This page was exported from Best Free Exam Guide [ http://free.exams4sures.com ] Export date:Sat Mar 15 12:08:26 2025 / +0000 GMT ___________________________________________________ Title: Get Nov-2023 updated MD-100 Certification Exam Sample Questions [Q186-Q204] --------------------------------------------------- Get Nov-2023 updated MD-100 Certification Exam Sample Questions MD-100 Study Guide Cover to Cover as Literally Q186. You have computers that run Windows 10. The computers are joined to an Azure Active Directory (Azure AD) tenant and enrolled in Microsoft Intune.You need to recommend a solution for help desk administrators that meets the following requirements:The administrators must assist users remotely by connecting to each user’s computer.The remote connections must be initiated by the administrators. The users must approve the connection.Both the users and the administrators must be able to see the screen of the users’ computer.The administrators must be able to make changes that require running applications as a member of each computer’s Administrators group.Which tool should you include in the recommendation?  Remote Desktop  Intune  Remote Assistance  Quick Assist References:https://docs.microsoft.com/en-us/mem/intune/remote-actions/remote-assist-mobile-devicesQ187. You install Windows 10 Pro on a computer named CLIENT1.You need to ensure that all per-user services are disabled on CLIENT1. The solution must minimize administrative effort.What should you use?  the sc command  Task Manager  Services  the sfc command Q188. You deploy Windows 10 to a new computer named Computer1.You sign in to Computer1 and create a user named User1.You create a file named LayoutModification.xml in the C:UsersDefaultAppDataLocalMicrosoftWindowsShellfolder. LayoutModification.xml contains the following markup.What is the effect of the configuration? To answer, select the appropriate options in the answer area.NOTE: Each correct selection is worth one point. Explanation:References:https://docs.microsoft.com/en-us/windows/configuration/configure-windows-10-taskbarQ189. You need to recommend a solution to configure the employee VPN connections.What should you include in the recommendation?  Remote Access Management Console  Group Policy Management Console (GPMC)  Connection Manager Administration Kit (CMAK)  Microsoft Intune ExplanationReferences:https://docs.microsoft.com/en-us/windows-server/remote/remote-access/vpn/always-on-vpn/deploy/vpn-deploy-cTopic 1, Fabrikam, Inc.OverviewExisting EnvironmentFabrikam, Inc. is a distribution company that has 500 employees and 100 contractors.Active DirectoryThe network contains an Active Directory forest named fabrikam.com. The forest is synced to Microsoft Azure Active Directory (Azure AD). All the employees are assigned Microsoft 365 E3 licenses.The domain contains a user account for an employee named User10.Client ComputersAll the employees have computers that run Windows 10 Enterprise. All the computers are installed without Volume License Keys. Windows 10 license keys are never issued.All the employees register their computer to Azure AD when they first receive the computer.User10 has a computer named Computer10.All the contractors have their own computer that runs Windows 10. None of the computers are joined to Azure AD.Operational ProceduresFabrikam has the following operational procedures:Updates are deployed by using Windows Update for Business.When new contractors are hired, administrators must help the contactors configure the following settings on their computer:– User certificates– Browser security and proxy settings– Wireless network connection settingsSecurity policiesThe following security policies are enforced on all the client computers in the domain:* All the computers are encrypted by using BitLocker Drive Encryption (BitLocker). BitLocker recovery* information is stored in Active Directory and Azure AD.* The local Administrators group on each computer contains an enabled account named LocalAdmin.* The LocalAdmin account is managed by using Local Administrator Password Solution (LAPS).Problem StatementsFabrikam identifies the following issues:* Employees in the finance department use an application named Application1. Application1 frequently crashes due to a memory error. When Application1 crashes, an event is written to the application log and an administrator runs a script to delete the temporary files and restart the application.* When employees attempt to connect to the network from their home computer, they often cannot establish a VPN connection because of misconfigured VPN settings.* An employee has a computer named Computer11. Computer11 has a hardware failure that prevents the computer from connecting to the network.* User10 reports that Computer10 is not activated.Technical requirementsFabrikam identifies the following technical requirements for managing the client computers:* Provide employees with a configuration file to configure their VPN connection.* Use the minimum amount of administrative effort to implement the technical requirements.* Identify which employees’ computers are noncompliant with the Windows Update baseline of the company.* Ensure that the service desk uses Quick Assist to take remote control of an employee’s desktop during support calls.* Automate the configuration of the contractors’ computers. The solution must provide a configuration file that the contractors can open from a Microsoft SharePoint site to apply the required configurations.Q190. You have a computer named Computer1. Computer1 runs Windows 10 Pro.You have a mobile device. You use Bluetooth to pair the mobile device to Computer1.You want to enable dynamic lock on Computer1.What should you do?To complete this task, sign in to the required computer or computers. On Computer1, select the Start button > Settings > Accounts > Sign-in options.Under Dynamic lock, select the Allow Windows to automatically lock your device when you’re away check box.Reference:https://support.microsoft.com/en-za/help/4028111/windows-lock-your-windows-10-pc-automatically-when-you-step-away-fromQ191. You are a network administrator at your company.A user attempts to start a computer and receives the following error message: “Bootmgr is missing.” You need to resolve the issue.You start the computer in recovery mode.Which command should you run next? To answer, select the appropriate options in the answer area.NOTE: Each correct selection is worth one point. Reference:https://neosmart.net/wiki/bootrec/#Bootrec_in_Windows10Q192. You have computers that run Windows 11 as shown in the following table.You ping 192.168.10.15 from Computed and discover that the request timed out. You need to ensure that you can successfully ping 192.168.10.15 from Computer1. Solution: On Computer1, you turn off Windows Defender Firewall-Does this meet the goal?  Yes  No Q193. You have a workgroup computer named Computer1 that runs Windows 10 and has the users shown in the following table.You have a file named File1.reg that contains the following content.You need to identify what occurs when User1 and User2 double-click File1.reg.What should you identify? To answer, select the appropriate options in the answer area.NOTE: Each correct selection is worth one point. ExplanationBox 1:User1 is a member of the Administrators group so has permission to add keys to both registry hives.Box 2:User2 is a standard user so does not have permission to add a key to the HKEY_LOCAL_MACHINE registry hive so Key2 will not be imported.Q194. Your network contains an Active Directory domain. The domain contains the users shown in the following table.The Authenticated Users group has the Add workstations to domain user right in the Default Domain Controllers Policy.The Device Managers and Help Desk groups are granted the Create Computer objects permission for the Computers container of the domain.You have 15 workgroup computers that run Windows 10. Each computer contains a local user account named LocalAdmin1 that is a member of the following groups:AdministratorsDevice OwnersAuthenticated UsersFor each of the following statements, select Yes if the statement is true. Otherwise, select No.NOTE: Each correct selection is worth one point. Q195. You have the computer shown in the following table.You plan to configure deployment rings for Windows 10 quality and feature updates.What is the maximum number of days you can defer installing quality updates, and which computers support installing feature updates from Windows Update? To answer, select the appropriate options in the answer area.NOTE: Each correct selection is worth one point. ExplanationGraphical user interface, text, application, email Description automatically generatedReference:https://docs.microsoft.com/en-us/windows/deployment/update/waas-configure-wufbQ196. You have a computer named Computer5 that runs Windows 10 that is used to share documents in a workgroup.You create three users named User-a, User-b, User-c. The users plan to access Computer5 from the network only.You have a folder named Data. The Advanced Security Settings for the Data folder are shown in the Security exhibit. (Click the Security Exhibit tab).You share the Data folder. The permission for User-a are shown in the User-a exhibit (Click the User-a tab.)The permissions for user-b are shown in the User-b exhibit. (Click the User-b tab.)The permissions for user-c are shown in the User-c exhibit. (Click the User-c tab.)For each of the following statements, select Yes if the statements is true. Otherwise, select No.NOTE: Reach correct selection is worth one point. Q197. Your network contains an Active Directory domain named contoso.com. The domain contains two computers named Computer1 and Computer2 that run Windows 10 and are joined to the domain.On Computer1, you create an event subscription named Subscription1 for Computer2 as shown in the Subscription1 exhibit. (Click the Subcription1 tab.)Subscription1 is configured to use forwarded events as the destination log.On Computer1, you create a custom view named View1 as shown in the View1 exhibit. (Click the View1 tab.)For each of the following statements, select Yes if the statement is true. Otherwise, select No.NOTE: Each correct selection is worth one point. Q198. You have a computer named Computer1 that runs Windows 10. Computer1 is in a workgroup.Computer1 contains the folders shown in the following table.On Computer1, you create the users shown in the following table.User1 encrypts a file named File1.txt that is in a folder named C:Folder1.What is the effect of the configuration? To answer, select the appropriate options in the answer area.NOTE: Each correct selection is worth one point. Reference:https://support.microsoft.com/en-za/help/310316/how-permissions-are-handled-when-you-copy-and-move-files-and-foldersQ199. Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.You manage devices that run Windows 10.Ten sales users will travel to a location that has limited bandwidth that is expensive. The sales users will be at the location for three weeks.You need to prevent all Windows updates from downloading for the duration of the trip. The solution must not prevent access to email and the Internet.Solution: From Network & Internet in the Settings app, you set the network connections as metered connections.Does this meet the goal?  Yes  No References:https://www.makeuseof.com/tag/5-ways-temporarily-turn-off-windows-update-windows-10/Q200. Your network contains an Active Directory domain named adatum.com, a workgroup, and computers that run Windows 10. The computers are configured as shown in the following table.The local Administrator accounts on Computer1, Computer2, and Computer3 have the same user name and password.On Computer1, Windows Defender Firewall is configured as shown in the following exhibit.The services on Computer1 have the following states.For each of the following statements, select Yes if the statement is true. Otherwise, select No.NOTE: Each correct selection is worth one point. Q201. You plan to deploy Windows 10 Enterprise to company-owned devices.You capture a Windows 10 image file from a reference device.You need to generate catalog files and answer files for the deployment.What should you use for each file? To answer, select the appropriate options in the answer area.NOTE: Each correct selection is worth one point. Reference:https://docs.microsoft.com/en-us/windows-hardware/customize/desktop/wsim/open-a-windows-image-or-catalog-fileQ202. You need to meet the technical requirement for User6.What should you do?  Add User6 to the Remote Desktop Users group in the domain.  Remove User6 from Group2 in the domain.  Add User6 to the Remote Desktop Users group on Computer2.  And User6 to the Administrators group on Computer2. Topic 3, Litware incTo start the case studyTo display the first question in this case study, click the Next button. Use the buttons in the left pane to explore the content of the case study before you answer the questions. Clicking these buttons displays information such as business requirements, existing environment, and problem statements. When you are ready to answer a question, click the Question button to return to the question.OverviewGeneral OverviewLitware, Inc. is a consulting company that has a main office in Montreal and branch offices in Seattle and New York.EnvironmentExisting EnvironmentThe network contains an on-premises Active Directory domain named litware.com. The domain contains the computers shown in the following table.The network that uses 192.168.10.0/24 connects to the internet by using a Network Address Translation (NAT) device.Windows Admin Center is installed on Server1.The domain contains the groups shown in the following table.The domain contains the users shown in the following table.Computer1 ConfigurationComputer1 contains the local user accounts shown in the following table.Computer1 contains a folder named D:Folder1 that has permission inheritance disabled.Computer1 contains a file named D:Folder1Report.docx that has the permissions shown in the following table.D:Folder1Report.docx has auditing configured as shown in the following table.The Local Computer Policy for Computer1 is configured as shown in the following table.Windows Defender Firewall for Computer1 has the rules shown in the following table.Computer2 ConfigurationComputer2 contains the local user accounts shown in the following table.Group1 and Group2 are members of the Remote Desktop Users group.The Local Computer Policy for Computer2 is configured as shown in the following table.Windows Defender Firewall for Computer2 has the rules shown in the following table.Computer3 ConfigurationComputer3 contains the local user accounts shown in the following table.Windows Defender Firewall for Computer3 has the rules shown in the following table.Requirements and Planned ChangesPlanned ChangesLitware plans to make the following changes on Computer1:Grant User1 Allow Full control permissions to D:Folder1Report.docx.Grant User2 Allow Full control permissions to D:Folder1Report.docx.Grant User3 Allow Full control permissions to D:Folder1.Technical RequirementsLitware identifies the following technical requirements:Configure custom Visual Effect performance settings for Computer1.Manage Computer2 by using Windows Admin Center.Minimize administrative effort.Delivery Optimization on the computers that run Windows 10 must be configured to meet the following requirements:Content must be downloaded only from an original source.Downloading content from peer cache clients must be prevented.Downloads must be optimized by using the Delivery Optimization cloud service.Q203. Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.You have two computers named Computer1 and Computer2 that run Windows 10.You have an Azure Active Directory (Azure AD) user account named admin@contoso.com that is in the local Administrators group on each computer.You sign in to Computer1 by using admin@contoso.com.You need to ensure that you can use Event Viewer on Computer1 to connect to the event logs on Computer2.Solution: On Computer2, you enable the Remote Event Log Management inbound rule from Windows Defender Firewall.Does this meet the goal?  Yes  No Explanation/Reference:https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/ cc766438(v=ws.11)?redirectedfrom=MSDNQ204. You have a computer that runs Windows 10.From the Settings app, you view the connection properties shown in the following exhibit.Use the drop-down menus to select the answer choice that completes each statement based on the information presented in the graphic.NOTE: Each correct selection is worth one point. Explanation Loading … 100% Real & Accurate MD-100 Questions and Answers with Free and Fast Updates: https://www.exams4sures.com/Microsoft/MD-100-practice-exam-dumps.html --------------------------------------------------- Images: https://free.exams4sures.com/wp-content/plugins/watu/loading.gif https://free.exams4sures.com/wp-content/plugins/watu/loading.gif --------------------------------------------------- --------------------------------------------------- Post date: 2023-11-03 13:23:50 Post date GMT: 2023-11-03 13:23:50 Post modified date: 2023-11-03 13:23:50 Post modified date GMT: 2023-11-03 13:23:50