Practice Test Free
  • QUESTIONS
  • COURSES
    • CCNA
    • Cisco Enterprise Core
    • VMware vSphere: Install, Configure, Manage
  • CERTIFICATES
No Result
View All Result
  • Login
  • Register
Quesions Library
  • Cisco
    • 200-301
    • 200-901
      • Multiple Choice
      • Drag Drop
    • 350-401
      • Multiple Choice
      • Drag Drop
    • 350-701
    • 300-410
      • Multiple Choice
      • Drag Drop
    • 300-415
      • Multiple Choice
      • Drag Drop
    • 300-425
    • Others
  • AWS
    • CLF-C02
    • SAA-C03
    • SAP-C02
    • ANS-C01
    • Others
  • Microsoft
    • AZ-104
    • AZ-204
    • AZ-305
    • AZ-900
    • AI-900
    • SC-900
    • Others
  • CompTIA
    • SY0-601
    • N10-008
    • 220-1101
    • 220-1102
    • Others
  • Google
    • Associate Cloud Engineer
    • Professional Cloud Architect
    • Professional Cloud DevOps Engineer
    • Others
  • ISACA
    • CISM
    • CRIS
    • Others
  • LPI
    • 101-500
    • 102-500
    • 201-450
    • 202-450
  • Fortinet
    • NSE4_FGT-7.2
  • VMware
  • >>
    • Juniper
    • EC-Council
      • 312-50v12
    • ISC
      • CISSP
    • PMI
      • PMP
    • Palo Alto Networks
    • RedHat
    • Oracle
    • GIAC
    • F5
    • ITILF
    • Salesforce
Contribute
Practice Test Free
  • QUESTIONS
  • COURSES
    • CCNA
    • Cisco Enterprise Core
    • VMware vSphere: Install, Configure, Manage
  • CERTIFICATES
No Result
View All Result
Practice Test Free
No Result
View All Result
Home Practice Questions Free

MD-100 Practice Questions Free

Table of Contents

Toggle
  • MD-100 Practice Questions Free – 50 Exam-Style Questions to Sharpen Your Skills
  • Free Access Full MD-100 Practice Questions Free

MD-100 Practice Questions Free – 50 Exam-Style Questions to Sharpen Your Skills

Are you preparing for the MD-100 certification exam? Kickstart your success with our MD-100 Practice Questions Free – a carefully selected set of 50 real exam-style questions to help you test your knowledge and identify areas for improvement.

Practicing with MD-100 practice questions free gives you a powerful edge by allowing you to:

  • Understand the exam structure and question formats
  • Discover your strong and weak areas
  • Build the confidence you need for test day success

Below, you will find 50 free MD-100 practice questions designed to match the real exam in both difficulty and topic coverage. They’re ideal for self-assessment or final review. You can click on each Question to explore the details.

Question 1

HOTSPOT -
You have two workgroup computers named Computer1 and Computer2 that run Windows 10. The computers contain the local security principals shown in the following table.
 Image
Which security principals can be members of GroupA and GroupC? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
Hot Area:
 Image

 


Suggested Answer:
Correct Answer Image

 

Question 2

SIMULATION -
Please wait while the virtual machine loads. Once loaded, you may proceed to the lab section. This may take a few minutes, and the wait time will not be deducted from your overall test time.
When the Next button is available, click it to access the lab section. In this section, you will perform a set of tasks in a live environment. While most functionality will be available to you as it would be in a live environment, some functionality (e.g., copy and paste, ability to navigate to external websites) will not be possible by design.
Scoring is based on the outcome of performing the tasks stated in the lab. In other words, it doesn't matter how you accomplish the task, if you successfully perform it, you will earn credit for that task.
Labs are not timed separately, and this exam may more than one lab that you must complete. You can use as much time as you would like to complete each lab.
But, you should manage your time appropriately to ensure that you are able to complete the lab(s) and all other sections of the exam in the time provided.
Please note that once you submit your work by clicking the Next button within a lab, you will NOT be able to return to the lab.
Username and password -
 Image
Use the following login credentials as needed:
To enter your password, place your cursor in the Enter password box and click on the password below.
Username: Contoso/Administrator -
Password: Passw0rd!
The following information is for technical support purposes only:
Lab Instance: 11145882 -
 Image
 Image
You need to create an HTML report that shows which policies and policy settings are applied to CONTOSOUser1 on Client1. You must save the output to a file named Report.html in a folder named Folder1 on the C drive of Client1.
To complete this task, sign in to the required computer or computers.

 


Suggested Answer: See explanation below.

On Client1, log in as administrator.
Open command prompt and type:
gpresult /h CONTOSOUser1C:Folder1Report.html
Reference:
https://www.google.co.za/search?biw=1366&bih=614&sxsrf=ALeKk01XD_luAn4X-bIMllUjpYBm0i7btQ%

3A1592996005097&ei=pTDzXqLCBaif1fAP1NODqAY&q=gpresult+%2Fh+report.html+location&oq=gpresult+html+report
+&gs_lcp=CgZwc3ktYWIQARgEMgIIADICCAAyBggAEBYQHjIGCAAQFhAeMgYIABAWEB4yBggAEBYQHjIGCAAQFhAeMgYIABAWEB4yCAgAEBYQChAeMgYI
ABAWEB46BAgAEEdQyOUnWMjlJ2CRhihoAHACeACAAZIDiAGSA5IBAzQtMZgBAKABAaoBB2d3cy13aXo&sclient=psy-ab

Question 3

SIMULATION -
Please wait while the virtual machine loads. Once loaded, you may proceed to the lab section. This may take a few minutes, and the wait time will not be deducted from your overall test time.
When the Next button is available, click it to access the lab section. In this section, you will perform a set of tasks in a live environment. While most functionality will be available to you as it would be in a live environment, some functionality (e.g., copy and paste, ability to navigate to external websites) will not be possible by design.
Scoring is based on the outcome of performing the tasks stated in the lab. In other words, it doesn't matter how you accomplish the task, if you successfully perform it, you will earn credit for that task.
Labs are not timed separately, and this exam may more than one lab that you must complete. You can use as much time as you would like to complete each lab.
But, you should manage your time appropriately to ensure that you are able to complete the lab(s) and all other sections of the exam in the time provided.
Please note that once you submit your work by clicking the Next button within a lab, you will NOT be able to return to the lab.
Username and password -
 Image
Use the following login credentials as needed:
To enter your password, place your cursor in the Enter password box and click on the password below.
Username: Contoso/Administrator -
Password: Passw0rd!
The following information is for technical support purposes only:
Lab Instance: 10921597 -
 Image
You need to ensure that Client3 starts in safe mode automatically the next time the computer restarts. After completing the task, you must NOT restart Client3.
To complete this task, sign in to the required computer or computers.

 


Suggested Answer: See explanation below.

1. From Client3, open the System Configuration utility by pressing the Windows & R keys simultaneously to display the Run box .
2. Type ג€msconfigג€ into the box, and then click OK.
Reference Image
3. In the ג€System Configurationג€ window, switch to the ג€Bootג€ tab.
4. Enable the ג€Safe Bootג€ check box, and then make sure the ג€Minimalג€ option below that is selected. Click the ג€OKג€ button when you’re done.
Reference Image
5. You will be prompted to Restart or Exit without restart. Click Exit without restart.
Reference Image
Reference: alt=”Reference Image” />
3. In the ג€System Configurationג€ window, switch to the ג€Bootג€ tab.
4. Enable the ג€Safe Bootג€ check box, and then make sure the ג€Minimalג€ option below that is selected. Click the ג€OKג€ button when you’re done.
Reference Image
5. You will be prompted to Restart or Exit without restart. Click Exit without restart.
<img src=”https://www.examtopics.com/assets/media/exam-media/04292/0039700002.jpg” alt=”Reference Image” />
Reference:
https://www.howtogeek.com/howto/windows-vista/force-windows-to-boot-into-safe-mode-without-using-the-f8-key/

Question 4

Your network contains an Active Directory domain. All users have been issued with new computers that run Windows 10 Enterprise. All users have Microsoft 365
E3 licenses.
A user named Mia Hamm has an Active Directory user account named MHamm and a computer named Computer1. Mia Hamm reports that Computer1 is not activated.
You need to ensure that Mia Hamm can activate Computer1.
What should you do?

A. Assign a Windows 10 Enterprise license to MHamm, and then activate Computer1.

B. From the Microsoft Deployment Toolkit (MDT), redeploy Computer1.

C. From System Properties on Computer1, enter a Volume License Key, and then activate Computer1.

D. Instruct Mia Hamm to perform a local AutoPilot Reset on Computer1, and then activate Computer1.

 


Suggested Answer: D

Mia Hamm reports that Computer1 is not activated.
The solution is to perform a local AutoPilot Reset on the computer. This will restore the computer settings to a fully-configured or known IT-approved state. When the user signs in to Computer1 after the reset, the computer should activate.
You can use Autopilot Reset to remove personal files, apps, and settings from your devices. The devices remain enrolled in Intune and are returned to a fully- configured or known IT-approved state. You can Autopilot Reset a device locally or remotely from the Intune for Education portal.
Incorrect Answers:
A: All users have Microsoft 365 E3 licenses. This license includes Windows 10 Enterprise so we don’t need to assign a Windows 10 Enterprise license to Mia
Hamm.
B: Redeploying Computer1 is not required.
C: A Volume License Key is not required.
Reference:
https://docs.microsoft.com/en-us/windows/deployment/windows-autopilot/windows-autopilot-requirements-licensing
https://docs.microsoft.com/en-us/intune-education/autopilot-reset

Question 5

You have a computer that runs Windows 10 and hosts four Hyper-V virtual machines that run Windows 10.
You upgrade the computer to Windows 11.
You need to ensure that the virtual machines support hibernation.
What should you do?

A. Enable integration services.

B. Delete any virtual machine checkpoints.

C. Rebuild the virtual machines as generation 2 virtual machines.

D. Update the configuration version of the virtual machines.

 


Suggested Answer: D

 

Question 6

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
You have a computer named Computer1 that runs Windows 10.
You test Windows updates on Computer1 before you make the updates available to other computers.
You install a quality update that conflicts with a custom device driver.
You need to remove the update from Computer1.
Solution: From an elevated command prompt, you run the wmic qfe delete command.
Does this meet the goal?

A. Yes

B. No

 


Suggested Answer: B

 

Question 7

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
Your network contains an Active Directory domain. The domain contains a computer named Computer1 that runs Windows 8.1.
Computer1 has apps that are compatible with Windows 10.
You need to perform a Windows 10 in-place upgrade on Computer1.
Solution: You copy the Windows 10 installation media to a network share. From Windows 8.1 on Computer1, you run setup.exe from the network share.
Does this meet the goal?

A. Yes

B. No

 


Suggested Answer: B

 

Question 8

You have computers that run Windows 10. The computers are joined to an Azure Active Directory (Azure AD) tenant and enrolled in Microsoft Intune.
You need to recommend a solution for help desk administrators that meets the following requirements:
✑ The administrators must assist users remotely by connecting to each user's computer.
✑ The remote connections must be initiated by the administrators. The users must approve the connection.
✑ Both the users and the administrators must be able to see the screen of the users' computer.
✑ The administrators must be able to make changes that require running applications as a member of each computer's Administrators group.
Which tool should you include in the recommendation?

A. Remote Desktop

B. Intune

C. Remote Assistance

D. Quick Assist

 


Suggested Answer: B

Reference:
https://docs.microsoft.com/en-us/mem/intune/remote-actions/remote-assist-mobile-devices

Question 9

HOTSPOT
-
You have a computer that runs Windows 10 and contains two users named User1 and User2.
User1 needs to add a custom environment variable. The variable must be present when User2 signs in to the computer. The solution must use the principle of least privilege.
To which group should you add User1, and what should User1 use to add the environment variable? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point
 Image

 


Suggested Answer:
Correct Answer Image

 

Question 10

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
Your network contains an Active Directory domain named contoso.com. The domain contains the users shown in the following table.
 Image
You have a computer named Computer1 that runs Windows 10 and is in a workgroup.
A local standard user on Computer1 named User1 joins the computer to the domain and uses the credentials of User2 when prompted.
You need to ensure that you can rename Computer1 as Computer33.
Solution: You use the credentials of User1 on Computer1.
Does this meet the goal?

A. Yes

B. No

 


Suggested Answer: B

Renaming a domain-joined computer will also rename the computer account in the domain. To do this, you need domain administrator privileges.
User1 is a standard user.
Reference:
https://docs.microsoft.com/en-us/windows/security/identity-protection/access-control/active-directory-security-groups#bkmk-domainadmins

Question 11

HOTSPOT -
You have 20 computers that run Windows 11.
You need to enable Windows Sandbox on the computers.
How should you complete the command? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
Hot Area:
 Image

 


Suggested Answer:
Correct Answer Image

Box 1: Enable-WindowsOptionalFeature
To Enable Windows 10 Sandbox with PowerShell,
1. Open PowerShell as Administrator.
2. Type or copy-paste the following command:
Enable-WindowsOptionalFeature -FeatureName “Containers-DisposableClientVM” -All -Online
3. When prompted to restart the computer, type Y, and press Enter.
4. The change can be undone with the following command:
5. Disable-WindowsOptionalFeature -FeatureName “Containers-DisposableClientVM” -Online
Box 2: “Containers-DisposableClientVM”
Reference:
https://winaero.com/enable-windows-10-sandbox-powershell-dism/

Question 12

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
You have a laptop named Computer1 that runs Windows 10.
When in range, Computer1 connects automatically to a Wi-Fi network named Wireless1.
You need to prevent Computer1 from automatically connecting to Wireless1.
Solution: From the Services console, you disable the Link-Layer Topology Discovery Mapper service.
Does this meet the goal?

A. Yes

B. No

 


Suggested Answer: B

Link-Layer Topology Discovery is used by their Network Map feature to display a graphical representation of the local area network (LAN) or wireless LAN
(WLAN), to which the computer is connected.
Reference:
https://en.wikipedia.org/wiki/Link_Layer_Topology_Discovery

Question 13

HOTSPOT -
Your network contains the segments shown in the following table.
 Image
You have computers that run Windows 10 and are configured as shown in the following table.
 Image
Windows Defender Firewall has the File and Printer Sharing allowed apps rule shown in the following table.
 Image
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
NOTE: Each correct selection is worth one point.
Hot Area:
 Image

 


Suggested Answer:
Correct Answer Image

 

Question 14

You have the computers shown in the following table.
 Image
You plan to install Windows 11 and enable BitLocker Drive Encryption (BitLocker).
On which computer should you install Windows 11 and enable BitLocker?

A. Computer1

B. Computer2

C. Computer3

D. Computer4

 


Suggested Answer: C

 

Question 15

You have a computer named Computer1 that runs Windows 11.
You are often prompted to restart Computer1 after Windows updates are installed.
You need to minimize disruptions caused by restarting Computer1.
What should you configure?

A. Download updates over metered connections

B. Delivery Optimization

C. Focus assist

D. Active hours

 


Suggested Answer: D

 

Question 16

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
You have a computer named Computer1 that runs Windows 10.
A service named Application1 is configured as shown in the exhibit.
 Image
You discover that a user used the Service1 account to sign in to Computer1 and deleted some files.
You need to ensure that the identity used by Application1 cannot be used by a user to sign in to sign in to the desktop on Computer1. The solution must use the principle of least privilege.
Solution: On Computer1, you assign Service1 the Deny log on as a service user right.
Does this meet the goal?

A. Yes

B. No

 


Suggested Answer: B

A service account needs the log on as a service user right. When you assign an account to be used by a service, that account is granted the log on as a service user right. Therefore, assigning Service1 the deny log on as a service user right would mean the service would not function.
To sign in to the desktop on the computer, an account needs the log on locally right which all user accounts have by default. To meet the requirements of this question, we need to assign Service1 the deny log on locally user right, not the deny log on as a service user right.
Reference:
https://docs.microsoft.com/en-us/windows/security/threat-protection/security-policy-settings/deny-log-on-as-a-service

Question 17

HOTSPOT -
You need to meet the technical requirements for the helpdesk users.
What should you do? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
Hot Area:
 Image

 


Suggested Answer:
Correct Answer Image

Reference:
https://www.itprotoday.com/compute-engines/what-group-policy-creator-owners-group

Question 18

Your network contains an Active Directory domain named contoso.com.
A user named User1 has a personal computer named Computer1 that runs Windows 10 Pro. User1 has a VPN connection to the corporate network.
You need to ensure that when User1 connects to the VPN, network traffic uses a proxy server located in the corporate network. The solution must ensure that
User1 can access the Internet when disconnected from the VPN.
What should you do?

A. From Control Panel, modify the Windows Defender Firewall settings

B. From the Settings app, modify the Proxy settings for the local computer

C. From Control Panel, modify the properties of the VPN connection

D. From the Settings app, modify the properties of the VPN connection

 


Suggested Answer: D

In the Properties of the VPN you can add a proxy setting. The proxy setting will only be active when the user connects to the VPN.

Question 19

You have a computer that runs Windows 10.
You need to clear the DNS client cache.
Which command should you run?

A. ipconfig.exe

B. arp.exe

C. nslookup.exe

D. netstat.exe

 


Suggested Answer: A

The Clear-DnsClientCache cmdlet deletes all the contents of the DNS client cache. Running this cmdlet is equivalent to running ipconfig /flushdns .
Reference:
https://docs.microsoft.com/en-us/powershell/module/dnsclient/clear-dnsclientcache

Question 20

You customize the Start menu on a computer that runs Windows 10 as shown in the following exhibit.
 Image
You need to add Remote Desktop Connection to Group1 and remove Group3 from the Start menu.
Which two actions should you perform from the Start menu customizations? Each correct answer presents part of the solution.
NOTE: Each correct selection is worth one point.

A. Unlock Group1.

B. Remove Command Prompt from Group1.

C. Delete Group3.

D. Add Remote Desktop Connection to Group1.

E. Rename Group3 as Group1.

 


Suggested Answer: AD

A: You have to unlock Group1 before you can make any changes to it.
D: If you drag the Remote Desktop Connection from Group3 to Group1, Group3 will disappear.

Question 21

Your company has an on-premises network that contains an Active Directory domain. The domain is synced to Microsoft Azure Active Directory (Azure AD). All computers in the domain run Windows 10 Enterprise.
You have a computer named Computer1 that has a folder named C:Folder1.
You want to use File History to protect C:Folder1.
Solution: You enable File History on Computer1. You then encrypt the contents of Folder1.
Does this meet the goal?

A. Yes

B. No

 


Suggested Answer: B

File History only backs up copies of files that are in Libraries, and Desktop folders and the OneDrive files available offline on your PC. If you have files or folders elsewhere that you want backed up, you can add them to one of these folders.
Reference:
https://support.microsoft.com/en-us/help/17128/windows-8-file-history

Question 22

You have a computer that runs Windows 10.
You discover that Windows updates are failing to install on the computer.
You need to generate a log file that contains detailed information about the failures.
Which cmdlet should you run?

A. Getג€”LogProperties

B. Getג€”WindowsErrorReporting

C. Getג€”WindowsUpdateLog

D. Getג€”WinEvent

 


Suggested Answer: C

Reference:
https://docs.microsoft.com/en-us/powershell/module/windowsupdate/get-windowsupdatelog?view=win10-ps

Question 23

You have a computer that runs Windows 10.
You sign in by using your Microsoft account and set up the Microsoft OneDrive sync app to connect to your personal OneDrive account.
You plan to configure OneDrive to back up the important PC Folders.
Which three folders can be backed up by OneDrive?

A. Desktop, Documents, and Pictures

B. Desktop, Music, and Pictures

C. Documents, Music, and Videos

D. Music, Pictures, and Videos

 


Suggested Answer: A

Reference:
https://support.microsoft.com/en-us/office/back-up-your-documents-pictures-and-desktop-folders-with-onedrive-d61a7930-a6fb-4b95-b28a-6552e77c3057

Question 24

SIMULATION -
Please wait while the virtual machine loads. Once loaded, you may proceed to the lab section. This may take a few minutes, and the wait time will not be deducted from your overall test time.
When the Next button is available, click it to access the lab section. In this section, you will perform a set of tasks in a live environment. While most functionality will be available to you as it would be in a live environment, some functionality (e.g., copy and paste, ability to navigate to external websites) will not be possible by design.
Scoring is based on the outcome of performing the tasks stated in the lab. In other words, it doesn't matter how you accomplish the task, if you successfully perform it, you will earn credit for that task.
Labs are not timed separately, and this exam may more than one lab that you must complete. You can use as much time as you would like to complete each lab.
But, you should manage your time appropriately to ensure that you are able to complete the lab(s) and all other sections of the exam in the time provided.
Please note that once you submit your work by clicking the Next button within a lab, you will NOT be able to return to the lab.
Username and password -
 Image
Use the following login credentials as needed:
To enter your password, place your cursor in the Enter password box and click on the password below.
Username: Contoso/Administrator -
Password: Passw0rd!
The following information is for technical support purposes only:
Lab Instance: 10921597 -
 Image
You need to enable the Prohibit User from manually redirecting Profile Folders Group Policy setting only for the administrative users of Client3.
To complete this task, sign in to the required computer or computers.

 


Suggested Answer: See explanation below.

1. Open the Administrator Group Local Group Policy Editor.
2. In the left pane, click on User Configuration, Administrative Templates, and Desktop.
Reference Image
3. In the right pane, right click on Prohibit User from Manually redirecting Profile Folders and click on Properties.
4. To Prevent User Profile Folders Location Change
Select (dot) Enabled and click on OK.
Reference Image
5. Close the Local Group Policy Editor window.
Reference: alt=”Reference Image” />
3. In the right pane, right click on Prohibit User from Manually redirecting Profile Folders and click on Properties.
4. To Prevent User Profile Folders Location Change
Select (dot) Enabled and click on OK.
<img src=”https://www.examtopics.com/assets/media/exam-media/04292/0017100001.jpg” alt=”Reference Image” />
5. Close the Local Group Policy Editor window.
Reference:
https://www.vistax64.com/threads/user-profile-folders-prevent-or-allow-location-change.180719/

Question 25

You have a Windows 10 device that contains the users shown in the following table.
 Image
User1 runs the Resultant Set of Policy Wizard as shown in the following exhibit.
 Image
You need to ensure that User1 can perform a Resultant Set of Policy (RSoP) analysis for User2. The solution must use the principle of least privilege.
What should you do first?

A. Add User1 to the local Administrators group.

B. Add User2 to the local Performance Monitor Users group.

C. Run RSoP from an elevated-privilege account.

D. Add User1 to the local Performance Monitor Users group.

 


Suggested Answer: D

 

Question 26

You need to sign in as LocalAdmin on Computer11.
What should you do first?

A. From the LAPS UI tool, view the administrator account password for the computer object of Computer11.

B. From Windows Configuration Designer, create a configuration package that sets the password of the LocalAdmin account on Computer11.

C. Use a Group Policy object (GPO) to set the local administrator password.

D. From Microsoft Intune, set the password of the LocalAdmin account on Computer11.

 


Suggested Answer: A

Reference:
https://technet.microsoft.com/en-us/mt227395.aspx

Question 27

DRAG DROP
-
Your network contains an Active Directory domain named contoso.com. The domain contains the objects shown in the following table.
 Image
BitLocker Drive Encryption (BitLocker) recovery passwords are stored in Active Directory.
User1 enables the following on Computer1:
• BitLocker on drive C
• BitLocker on a removable drive named E
Which object stores the BitLocker recovery passwords for each drive? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
 Image

 


Suggested Answer:
Correct Answer Image

 

Question 28

HOTSPOT -
You deploy Windows 10 to a new computer named Computer1.
You sign in to Computer1 and create a user named User1.
You create a file named LayoutModification.xml in the C:UsersDefaultAppDataLocalMicrosoftWindowsShellfolder. LayoutModification.xml contains the following markup.
 Image
What is the effect of the configuration? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
Hot Area:
 Image

 


Suggested Answer:
Correct Answer Image

Reference:
https://docs.microsoft.com/en-us/windows/configuration/configure-windows-10-taskbar

Question 29

HOTSPOT -
Your network contains an Active Directory domain named adatum.com that uses Key Management Service (KMS) for activation.
You deploy a computer that runs Windows 10 to the domain.
The computer fails to activate.
You suspect that the activation server has an issue.
You need to identify which server hosts KMS.
How should you complete the command? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
Hot Area:
 Image

 


Suggested Answer:
Correct Answer Image

Reference:
https://docs.microsoft.com/en-us/office/troubleshoot/activation/discover-remove-unauthorized-office-windows-kms-hosts

Question 30

You manage devices that run Windows 10.
Ten sales users will travel to a location that has limited bandwidth that is expensive. The sales users will be at the location for three weeks.
You need to prevent all Windows updates from downloading for the duration of the trip. The solution must not prevent access to email and the Internet.
What should you do?

A. From Network & Internet in the Settings app, set a data limit.

B. From Accounts in the Settings app, turn off Sync settings.

C. From Network & Internet in the Settings app, set the network connections as metered connections.

D. From Update & Security in the Settings app, pause updates.

 


Suggested Answer: C

 

Question 31

SIMULATION -
Please wait while the virtual machine loads. Once loaded, you may proceed to the lab section. This may take a few minutes, and the wait time will not be deducted from your overall test time.
When the Next button is available, click it to access the lab section. In this section, you will perform a set of tasks in a live environment. While most functionality will be available to you as it would be in a live environment, some functionality (e.g., copy and paste, ability to navigate to external websites) will not be possible by design.
Scoring is based on the outcome of performing the tasks stated in the lab. In other words, it doesn't matter how you accomplish the task, if you successfully perform it, you will earn credit for that task.
Labs are not timed separately, and this exam may more than one lab that you must complete. You can use as much time as you would like to complete each lab.
But, you should manage your time appropriately to ensure that you are able to complete the lab(s) and all other sections of the exam in the time provided.
Please note that once you submit your work by clicking the Next button within a lab, you will NOT be able to return to the lab.
Username and password -
 Image
Use the following login credentials as needed:
To enter your password, place your cursor in the Enter password box and click on the password below.
Username: Contoso/Administrator -
Password: Passw0rd!
The following information is for technical support purposes only:
Lab Instance: 10921597 -
 Image
You need to create a group named Group2 on Client2. The members of Group2 must be able to change the system time. The solution must use the principle of least privilege.
To complete this task, sign in to the required computer or computers.

 


Suggested Answer: See explanation below.

1. On Client2, Press Windows+R
2. Type lusrmgr.msc
3. Right click Groups and click New Group.
4. Type in the Group name and a description.
5. Click Add to add members to this group. Specify the name of the user or group or computer to be added.
6. Click Create and Close.
1. Press the Win + R keys to open Run, type secpol.msc into Run, and click/tap on OK to open Local Security Policy.
2. Expand open Local Policies in the left pane of Local Security Policy, click/tap on User Rights Assignment, and double click/tap on the Change the system time policy in the right pane.
3. Click/tap on the Add User or Group button.
4. Click/tap on the Object Types button.
5. Check all the boxes for Object types, and click/tap on the OK.
6. Click/tap on the Advanced button.
7. Click/tap on the Find Now button, select the name of the user or group
8. Click/tap on OK.
9. Click/tap on OK.
10.When finished, you can close Local Users and Groups.
Reference:
https://www.windows-active-directory.com/local-user-management.html
https://www.tenforums.com/tutorials/92910-allow-prevent-users-groups-change-time-windows-10-a.html#option1

Question 32

You have a Windows 10 device named Device1 that contains the users shown in the following table.
 Image
Device1 contains the local Group Policy Objects (GPOs) shown in the following exhibit.
 Image
You need to configure Device1 to meet the following requirements:
•	Deny User1 the right to sign in locally.
•	Ensure that a logon script runs only when User2 signs in to Device1.
•	Ensure that no login scripts run when User1 or Admin1 sign in to Device1.
Which two policies should you modify? Each correct answer presents part of the solution.
NOTE: Each correct selection is worth one point.

A. Local ComputerUser1 Policy

B. Local Computer Policy

C. Local ComputerUser2 Policy

D. Local ComputerNon-Administrators Policy

E. Local ComputerAdmin1 Policy

F. Local ComputerAdministrators Policy

 


Suggested Answer: AC

 

Question 33

You deploy Windows 10 to a computer named Computer1.
Computer1 contains a folder named C:Folder1. Folder1 contains multiple documents.
You need to ensure that you can recover the files in Folder1 by using the Previous Versions tab.
What are three possible ways to achieve the goal? Each correct answer presents a complete the solution.
NOTE: Each correct selection is worth one point.

A. Set up Backup and Restore (Windows 7) and include Folder1 in the backup.

B. Enable File History and add Folder1 to File History.

C. Enable File History and include Folder1 in the Documents library.

D. Select Allow files in this folder to have contents indexed in addition to file properties from the properties of Folder1.

E. Select Folder is ready for archiving from the properties of Folder1.

 


Suggested Answer: ABC

Reference:
https://www.tenforums.com/tutorials/79490-restore-previous-versions-files-folders-drives-windows-10-a.html

Question 34

Your network contains an Active Directory domain that is synced to a Microsoft Azure Active Directory (Azure AD) tenant.
The company plans to purchase computers preinstalled with Windows 10 Pro for all users.
The company the following requirements:
✑ The new computers must be upgraded to Windows 10 Enterprise automatically.
✑ The new computers must be joined to Azure AD automatically when the user starts the new computers for the first time.
✑ The users must not be required to accept the End User License Agreement (EULA).
You need to deploy the new computers.
What should you do?

A. Make use of the wipe and load refresh deployment method.

B. Perform in-place upgrade on the new computers.

C. Provide provisioning packages for the new computers.

D. Make use of Windows Autopilot.

 


Suggested Answer: D

Windows Autopilot is a collection of technologies used to set up and pre-configure new devices, getting them ready for productive use. You can also use Windows
Autopilot to reset, repurpose and recover devices.
The OEM Windows 10 installation on the new computers can be transformed into a “business-ready” state, applying settings and policies, installing apps, and even changing the edition of Windows 10 being used (e.g. from Windows 10 Pro to Windows 10 Enterprise) to support advanced features.
The only interaction required from the end user is to connect to a network and to verify their credentials. Everything beyond that is automated.
Reference:
https://docs.microsoft.com/en-us/windows/deployment/windows-autopilot/windows-autopilot

Question 35

HOTSPOT
-
You have a computer named Computer1 that runs Windows 11. Computer1 has a single network interface and contains the Hyper-V virtual switches shown in the following exhibit.
 Image
Use the drop-down menus to select the answer choice that completes each statement based on the information presented in the graphic.
NOTE: Each correct selection is worth one point.
 Image

 


Suggested Answer:
Correct Answer Image

 

Question 36

You have a computer named Computer1 that runs Windows 10.
You need to enable boot logging on Computer1.
What should you do?

A. At a command prompt, run the bcdboot.exe command and specify the /v parameter.

B. From the Settings app, configure the Start settings.

C. From System Properties in Control Panel, configure the Startup and Recovery settings.

D. From System Configuration configure the Boot settings.

 


Suggested Answer: D

Reference:
https://www.windowscentral.com/how-enable-boot-log-windows-10

Question 37

DRAG DROP -
You have 100 domain-joined computers that run Windows 10.
You configure a custom Start layout on a source computer.
You need to apply the custom Start layout to the domain-joined computers. The solution must minimize administrative effort.
Which three actions should you perform in sequence? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.
Select and Place:
 Image

 


Suggested Answer:
Correct Answer Image

Step 1: Export the layout to an XML file.
When you have the Start layout that you want your users to see, use the Export-StartLayout cmdlet in Windows PowerShell to export the Start layout to an .xml file.
Step 2: Copy the layout file to a network share
The .xml file with the Start and taskbar layout must be located on shared network storage that is available to the users’ computers when they sign in and the users must have Read-only access to the file.
Step 3: Create a Group Policy Object (GPO) and configure the Start Layout settings.
Reference:
https://docs.microsoft.com/en-us/windows/configuration/customize-and-export-start-layout
https://docs.microsoft.com/en-us/windows/configuration/customize-windows-10-start-screens-by-using-group-policy

Question 38

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
A user named User1 has a computer named Computer1 that runs Windows 10. Computer1 is joined to an Azure Active Directory (Azure AD) tenant named contoso.com. User1 joins Computer1 to contoso.com by using
user1@contoso.com
.
Computer1 contains a folder named Folder1. Folder1 is in drive C and is shared as Share1. Share1 has the permission shown in the following table.
 Image
A user named User2 has a computer named Computer2 that runs Windows 10. User2 joins Computer2 to contoso.com by using
user2@contoso.com
.
User2 attempts to access Share1 and receives the following error message: `The username or password is incorrect.`
You need to ensure that User2 can connect to Share1.
Solution: In Azure AD, you create a group named Group1 that contains User1 and User2. You grant Group1 Modify access to Folder1.
Does this meet the goal?

A. Yes

B. No

 


Suggested Answer: A

Reference:
https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/cc754178(v%3dws.10)

Question 39

HOTSPOT -
You need to meet the technical requirement for Computer1.
What should you do? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
Hot Area:
 Image

 


Suggested Answer:
Correct Answer Image

The requirement states: Kiosk (assigned access) must be configured on Computer1.
Kiosk (assigned access) is a feature on Windows 10 that allows you to create a lockdown environment that lets users interact with only one app when they sign into a specified account. With Kiosk (assigned access), users won’t be able to get to the desktop, Start menu, or any other app, including the Settings app.
Box 1: User 11 –
Kiosk (assigned access) must be configured by a user who is a member of the Local Administrators group on the Computer.
Box 2: User 12.
Kiosk (assigned access) must be configured for a user account that is a member of the Users group.
Reference:
https://www.windowscentral.com/how-set-assigned-access-windows-10

Question 40

HOTSPOT -
Your company uses a Key Management Service (KMS) to activate computers that run Windows 10.
A user works remotely and establishes a VPN connection once a month.
The computer of the user fails to be activated.
Which command should you run on the computer to initiate activation? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
Hot Area:
 Image

 


Suggested Answer:
Correct Answer Image

To activate online, type slmgr.vbs /ato.
Reference:
https://docs.microsoft.com/en-us/windows/deployment/volume-activation/activate-using-key-management-service-vamt
https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2012-R2-and-2012/dn502540(v=ws.11)

Question 41

HOTSPOT -
You have a workgroup computer named Computer1 that runs Windows 10 and has the users shown in the following table.
 Image
User Account Control (UAC) on Computer1 is configured as shown in the following exhibit.
 Image
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
NOTE: Each correct selection is worth one point.
Hot Area:
 Image

 


Suggested Answer:
Correct Answer Image

Box 1: Yes –
User Account Control: Behavior of the elevation prompt for administrators in Admin Approval Mode is set to Prompt for consent When an operation requires elevation of privilege, the user is prompted to select either Permit or Deny. If the user selects Permit, the operation continues with the user’s highest available privilege.
Box 2: Yes –
User1 is a member of Administrators group.
User Account Control: Behavior of the elevation prompt for administrators in Admin Approval Mode is set to Prompt for consent When an operation requires elevation of privilege, the user is prompted to select either Permit or Deny. If the user selects Permit, the operation continues with the user’s highest available privilege.
Box 3: Yes –
User Account Control: Behavior of the elevation prompt for standard users is set to Prompt for credentials (Default) When an operation requires elevation of privilege, the user is prompted to enter an administrative user name and password. If the user enters valid credentials, the operation continues with the applicable privilege.
Reference:
https://docs.microsoft.com/en-us/windows/security/identity-protection/user-account-control/user-account-control-security-policy-settings

Question 42

Your network contains an Active Directory domain. All users have been issued with computers that run Windows 8.1.
A user named Mia Hamm has a computer named Computer1. You upgrade Computer1 to Windows 10 by performing a clean installation of Windows 10 without formatting the drives.
You need to migrate the settings for Mia Hamm from Windows 8.1 to Windows 10.
Which two actions should you perform?
NOTE: Each correct selection is worth one point.

A. Run scanstate.exe and specify the C:Users folder

B. Run loadstate.exe and specify the C:Windows.old folder

C. Run usmultils.exe and specify the C:Users folder

D. Run scanstate.exe and specify the C:Windows.old folder

E. Run loadstate.exe and specify the C:Users folder

F. Run usmultils.exe and specify the C:Windows.old folder

 


Suggested Answer: DE

D: As we have performed a clean installation of Windows 10 without formatting the drives, User1’s Windows 8.1 user profile will be located in the Windows.old folder. Therefore, we need to run scanstate.exe on the Windows.old folder.
E: User1’s Windows 10 profile will be in the C:Users folder so we need to run loadstate.exe to apply the changes in the C:Users folder.
Reference:
https://docs.microsoft.com/en-us/windows/deployment/usmt/usmt-how-it-works
https://docs.microsoft.com/en-us/windows/deployment/usmt/usmt-common-migration-scenarios#bkmk-fourpcrefresh

Question 43

You have an Azure Active Directory (Azure AD) tenant named contoso.com.
You have a workgroup computer named Computer1 that runs Windows 10.
You need to add Computer1 to contoso.com.
What should you use?

A. Computer Management

B. dsregcmd.exe

C. the Settings app

D. netdom.exe

 


Suggested Answer: C

You join a computer to a domain, including an Azure AD domain in the Settings panel in Windows 10, under System->About
Reference:
https://aadguide.azurewebsites.net/aadjoin/

Question 44

You have a workgroup computer that runs Windows 10.
You create a local user named User1.
User1 needs to be able to share and manage folders located in a folder named C:Share by using the Shared Folders snap-in. The solution must use the principle of least privilege.
To which group should you add User1?

A. Administrators

B. Device Owners

C. Users

D. Power Users

 


Suggested Answer: A

 

Question 45

Your network contains an Active Directory domain. The domain contains computers that run Windows 10.
All users use Roaming User Profiles.
You have a user named Public1 that is used to sign-in to a public computer.
You need to prevent changes to the user settings of Public1 from being saved to the user profile.
What should you do?

A. Rename Ntuser.dat to Ntuser.v6.

B. Rename the Roaming User Profile folder to Public 1.v1.

C. Rename the Roaming User Profile folder to Public1.man.

D. Rename Ntuser.dat to Ntuser.man.

 


Suggested Answer: D

 

Question 46

You have a computer named Computer1 that runs Windows 10.
From Event Viewer on Computer1, you have a task named Action1 that is attached to the following event:
✑ Log: System
✑ Source: Kernel-General
✑ Event ID: 16
You need to modify the settings of Action1.
What should you use?

A. the Settings app

B. Task Scheduler

C. Event Viewer

D. System Configuration

 


Suggested Answer: C

An Event Viewer task is created and modified in Event Viewer.
Reference:
https://www.techrepublic.com/article/how-to-use-custom-views-in-windows-10s-event-viewer/

Question 47

HOTSPOT -
Your network contains an Active Directory forest. The forest contains a root domain named contoso.com and a child domain named corp.contoso.com.
You have a computer named Computer1 that runs Windows 10. Computer1 is joined to the corp.contoso.com domain.
Computer1 contains a folder named Folder1. In the Security settings of Folder1, Everyone is assigned the Full control permission.
On Computer1, you share Folder1 as Share1 and assign the Read permissions for Share1 to the local Users group.
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
NOTE: Each correct selection is worth one point.
Hot Area:
 Image

 


Suggested Answer:
Correct Answer Image

Reference:
https://www.techrepublic.com/article/learn-the-basic-differences-between-share-and-ntfs-permissions/

Question 48

User1 is a member of the Administrators group on a computer that runs Windows 10.
When User1 attempts to view the security settings of a folder named C:SecretData, the user receives the message in the Security exhibit. (Click the Security tab.)
 Image
On the computer, you sign in as a member of the Administrators group and view the permissions to C:SecretData as shown in the Permissions exhibit. (Click the
Permissions tab.)
 Image
You need to restore Use1's access to C:SecretData.
What should you do first?

A. From the Permissions tab of Advanced Security Settings for SecretData, select Change to take ownership of the folder.

B. From the Permissions tab of Advanced Security Settings for SecretData, select Continue to attempt the operation by using administrative privileges.

C. Assign User1 Full control permissions to the C folder and set the inheritance to This folder, subfolders and files.

D. From an elevated command prompt, run cacls.exe c:secretdata /g user1:F.

 


Suggested Answer: B

Reference:
https://docs.microsoft.com/en-us/troubleshoot/windows-server/windows-security/dont-have-permission-access-folder

Question 49

HOTSPOT
-
You have a computer named Computer1 that runs Windows 11.
You plan to create a storage space on Computer1 that will have the following configurations:
• Name: Data
• Drive letter: F
• File system: NTFS
• Resiliency type: Three-way mirror
What is the minimum number of data disks required, and what is the maximum number of disks that can fail while maintaining data availability? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
 Image

 


Suggested Answer:
Correct Answer Image

 

Question 50

You have a VPN server that accepts PPTP and L2TP connections and is configured as shown in the following exhibit.
 Image
A user named User1 has a computer that runs Windows 10 and has a VPN connection configured as shown in the following exhibit.
 Image
User1 fails to establish a VPN connection when connected to a home network.
You need to identify which VPN client setting must be modified.
What should you identify?

A. ServerAddress

B. TunnelType

C. AuthenticationMethod

D. L2tpIPsecAuth

E. EncryptionLevel

 


Suggested Answer: A

The server address is a private IP address. This needs to be the public IP address of the VPN server.

Free Access Full MD-100 Practice Questions Free

Want more hands-on practice? Click here to access the full bank of MD-100 practice questions free and reinforce your understanding of all exam objectives.

We update our question sets regularly, so check back often for new and relevant content.

Good luck with your MD-100 certification journey!

Share18Tweet11
Previous Post

MB-800 Practice Questions Free

Next Post

MLS-C01 Practice Questions Free

Next Post

MLS-C01 Practice Questions Free

MS-100 Practice Questions Free

MS-101 Practice Questions Free

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recommended

Network+ Practice Test

Comptia Security+ Practice Test

A+ Certification Practice Test

Aws Cloud Practitioner Exam Questions

Aws Cloud Practitioner Practice Exam

Comptia A+ Practice Test

  • About
  • DMCA
  • Privacy & Policy
  • Contact

PracticeTestFree.com materials do not contain actual questions and answers from Cisco's Certification Exams. PracticeTestFree.com doesn't offer Real Microsoft Exam Questions. PracticeTestFree.com doesn't offer Real Amazon Exam Questions.

  • Login
  • Sign Up
No Result
View All Result
  • Quesions
    • Cisco
    • AWS
    • Microsoft
    • CompTIA
    • Google
    • ISACA
    • ECCouncil
    • F5
    • GIAC
    • ISC
    • Juniper
    • LPI
    • Oracle
    • Palo Alto Networks
    • PMI
    • RedHat
    • Salesforce
    • VMware
  • Courses
    • CCNA
    • ENCOR
    • VMware vSphere
  • Certificates

Welcome Back!

Login to your account below

Forgotten Password? Sign Up

Create New Account!

Fill the forms below to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Insert/edit link

Enter the destination URL

Or link to existing content

    No search term specified. Showing recent items. Search or use up and down arrow keys to select an item.