Practice Test Free
  • QUESTIONS
  • COURSES
    • CCNA
    • Cisco Enterprise Core
    • VMware vSphere: Install, Configure, Manage
  • CERTIFICATES
No Result
View All Result
  • Login
  • Register
Quesions Library
  • Cisco
    • 200-301
    • 200-901
      • Multiple Choice
      • Drag Drop
    • 350-401
      • Multiple Choice
      • Drag Drop
    • 350-701
    • 300-410
      • Multiple Choice
      • Drag Drop
    • 300-415
      • Multiple Choice
      • Drag Drop
    • 300-425
    • Others
  • AWS
    • CLF-C02
    • SAA-C03
    • SAP-C02
    • ANS-C01
    • Others
  • Microsoft
    • AZ-104
    • AZ-204
    • AZ-305
    • AZ-900
    • AI-900
    • SC-900
    • Others
  • CompTIA
    • SY0-601
    • N10-008
    • 220-1101
    • 220-1102
    • Others
  • Google
    • Associate Cloud Engineer
    • Professional Cloud Architect
    • Professional Cloud DevOps Engineer
    • Others
  • ISACA
    • CISM
    • CRIS
    • Others
  • LPI
    • 101-500
    • 102-500
    • 201-450
    • 202-450
  • Fortinet
    • NSE4_FGT-7.2
  • VMware
  • >>
    • Juniper
    • EC-Council
      • 312-50v12
    • ISC
      • CISSP
    • PMI
      • PMP
    • Palo Alto Networks
    • RedHat
    • Oracle
    • GIAC
    • F5
    • ITILF
    • Salesforce
Contribute
Practice Test Free
  • QUESTIONS
  • COURSES
    • CCNA
    • Cisco Enterprise Core
    • VMware vSphere: Install, Configure, Manage
  • CERTIFICATES
No Result
View All Result
Practice Test Free
No Result
View All Result
Home Practice Exam Free

MD-100 Practice Exam Free

Table of Contents

Toggle
  • MD-100 Practice Exam Free – 50 Questions to Simulate the Real Exam
  • Free Access Full MD-100 Practice Exam Free

MD-100 Practice Exam Free – 50 Questions to Simulate the Real Exam

Are you getting ready for the MD-100 certification? Take your preparation to the next level with our MD-100 Practice Exam Free – a carefully designed set of 50 realistic exam-style questions to help you evaluate your knowledge and boost your confidence.

Using a MD-100 practice exam free is one of the best ways to:

  • Experience the format and difficulty of the real exam
  • Identify your strengths and focus on weak areas
  • Improve your test-taking speed and accuracy

Below, you will find 50 realistic MD-100 practice exam free questions covering key exam topics. Each question reflects the structure and challenge of the actual exam.

Question 1

You have 200 computers that run Windows 10 and are joined to an Active Directory domain.
You need to enable Windows Remote Management (WinRM) on all the computers by using Group Policy.
Which three actions should you perform? Each correct answer presents part of the solution.
NOTE: Each correct selection is worth one point.

A. Set the Startup Type of the Windows Remote Management (WS-Management) service to Automatic.

B. Enable the Windows Defender Firewall: Allow inbound Remote Desktop exceptions setting.

C. Enable the Allow remote server management through WinRM setting.

D. Enable the Windows Defender Firewall: Allow inbound remote administration exception setting.

E. Enable the Allow Remote Shell access setting.

F. Set the Startup Type of the Remote Registry service to Automatic.

 


Suggested Answer: ACD

Reference:
http://www.mustbegeek.com/how-to-enable-winrm-via-group-policy/

Question 2

Your network contains an Active Directory domain. The domain contains 1,000 computers that run Windows 10.
You configure Microsoft Edge settings by using domain and local Group Policy Objects (GPOs).
You need to generate a report that contains all the Microsoft Edge policy settings applied to a computer.
What should you do?

A. From Microsoft Edge, open edge://settings.

B. From a command prompt, run scanstate and specify the /genconfig parameter.

C. From Microsoft Edge, open edge://policy.

D. From the Start menu, select Group Policy Object Editor.

 


Suggested Answer: C

 

Question 3

You need to sign in as LocalAdmin on Computer11.
What should you do first?

A. From the LAPS UI tool, view the administrator account password for the computer object of Computer11.

B. From Windows Configuration Designer, create a configuration package that sets the password of the LocalAdmin account on Computer11.

C. Use a Group Policy object (GPO) to set the local administrator password.

D. From Microsoft Intune, set the password of the LocalAdmin account on Computer11.

 


Suggested Answer: A

Reference:
https://technet.microsoft.com/en-us/mt227395.aspx

Question 4

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
Your network contains an Active Directory domain. The domain contains a computer named Computer1 that runs Windows 8.1.
Computer1 has apps that are compatible with Windows 10.
You need to perform a Windows 10 in-place upgrade on Computer1.
Solution: You copy the Windows 10 installation media to a Microsoft Deployment Toolkit (MDT) deployment share. You create a task sequence, and then you run the MDT deployment wizard on Computer1.
Does this meet the goal?

A. Yes

B. No

 


Suggested Answer: A

Reference:
https://docs.microsoft.com/en-us/windows/deployment/deploy-windows-mdt/upgrade-to-windows-10-with-the-microsoft-deployment-toolkit

Question 5

HOTSPOT -
You have 20 computers that run Windows 11.
You need to enable Windows Sandbox on the computers.
How should you complete the command? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
Hot Area:
 Image

 


Suggested Answer:
Correct Answer Image

Box 1: Enable-WindowsOptionalFeature
To Enable Windows 10 Sandbox with PowerShell,
1. Open PowerShell as Administrator.
2. Type or copy-paste the following command:
Enable-WindowsOptionalFeature -FeatureName “Containers-DisposableClientVM” -All -Online
3. When prompted to restart the computer, type Y, and press Enter.
4. The change can be undone with the following command:
5. Disable-WindowsOptionalFeature -FeatureName “Containers-DisposableClientVM” -Online
Box 2: “Containers-DisposableClientVM”
Reference:
https://winaero.com/enable-windows-10-sandbox-powershell-dism/

Question 6

HOTSPOT -
You have three computers that run Windows 10 as shown in the following table.
 Image
All the computers have C and D volumes. The Require additional authentication at startup Group Policy settings is disabled on all the computers.
Which volumes can you encrypt by using BitLocker Drive Encryption (BitLocker)? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
Hot Area:
 Image

 


Suggested Answer:
Correct Answer Image

Reference:
https://www.windowscentral.com/how-use-bitlocker-encryption-windows-10

Question 7

You are troubleshooting an issue that prevents you from installing Windows 10 updates.
You discover that the issue relates to corrupt protected system files.
You need to restore the corrupt system files.
Which command should you run?

A. scanstate

B. sfc

C. chkdsk

D. chkntfs

 


Suggested Answer: B

Reference:
https://support.microsoft.com/en-us/topic/use-the-system-file-checker-tool-to-repair-missing-or-corrupted-system-files-79aa86cb-ca52-166a-92a3-966e85d4094e

Question 8

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
A user named User1 has a computer named Computer1 that runs Windows 10. Computer1 is joined to an Azure Active Directory (Azure AD) tenant named contoso.com. User1 joins Computer1 to contoso.com by using
user1@contoso.com
.
Computer1 contains a folder named Folder1. Folder1 is in drive C and is shared as Share1. Share1 has the permission shown in the following table.
 Image
A user named User2 has a computer named Computer2 that runs Windows 10. User2 joins Computer2 to contoso.com by using
user2@contoso.com
.
User2 attempts to access Share1 and receives the following error message: `The username or password is incorrect.`
You need to ensure that User2 can connect to Share1.
Solution: You create a local user account on Computer1 and instruct User2 to use the local account to connect to Share1.
Does this meet the goal?

A. Yes

B. No

 


Suggested Answer: B

 

Question 9

You have a computer named Computer1 that runs Windows 10.
You are troubleshooting connectivity issues on Computer1.
You need to view the remote addresses to which Computer1 has active TCP connections.
Which tool should you use?

A. Performance Monitor

B. Task Manager

C. Resource Monitor

D. Windows Defender Firewall with Advanced Security

 


Suggested Answer: C

 

Question 10

You have a computer named Computer1 that runs Windows10. Computer1 is in a workgroup.
Computer1 contains the users shown in the following table.
 Image
You need to apply the same Group Policy settings to only User1, User2 and User3. The solution must use a minimum number of local Group Policy objects
(GPOs).
How many local GPOs should you create?

A. 1

B. 2

C. 3

 


Suggested Answer: A

You can use security filtering to restrict the GPO to the required users. Only users with the Read and Apply Group Policy permissions will have the GPO applied to them.

Question 11

You have a computer that runs Windows 10.
You need to clear the DNS client cache.
Which command should you run?

A. ipconfig.exe

B. arp.exe

C. nslookup.exe

D. netstat.exe

 


Suggested Answer: A

The Clear-DnsClientCache cmdlet deletes all the contents of the DNS client cache. Running this cmdlet is equivalent to running ipconfig /flushdns .
Reference:
https://docs.microsoft.com/en-us/powershell/module/dnsclient/clear-dnsclientcache

Question 12

SIMULATION -
You have a computer named Computer1. Computer1 runs Windows 10 Pro. Computer1 has a cellular connection and a Wi-Fi connection.
You want to prevent Computer1from using the cellular connection unless a you manually connects to the cellular network.
What should you do?
To complete this task, sign in to the required computer or computers.

 


Suggested Answer: See explanation below.

1. Select the Network icon on the lower right corner of the taskbar, and then select the cellular network icon.
2. Clear the Let Windows manage this connection check box.
Reference:
https://support.microsoft.com/en-za/help/10739/windows-10-cellular-settings

Question 13

Your company has a main office and a branch office. The offices connect to each other by using a WAN link. Access to the Internet is provided through the main office.
The branch office contains 25 computers that run Windows 10. The computers contain small hard drives that have very little free disk space.
You need to prevent the computers in the branch office from downloading updates from peers on the network.
What should you do?

A. From the Settings app, modify the Delivery Optimizations settings.

B. Configure the network connections as metered connections.

C. Configure the computers to use BranchCache in hosted cache mode.

D. Configure the updates to use the Semi-Annual Channel (Targeted) channel.

 


Suggested Answer: C

Reference:
https://docs.microsoft.com/en-us/windows/deployment/update/waas-branchcache

Question 14

HOTSPOT -
You have a Windows 10 unattended installation answer file named C:answer.txt. You have a bootable USB Windows 10 installation media that is mounted as drive E.
You need to perform an unattended installation of Windows 10 on a new computer.
To where should you copy the answer file, and how should you name the answer file? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
Hot Area:
 Image

 


Suggested Answer:
Correct Answer Image

Box 1: E:
In the root of the drive, right-click the Paste to copy the autounattend.xml to the Windows 10 installation media.
Box 2: Autounattend.xml –
Create an autounattend.xml answer file containing all the necessary settings to perform a basic unattended installation of Windows 10.
Reference:
https://www.windowscentral.com/how-create-unattended-media-do-automated-installation-windows-10

Question 15

You need to meet the technical requirements for the San Diego office computers.
Which Windows 10 deployment method should you use?

A. wipe and load refresh

B. in-place upgrade

C. provisioning packages

D. Windows Autopilot

 


Suggested Answer: D

The requirement states: The computers in the San Diego office must be upgraded automatically to Windows 10 Enterprise and must be joined to Azure AD the first time a user starts each new computer. End users must not be required to accept the End User License Agreement (EULA).
Windows Autopilot is a collection of technologies used to set up and pre-configure new devices, getting them ready for productive use. You can also use Windows
Autopilot to reset, repurpose and recover devices.
The OEM Windows 10 installation on the new computers can be transformed into a ג€business-readyג€ state, applying settings and policies, installing apps, and even changing the edition of Windows 10 being used (e.g. from Windows 10 Pro to Windows 10 Enterprise) to support advanced features.
The only interaction required from the end user is to connect to a network and to verify their credentials. Everything beyond that is automated.
Reference:
https://docs.microsoft.com/en-us/windows/deployment/windows-autopilot/windows-autopilot

Question 16

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
You have a computer that runs Windows 10. The computer contains a folder. The folder contains sensitive data.
You need to log which user reads the contents of the folder and modifies and deletes files in the folder.
Solution: From the properties of the folder, you configure the Auditing settings and from the Audit Policy in the local Group Policy, you configure Audit privilege use.
Does this meet the goal?

A. Yes

B. No

 


Suggested Answer: B

Files and folders are objects and are audited through object access, not though privilege use.
Reference:
https://www.netwrix.com/how_to_detect_who_changed_file_or_folder_owner.html

Question 17

Your company has a branch office that contains 25 workgroup computers. The computers run Windows 10 Pro.
Users report that they cannot see other computers from Network in File Explorer.
What should you do to resolve the issue?

A. Set Network profile to Private.

B. Turn off random hardware addresses for the network connection.

C. Set Network profile to Public.

D. Configure the network connection as a metered connection.

 


Suggested Answer: A

 

Question 18

SIMULATION -
You have a computer named Computer1 that runs Windows 10.
Computer1 has a folder named C:Folder1.
You need to meet the following requirements:
✑ Provide a user named Jon Ross with the ability to modify the permissions of C:Folder1.
✑ Ensure that the principle of least privilege is maintained.
What should you do?
To complete this task, sign in to the required computer or computers.

 


Suggested Answer: See explanation below.

1. In Windows Explorer, right-click the C:Folder1 folder, and then click Properties.
2. Click on the Security tab, and then click Edit.
3. In the Permissions dialog box, add Jon Ross.
4. Specify the Allow Modify permissions for the Jon Ross.
5. Click OK twice to close the Security dialog box.
6. Click OK twice to close the Properties dialog box.
Reference:
https://docs.microsoft.com/en-us/iis/web-hosting/configuring-servers-in-the-windows-web-platform/configuring-share-and-ntfs-permissions

Question 19

HOTSPOT -
You have a computer named Computer1 that runs Windows 10.
Computer has the users shown in the following table.
 Image
User1 signs in to Computer1, creates the following files, and then signs out:
✑ File1.docx in CUsersUser1Desktop
✑ File2.docx in C:UsersPublicPublic Desktop
✑ File3.docx in C:UsersDefaultDesktop
User3 then signs in to Computer1 and creates a file named File4.docx in C:UsersUser3Desktop.
User2 has never signed in to Computer1.
How many DOCX files will appear on the desktop of each user the next time each user signs in? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
Hot Area:
 Image

 


Suggested Answer:
Correct Answer Image

Box 1: 3 –
File1, File2 and File3.
C:UsersPublicDesktop is the CommonDesktopDirectory special folder.
The “public desktop” folder is normally a hidden folder.
Box 2: 1 –
Only File3.
Box 3: 1 –
User3 is a guest so only the public desktop folder and File3 in that folder is displayed.
Reference:
https://superuser.com/questions/984866/how-to-make-a-desktop-shortcut-available-for-all-users-in-windows-10

Question 20

Which users can create a new group on Computer3?

A. User31 and User32 only

B. Admin1, User31, and User32 only

C. User31 only

D. Admin1 and User31 only

 


Suggested Answer: D

Reference:
https://ss64.com/nt/syntax-security_groups.html

Question 21

HOTSPOT -
You open System Information on a computer that runs Windows 8.1 as shown in the following exhibit.
 Image
Use the drop-down menus to select the answer choice that completes each statement based on the information presented in the graphic.
NOTE: Each correct selection is worth one point.
Hot Area:
 Image

 


Suggested Answer:
Correct Answer Image

Box 1: install additional physical memory
Need to upgrade to at least 2 GB RAM for 64-bit Windows 10.
Incorrect:
* Legacy BIOS is OK.
In place upgrade to windows 10 requirements Legacy bios
Box 2: Windows 10 Pro only –
There is no in-place upgrade path from Windows 8.1 Enterprise to Windows 10 Enterprise. Enterprise versions are licensed independently.
Reference:
https://support.microsoft.com/en-us/windows/windows-10-system-requirements-6d4e9a79-66bf-7950-467c-795cf0386715
https://superuser.com/questions/991834/how-to-upgrade-windows-8-enterprise-to-windows-10

Question 22

You have a computer named Computer1 that has the following configurations:
• RAM: 4 GB
• CPU: 1.6 GHz
• Hard drive: 128 GB
• Operating system: Windows 10 Pro in S mode
You need to upgrade Computer1 to Windows 11.
What should you do first?

A. Increase the amount of RAM.

B. Increase the storage capacity of the hard drive.

C. Switch out of S mode.

D. Upgrade the CPU.

 


Suggested Answer: C

 

Question 23

You have a computer that runs Windows 10 Pro. The computer contains the users shown in the following table.
 Image
You need to use a local Group Policy Object (GPO) to configure one group of settings for all the members of the local Administrators group and another group of settings for all non-administrators.
What should you do?

A. Use the runas command to open Gpedit.msc as each user.

B. Run mmc as User1 and add the Group Policy Object Editor snap-in twice.

C. Open Gpedit.msc as User1 and add two Administrative Templates.

D. Run mmc as User1 and add the Security Templates snap-in twice.

 


Suggested Answer: B

Add the Group Policy Object Editor snap-in twice. Select Browse > Users > Administrators when you add the first snap-in and select Browse > Users > Non-
Administrators when you add the second snap-in.

Question 24

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
You have a computer named Computer1 that runs Windows10.
A service named Application1 is configured as shown in the exhibit.
 Image
You discover that a user used the Service1 account to sign in to Computer1 and deleted some files.
You need to ensure that the identity used by Application1 cannot be used by a user to sign in to sign in to the desktop on Computer1. The solution must use the principle of least privilege.
Solution: On Computer1, you configure Application1 to sign in as the LocalSystem account and select the Allow service to interact with desktop check box. You delete the Service1 account.
Does this meet the goal?

A. Yes

B. No

 


Suggested Answer: B

Configuring Application1 to sign in as the LocalSystem account would ensure that the identity used by Application1 cannot be used by a user to sign in to the desktop on Computer1. However, this does not use the principle of least privilege. The LocalSystem account has full access to the system. Therefore, this solution does not meet the goal.
Reference:
https://docs.microsoft.com/en-us/windows/security/threat-protection/security-policy-settings/deny-log-on-locally

Question 25

HOTSPOT -
You have 100 computers that run Windows 10. You have no servers. All the computers are joined to Microsoft Azure Active Directory (Azure AD).
The computers have different update settings, and some computers are configured for manual updates.
You need to configure Windows Update. The solution must meet the following requirements:
✑ The configuration must be managed from a central location.
✑ Internet traffic must be minimized.
✑ Costs must be minimized.
How should you configure Windows Update? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
Hot Area:
 Image

 


Suggested Answer:
Correct Answer Image

Reference:
https://docs.microsoft.com/en-us/windows/deployment/update/waas-manage-updates-wufb
https://docs.microsoft.com/en-us/windows/deployment/update/waas-delivery-optimization

Question 26

HOTSPOT -
You have a computer named Computer1 that runs Windows 10.
Computer1 has the local users shown in the following table.
 Image
Which users can analyze the event logs on Computer1? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
Hot Area:
 Image

 


Suggested Answer:
Correct Answer Image

Reference:
https://docs.microsoft.com/en-us/windows/security/identity-protection/access-control/local-accounts#sec-localsystem

Question 27

HOTSPOT -
You have a workgroup computer named Computer1 that runs Windows 10. Computer1 has the users accounts shown in the following table:
 Image
Computer1 has the local Group Policy shown in the following table.
 Image
You create the Local ComputerAdministrators policy shown in the following table.
 Image
You create the Local ComputerNon-Administrators policy shown in the following table.
 Image
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
NOTE: Each correct selection is worth one point.
Hot Area:
 Image

 


Suggested Answer:
Correct Answer Image

Reference:
https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-vista/cc766291(v=ws.10)

Question 28

You have a Windows 10 device named Device1.
You plan purchase a wireless display device that will stream audio and video from Device1.
Which wireless feature or protocol should the display device support?

A. Wi-Fi sense

B. Miracast

C. near field communications (NFC)

D. Bluetooth

 


Suggested Answer: D

 

Question 29

HOTSPOT -
Your network contains an Active Directory domain that contains the objects shown in the following table.
 Image
Computer1 contains the shared folders shown in the following table.
 Image
The computers have the network configurations shown in the following table.
 Image
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
NOTE: Each correct selection is worth one point.
Hot Area:
 Image

 


Suggested Answer:
Correct Answer Image

Box 1: Yes –
User1 is in Group1 which has permission to access the share so the share will be visible.
Box 2: No –
User2 is in Group2 which does not have permission to access Share1. Access-based enumeration is enabled so Share1 will not be listed as User2 does not have permission to access it.
Box 3: No –
Share2$ is a hidden share (dollar sign appended) so the share will never be listed.

Question 30

Your network contains an Active Directory domain. The domain contains a computer named Computer1 that runs Windows 10.
You need to view the settings to Computer1 by Group Policy objects (GPOs) in the domain and local Group Policies.
Which command should you run?

A. gpresult

B. secedit

C. gpupdate

D. gpfixup

 


Suggested Answer: A

Reference:
https://docs.microsoft.com/en-us/windows-server/administration/windows-commands/gpresult

Question 31

Your network contains an Active Directory domain. The domain contains the computers shown in the following table.
 Image
On which computers can you perform an in-place upgrade to Windows 10 Enterprise?

A. Computer3 only

B. Computer2 and Computer3 only

C. Computer2 only

D. Computer1, Computer2, and Computer3

 


Suggested Answer: D

Reference:
https://docs.microsoft.com/en-us/windows/deployment/upgrade/windows-10-upgrade-paths
https://docs.microsoft.com/en-us/windows/deployment/upgrade/windows-10-edition-upgrades

Question 32

HOTSPOT -
Your network contains an Active Directory domain. The domain contains the users shown in the following table.
 Image
The Authenticated Users group has the Add workstations to domain user right in the Default Domain Controllers Policy.
The Device Managers and Help Desk groups are granted the Create Computer objects permission for the Computers container of the domain.
You have 15 workgroup computers that run Windows 10. Each computer contains a local user account named LocalAdmin1 that is a member of the following groups:
✑ Administrators
✑ Device Owners
✑ Authenticated Users
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
NOTE: Each correct selection is worth one point.
Hot Area:
 Image

 


Suggested Answer:
Correct Answer Image

Box 1: No –
User1 is a member of the Authenticated Users group which has the Add workstations to domain user right. However, with the Add workstations to domain user right, you are restricted to joining a maximum of 10 computers to the domain.
Box 2: No –
User2 is a member of the Authenticated Users group which has the Add workstations to domain user right. User2 is also a member of the Device Managers group which is granted the Create Computer objects permission for the Computers container of the domain. The Create Computer objects permission overrides the 10- computer limit imposed by the Add workstations to domain user right so User2 can join more than 10 computers to the domain.
Box 3. Yes –
User3 is a member of the Authenticated Users group which has the Add workstations to domain user right. User3 is also a member of the Help Desk group which is granted the Create Computer objects permission for the Computers container of the domain. The Create Computer objects permission overrides the 10- computer limit imposed by the Add workstations to domain user right so User3 can join all the computers to the domain.

Question 33

You have a computer named Computer1 that runs Windows 10.
You complete a full back up of Computer1 to an external USB drive. You store the USB drive offsite.
You delete several files from your personal Microsoft OneDrive account by using File Explorer, and then you empty the Recycle Bin on Computer1.
You need to recover the files 60 days after you deleted them in the least amount of time possible.
What should you use?

A. the OneDrive recycle bin

B. the full backup on the external USB drive

C. Recovery in the Settings app

 


Suggested Answer: B

Reference:
https://support.office.com/en-us/article/restore-deleted-files-or-folders-in-onedrive-949ada80-0026-4db3-a953-c99083e6a84f

Question 34

SIMULATION -
Please wait while the virtual machine loads. Once loaded, you may proceed to the lab section. This may take a few minutes, and the wait time will not be deducted from your overall test time.
When the Next button is available, click it to access the lab section. In this section, you will perform a set of tasks in a live environment. While most functionality will be available to you as it would be in a live environment, some functionality (e.g., copy and paste, ability to navigate to external websites) will not be possible by design.
Scoring is based on the outcome of performing the tasks stated in the lab. In other words, it doesn't matter how you accomplish the task, if you successfully perform it, you will earn credit for that task.
Labs are not timed separately, and this exam may more than one lab that you must complete. You can use as much time as you would like to complete each lab.
But, you should manage your time appropriately to ensure that you are able to complete the lab(s) and all other sections of the exam in the time provided.
Please note that once you submit your work by clicking the Next button within a lab, you will NOT be able to return to the lab.
Username and password -
 Image
Use the following login credentials as needed:
To enter your password, place your cursor in the Enter password box and click on the password below.
Username: Contoso/Administrator -
Password: Passw0rd!
The following information is for technical support purposes only:
Lab Instance: 11145882 -
 Image
 Image
Administrators report that they cannot use Event Viewer to remotely view the event logs on Client3.
You need to ensure that the administrators can access the event logs remotely on Client3. The solution must ensure that Windows Firewall remains enabled.
To complete this task, sign in to the required computer or computers.

 


Suggested Answer: See explanation below.

1. Go to Control Panel -> System and Security -> Windows Firewall.
2. Click on the Advanced settings link in the left-hand side.
Reference Image
3. Enable COM+ Network Access (DCOM-In).
Reference Image
4. Enable all the rules in the Remote Event Log Management group.
Reference Image
Reference: alt=”Reference Image” />
3. Enable COM+ Network Access (DCOM-In).
Reference Image
4. Enable all the rules in the Remote Event Log Management group.
<img src=”https://www.examtopics.com/assets/media/exam-media/04292/0034700003.jpg” alt=”Reference Image” />
Reference:
https://www.zubairalexander.com/blog/unable-to-access-event-viewer-on-a-remote-computer/

Question 35

You have a workgroup computer that runs Windows 10.
You need to set the minimum password length to 12 characters.
What should you use?

A. Local Group Policy Editor

B. User Accounts in Control Panel

C. System Protection in System Properties

D. Sign-in options in the Settings app

 


Suggested Answer: A

You can set the password length on computers that are not domain joined by using the Local Security Policy or the Local Group Policy Editor.
Note:
There are several versions of this question in the exam. The question has two possible correct answers:
1. Local Group Policy Editor
2. Local Security Policy
Other incorrect answer options you may see on the exam include the following:
1. Credential Manager in Control Panel
2. Email & accounts in the Settings app
3. Local Users and Groups in Computer Management
Reference:
https://docs.microsoft.com/en-us/windows/security/threat-protection/security-policy-settings/how-to-configure-security-policy-settings

Question 36

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
You have a computer named Computer1 that runs Windows 10.
You test Windows updates on Computer1 before you make the updates available to other computers.
You install a quality update that conflicts with a custom device driver.
You need to remove the update from Computer1.
Solution: From System Restore, you revert the system state to a restore point that was created before the update was installed.
Does this meet the goal?

A. Yes

B. No

 


Suggested Answer: A

 

Question 37

HOTSPOT -
You have a computer named Computer1 that runs Windows 10.
On Computer1, you create a VPN connection as shown in the following exhibit.
 Image
The corporate network contains a single IP subnet.
Use the drop-down menus to select the answer choice that completes each statement based on the information presented in the graphic.
NOTE: Each correct selection is worth one point.
Hot Area:
 Image

 


Suggested Answer:
Correct Answer Image

 

Question 38

HOTSPOT -
You have the source files shown in the following table.
 Image
You mount an image from Image1.wim to a folder named C:Mount.
You need to add the French language pack to the mounted image.
How should you complete the command? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
Hot Area:
 Image

 


Suggested Answer:
Correct Answer Image

Note: The referenced document has the mount directory as C:MountWindows. In this question, the mount directory is C:Mount.
Reference:
https://docs.microsoft.com/en-us/windows-hardware/manufacture/desktop/add-language-packs-to-windows

Question 39

You have 20 computers that run Windows 10.
You configure all the computers to forward all the events from all the logs to a computer named Computer1 that runs Windows 10.
When you sign in to Computer1, you cannot see any security events from other computers. You can see all the other forwarded events from the other computers.
You need to ensure that the security events are forwarded to Computer1.
What should you do?

A. On each computer, run wecutil qc /q.

B. On each computer, add the NETWORK SERVICE account to the Event Log Readers group.

C. On each computer, run winrm qc ג€”q.

D. On Computer1, add the account of Computer1 to the Event Log Readers group.

 


Suggested Answer: D

Reference:
https://docs.microsoft.com/en-us/windows/security/threat-protection/use-windows-event-forwarding-to-assist-in-intrusion-detection

Question 40

HOTSPOT
-
You have a workgroup computer that runs Windows 10.
You need to configure User Account Control (UAC) to meet the following requirements:
• Ensure that the local Administrator account is always be prompted to approve elevation of privilege.
• Enforce public key infrastructure (PKI) signature checks for any interactive apps that request elevation of privilege.
Which two policy settings should you modify? To answer, select the settings in the answer area.
NOTE: Each correct selection is worth one point.
 Image

 


Suggested Answer:
Correct Answer Image

 

Question 41

HOTSPOT -
Your network contains an Active Directory domain. The domain contains 100 computers that run Windows 10.
You need to configure the computers to send the error events in the System log to a computer named Computer1 that runs Windows 10.
What should you do? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
Hot Area:
 Image

 


Suggested Answer:
Correct Answer Image

Box 1: Create a source-initiated subscription
Use the Source computer initiated subscription.
Source-initiated subscriptions allow you to define a subscription on an event collector computer without defining the event source computers, and then multiple remote event source computers can be set up (using a group policy setting) to forward events to the event collector computer.
Box 2: Configure Event Forwarding by using a Group Policy Object (GPO)ֳ¶.
Windows Event Log Forwarding is a service that allows you to forward events from multiple Windows servers and collect them in one spot. The service has two main components; a forwarder and a collector. A collector is a service running on Windows server that collects all events sent to it from an event log forwarder.
Reference:
https://docs.microsoft.com/en-us/windows/win32/wec/setting-up-a-source-initiated-subscription
https://adamtheautomator.com/windows-event-collector/

Question 42

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
Your network contains an Active Directory domain named contoso.com. The domain contains the users shown in the following table.
 Image
You have a computer named Computer1 that runs Windows 10 and is in a workgroup.
A local standard user on Computer1 named User1 joins the computer to the domain and uses the credentials of User2 when prompted.
You need to ensure that you can rename Computer1 as Computer33.
Solution: You use the credentials of User1 on Computer1.
Does this meet the goal?

A. Yes

B. No

 


Suggested Answer: B

Renaming a domain-joined computer will also rename the computer account in the domain. To do this, you need domain administrator privileges.
User1 is a standard user.
Reference:
https://docs.microsoft.com/en-us/windows/security/identity-protection/access-control/active-directory-security-groups#bkmk-domainadmins

Question 43

HOTSPOT -
You have computers that run Windows 10 Enterprise as shown in the following table.
 Image
Both computers have applications installed and contain user data.
You plan to configure both computers to run Windows 10 Enterprise LTSC 2019 and to retain all the existing applications and data.
You need to recommend a method to deploy Windows 10 Enterprise LTSC 2019 to the computers. The solution must minimize effort to install and configure the applications.
What should you include in the recommendation for each computer? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
Hot Area:
 Image

 


Suggested Answer:
Correct Answer Image

Reference:
https://docs.microsoft.com/en-us/windows/deployment/upgrade/windows-10-upgrade-paths

Question 44

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
You have two computers named Computer1 and Computer2 that run Windows 10.
You have an Azure Active Directory (Azure AD) user account named
admin@contoso.com
that is in the local Administrators group on each computer.
You sign in to Computer1 by using
admin@contoso.com
.
You need to ensure that you can use Event Viewer on Computer1 to connect to the event logs on Computer2.
Solution: On Computer2, you run the Enable-PSRemoting cmdlet.
Does this meet the goal?

A. Yes

B. No

 


Suggested Answer: B

The solution to this question is to configure the firewall to enable the Remote Event Log Management inbound rule.
The Enable-PSRemoting cmdlet configures the computer to receive PowerShell remote commands that are sent by using the WS-Management technology.
Reference:
https://docs.microsoft.com/en-us/powershell/module/microsoft.powershell.core/enable-psremoting?view=powershell-7.1

Question 45

A user purchases a new computer that has Windows 10 Home preinstalled. The computer has a biometric fingerprint reader.
You need to ensure that the user can use the fingerprint reader to sign in to the computer by using an Azure Active Directory (Azure AD) account.
What should you do first?

A. Register the computer to Azure AD.

B. Install the latest feature updates on the computer.

C. Upgrade the computer to Windows 10 Enterprise.

D. Upgrade the computer to Windows 10 Pro.

 


Suggested Answer: B

 

Question 46

HOTSPOT -
You have two workgroup computers named Computer1 and Computer2 that run Windows 10. The computers contain the local security principals shown in the following table.
 Image
Which security principals can be members of GroupA and GroupC? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
Hot Area:
 Image

 


Suggested Answer:
Correct Answer Image

 

Question 47

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
Your company has an on-premises network that contains an Active Directory domain. The domain is synced to Microsoft Azure Active Directory (Azure AD). All computers in the domain run Windows 10 Enterprise.
You are logged on as the local administrator on a Computer named Computer1.
A user named Mia Hamm has a computer named Computer2. Mia Hamm reports that she is experiencing problems with Computer2.
You want to use Event Viewer on Computer1 to view the event logs on Computer2.
What should you do?

A. On Computer1, run the Connect-WSMan -ComputerName “Computer1” cmdlet.

B. On Computer1, run the Get-Eventlog -List -ComputerName “Computer1” cmdlet.

C. On Computer1, log on as a domain administrator, then open Event Viewer and select the Connect to another computer ג€¦ option.

D. On Computer1, open the Windows Defender Firewall and enable the Remote Event Log Management inbound rule.

 


Suggested Answer: C

You are logged on as a local administrator. You need the required permissions to access Event Viewer logs on all remote Windows computers.
Reference:
https://docs.microsoft.com/en-us/windows/win32/winrm/about-windows-remote-management

Question 48

You have a public computer named Computer1 that runs Windows 10. Computer1 contains a folder named Folder1.
You need to provide a user named User1 with the ability to modify the permissions of Folder1. The solution must use the principle of least privilege.
Which NTFS permission should you assign to User1?

A. Full control

B. Modify

C. Write

D. Read & execute

 


Suggested Answer: A

The NTFS Full control permission is required to change permissions.
Reference:
https://www.ntfs.com/ntfs-permissions-file-folder.htm

Question 49

HOTSPOT -
Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2016 and a computer named Computer1 that runs Windows 10.
Server1 contains a share named Backup. All users can read and write data in Backup.
On Monday at 13:00, you configure Backup and Restore (Windows 7) on Computer1 to use the following settings:
✑ Backup Destination:Server1Backup
✑ What do you want to back up?:Local Disk (D:), Include a system image of drives: System Reserved, (C:)
✑ Schedule: Daily at 23:00
You need to identify how many backups will be available on Thursday at 17:00.
What should you identify? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
Hot Area:
 Image

 


Suggested Answer:
Correct Answer Image

Reference:
https://www.windowscentral.com/how-make-full-backup-windows-10#create_system_image_windows10https://www.bleepingcomputer.com/tutorials/create-
system-image-in-windows-7-8/

Question 50

Your network contains an Active Directory domain named contoso.com. The domain contains two computers named Computer1 and Computer2 that run Windows
10.
On Computer1, you need to run the Invoke-Command cmdlet to execute several PowerShell commands on Computer2.
What should you do first?

A. On Computer2, run the Enable-PSRemoting cmdlet

B. From Active Directory, configure the Trusted for Delegation setting for the computer account of Computer2

C. On Computer1, run the New-PSSession cmdlet

D. On Computer2, add Computer1 to the Remote Management Users group

 


Suggested Answer: A

Reference:
https://docs.microsoft.com/en-us/powershell/module/microsoft.powershell.core/enable-psremoting?view=powershell-6

Free Access Full MD-100 Practice Exam Free

Looking for additional practice? Click here to access a full set of MD-100 practice exam free questions and continue building your skills across all exam domains.

Our question sets are updated regularly to ensure they stay aligned with the latest exam objectives—so be sure to visit often!

Good luck with your MD-100 certification journey!

Share18Tweet11
Previous Post

MB-800 Practice Exam Free

Next Post

MLS-C01 Practice Exam Free

Next Post

MLS-C01 Practice Exam Free

MS-100 Practice Exam Free

MS-101 Practice Exam Free

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recommended

Network+ Practice Test

Comptia Security+ Practice Test

A+ Certification Practice Test

Aws Cloud Practitioner Exam Questions

Aws Cloud Practitioner Practice Exam

Comptia A+ Practice Test

  • About
  • DMCA
  • Privacy & Policy
  • Contact

PracticeTestFree.com materials do not contain actual questions and answers from Cisco's Certification Exams. PracticeTestFree.com doesn't offer Real Microsoft Exam Questions. PracticeTestFree.com doesn't offer Real Amazon Exam Questions.

  • Login
  • Sign Up
No Result
View All Result
  • Quesions
    • Cisco
    • AWS
    • Microsoft
    • CompTIA
    • Google
    • ISACA
    • ECCouncil
    • F5
    • GIAC
    • ISC
    • Juniper
    • LPI
    • Oracle
    • Palo Alto Networks
    • PMI
    • RedHat
    • Salesforce
    • VMware
  • Courses
    • CCNA
    • ENCOR
    • VMware vSphere
  • Certificates

Welcome Back!

Login to your account below

Forgotten Password? Sign Up

Create New Account!

Fill the forms below to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Insert/edit link

Enter the destination URL

Or link to existing content

    No search term specified. Showing recent items. Search or use up and down arrow keys to select an item.