This page was exported from Actual Test Materials [ http://blog.actualtests4sure.com ] Export date:Fri Nov 15 20:41:06 2024 / +0000 GMT ___________________________________________________ Title: MD-100 Dumps By Pros - 1st Attempt Guaranteed Success [Q35-Q52] --------------------------------------------------- MD-100 Dumps By Pros - 1st Attempt Guaranteed Success 100% Guarantee Download MD-100 Exam Dumps PDF Q&A Q35. Your domain contains named Computer named Computer1 that runs Windows 10. Computer1 does not have a TPM.You need to be able to encrypt the C drive by using Bitlocker Drive Encryption (BitLocker). The solution must ensure that the recovery key is stored in Active Directory.Which two Group Policy settings should you configure? To answer, select the appropriate settings in the answer area.NOTE: Each correct selection is worth one point. Reference:https://docs.microsoft.com/en-us/windows/security/information-protection/bitlocker/bitlocker-group-policy-settings#bkmk-rec1Q36. Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2016 and a computer named Computer1 that runs Windows 10.Server1 contains a share named Backup. All users can read and write data in Backup.On Monday at 13:00, you configure Backup and Restore (Windows 7) on Computer1 to use the following settings:* Backup Destination:Server1Backup* What do you want to back up?:Local Disk (D:), Include a system image of drives: System Reserved, (C:)* Schedule: Daily at 23:00You need to identify how many backups will be available on Thursday at 17:00.What should you identify? To answer, select the appropriate options in the answer area.NOTE: Each correct selection is worth one point. ExplanationReferences:https://www.windowscentral.com/how-make-full-backup-windows-10#create_system_image_windows10https://Q37. You are troubleshooting an issue that prevents you from installing Windows 10 updates.You discover that the issue relates to corrupt protected system files.You need to restore the corrupt system files.Which command should you run?  scanstate  sfc  chlcdslc  chkntfs Reference:https://support.microsoft.com/en-us/topic/use-the-system-file-checker-tool-to-repair-missing-or-corrupted-system-files-79aa86cb-ca52-166a-92a3-966e85d4094eQ38. Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.You have a computer that runs Windows 10. The computer contains a folder named D:Scripts. D:Scripts contains several PowerShell scripts.You need to ensure that you can run the PowerShell scripts without specifying the full path to the scripts. The solution must persist between PowerShell sessions.Solution: From PowerShell, you run $env:Path += “;d:scripts”.Does this meet the goal?  Yes  No Explanation/Reference:References:https://docs.microsoft.com/en-us/powershell/module/microsoft.powershell.core/about/ about_environment_variables?view=powershell-7Q39. Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.You have two computers named Computer1 and Computer2 that run Windows 10.You have an Azure Active Directory (Azure AD) user account named admin@contoso.com that is in the local Administrators group on each computer.You sign in to Computer1 by using admin@contoso.com.You need to ensure that you can use Event Viewer on Computer1 to connect to the event logs on Computer2.Solution: On Computer2, you create a Windows Defender Firewall rule that allows eventwr.exe.Does this meet the goal?  Yes  No Reference:https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/cc76643Q40. You have a computer named Computer1 that runs Windows 7. Computer1 has a local user named User1 who has a customized profile.On Computer1, you perform a clean installation of Windows 10 without formatting the drives.You need to migrate the settings of User1 from Windows7 to Windows 10.Which two actions should you perform? To answer, drag the appropriate actions to the correct targets. Each action may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.NOTE: Each correct selection is worth one point. ExplanationReferences:https://docs.microsoft.com/en-us/windows/deployment/usmt/usmt-how-it-worksQ41. You need to meet the technical requirements for the HR department users.Which permissions should you assign to the HR department users for the D:Reports folder? To answer, select the appropriate permissions in the answer area.NOTE: Each correct selection is worth one point. ExplanationReferences:https://www.online-tech-tips.com/computer-tips/set-file-folder-permissions-windows/Q42. You have the source files shown in the following table.You mount an image from Image1.wim to a folder named C:Mount.You need to add the French language pack to the mounted image.How should you complete the command? To answer, select the appropriate options in the answer area.NOTE: Each correct selection is worth one point. Reference:https://docs.microsoft.com/en-us/windows-hardware/manufacture/desktop/add-language-packs-to-windowsQ43. You have a computer named Computer1 that runs Windows 10. Computer1 contains a folder named Folder1.You need to log any users who take ownership of the files in Folder1.Which two actions should you perform? Each correct answer presents part of the solution.NOTE: Each correct selection is worth one point.  Modify the folder attributes of Folder1.  Modify the Advanced Security Settings for Folder1.  From a Group Policy object (GPO), configure the Audit Sensitive Privilege Use setting.  From a Group Policy object (GPO), configure the Audit File System setting.  Install the Remote Server Administration Tools (RSAT). Reference:https://docs.microsoft.com/en-us/windows/security/threat-protection/auditing/audit-sensitive-privilege-useQ44. You enable Windows PowerShell remoting on a computer that runs Windows 10.You need to limit which PowerShell cmdlets can be used in a remote session.Which three actions should you perform in sequence? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order. Explanation:References:https://www.petri.com/powershell-remoting-restricting-user-commandsQ45. Your network contains an Active Directory domain named adatum.com. The domain contains the users shown in the following table.The domain contains a computer named Computer1 that runs Windows10. Computer1 has a file named File1.txt that has the permissions shown in the exhibit. (Click the Exhibit tab.)For each of the following statements, select Yes if the statement is true. Otherwise, select No.NOTE: Each correct selection is worth one point. Q46. You have a computer named Computer1 that runs Windows 10 and is joined to an Active Directory domain named adatum.com.A user named Admin1 signs in to Computer1 and runs the whoami command as shown in the following exhibit.Use the drop-down menus to select the answer choice that completes each statement based on the information presented in the graphic.NOTE: Each correct selection is worth one point. ExplanationQ47. Your network contains an Active Directory domain. The domain contains the users shown in the following table.You have a server named Server1 that runs Windows Server 2019 and has the Windows Deployment Services role installed. Server1 contains an x86 boot image and three Windows 10 install images. The install images are shown in the following table.You purchase a computer named Computer1 that is compatible with the 64-bit version of Windows 10.For each of the following statements, select Yes if the statement is true. Otherwise, select No.NOTE: Each correct selection is worth one point. Reference:https://techdirectarchive.com/2020/09/14/error-0xc1510111-you-do-not-have-permissions-to-mount-and-modify-this-image/Q48. Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.You have a computer named Computer1 that runs Windows 10.A service named Application1 is configured as shown in the exhibit.You discover that a user used the Service1 account to sign in to Computer1 and deleted some files.You need to ensure that the identity used by Application1 cannot be used by a user to sign in to sign in to the desktop on Computer1. The solution must use the principle of least privilege.Solution: On Computer1, you assign Service1 the deny log on locally user right.Does this meet the goal?  Yes  No References:https://docs.microsoft.com/en-us/windows/security/threat-protection/security-policy-settings/deny-log-on-locallyQ49. You have a computer named Computer1 that runs Windows 10.Computer contains the folders shown in the following table.You include Folder1, Folder2 and Folder3 in the Documents library.You configure File History to run every 15 minutes, and then turn on file History.For each of the following statements, select YES if the statements is true. Otherwise, select No.NOTE: Each correct selection is worth one point. ExplanationYes > No > NoQ50. You have a computer named Computer1 that runs Windows 10.You are troubleshooting connectivity issues on Computer1.You need to view the remote addresses to which Computer1 has active TCP connections.Which tool should you use?  Performance Monitor  Task Manager  Resource Monitor  Windows Defender Firewall with Advanced Security Q51. You plan to deploy Windows 10 Enterprise to company-owned devices.You capture a Windows 10 image file from a reference device.You need to generate catalog files and answer files for the deployment.What should you use for each file? To answer, select the appropriate options in the answer area.NOTE: Each correct selection is worth one point. References:https://docs.microsoft.com/en-us/windows-hardware/customize/desktop/wsim/open-a-windows-image-or-catalog-fileQ52. You need to ensure that User10 can activate Computer10.What should you do?  Request that a Windows 10 Enterprise license be assigned to User10, and then activate Computer10.  From the Microsoft Deployment Toolkit (MDT), add a Volume License Key to a task sequence, and then redeploy Computer10.  From System Properties on Computer10, enter a Volume License Key, and then activate Computer10.  Request that User10 perform a local AutoPilot Reset on Computer10, and then activate Computer10. The case study states: User10 reports that Computer10 is not activated.The solution is to perform a local AutoPilot Reset on the computer. This will restore the computer settings to a fully-configured or known IT-approved state. When User10 signs in to the computer after the reset, the computer should activate.You can use Autopilot Reset to remove personal files, apps, and settings from your devices. The devices remain enrolled in Intune and are returned to a fully-configured or known IT-approved state. You can Autopilot Reset a device locally or remotely from the Intune for Education portal.Incorrect Answers:A: All users have Microsoft 365 E3 licenses. This license includes Windows 10 Enterprise so we don’t need to assign a Windows 10 Enterprise license to User10.B: Volume License Keys aren’t required.C: Volume License Keys aren’t required.References:https://docs.microsoft.com/en-us/windows/deployment/windows-autopilot/windows-autopilot-requirements- licensinghttps://docs.microsoft.com/en-us/intune-education/autopilot-resetDeploy WindowsTestlet 2Case StudyThis is a case study. Case studies are not timed separately. You can use as much exam times as you would like to complete each case. However, there may be additional studies and sections on this exam. You must manage your time to ensure that you are able to complete all questions included on this exam in the time provided.To answer the questions included in a case study, you will need to reference information that is provided in the case study. Case studies might contain exhibits and other resources that provide more information about the scenario that is described in the case study. Each question is independent of the other questions in this case study.At the end of this case study, a review screen will appear. This screen allows you to review your answers and to make changes before you move to the next section of the exam. After you begin a new section, you cannot return to this section.To start the case studyTo display the first question in this case study, click the Next button. Use the buttons in the left pane to explore the content of the case study before you answer the questions. Clicking these buttons displays information such as business requirements, existing environment, and problem statements. When you are ready to answer a question, click the Question button to return to the question.OverviewContoso, Ltd. is a consulting company that has a main office in Montreal and two branch offices in Seattle and New York.Contoso has IT, human resources (HR), and finance departments.Contoso recently opened a new branch office in San Diego. All the users in the San Diego office work from home.Existing environmentContoso uses Microsoft 365.The on-premises network contains an Active Directory domain named contoso.com. The domain is synced to Microsoft Azure Active Directory (Azure AD).All computers run Windows 10 Enterprise.You have four computers named Computer1, Computer2, Computer3, and ComputerA. ComputerA is in a workgroup on an isolated network segment and runs the Long Term Servicing Channel version of Windows 10.ComputerA connects to a manufacturing system and is business critical. All the other computers are joined to the domain and run the Semi-Annual Channel version of Windows 10.In the domain, you create four groups named Group1, Group2, Group3, and Group4.Computer2 has the local Group Policy settings shown in the following table.The computers are updated by using Windows Update for Business.The domain has the users shown in the following table.Computer1 has the local users shown in the following table.RequirementsPlanned ChangesContoso plans to purchase computers preinstalled with Windows 10 Pro for all the San Diego office users.Technical requirementsContoso identifies the following technical requirements:* The computers in the San Diego office must be upgraded automatically to Windows 10 Enterprise and must be joined to Azure AD the first time a user starts each new computer. End users must not be required to accept the End User License Agreement (EULA).* Helpdesk users must be able to troubleshoot Group Policy object (GPO) processing on the Windows 10 computers. The helpdesk users must be able to identify which Group Policies are applied to the computers.* Users in the HR department must be able to view the list of files in a folder named D:Reports on Computer3.* ComputerA must be configured to have an Encrypting File System (EFS) recovery agent.* Quality update installations must be deferred as long as possible on ComputerA.* Users in the IT department must use dynamic look on their primary device.* User6 must be able to connect to Computer2 by using Remote Desktop.* The principle of least privilege must be used whenever possible.* Administrative effort must be minimized whenever possible.* Assigned access must be configured on Computer1. Loading … Earn Quick And Easy Success With MD-100 Dumps: https://www.actualtests4sure.com/MD-100-test-questions.html --------------------------------------------------- Images: https://blog.actualtests4sure.com/wp-content/plugins/watu/loading.gif https://blog.actualtests4sure.com/wp-content/plugins/watu/loading.gif --------------------------------------------------- --------------------------------------------------- Post date: 2023-02-11 15:10:57 Post date GMT: 2023-02-11 15:10:57 Post modified date: 2023-02-11 15:10:57 Post modified date GMT: 2023-02-11 15:10:57