This page was exported from Actual Test Materials [ http://blog.actualtests4sure.com ] Export date:Fri Nov 15 20:19:24 2024 / +0000 GMT ___________________________________________________ Title: [May-2023] Free MD-100 Exam Questions MD-100 Actual Free Exam Questions [Q60-Q84] --------------------------------------------------- [May-2023] Free MD-100 Exam Questions MD-100 Actual Free Exam Questions Verified MD-100 dumps and 345 unique questions Q60. You have a computer that runs Windows 10.The computer fails to start, and you receive the following error message: “BOOTMGR image is corrupt. The system cannot boot”.You need to repair the system partition.Which command should you run from Windows Recovery Environment (WinRE)?  fdisk.exe  chkdsk.exe  diskpart.exe  bcdboot.exe ExplanationDiskPart, which has replaced fdisk, is a command-line utility that provides the ability to manage disks, partitions or volumes in your computer running all versions of operating system since Windows 2000.References:https://www.diskpart.com/windows-10/diskpart-windows-10-1203.htmlQ61. Your network contains an Active Directory domain named contoso.com. The domain contains two computers named Computer1 and Computer2 that run Windows 10 and are joined to the domain.On Computer1, you create an event subscription named Subscription1 for Computer2 as shown in the Subscription1 exhibit. (Click the Subcription1 tab.)Subscription1 is configured to use forwarded events as the destination log.On Computer1, you create a custom view named View1 as shown in the View1 exhibit. (Click the View1 tab.)For each of the following statements, select Yes if the statement is true. Otherwise, select No.NOTE: Each correct selection is worth one point. Q62. You have 10 computers that run Windows 10.You have a Windows Server Update Services (WSUS) server.You need to configure the computers to install updates from WSUS.Which two settings should you configure? To answer, select the appropriate options in the answer area.NOTE: Each correct selection is worth one point. Explanation:References:https://docs.microsoft.com/en-us/windows/deployment/update/waas-manage-updates-wsus#configure-automatic-updates-and-update-service-locationQ63. You need to ensure that User10 can activate Computer10.What should you do?  Request that a Windows 10 Enterprise license be assigned to User10, and then activate Computer10.  From the Microsoft Deployment Toolkit (MDT), add a Volume License Key to a task sequence, and then redeploy Computer10.  From System Properties on Computer10, enter a Volume License Key, and then activate Computer10.  Request that User10 perform a local AutoPilot Reset on Computer10, and then activate Computer10. The case study states: User10 reports that Computer10 is not activated.The solution is to perform a local AutoPilot Reset on the computer. This will restore the computer settings to a fully-configured or known IT-approved state. When User10 signs in to the computer after the reset, the computer should activate.You can use Autopilot Reset to remove personal files, apps, and settings from your devices. The devices remain enrolled in Intune and are returned to a fully-configured or known IT-approved state. You can Autopilot Reset a device locally or remotely from the Intune for Education portal.Incorrect Answers:A: All users have Microsoft 365 E3 licenses. This license includes Windows 10 Enterprise so we don’t need to assign a Windows 10 Enterprise license to User10.B: Volume License Keys aren’t required.C: Volume License Keys aren’t required.References:https://docs.microsoft.com/en-us/windows/deployment/windows-autopilot/windows-autopilot-requirements- licensinghttps://docs.microsoft.com/en-us/intune-education/autopilot-resetDeploy WindowsQuestion Set 2Q64. You plan to deploy Windows 10 Enterprise to company-owned devices.You capture a Windows 10 image file from a reference device.You need to generate catalog files and answer files for the deployment.What should you use for each file? To answer, select the appropriate options in the answer area.NOTE: Each correct selection is worth one point. References:https://docs.microsoft.com/en-us/windows-hardware/customize/desktop/wsim/open-a-windows-image-or-catalog-fileQ65. You are a network administrator at your company.A user attempts to start a computer and receives the following error message: “Bootmgr is missing.” You need to resolve the issue.You start the computer in the recovery mode.Which command should you run next? To answer, select the appropriate options in the answer area.NOTE: Each correct selection is worth one point. Explanation:References:https://neosmart.net/wiki/bootmgr-is-missing/Q66. You manage devices that run Windows 10.Ten sales users will travel to a location that has limited bandwidth that is expensive. The sales users will be at the location for three weeks.You need to prevent all Windows updates from downloading for the duration of the trip. The solution must not prevent access to email and the Internet.What should you do?  From Network & Internet in the Settings app, set a data limit.  From Accounts in the Settings app, turn off  From Network & Internet in the Settings app, set the network connections as metered connections.  From Update & Security in the Settings app, pause updates. Q67. Please wait while the virtual machine loads. Once loaded, you may proceed to the lab section. This may take a few minutes, and the wait time will not be deducted from your overall test time.When the Next button is available, click it to access the lab section. In this section, you will perform a set of tasks in a live environment. While most functionality will be available to you as it would be in a live environment, some functionality (e.g., copy and paste, ability to navigate to external websites) will not be possible by design.Scoring is based on the outcome of performing the tasks stated in the lab. In other words, it doesn’t matter how you accomplish the task, if you successfully perform it, you will earn credit for that task.Labs are not timed separately, and this exam may more than one lab that you must complete. You can use as much time as you would like to complete each lab. But, you should manage your time appropriately to ensure that you are able to complete the lab(s) and all other sections of the exam in the time provided.Please note that once you submit your work by clicking the Next button within a lab, you will NOT be able to return to the lab.Username and passwordUse the following login credentials as needed:To enter your password, place your cursor in the Enter password box and click on the password below.Username: Contoso/AdministratorPassword: Passw0rd!The following information is for technical support purposes only:Lab Instance: 10921597You need to create a group named Group2 on Client2. The members of Group2 must be able to change the system time. The solution must use the principle of least privilege.To complete this task, sign in to the required computer or computers. On Client2, Press Windows+RType lusrmgr.mscRight click Groups and click New Group.Type in the Group name and a description.Click Add to add members to this group. Specify the name of the user or group or computer to be added.Click Create and Close.Press the Win + R keys to open Run, type secpol.msc into Run, and click/tap on OK to open Local Security Policy.Expand open Local Policies in the left pane of Local Security Policy, click/tap on User Rights Assignment, and double click/tap on the Change the system time policy in the right pane.Click/tap on the Add User or Group button.Click/tap on the Object Types button.Check all the boxes for Object types, and click/tap on the OK.Click/tap on the Advanced button.Click/tap on the Find Now button, select the name of the user or groupClick/tap on OK.Click/tap on OK.When finished, you can close Local Users and Groups.Reference:https://www.windows-active-directory.com/local-user-management.htmlhttps://www.tenforums.com/tutorials/92910-allow-prevent-users-groups-change-time-windows-10-a.html#option1Q68. Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.You deploy Windows 10 to a computer named Computer1.Computer1 contains a folder named C:Folder1. Folder1 contains multiple documents.You need to ensure that you can recover the files in Folder1 by using the Previous Versions tab.Solution: You set up Backup and Restore (Windows 7) and include Folder1 in the backup.Does this meet the goal?  Yes  No Explanation/Reference:https://www.tenforums.com/tutorials/79490-restore-previous-versions-files-folders-drives-windows-10-a.htmlhttps://support.microsoft.com/en-za/help/17128/windows-8-file-historyQ69. An employee reports that she must perform a BitLocker recovery on her laptop. The employee does not have her BitLocker recovery key but does have a Windows 10 desktop computer.What should you instruct the employee to do from the desktop computer?  Run the manage-bde.exe -status command  From BitLocker Recovery Password Viewer, view the computer object of the laptop  Go to https://account.activedirectory.windowsazure.com and view the user account profile  Run the Enable-BitLockerAutoUnlock cmdlet Reference:https://celedonpartners.com/blog/storing-recovering-bitlocker-keys-azure-active-directory/Topic 2, Contoso, LtdExisting environmentContoso uses Microsoft 365.The on-premises network contains an Active Directory domain named contoso.com. The domain is synced to Microsoft Azure Active Directory (Azure AD).All computers run Windows 10 Enterprise.You have four computers named Computer1, Computer2, Computer3, and Computer In the domain, you create four groups named Group1, Group2, Group3, and Group4.Computer2 has the local Group Policy settings shown in the following table.The computers are updated by using Windows Update for Business.The domain has the users shown in the following table.Computer1 has the local users shown in the following table.RequirementsPlanned ChangesContoso plans to purchase computers preinstalled with Windows 10 Pro for all the San Diego office users.Technical RequirementsContoso identifies the following technical requirements:The computers in the San Diego office must be upgraded automatically to Windows 10 Enterprise and must be joined to Azure AD the first time a user starts each new computer. End users must not be required to accept the End User License Agreement (EULA).Helpdesk users must be able to troubleshoot Group Policy object (GPO) processing on the Windows 10 computers. The helpdesk users must be able to identify which Group Policies are applied to the computers.Users in the HR department must be able to view the list of files in a folder named D:Reports on Computer3.ComputerA must be configured to have an Encrypting File System (EFS) recovery agent.Quality update installations must be deferred as long as possible on ComputerA.Users in the IT department must use dynamic look on their primary device.User6 must be able to connect to Computer2 by using Remote Desktop.The principle of least privilege must be used whenever possible.Administrative effort must be minimized whenever possible.Assigned access must be configured on Computer1.Q70. You need to recommend a solution to monitor update deployments.What should you include in the recommendation?  Windows Server Update (WSUS)  the Update Management solution in Azure Automation  the Update Compliance solution in Azure Log Analytics  the Azure Security Center Explanation/Reference:References:https://docs.microsoft.com/en-us/windows/deployment/update/update-compliance-monitor Maintain Windows Testlet 2 Case Study This is a case study. Case studies are not timed separately. You can use as much exam times as you would like to complete each case. However, there may be additional studies and sections on this exam. You must manage your time to ensure that you are able to complete all questions included on this exam in the time provided.To answer the questions included in a case study, you will need to reference information that is provided in the case study. Case studies might contain exhibits and other resources that provide more information about the scenario that is described in the case study. Each question is independent of the other questions in this case study.At the end of this case study, a review screen will appear. This screen allows you to review your answers and to make changes before you move to the next section of the exam. After you begin a new section, you cannot return to this section.To start the case studyTo display the first question in this case study, click the Next button. Use the buttons in the left pane to explore the content of the case study before you answer the questions. Clicking these buttons displays information such as business requirements, existing environment, and problem statements. When you are ready to answer a question, click the Question button to return to the question.OverviewContoso, Ltd. is a consulting company that has a main office in Montreal and two branch offices in Seattle and New York.Contoso has IT, human resources (HR), and finance departments.Contoso recently opened a new branch office in San Diego. All the users in the San Diego office work from home.Existing environmentContoso uses Microsoft 365.The on-premises network contains an Active Directory domain named contoso.com. The domain is synced to Microsoft Azure Active Directory (Azure AD).All computers run Windows 10 Enterprise.You have four computers named Computer1, Computer2, Computer3, and ComputerA. ComputerA is in a workgroup on an isolated network segment and runs the Long Term Servicing Channel version of Windows 10.ComputerA connects to a manufacturing system and is business critical. All the other computers are joined to the domain and run the Semi-Annual Channel version of Windows 10.In the domain, you create four groups named Group1, Group2, Group3, and Group4.Computer2 has the local Group Policy settings shown in the following table.The computers are updated by using Windows Update for Business.The domain has the users shown in the following table.Computer1 has the local users shown in the following table.RequirementsPlanned ChangesContoso plans to purchase computers preinstalled with Windows 10 Pro for all the San Diego office users.Technical requirementsContoso identifies the following technical requirements:* The computers in the San Diego office must be upgraded automatically to Windows 10 Enterprise and must be joined to Azure AD the first time a user starts each new computer. End users must not be required to accept the End User License Agreement (EULA).* Helpdesk users must be able to troubleshoot Group Policy object (GPO) processing on the Windows 10 computers. The helpdesk users must be able to identify which Group Policies are applied to the computers.* Users in the HR department must be able to view the list of files in a folder named D:Reports on Computer3.* ComputerA must be configured to have an Encrypting File System (EFS) recovery agent.* Quality update installations must be deferred as long as possible on ComputerA.* Users in the IT department must use dynamic look on their primary device.* User6 must be able to connect to Computer2 by using Remote Desktop.* The principle of least privilege must be used whenever possible.* Administrative effort must be minimized whenever possible.* Assigned access must be configured on Computer1.Q71. You have an Azure Active Directory (Azure AD) tenant that contains a user named user1@contoso.com.You have a computer named Computer1 that runs Windows 10.You join Computer1 to Azure AD. You enable Remote Desktop on Computer1.User1@contoso.com attempts to connect to Computer1 by using Remote Desktop and receives the following error message: “The logon attempt failed.” You need to ensure that the user can connect to Computer1 by using Remote Desktop.What should you do first?  In Azure AD, assign user1@contoso.com the Cloud device administrator role.  From the local Group Policy, modify the Allow log on through Remote Desktop Services user right.  In Azure AD, assign user1@contoso.com the Security administrator role.  On Computer1, create a local user and add the new user to the Remote Desktop Users group. References:https://docs.microsoft.com/en-us/windows/client-management/connect-to-remote-aadj-pcQ72. You have a workgroup computer named Computer1 that runs Windows 10 and has the users shown in the following table.Computer1 contains an image file named C:FolderImage.jpg.Computer1 has the Local ComputerAdministrators Policy shown in the following table.Computer1 has the Local ComputerNon-Administrators Policy shown in the following table.Computer1 has the local computer policy shown in the following table.For each of the following statements, select Yes if the statement is true. Otherwise, select No.NOTE: Each correct selection is worth one point. Q73. Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.You have a computer named Computer1 that runs Windows 10.A service named Application1 is configured as shown in the exhibit.You discover that a user used the Service1 account to sign in to Computer1 and deleted some files.You need to ensure that the identity used by Application1 cannot be used by a user to sign in to sign in to the desktop on Computer1. The solution must use the principle of least privilege.Solution: On Computer1, you assign Service1 the deny log on as a service user right.Does this meet the goal?  Yes  No ExplanationReferences:https://docs.microsoft.com/en-us/windows/security/threat-protection/security-policy-settings/deny-log-on-as-a-sQ74. You need to reduce the amount of time it takes to restart Application1 when the application crashes.What should you include in the solution? To answer, select the appropriate options in the answer area.NOTE: Each correct selection is worth one point. Reference:https://www.howto-connect.com/how-to-attach-a-task-to-this-event-in-event-viewer-in-windows-10/ Overview Contoso, Ltd. is a consulting company that has a main office in Montreal and two branch offices in Seattle and New York.Contoso has IT, human resources (HR), and finance departments.Contoso recently opened a new branch office in San Diego. All the users in the San Diego office work from home.Topic 3, Litware incGeneral OverviewLitware, Inc. is a consulting company that has a main office in Montreal and branch offices in Seattle and New York.EnvironmentExisting EnvironmentThe network contains an on-premises Active Directory domain named litware.com. The domain contains the computers shown in the following table.The network that uses 192.168.10.0/24 connects to the internet by using a Network Address Translation (NAT) device.Windows Admin Center is installed on Server1.The domain contains the groups shown in the following table.The domain contains the users shown in the following table.Computer1 ConfigurationComputer1 contains the local user accounts shown in the following table.Computer1 contains a folder named D:Folder1 that has permission inheritance disabled.Computer1 contains a file named D:Folder1Report.docx that has the permissions shown in the following table.D:Folder1Report.docx has auditing configured as shown in the following table.The Local Computer Policy for Computer1 is configured as shown in the following table.Windows Defender Firewall for Computer1 has the rules shown in the following table.Computer2 ConfigurationComputer2 contains the local user accounts shown in the following table.Group1 and Group2 are members of the Remote Desktop Users group.The Local Computer Policy for Computer2 is configured as shown in the following table.Windows Defender Firewall for Computer2 has the rules shown in the following table.Computer3 ConfigurationComputer3 contains the local user accounts shown in the following table.Windows Defender Firewall for Computer3 has the rules shown in the following table.Requirements and Planned ChangesPlanned ChangesLitware plans to make the following changes on Computer1:Grant User1 Allow Full control permissions to D:Folder1Report.docx.Grant User2 Allow Full control permissions to D:Folder1Report.docx.Grant User3 Allow Full control permissions to D:Folder1.Technical RequirementsLitware identifies the following technical requirements:Configure custom Visual Effect performance settings for Computer1.Manage Computer2 by using Windows Admin Center.Minimize administrative effort.Delivery Optimization on the computers that run Windows 10 must be configured to meet the following requirements:Content must be downloaded only from an original source.Downloading content from peer cache clients must be prevented.Downloads must be optimized by using the Delivery Optimization cloud service.Q75. Your network contains an Active Directory domain. the domain contains a computer named Computer1 that runs Windows 10. The domain contains the users shown in the following table.Computer contains the shared folders shown in the following table.The shared folders have the permissions shown in the following table.For each of the following statements, select Yes if the statement is true. Otherwise select No.NOTE: Each correct selection is worth one point. Q76. Your office has a dedicated wireless network for guests.You plan to provide access cards that will have a QR code for guests. The QR code will link to a network configuration file stored on a publicly accessible website and provide the wireless network settings for Windows 10 devices.Which tool should you use to create the configuration file and which file type should you use for the configuration file? To answer, select the appropriate options in the answer area.NOTE: Each correct selection is worth one point. Reference:https://docs.microsoft.com/en-us/windows/configuration/provisioning-packages/provisioning-packagesQ77. Your company has an on-premises network that contains an Active Directory domain. The domain is synced to Microsoft Azure Active Directory (Azure AD). All computers in the domain run Windows 10 Enterprise.You have a computer named Computer1 that has a folder named C:Folder1.You want to use File History to protect C:Folder1.Solution: You enable File History on Computer1. You then encrypt the contents of Folder1.Does this meet the goal?  Yes  No File History only backs up copies of files that are in Libraries, and Desktop folders and the OneDrive files available offline on your PC. If you have files or folders elsewhere that you want backed up, you can add them to one of these folders.Reference:https://support.microsoft.com/en-us/help/17128/windows-8-file-historyQ78. You have a computer that runs Windows 10 and contains the folders shown in the following table.You create the groups shown in the following table.On FolderA, you remove permission inheritance. To each folder, you assign the NTFS permissions shown in the following table.For each of the following statements, select Yes if the statement is true. Otherwise, select No.NOTE: Each correct selection is worth one point. Q79. Your network contains an Active Directory domain. The domain contains the users shown in the following table.You have a server named Server1 that runs Windows Server 2019 and has the Windows Deployment Services role installed. Server1 contains an x86 boot image and three Windows 10 install images. The install images are shown in the following table.You purchase a computer named Computer1 that is compatible with the 64-bit version of Windows 10.For each of the following statements, select Yes if the statement is true. Otherwise, select No.NOTE: Each correct selection is worth one point. Reference:https://techdirectarchive.com/2020/09/14/error-0xc1510111-you-do-not-have-permissions-to-mount-and-modify-this-image/Q80. You need to implement a solution to configure the contractors’ computers.What should you do? To answer, select the appropriate options in the answer area.NOTE: Each correct selection is worth one point. Explanation:References:https://docs.microsoft.com/en-us/windows/configuration/provisioning-packages/provisioning-install-icdQ81. You have 200 computers that run Windows 10 and are joined to an Active Directory domain.You need to enable Windows Remote Management (WinRM) on all the computers by using Group Policy.Which three actions should you perform? Each correct answer presents part of the solution.NOTE: Each correct selection is worth one point.  Set the Startup Type of the Windows Remote Management (WS-Management) service to Automatic.  Enable the Windows Firewall: Allow inbound remote administration exception setting.  Enable the Allow remote server management through WinRM setting.  Enable the Windows Firewall: Allow inbound Remote Desktop exceptions setting.  Enable the Allow Remote Shell access setting.  Set the Startup Type of the Remote Registry service to Automatic. Explanation/Reference:References:http://www.mustbegeek.com/how-to-enable-winrm-via-group-policy/Q82. Your domain contains named Computer named Computer1 that runs Windows 10. Computer1 does not have a TPM.You need to be able to encrypt the C drive by using Bitlocker Drive Encryption (BitLocker). The solution must ensure that the recovery key is stored in Active Directory.Which two Group Policy settings should you configure? To answer, select the appropriate settings in the answer area.NOTE: Each correct selection is worth one point. Reference:https://docs.microsoft.com/en-us/windows/security/information-protection/bitlocker/bitlocker-group-policy-settings#bkmk-rec1Q83. You need to recommend a solution to monitor update deployments.What should you include in the recommendation?  Windows Server Update (WSUS)  the Update Management solution in Azure Automation  the Update Compliance solution in Azure Log Analytics  the Azure Security Center References:https://docs.microsoft.com/en-us/windows/deployment/update/update-compliance-monitorQ84. Please wait while the virtual machine loads. Once loaded, you may proceed to the lab section. This may take a few minutes, and the wait time will not be deducted from your overall test time.When the Next button is available, click it to access the lab section. In this section, you will perform a set of tasks in a live environment. While most functionality will be available to you as it would be in a live environment, some functionality (e.g., copy and paste, ability to navigate to external websites) will not be possible by design.Scoring is based on the outcome of performing the tasks stated in the lab. In other words, it doesn’t matter how you accomplish the task, if you successfully perform it, you will earn credit for that task.Labs are not timed separately, and this exam may more than one lab that you must complete. You can use as much time as you would like to complete each lab. But, you should manage your time appropriately to ensure that you are able to complete the lab(s) and all other sections of the exam in the time provided.Please note that once you submit your work by clicking the Next button within a lab, you will NOT be able to return to the lab.Username and passwordUse the following login credentials as needed:To enter your password, place your cursor in the Enter password box and click on the password below.Username: Contoso/AdministratorPassword: Passw0rd!The following information is for technical support purposes only:Lab Instance: 10921597You need to ensure that a local user named User1 can establish a Remote Desktop connection to Client2.To complete this task, sign in to the required computer or computers. See explanation below.ExplanationAdd User to Remote Desktop Users Group via Settings App* Open the Settings app on Client2 and go to System -> Remote Desktop. Click on the Select users that can remotely access this PC link on the right side.* When the Remote Desktop Users dialog opens, click on Add.* Click on Advanced.* Click on Find Now and then select any user account you want to add to the “Remote Desktop Users” group, and click OK.* Click OK and you’re done.Reference:https://www.top-password.com/blog/add-user-to-remote-desktop-users-group-in-windows-10/ Loading … Latest 100% Passing Guarantee - Brilliant MD-100 Exam Questions PDF: https://www.actualtests4sure.com/MD-100-test-questions.html --------------------------------------------------- Images: https://blog.actualtests4sure.com/wp-content/plugins/watu/loading.gif https://blog.actualtests4sure.com/wp-content/plugins/watu/loading.gif --------------------------------------------------- --------------------------------------------------- Post date: 2023-05-07 16:55:24 Post date GMT: 2023-05-07 16:55:24 Post modified date: 2023-05-07 16:55:24 Post modified date GMT: 2023-05-07 16:55:24