19 May, 2023
How Many Questions Of MD-100 Free Samples
Realistic of MD-100 exam question materials and prep for Microsoft certification for consumer, Real Success Guaranteed with Updated MD-100 pdf dumps vce Materials. 100% PASS Windows 10 exam Today!
Online Microsoft MD-100 free dumps demo Below:
Question 1
- (Exam Topic 3)
You have a computer that runs Windows 10. The computer is in a workgroup. The computer is used to provide visitors with access to the Internet.
You need to configure the computer to meet the following requirements:
Always sign in automatically as User1.
Start an application named App1.exe at sign-in.
What should you use to meet each requirement? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point.
Solution:
References:
http://www.itexpertmag.com/server/complete-manageability-at-no-extra-cost
Does this meet the goal?
You have a computer that runs Windows 10. The computer is in a workgroup. The computer is used to provide visitors with access to the Internet.
You need to configure the computer to meet the following requirements:
Always sign in automatically as User1.
Start an application named App1.exe at sign-in.
What should you use to meet each requirement? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point.
Solution:
References:
http://www.itexpertmag.com/server/complete-manageability-at-no-extra-cost
Does this meet the goal?
Question 2
- (Exam Topic 3)
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
You have a computer named Computer1 that runs Windows 10. The computer contains a folder. The folder contains sensitive data.
You need to log which user reads the contents of the folder and modifies and deletes files in the folder. Solution: From the properties of the folder, you configure the Auditing settings and from the Audit Policy in
the local Group Policy, you configure Audit directory service access.
Does this meet the goal?
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
You have a computer named Computer1 that runs Windows 10. The computer contains a folder. The folder contains sensitive data.
You need to log which user reads the contents of the folder and modifies and deletes files in the folder. Solution: From the properties of the folder, you configure the Auditing settings and from the Audit Policy in
the local Group Policy, you configure Audit directory service access.
Does this meet the goal?
Question 3
- (Exam Topic 3)
You have a computer named Computer1 that runs Windows 10 and has an application named App1. You need to use Performance Monitor to collect data about the processor utilization of App1. Which performance object should you monitor?
You have a computer named Computer1 that runs Windows 10 and has an application named App1. You need to use Performance Monitor to collect data about the processor utilization of App1. Which performance object should you monitor?
Question 4
- (Exam Topic 1)
You need to recommend a solution to configure the employee VPN connections. What should you include in the recommendation?
You need to recommend a solution to configure the employee VPN connections. What should you include in the recommendation?
Question 5
- (Exam Topic 3)
Your network contains an Active Directory domain named contoso.com. The domain contains named Computer1 that runs Windows 10.
On Computer1, you create an NTFS folder and assign Full control permissions to Everyone. You share the folder as Share1 and assign the permissions shown in the following table.
When accessing Share1, which two actions can be performed by User1 but not by User2? Each correct answer presents part of the solution.
NOTE: Each correct selection is worth one point.
Your network contains an Active Directory domain named contoso.com. The domain contains named Computer1 that runs Windows 10.
On Computer1, you create an NTFS folder and assign Full control permissions to Everyone. You share the folder as Share1 and assign the permissions shown in the following table.
When accessing Share1, which two actions can be performed by User1 but not by User2? Each correct answer presents part of the solution.
NOTE: Each correct selection is worth one point.
Question 6
- (Exam Topic 3)
Your company purchases 20 laptops that use a new hardware platform. In a test environment, you deploy Windows 10 to the new laptops. Some laptops frequently generate stop errors.
You need to identify the cause of the issue. What should you use?
Your company purchases 20 laptops that use a new hardware platform. In a test environment, you deploy Windows 10 to the new laptops. Some laptops frequently generate stop errors.
You need to identify the cause of the issue. What should you use?
Question 7
- (Exam Topic 3)
You have several computers that run Windows 10. The computers are in a workgroup and have BitLocker Drive Encryption (BitLocker) enabled.
You join the computers to Microsoft Azure Active Directory (Azure AD).
You need to ensure that you can recover the BitLocker recovery key for the computers from Azure AD. What should you do first?
You have several computers that run Windows 10. The computers are in a workgroup and have BitLocker Drive Encryption (BitLocker) enabled.
You join the computers to Microsoft Azure Active Directory (Azure AD).
You need to ensure that you can recover the BitLocker recovery key for the computers from Azure AD. What should you do first?
Question 8
- (Exam Topic 3)
You have a computer that runs Windows 10. You can start the computer but cannot sign in.
You need to start the computer into the Windows Recovery Environment (WinRE). What should you do?
You have a computer that runs Windows 10. You can start the computer but cannot sign in.
You need to start the computer into the Windows Recovery Environment (WinRE). What should you do?
Question 9
- (Exam Topic 3)
You have a computer that runs Windows 10.
From the Settings app, you view the connection properties shown in the following exhibit.
Use the drop-down menus to select the answer choice that completes each statement based on the information presented in the graphic.
NOTE: Each correct selection is worth one point.
Solution:
Does this meet the goal?
You have a computer that runs Windows 10.
From the Settings app, you view the connection properties shown in the following exhibit.
Use the drop-down menus to select the answer choice that completes each statement based on the information presented in the graphic.
NOTE: Each correct selection is worth one point.
Solution:
Does this meet the goal?
Question 10
- (Exam Topic 3)
A user named User1 has a computer named Computer1 that runs Windows 10.
User1 connects to a Microsoft Azure virtual machine named VM1 by using Remote Desktop. User1 creates a VPN connection to a partner organization.
When the VPN connection is established, User1 cannot connect to VM1. When User1 disconnects from the VPN, the user can connect to VM1.
You need to ensure that User1 can connect to VM1 while connected to the VPN. What should you do?
A user named User1 has a computer named Computer1 that runs Windows 10.
User1 connects to a Microsoft Azure virtual machine named VM1 by using Remote Desktop. User1 creates a VPN connection to a partner organization.
When the VPN connection is established, User1 cannot connect to VM1. When User1 disconnects from the VPN, the user can connect to VM1.
You need to ensure that User1 can connect to VM1 while connected to the VPN. What should you do?
Question 11
- (Exam Topic 3)
You have a computer named Computer 1 that runs Windows 10.
You turn on System Protection and create a restore point named Point1. You perform the following changes:
Add four files named File1.txt, File2.dll, File3.sys, and File4.exe to the desktop.
Run a configuration script that adds the following four registry keys:
- Key1 to HKEY_CURRENT_USER
- Key2 to HKEY_CLASSES_ROOT
- Key3 to HKEY_LOCAL_MACHINESYSTEM
- Key4 to HKEY_CURRENT_CONFIG
You restore Point1.
Which files and registry keys are removed? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point.
Solution:
References:
https://www.maketecheasier.com/what-system-restore-can-and-cannot-do-to-your-windows-system/ https://superuser.com/questions/343112/what-does-windows-system-restore-exactly-back-up-and-restore
Does this meet the goal?
You have a computer named Computer 1 that runs Windows 10.
You turn on System Protection and create a restore point named Point1. You perform the following changes:
Add four files named File1.txt, File2.dll, File3.sys, and File4.exe to the desktop.
Run a configuration script that adds the following four registry keys:
- Key1 to HKEY_CURRENT_USER
- Key2 to HKEY_CLASSES_ROOT
- Key3 to HKEY_LOCAL_MACHINESYSTEM
- Key4 to HKEY_CURRENT_CONFIG
You restore Point1.
Which files and registry keys are removed? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point.
Solution:
References:
https://www.maketecheasier.com/what-system-restore-can-and-cannot-do-to-your-windows-system/ https://superuser.com/questions/343112/what-does-windows-system-restore-exactly-back-up-and-restore
Does this meet the goal?
Question 12
- (Exam Topic 3)
You have a computer named Computer1 that runs Windows 10.
On Computer1, you create the local users shown in the following table.
Which three user profiles will persist after each user signs out? Each correct answer presents part of the solution.
NOTE: Each correct selection is worth one point.
You have a computer named Computer1 that runs Windows 10.
On Computer1, you create the local users shown in the following table.
Which three user profiles will persist after each user signs out? Each correct answer presents part of the solution.
NOTE: Each correct selection is worth one point.
Question 13
ComputerA connects to a manufacturing system and is business critical. All the other computers are joined to the domain and run the Semi-Annual Channel version of Windows 10.
In the domain, you create four groups named Group1, Group2, Group3, and Group4. Computer2 has the local Group Policy settings shown in the following table.
The computers are updated by using Windows Update for Business. The domain has the users shown in the following table.
Computer1 has the local users shown in the following table.
Requirements Planned Changes
Contoso plans to purchase computers preinstalled with Windows 10 Pro for all the San Diego office users.
Technical requirements
Contoso identifies the following technical requirements:
The computers in the San Diego office must be upgraded automatically to Windows 10 Enterprise and must be joined to Azure AD the first time a user starts each new computer. End users must not be required to accept the End User License Agreement (EULA).
Helpdesk users must be able to troubleshoot Group Policy object (GPO) processing on the Windows 10 computers. The helpdesk users must be able to identify which Group Policies are applied to the computers.
Users in the HR department must be able to view the list of files in a folder named D:Reports on Computer3.
ComputerA must be configured to have an Encrypting File System (EFS) recovery agent.
Quality update installations must be deferred as long as possible on ComputerA.
Users in the IT department must use dynamic look on their primary device.
User6 must be able to connect to Computer2 by using Remote Desktop.
The principle of least privilege must be used whenever possible.
Administrative effort must be minimized whenever possible.
Assigned access must be configured on Computer1.
6. - (Exam Topic 2)
You need to meet the technical requirements for EFS on ComputerA. What should you do?
In the domain, you create four groups named Group1, Group2, Group3, and Group4. Computer2 has the local Group Policy settings shown in the following table.
The computers are updated by using Windows Update for Business. The domain has the users shown in the following table.
Computer1 has the local users shown in the following table.
Requirements Planned Changes
Contoso plans to purchase computers preinstalled with Windows 10 Pro for all the San Diego office users.
Technical requirements
Contoso identifies the following technical requirements:
The computers in the San Diego office must be upgraded automatically to Windows 10 Enterprise and must be joined to Azure AD the first time a user starts each new computer. End users must not be required to accept the End User License Agreement (EULA).
Helpdesk users must be able to troubleshoot Group Policy object (GPO) processing on the Windows 10 computers. The helpdesk users must be able to identify which Group Policies are applied to the computers.
Users in the HR department must be able to view the list of files in a folder named D:Reports on Computer3.
ComputerA must be configured to have an Encrypting File System (EFS) recovery agent.
Quality update installations must be deferred as long as possible on ComputerA.
Users in the IT department must use dynamic look on their primary device.
User6 must be able to connect to Computer2 by using Remote Desktop.
The principle of least privilege must be used whenever possible.
Administrative effort must be minimized whenever possible.
Assigned access must be configured on Computer1.
6. - (Exam Topic 2)
You need to meet the technical requirements for EFS on ComputerA. What should you do?
Question 14
- (Exam Topic 3)
You have 20 computers that run Windows 10.
You configure all the computers to forward all the events from all the logs to a computer named Computer1 that runs Windows 10.
When you sign in to Computer1, you cannot see any security events from other computers. You can see all the other forwarded events from the other computers.
You need to ensure that the security events are forwarded to Computer1. What should you do?
You have 20 computers that run Windows 10.
You configure all the computers to forward all the events from all the logs to a computer named Computer1 that runs Windows 10.
When you sign in to Computer1, you cannot see any security events from other computers. You can see all the other forwarded events from the other computers.
You need to ensure that the security events are forwarded to Computer1. What should you do?