Summer Sale - Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dpt65

MD-100 Questions and Answers

Note! Following MD-100 Exam is Retired now. Please select the alternative replacement for your Exam Certification. The new exam code is MD-102

MD-100 Questions and Answers

Question # 6

You need to meet the technical requirements for the San Diego office computers. Which Windows 10 deployment method should you use?

A.

wipe and load refresh

B.

Windows Autopilot

C.

provisioning Packages

D.

in-place upgrade

Full Access
Question # 7

You deploy Windows 10 to a new computer named Computer1.

You sign in to Computer1 and create a user named User1.

You create a file named LayoutModification.xml in the C:\Users\Default\AppData\Local\Microsoft\Windows\Shell\folder. LayoutModification.xml contains the following markup.

What is the effect of the configuration? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Full Access
Question # 8

Which users can create a new group on Computer3?

A.

User31 only

B.

User1 and User32 only

C.

Admin1 and User31 only

D.

Admin1, User31, and User32 only

Full Access
Question # 9

On Computer1, you need to configure the custom Visual Effects performance settings. Which user accounts can you use?

A.

Admm1,User11, and User13 only

B.

Admin1 only

C.

Admin1, User11, and User12 only

D.

Admin1, User11, User12, and User13

E.

Admin1 and User11 only

Full Access
Question # 10

You need to meet the technical requirements for the helpdesk users.

What should you do? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Full Access
Question # 11

You need to meet the technical requirements for EFS on ComputerA.

What should you do?

A.

Run certutil.exe, and then add a certificate to the local computer certificate store.

B.

Run cipher.exe, and then add a certificate to the local computer certificate store.

C.

Run cipher.exe, and then add a certificate to the local Group Policy.

D.

Run certutil.exe, and then add a certificate to the local Group Policy.

Full Access
Question # 12

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Full Access
Question # 13

Which users can sign in to Computer2 by using Remote Desktop?

A.

Admin1 only

B.

User 1 only

C.

Admin1 and User2 only

D.

Admin1, User1, User2, and User3

E.

User2 only

Full Access
Question # 14

You need to meet the quality update requirement for ComputerA.

For how long should you defer the updates?

A.

14 days

B.

10 years

C.

5 years

D.

180 days

E.

30 days

Full Access
Question # 15

You have a computer named Computer1 that runs Windows 10. Computer1 contains a registry key named Key1 that has the values shown in the exhibit. (Click the Exhibit tab.).

You have a Registration Entries (.reg) file named File1.reg that contains the following text.

Windows Registry Editor Version 5.00

[HKEY_LOCAL_MACHINE\SOFTWARE\Key1]

"String1"=-

@="2"

You need to identify the effect of importing File1.reg to Computer1.

What should you identify? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Full Access
Question # 16

You need to meet the technical requirement for the IT department users.

What should you do first?

A.

Issue computer certificates

B.

Distribute USB keys to the IT department users.

C.

Enable screen saver and configure a timeout.

D.

Turn on Bluetooth.

Full Access
Question # 17

You need to recommend a solution to monitor update deployments.

What should you include in the recommendation?

A.

Windows Server Update (WSUS)

B.

the Update Management solution in Azure Automation

C.

the Update Compliance solution in Azure Log Analytics

D.

the Azure Security Center

Full Access
Question # 18

You need to ensure that User10 can activate Computer10.

What should you do?

A.

Request that a Windows 10 Enterprise license be assigned to User10, and then activate Computer10.

B.

From the Microsoft Deployment Toolkit (MDT), add a Volume License Key to a task sequence, and then

redeploy Computer10.

C.

From System Properties on Computer10, enter a Volume License Key, and then activate Computer10.

D.

Request that User10 perform a local AutoPilot Reset on Computer10, and then activate Computer10.

Full Access
Question # 19

You need to reduce the amount of time it takes to restart Application1 when the application crashes.

What should you include in the solution? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Full Access
Question # 20

You need to implement a solution to configure the contractors’ computers.

What should you do? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Full Access
Question # 21

You need to recommend a solution to configure the employee VPN connections.

What should you include in the recommendation?

A.

Remote Access Management Console

B.

Group Policy Management Console (GPMC)

C.

Connection Manager Administration Kit (CMAK)

D.

Microsoft Intune

Full Access
Question # 22

An employee reports that she must perform a BitLocker recovery on her laptop. The employee does not have her BitLocker recovery key but does have a Windows 10 desktop computer.

What should you instruct the employee to do from the desktop computer?

A.

Run the manage-bde.exe –status command

B.

From BitLocker Recovery Password Viewer, view the computer object of the laptop

C.

Go to https://account.activedirectory.windowsazure.com and view the user account profile

D.

Run the Enable-BitLockerAutoUnlock cmdlet

Full Access
Question # 23

You need to take remote control of an employee’s computer to troubleshoot an issue.

What should you send to the employee to initiate a remote session?

A.

a numeric security code

B.

a connection file

C.

an Easy Connect request

D.

a password

Full Access
Question # 24

You need to sign in as LocalAdmin on Computer11.

What should you do first?

A.

From the LAPS UI tool, view the administrator account password for the computer object of Computer11.

B.

From Local Security Policy, edit the policy password settings on Computer11.

C.

From the LAPS UI tool, reset the administrator account password for the computer object of Computer11.

D.

From Microsoft Intune, edit the policy password settings on Computer11.

Full Access
Question # 25

Your company is not connected to the internet. The company purchases several new computers with Windows 10 Pro for its users.

None of the new computers are activated.

You need to activate the computers without connecting the network to the Internet.

What should you do?

A.

Make use of the Volume Activation Management Tool (VAMT).

B.

Make use of the Key Management Service (KMS).

C.

Make use of the Windows Process Activation Service.

D.

Run the Get-WmiObject -query cmdlet.

Full Access
Question # 26

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.

A user named User2 has a computer named Computer2 that runs Windows 10. User2 joins Computer2 to contoso.com by using user2@contoso.com.

Computer1 contains a folder named Folder1. Folder1 is in drive C and is shared as Share1. Share1 has the permission shown in the following table.

A user named User2 has a computer named Computer2 that runs Windows 10. User2 joins Computer2 to contoso.com by using user2@contoso.com.

User2 attempts to access Share1 and receives the following error message: “The username or password is incorrect.”

You need to ensure that User2 can connect to Share1.

Solution: You create a local user account on Computer1 and instruct User2 to use the local account to connect to Share1.

Does this meet the goal?

A.

Yes

B.

No

Full Access
Question # 27

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.

You have a workgroup computer that runs Windows 10. The computer contains the local user accounts shown in the following table.

You need to configure the desktop background for User1 and User2 only.

Solution: You create two new local Group Policy Objects (GPOs) and apply one GPO to User1 and the other GPO to User2. You configure the Desktop Wallpaper setting in each GPO.

Does this meet the goal?

A.

Yes

B.

No

Full Access
Question # 28

You have a computer named Computer1 that runs Windows 10.

Several users have signed in to Computer1 and have a profile.

You create a taskbar modification file named LayoutModification.xml.

You need to ensure that LayoutModification.xml will apply to all users who sign in to Computer1.

To which folder should you copy LayoutModification.xml?

A.

C:\Users\Public\Public Desktop

B.

C:\Windows\ShellExperiences

C.

C:\Users\Default\AppData\Local\Microsoft\Windows\Shell\

D.

C:\Windows\System32\Configuration

Full Access
Question # 29

You implement the planned changes for Computer1.

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Full Access
Question # 30

You need to configure Delivery Optimization to meet the technical requirements.

Which download mode should you use?

A.

Simple (99)

B.

Group (2)

C.

Internet (3)

D.

HTTP Only (0)

E.

Bypass (100)

Full Access
Question # 31

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE Each correct selection is worth one point.

Full Access
Question # 32

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.

Your network contains an Active Directory domain named contoso.com. The domain contains the users shown in the following table.

You have a computer named Computer1 that runs Windows 10 and is in a workgroup.

A local standard user on Computer1 named User1 joins the computer to the domain and uses the credentials of User2 when prompted.

You need to ensure that you can rename Computer1 as Computer33.

Solution: You use the credentials of User1 on Computer1.

Does this meet the goal?

A.

Yes

B.

No

Full Access
Question # 33

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.

You have two computers named Computer1 and Computer2 that run Windows 10.

You have an Azure Active Directory (Azure AD) user account named admin@contoso.com that is in the local Administrators group on each computer.

You sign in to Computer1 by using admin@contoso.com.

You need to ensure that you can use Event Viewer on Computer1 to connect to the event logs on Computer2.

Solution: On Computer2, you create a Windows Defender Firewall rule that allows eventwr.exe.

Does this meet the goal?

A.

Yes

B.

No

Full Access
Question # 34

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.

You have a computer that runs Windows 10. The computer contains a folder. The folder contains sensitive data.

You need to log which user reads the contents of the folder and modifies and deletes files in the folder.

Solution: From the properties of the folder, you configure the Auditing settings and from the Audit Policy in the local Group Policy, you configure Audit privilege use.

Does this meet the goal?

A.

Yes

B.

No

Full Access
Question # 35

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.

You have a workgroup computer that runs Windows 10. The computer contains the local user accounts shown in the following table.

You need to configure the desktop background for User1 and User2 only.

Solution: From the local computer policy, you configure the Filter Options settings for the computer policy.

Does this meet the goal?

A.

Yes

B.

No

Full Access
Question # 36

You have a file named Reg1.reg that contains the following content.

What is the effect of importing the file?

A.

A key named command will be renamed as notepad.exe.

B.

In a key named Notepad, the command value will be set to @="notepad.exe".

C.

In a key named command, the default value will be set to notepad.exe.

Full Access
Question # 37

You have a computer that runs Windows 10.

You need to view the Windows Update diagnostic log.

What should you do first?

A.

From File Explorer, go to the C:\Windows\Logs\WindowsUpdate folder and select Show hidden files, folders, and drives.

B.

From Windows Update in the Settings app. configure Advanced options.

C.

From Event Viewer, modify the properties of the WindowsUpdateClient operational log.

D.

From Windows PowerShell, run the Get-WindowsUpdateLog cmdlet.

Full Access
Question # 38

You have computers that run Windows 11 as shown in the following table.

You ping 192.168.10.15 from Computed and discover that the request timed out. You need to ensure that you can successfully ping 192.168.10.15 from Computer1. Solution: On Computer1, you turn off Windows Defender Firewall-Does this meet the goal?

A.

Yes

B.

No

Full Access
Question # 39

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.

You have a computer named Computer1 that runs Windows 10. The computer contains a folder. The folder contains sensitive data.

You need to log which user reads the contents of the folder and modifies and deletes files in the folder.

Solution: From the properties of the folder, you configure the Auditing settings and from the Audit Policy in the local Group Policy, you configure Audit directory service access.

Does this meet the goal?

A.

Yes

B.

No

Full Access