer named Computer1 that runs Windows 10. Computer1 is in a workgroup. Computer1 contains the folders shown in the following table.
MD-100 dumps exhibit
On Computer1, you create the users shown in the following table.
MD-100 dumps exhibit
User1 encrypts a file named File1.txt that is in a folder named C:Folder1.
What is the effect of the configuration? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point.
MD-100 dumps exhibit

  • A. Mastered
  • B. Not Mastered

Answer: A

Explanation:
References:
https://support.microsoft.com/en-za/help/310316/how-permissions-are-handled-when-you-copy-and-move-files-

NEW QUESTION 11

You need to recommend a solution to configure the employee VPN connections. What should you include in the recommendation?

  • A. Remote Access Management Console
  • B. Group Policy Management Console (GPMC)
  • C. Connection Manager Administration Kit (CMAK)
  • D. Microsoft Intune

Answer: D

Explanation:
References:
https://docs.microsoft.com/en-us/windows-server/remote/remote-access/vpn/always-on-vpn/deploy/vpn-deploy-

NEW QUESTION 12

You have a computer named Computer1 that runs Windows 10 and contains the following files:
MD-100 dumps exhibit C:Folder1File1.bat
MD-100 dumps exhibit C:Folder1File1.exe
MD-100 dumps exhibit C:Folder1File1.cmd
A user named User1 is assigned Read & execute to all the files. Computer1 is configured as shown in the exhibit.
MD-100 dumps exhibit
Use the drop-down menus to select the answer choice that completes each statement based on the information presented in the graphic.
NOTE: Each correct selection is worth one point.
MD-100 dumps exhibit

  • A. Mastered
  • B. Not Mastered

Answer: A

Explanation:
References:
https://stackoverflow.com/questions/148968/windows-batch-files-bat-vs-cmd

NEW QUESTION 13

Your network contains an Active Directory forest. The forest contains a root domain named contoso.com and a child domain named corp.contoso.com.
You have a computer named Computer1 that runs Windows 10. Computer1 is joined to the corp.contoso.com domain.
Computer1 contains a folder named Folder1. In the Security settings of Folder1, Everyone is assigned the Full control permissions.
On Computer1, you share Folder1 as Share1 and assign the Read permissions for Share1 to the Users group. For each of the following statements, select Yes if the statement is true. Otherwise, select No.
NOTE: Each correct selection is worth one point.
MD-100 dumps exhibit

  • A. Mastered
  • B. Not Mastered

Answer: A

Explanation:
References:
https://www.techrepublic.com/article/learn-the-basic-differences-between-share-and-ntfs-permissions/

NEW QUESTION 14

You have 15 computers that run Windows 10. Each computer has two network interfaces named Interface1 and Interface2.
You need to ensure that network traffic uses Interface1, unless Interface1 is unavailable. What should you do?

  • A. Run the Set-NetIPInterface –InterfaceAlias Interface1 –InterfaceMetric 1 command.
  • B. Run the Set-NetAdapterBinding –Name Interface2 –Enabled $true –ComponentID ms_tcpip – ThrottleLimit 0 command.
  • C. Set a static IP address on Interface 1.
  • D. From Network Connections in Control Pane, modify the Provider Order.

Answer: A

Explanation:
References:
https://tradingtechnologies.atlassian.net/wiki/spaces/KB/pages/27439127/How+to+Change+Network+Adapter+ https://docs.microsoft.com/en-us/powershell/module/nettcpip/set-netipinterface?view=win10-ps

NEW QUESTION 15

Your network contains an Active Directory domain. The domain contains a user named Admin1. All computers run Windows 10.
You enable Windows PowerShell remoting on the computers.
You need to ensure that Admin1 can establish remote PowerShell connections to the computers. The solution must use the principle of least privilege.
To which group should you add Admin1?

  • A. Access Control Assistance Operators
  • B. Power Users
  • C. Remote Desktop Users
  • D. Remote Management Users

Answer: D

Explanation:
References:
https://4sysops.com/wiki/enable-powershell-remoting/

NEW QUESTION 16

You need to implement a solution to configure the contractors’ computers.
What should you do? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point.
MD-100 dumps exhibit

  • A. Mastered
  • B. Not Mastered

Answer: A

Explanation:
References:
https://docs.microsoft.com/en-us/windows/configuration/provisioning-packages/provisioning-install-icd

NEW QUESTION 17

A user named User1 has a computer named Computer1 that runs Windows 10.
User1 connects to a Microsoft Azure virtual machine named VM1 by using Remote Desktop. User1 creates a VPN connection to a partner organization.
When the VPN connection is established, User1 cannot connect to VM1. When User1 disconnects from the VPN, the user can connect to VM1.
You need to ensure that User1 can connect to VM1 while connected to the VPN. What should you do?

  • A. From the proxy settings, add the IP address of VM1 to the bypass list to bypass the proxy.
  • B. From the properties of VPN1, clear the Use default gateway on remote network check box.
  • C. From the properties of the Remote Desktop connection to VM1, specify a Remote Desktop Gateway (RDGateway).
  • D. From the properties of VPN1, configure a static default gateway address.

Answer: B

Explanation:
References:
https://www.stevejenkins.com/blog/2010/01/using-the-local-default-gateway-with-a-windows-vpn-connection/

NEW QUESTION 18

You have a computer that runs Windows 10.
From the Settings app, you view the connection properties shown in the following exhibit.
MD-100 dumps exhibit
Use the drop-down menus to select the answer choice that completes each statement based on the information presented in the graphic.
NOTE: Each correct selection is worth one point.
MD-100 dumps exhibit

  • A. Mastered
  • B. Not Mastered

Answer: A

Explanation:
MD-100 dumps exhibit

NEW QUESTION 19

You have 200 computers that run Windows 10 and are joined to an Active Directory domain.
You need to enable Windows Remote Management (WinRM) on all the computers by using Group Policy. Which three actions should you perform? Each correct answer presents part of the solution.
NOTE: Each correct selection is worth one point.

  • A. Set the Startup Type of the Windows Remote Management (WS-Management) service to Automatic.
  • B. Enable the Windows Firewall: Allow inbound remote administration exception setting.
  • C. Enable the Allow remote server management through WinRM setting.
  • D. Enable the Windows Firewall: Allow inbound Remote Desktop exceptions setting.
  • E. Enable the Allow Remote Shell access setting.
  • F. Set the Startup Type of the Remote Registry service to Automatic.

Answer: ACD

Explanation:
References:
http://www.mustbegeek.com/how-to-enable-winrm-via-group-policy/

NEW QUESTION 20

You have a computer named Computer 1 that runs Windows 10.
You turn on System Protection and create a restore point named Point1. You perform the following changes:
MD-100 dumps exhibit Add four files named File1.txt, File2.dll, File3.sys, and File4.exe to the desktop.
Run a configuration script that adds the following four registry keys:
- Key1 to HKEY_CURRENT_USER
- Key2 to HKEY_CLASSES_ROOT
- Key3 to HKEY_LOCAL_MACHINESYSTEM
- Key4 to HKEY_CURRENT_CONFIG
You restore Point1.
Which files and registry keys are removed? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point.
MD-100 dumps exhibit

  • A. Mastered
  • B. Not Mastered

Answer: A

Explanation:
References:
https://www.maketecheasier.com/what-system-restore-can-and-cannot-do-to-your-windows-system/ https://superuser.com/questions/343112/what-does-windows-system-restore-exactly-back-up-and-restore

NEW QUESTION 21

Your company purchases 20 laptops that use a new hardware platform. In a test environment, you deploy Windows 10 to the new laptops. Some laptops frequently generate stop errors.
You need to identify the cause of the issue. What should you use?

  • A. Reliability Monitor
  • B. Task Manager
  • C. System Configuration
  • D. Performance Monitor

Answer: A

Explanation:
References:
https://lifehacker.com/how-to-troubleshoot-windows-10-with-reliability-monitor-1745624446

NEW QUESTION 22
......

Recommend!! Get the Full MD-100 dumps in VCE and PDF From Certifytools, Welcome to Download: https://www.certifytools.com/MD-100-exam.html (New 83 Q&As Version)