This page was exported from Free valid test braindumps [ http://free.validbraindumps.com ] Export date:Sat Apr 5 21:32:33 2025 / +0000 GMT ___________________________________________________ Title: [Mar 11, 2023] Latest Windows 10 MD-100 Actual Free Exam Questions [Q10-Q29] --------------------------------------------------- [Mar 11, 2023] Latest Windows 10 MD-100 Actual Free Exam Questions Windows 10 MD-100 Dumps Updated Practice Test and 325 unique questions Prerequisites As a potential applicant, you should be familiar with Microsoft 365 workloads and know how to work with them. This means that you need to have some hands-on expertise and ability to configure, deploy, and maintain technologies and devices working on Windows 10 and non-Windows environments. Besides that, it is important to have knowledge of how to collaborate with the Microsoft 365 Enterprise Administrators to meet the needs of an organization by designing and implementing the working device strategy. These specialists should also know how to manage apps, updates, policies, access, and identity.   NO.10 Your company has an on-premises network that contains an Active Directory domain. The domain is synced to Microsoft Azure Active Directory (Azure AD). All computers in the domain run Windows 10 Enterprise.You have a computer named Computer1 that has a folder named Folder1.You must provide users in group named Group1 with the ability to view the list of files in Folder1. Your solution must ensure that the principle of least privilege is maintained.What should you do?  Assign the Full control permissions for the Folder1 folder to Group1.  Assign the Read permissions for the Folder1 folder to Group1.  Assign the List folder permissions for the Folder1 folder to Group1.  Assign the Take ownership permissions for the Folder1 folder to Group1. Reference:https://www.online-tech-tips.com/computer-tips/set-file-folder-permissions-windows/NO.11 Your domain contains named Computer named Computer1 that runs Windows 10. Computer1 does not have a TPM.You need to be able to encrypt the C drive by using Bitlocker Drive Encryption (BitLocker). The solution must ensure that the recovery key is stored in Active Directory.Which two Group Policy settings should you configure? To answer, select the appropriate settings in the answer area.NOTE: Each correct selection is worth one point. Reference:https://docs.microsoft.com/en-us/windows/security/information-protection/bitlocker/bitlocker-group-policy-settings#bkmk-rec1NO.12 You need to reduce the amount of time it takes to restart Application1 when the application crashes.What should you include in the solution? To answer, select the appropriate options in the answer area.NOTE: Each correct selection is worth one point. Reference:https://www.howto-connect.com/how-to-attach-a-task-to-this-event-in-event-viewer-in-windows-10/ Overview Contoso, Ltd. is a consulting company that has a main office in Montreal and two branch offices in Seattle and New York.Contoso has IT, human resources (HR), and finance departments.Contoso recently opened a new branch office in San Diego. All the users in the San Diego office work from home.Topic 3, Litware incGeneral OverviewLitware, Inc. is a consulting company that has a main office in Montreal and branch offices in Seattle and New York.EnvironmentExisting EnvironmentThe network contains an on-premises Active Directory domain named litware.com. The domain contains the computers shown in the following table.The network that uses 192.168.10.0/24 connects to the internet by using a Network Address Translation (NAT) device.Windows Admin Center is installed on Server1.The domain contains the groups shown in the following table.The domain contains the users shown in the following table.Computer1 ConfigurationComputer1 contains the local user accounts shown in the following table.Computer1 contains a folder named D:Folder1 that has permission inheritance disabled.Computer1 contains a file named D:Folder1Report.docx that has the permissions shown in the following table.D:Folder1Report.docx has auditing configured as shown in the following table.The Local Computer Policy for Computer1 is configured as shown in the following table.Windows Defender Firewall for Computer1 has the rules shown in the following table.Computer2 ConfigurationComputer2 contains the local user accounts shown in the following table.Group1 and Group2 are members of the Remote Desktop Users group.The Local Computer Policy for Computer2 is configured as shown in the following table.Windows Defender Firewall for Computer2 has the rules shown in the following table.Computer3 ConfigurationComputer3 contains the local user accounts shown in the following table.Windows Defender Firewall for Computer3 has the rules shown in the following table.Requirements and Planned ChangesPlanned ChangesLitware plans to make the following changes on Computer1:Grant User1 Allow Full control permissions to D:Folder1Report.docx.Grant User2 Allow Full control permissions to D:Folder1Report.docx.Grant User3 Allow Full control permissions to D:Folder1.Technical RequirementsLitware identifies the following technical requirements:Configure custom Visual Effect performance settings for Computer1.Manage Computer2 by using Windows Admin Center.Minimize administrative effort.Delivery Optimization on the computers that run Windows 10 must be configured to meet the following requirements:Content must be downloaded only from an original source.Downloading content from peer cache clients must be prevented.Downloads must be optimized by using the Delivery Optimization cloud service.NO.13 You have a computer named Computer 1 that runs Windows 10.You turn on System Protection and create a restore point named Point1.You perform the following changes:* Add four files named File1.txt, File2.dll, File3.sys, and File4.exe to the desktop.Run a configuration script that adds the following four registry keys:– Key1 to HKEY_CURRENT_USER– Key2 to HKEY_CLASSES_ROOT– Key3 to HKEY_LOCAL_MACHINESYSTEM– Key4 to HKEY_CURRENT_CONFIGYou restore Point1.Which files and registry keys are removed? To answer, select the appropriate options in the answer area.NOTE: Each correct selection is worth one point. ExplanationReferences:https://www.maketecheasier.com/what-system-restore-can-and-cannot-do-to-your-windows-system/https://superuser.com/questions/343112/what-does-windows-system-restore-exactly-back-up-and-restoreNO.14 You have a computer named Computer1 that runs Windows 10 and is joined to an Active Directory domain named adatum.com.A user named Admin1 signs in to Computer1 and runs the whoami command as shown in the following exhibit.Use the drop-down menus to select the answer choice that completes each statement based on the information presented in the graphic.NOTE: Each correct selection is worth one point. NO.15 You have a computer named Computer1 that runs Windows 10. Computer1 is in a workgroup.Computer1 contains the local users shown in the following table.You create a folder named Folder1 that has the permissions shown in the following table.You create a file named File1.txt in Folder1 and allow Group2 Full control permissions to File1.txt.For each of the following statements, select Yes if the statement is true. Otherwise, select No.NOTE: Each correct selection is worth one point. Explanation:References:https://www.dell.com/support/article/za/en/zadhs1/sln156352/understanding-file-and-folder-permissions-in-windows?lang=enNO.16 You have the computer shown in the following table.You plan to configure deployment rings for Windows 10 quality and feature updates.What is the maximum number of days you can defer installing quality updates, and which computers support installing feature updates from Windows Update? To answer, select the appropriate options in the answer area.NOTE: Each correct selection is worth one point. Reference:https://docs.microsoft.com/en-us/windows/deployment/update/waas-configure-wufbNO.17 A user has a computer that runs Windows 10.The user has access to the following storage locations:A USB flash driveMicrosoft OneDriveOneDrive for BusinessA drive mapped to network shareA secondary partition on the system driveYou need to configure Back up using File History from the Settings app.Which two storage locations can you select by using File History? Each correct answer presents complete solution.NOTE: Each correct selection is worth one point.  The USB flash drive  OneDrive for Business  OneDrive  The drive mapped to a network share  The secondary partition on the system drive. NO.18 You have a computer named Computer1 that runs Windows 10. Computer1 has an IP address of 10.10.1.200 and a subnet mask of 255.255.255.0.You configure the proxy settings on Computer1 as shown in the following exhibit.Use the drop-down menus to select the answer choice that completes each statement based on the information presented in the graphic.NOTE: Each correct selection is worth one point. References:https://www.howtogeek.com/tips/how-to-set-your-proxy-settings-in-windows-8.1/NO.19 You are a network administrator at your company.The company uses an application that checks for network connectivity to a server by sending a ping request to the IPv6 address of the server replies, the application loads.A user cannot open the application.You manually send the ping request from the computer of the user and the server does not reply. You send the ping request from your computer and the server replies.You need to ensure that the ping request works from the user’s computer.Which Windows Defender firewall rule is a possible cause of the issue?  File and Printer Sharing (NB-Datagram-In)  File and Printer Sharing (Echo request ICMPv6-Out)  File and Printer Sharing (NB-Datagram-Out)  File and Printer Sharing (Echo Request ICMPv6-In) Topic 1, Contoso, LtdOverviewContoso, Ltd. is a consulting company that has a main office in Montreal and two branch offices in Seattle and New York.Contoso has IT, human resources (HR), and finance departments.Contoso recently opened a new branch office in San Diego. All the users in the San Diego office work from home.Existing environmentContoso uses Microsoft 365.The on-premises network contains an Active Directory domain named contoso.com. The domain is synced to Microsoft Azure Active Directory (Azure AD).All computers run Windows 10 Enterprise.You have four computers named Computer1, Computer2, Computer3, and ComputerA. ComputerA is in a workgroup on an isolated network segment and runs the Long Term Servicing Channel version of Windows10. ComputerA connects to a manufacturing system and is business critical. All the other computers are joined to the domain and run the Semi-Annual Channel version of Windows 10.In the domain, you create four groups named Group1, Group2, Group3, and Group4.Computer2 has the local Group Policy settings shown in the following table.The computers are updated by using Windows Update for Business.The domain has the users shown in the following table.Computer1 has the local users shown in the following table.RequirementsPlanned ChangesContoso plans to purchase computers preinstalled with Windows 10 Pro for all the San Diego office users.Technical requirementsContoso identifies the following technical requirements:The computers in the San Diego office must be upgraded automatically to Windows 10 Enterprise and must be joined to Azure AD the first time a user starts each new computer. End users must not be required to accept the End User License Agreement (EULA).Helpdesk users must be able to troubleshoot Group Policy object (GPO) processing on the Windows 10 computers. The helpdesk users must be able to identify which Group Policies are applied to the computers.Users in the HR department must be able to view the list of files in a folder named D:Reports on Computer3.ComputerA must be configured to have an Encrypting File System (EFS) recovery agent.Quality update installations must be deferred as long as possible on ComputerA.Users in the IT department must use dynamic look on their primary device.User6 must be able to connect to Computer2 by using Remote Desktop.The principle of least privilege must be used whenever possible.Administrative effort must be minimized whenever possible.Assigned access must be configured on Computer1.NO.20 Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.You manage devices that run Windows 10.Ten sales users will travel to a location that has limited bandwidth that is expensive. The sales users will be at the location for three weeks.You need to prevent all Windows updates from downloading for the duration of the trip. The solution must not prevent access to email and the Internet.Solution: From Network & Internet in the Settings app, you set the network connections as metered connections.Does this meet the goal?  Yes  No Reference:https://www.makeuseof.com/tag/5-ways-temporarily-turn-off-windows-update-windows-10/NO.21 You need to meet the technical requirements for EFS on ComputerA.What should you do?  Run certutil.exe, and then add a certificate to the local computer certificate store.  Run cipher.exe, and then add a certificate to the local computer certificate store.  Run cipher.exe, and then add a certificate to the local Group Policy.  Run certutil.exe, and then add a certificate to the local Group Policy. Explanation/Reference:References:https://docs.microsoft.com/en-us/windows/security/information-protection/windows-information-protection/ create-and-verify-an-efs-dra-certificate Manage Devices and Data Question Set 3NO.22 You have a workgroup computer named Computer1 that runs Windows 10 and has the users shown in the following table.User Account Control (UAC) on Computer1 is configured as shown in the following exhibit.For each of the following statements, select Yes if the statement is true. Otherwise, select No.NOTE: Each correct selection is worth one point. ExplanationBox 1: YesUser Account Control: Behavior of the elevation prompt for administrators in Admin Approval Mode is set to Prompt for consent When an operation requires elevation of privilege, the user is prompted to select either Permit or Deny. If the user selects Permit, the operation continues with the user’s highest available privilege.Box 2: YesUser1 is a member of Administrators group.User Account Control: Behavior of the elevation prompt for administrators in Admin Approval Mode is set to Prompt for consent When an operation requires elevation of privilege, the user is prompted to select either Permit or Deny. If the user selects Permit, the operation continues with the user’s highest available privilege.Box 3: YesUser Account Control: Behavior of the elevation prompt for standard users is set to Prompt for credentials (Default) When an operation requires elevation of privilege, the user is prompted to enter an administrative user name and password. If the user enters valid credentials, the operation continues with the applicable privilege.References:https://docs.microsoft.com/en-us/windows/security/identity-protection/user-account-control/user-account-controlNO.23 You have 20 computers that run Windows 10.You configure all the computers to forward all the events from all the logs to a computer named Computer1 that runs Windows 10.When you sign in to Computer1, you cannot see any security events from other computers. You can see all the other forwarded events from the other computers.You need to ensure that the security events are forwarded to Computer1.What should you do?  On each computer, run wecutil qc /q.  On each computer, add the NETWORK SERVICE account to the Event Log Readers group.  On each computer, run winrm qc -q.  On Computer1, add the account of Computer1 to the Event Log Readers group. Explanation/Reference:References:https://docs.microsoft.com/en-us/windows/security/threat-protection/use-windows-event-forwarding-to-assist- in-intrusion-detectionNO.24 Your network contains an Active Directory domain. The domain contains the computers shown in the following table.On which computers can you perform an in-place upgrade to Windows 10 Enterprise?  Computer3 only  Computed and Computer3 only  Computed only  Computed. Computed, and Computer3 References:https://docs.microsoft.com/en-us/windows/deployment/upgrade/windows-10-upgrade-pathshttps://docs.microsoft.com/en-us/windows/deployment/upgrade/windows-10-edition-upgradesNO.25 Your domain contains named Computer named Computer1 that runs Windows 10. Computer1 does not have a TPM.You need to be able to encrypt the C drive by using Bitlocker Drive Encryption (BitLocker). The solution must ensure that the recovery key is stored in Active Directory.Which two Group Policy settings should you configure? To answer, select the appropriate settings in the answer area.NOTE: Each correct selection is worth one point. Reference:https://docs.microsoft.com/en-us/windows/security/information-protection/bitlocker/bitlocker-group-policy-settings#bkmk-rec1NO.26 Your network contains an Active Directory domain named adatum.com. The domain contains two computers named Computer1 and Computer2 that run Windows 10.The domain contains the user accounts shown in the following table.Computer2 contains the local groups shown in the following table.The relevant user rights assignments for Computer2 are shown in the following table.For each of the following statements, select Yes if the statement is true. Otherwise, select No.NOTE: Each correct selection is worth one point. Explanation:Box 1: YesUser1 is an administrator and has the Allow log on through Remote Desktop Services.Box 2: NoUser2 is a member of Group2 which has the Deny log on through Remote Desktop Services.Box 3: YesUser3 is a member of the administrators group and has the Allow log on through Remote Desktop Services.Note: Deny permissions take precedence over Allow permissions. If a user belongs to two groups, and one of them has a specific permission set to Deny, that user is not able to perform tasks that require that permission even if they belong to a group that has that permission set to Allow.References:https://docs.microsoft.com/en-us/azure/devops/organizations/security/about-permissions?view=azure-devops&tabs=preview-page%2Ccurrent-pageNO.27 Your network contains an Active Directory domain named contoso.com. The domain contains two computers named Computer1 and Computer2 that run Windows 10 and are joined to the domain.On Computer1, you create an event subscription named Subscription1 for Computer2 as shown in the Subscription1 exhibit. (Click the Subcription1 tab.)Subscription1 is configured to use forwarded events as the destination log.On Computer1, you create a custom view named View1 as shown in the View1 exhibit. (Click the View1 tab.)For each of the following statements, select Yes if the statement is true. Otherwise, select No.NOTE: Each correct selection is worth one point. ExplanationNO.28 You have a workgroup computer named Computer1 that runs Windows 10 and has the users shown in the following table.User Account Control (UAC) on Computer1 is configured as shown in the following exhibit.For each of the following statements, select Yes if the statement is true. Otherwise, select No.NOTE: Each correct selection is worth one point. Reference:https://docs.microsoft.com/en-us/windows/security/identity-protection/user-account-control/user-account-control-security-policy-settingsNO.29 Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.A user named User1 has a computer named Computer1 that runs Windows 10. Computer1 is joined to an Azure Active Directory (Azure AD) tenant named contoso.com. User1 joins Computer1 to contoso.com by using user1@contoso.com.Computer1 contains a folder named Folder1. Folder1 is in drive C and is shared as Share1. Share1 has the permission shown in the following table.A user named User2 has a computer named Computer2 that runs Windows 10. User2 joins Computer2 to contoso.com by using user2@contoso.com.User2 attempts to access Share1 and receives the following error message: “The username or password is incorrect.” You need to ensure that User2 can connect to Share1.Solution: In Azure AD, you create a group named Group1 that contains User1 and User2. You grant Group1 Change access to Share1.Does this meet the goal?  Yes  No ExplanationReferences:https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/cc75417 Loading … Verified MD-100 dumps Q&As - 100% Pass from ValidBraindumps: https://www.validbraindumps.com/MD-100-exam-prep.html --------------------------------------------------- Images: https://free.validbraindumps.com/wp-content/plugins/watu/loading.gif https://free.validbraindumps.com/wp-content/plugins/watu/loading.gif --------------------------------------------------- --------------------------------------------------- Post date: 2023-03-11 12:13:13 Post date GMT: 2023-03-11 12:13:13 Post modified date: 2023-03-11 12:13:13 Post modified date GMT: 2023-03-11 12:13:13