Practice Test Free
  • QUESTIONS
  • COURSES
    • CCNA
    • Cisco Enterprise Core
    • VMware vSphere: Install, Configure, Manage
  • CERTIFICATES
No Result
View All Result
  • Login
  • Register
Quesions Library
  • Cisco
    • 200-301
    • 200-901
      • Multiple Choice
      • Drag Drop
    • 350-401
      • Multiple Choice
      • Drag Drop
    • 350-701
    • 300-410
      • Multiple Choice
      • Drag Drop
    • 300-415
      • Multiple Choice
      • Drag Drop
    • 300-425
    • Others
  • AWS
    • CLF-C02
    • SAA-C03
    • SAP-C02
    • ANS-C01
    • Others
  • Microsoft
    • AZ-104
    • AZ-204
    • AZ-305
    • AZ-900
    • AI-900
    • SC-900
    • Others
  • CompTIA
    • SY0-601
    • N10-008
    • 220-1101
    • 220-1102
    • Others
  • Google
    • Associate Cloud Engineer
    • Professional Cloud Architect
    • Professional Cloud DevOps Engineer
    • Others
  • ISACA
    • CISM
    • CRIS
    • Others
  • LPI
    • 101-500
    • 102-500
    • 201-450
    • 202-450
  • Fortinet
    • NSE4_FGT-7.2
  • VMware
  • >>
    • Juniper
    • EC-Council
      • 312-50v12
    • ISC
      • CISSP
    • PMI
      • PMP
    • Palo Alto Networks
    • RedHat
    • Oracle
    • GIAC
    • F5
    • ITILF
    • Salesforce
Contribute
Practice Test Free
  • QUESTIONS
  • COURSES
    • CCNA
    • Cisco Enterprise Core
    • VMware vSphere: Install, Configure, Manage
  • CERTIFICATES
No Result
View All Result
Practice Test Free
No Result
View All Result
Home Exam Prep Free

MD-100 Exam Prep Free

Table of Contents

Toggle
  • MD-100 Exam Prep Free – 50 Practice Questions to Get You Ready for Exam Day
  • Access Full MD-100 Exam Prep Free

MD-100 Exam Prep Free – 50 Practice Questions to Get You Ready for Exam Day

Getting ready for the MD-100 certification? Our MD-100 Exam Prep Free resource includes 50 exam-style questions designed to help you practice effectively and feel confident on test day

Effective MD-100 exam prep free is the key to success. With our free practice questions, you can:

  • Get familiar with exam format and question style
  • Identify which topics you’ve mastered—and which need more review
  • Boost your confidence and reduce exam anxiety

Below, you will find 50 realistic MD-100 Exam Prep Free questions that cover key exam topics. These questions are designed to reflect the structure and challenge level of the actual exam, making them perfect for your study routine.

Question 1

HOTSPOT -
You have four computers that run Windows 10. The computers are configured as shown in the following table.
 Image
On Computer1, you create a user named User1. In the domain, you create a user named User2.
You create the groups shown in the following table.
 Image
You need to identify to which computers User1 can sign in, and to which groups you can add User2.
What should you identify? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
Hot Area:
 Image

 


Suggested Answer:
Correct Answer Image

Box 1: Computer 1 only.
User1’s account was created on Computer1. The account is a local account on Computer1. Therefore, User1 can only sign in to Computer1.
Box 2: Group5 only.
User2’s account was created in the domain. A domain is a security boundary. Therefore, you can only add User2 to groups in the domain.

Question 2

You plan to install Windows 10 Pro by using an answer file.
You open Windows System Image Manager.
You need to create an answer file.
What should you do first?

A. Open the Install.wim file from the Windows 10 installation media.

B. Open the Boot.wim file from the Windows 10 installation media.

C. Install the WinPE add-on for the Windows Assessment and Deployment Kit (Windows ADK).

D. Install the Windows Assessment and Deployment Kit (Windows ADK).

 


Suggested Answer: C

 

Question 3

You need to meet the technical requirement for User6.
What should you do?

A. Add User6 to the Remote Desktop Users group in the domain.

B. Remove User6 from Group2 in the domain.

C. Add User6 to the Remote Desktop Users group on Computer2.

D. And User6 to the Administrators group on Computer2.

 


Suggested Answer: B

 

Question 4

HOTSPOT -
You plan to deploy Windows 10 Enterprise to company-owned devices.
You capture a Windows 10 image file from a reference device.
You need to generate catalog files and answer files for the deployment.
What should you use for each file? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
Hot Area:
 Image

 


Suggested Answer:
Correct Answer Image

Reference:
https://docs.microsoft.com/en-us/windows-hardware/customize/desktop/wsim/open-a-windows-image-or-catalog-file

Question 5

You deploy Windows 10 to 20 new laptops.
The laptops will be used by users who work at customer sites. Each user will be assigned one laptop and one Android device.
You need to recommend a solution to lock the laptop when the users leave their laptop for an extended period.
Which two actions should you include in the recommendation? Each correct answer presents part of the solution.
NOTE: Each correct selection is worth one point.

A. Enable Bluetooth discovery.

B. From the Settings app, configure the Dynamic lock settings.

C. From Sign-in options, configure the Windows Hello settings.

D. From the Settings app, configure the Lock screen settings.

E. Pair the Android device and the laptop.

F. From the Settings app, configure the Screen timeout settings.

 


Suggested Answer: DF

 

Question 6

Your network contains an Active Directory domain. The domain contains a user named Admin1. All computers run Windows 10.
You enable Windows PowerShell remoting on the computers.
You need to ensure that Admin1 can establish remote PowerShell connections to the computers. The solution must use the principle of least privilege.
To which group should you add Admin1?

A. Access Control Assistance Operators

B. Power Users

C. Remote Desktop Users

D. Remote Management Users

 


Suggested Answer: D

Reference:
https://4sysops.com/wiki/enable-powershell-remoting/

Question 7

You have a computer that runs Windows 10.
The computer fails to start, and you receive the following error message: `BOOTMGR image is corrupt. The system cannot boot`.
You need to repair the system partition.
Which command should you run from Windows Recovery Environment (WinRE)?

A. fdisk.exe

B. chkdsk.exe

C. diskpart.exe

D. bcdboot.exe

 


Suggested Answer: C

DiskPart, which has replaced fdisk, is a command-line utility that provides the ability to manage disks, partitions or volumes in your computer running all versions of operating system since Windows 2000.
Reference:
https://www.diskpart.com/windows-10/diskpart-windows-10-1203.html

Question 8

You have 10 computers that run Windows 10 and have BitLocker Drive Encryption (BitLocker) enabled.
You plan to update the firmware of the computers.
You need to ensure that you are not prompted for the BitLocker recovery key on the next restart. The drive must be protected by BitLocker on subsequent restarts.
Which cmdlet should you run?

A. Unlock-BitLocker

B. Disable-BitLocker

C. Add-BitLockerKeyProtector

D. Suspend-BitLocker

 


Suggested Answer: D

Reference:
https://support.microsoft.com/en-us/help/4057282/bitlocker-recovery-key-prompt-after-surface-uefi-tpm-firmware-update

Question 9

You have a computer named Computer1. Computer1 runs Windows 10 Pro.
You attempt to start Computer1 but you receive the following error message:
Bootmgr is missing.
You need to be able to start Computer1.
What should you do?

A. Start the computer in recovery mode and run the bootrec /rebuildbcd command.

B. Start the computer in recovery mode and run the diskpart /repair command.

C. Start the computer in recovery mode and run the bcdboot /s command.

D. Start the computer in recovery mode and run the bootcfg /debug command.

 


Suggested Answer: A

Reference:
https://neosmart.net/wiki/bootmgr-is-missing/

Question 10

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
A user named User1 has a computer named Computer1 that runs Windows 10. Computer1 is joined to an Azure Active Directory (Azure AD) tenant named contoso.com. User1 joins Computer1 to contoso.com by using
user1@contoso.com
.
Computer1 contains a folder named Folder1. Folder1 is in drive C and is shared as Share1. Share1 has the permission shown in the following table.
 Image
A user named User2 has a computer named Computer2 that runs Windows 10. User2 joins Computer2 to contoso.com by using
user2@contoso.com
.
User2 attempts to access Share1 and receives the following error message: `The username or password is incorrect.`
You need to ensure that User2 can connect to Share1.
Solution: You create a local user account on Computer1 and instruct User2 to use the local account to connect to Share1.
Does this meet the goal?

A. Yes

B. No

 


Suggested Answer: B

 

Question 11

You have a computer named Computer1 that runs Windows 10.
You restart Computer1 by using Advanced startup and select Boot log.
In which folder is the boot log file stored?

A. C:

B. C:Windows

C. C:Windowsdebug

D. C:WindowsSystem32LogFiles

 


Suggested Answer: B

Reference:
https://winaero.com/enable-boot-log-windows-10/

Question 12

You have a computer that runs Windows 10 Pro. The computer contains the users shown in the following table.
 Image
You need to use a local Group Policy Object (GPO) to configure one group of settings for all the members of the local Administrators group and another group of settings for all non-administrators.
What should you do?

A. Use the runas command to open Gpedit.msc as each user.

B. Run mmc as User1 and add the Group Policy Object Editor snap-in twice.

C. Open Gpedit.msc as User1 and add two Administrative Templates.

D. Run mmc as User1 and add the Security Templates snap-in twice.

 


Suggested Answer: B

Add the Group Policy Object Editor snap-in twice. Select Browse > Users > Administrators when you add the first snap-in and select Browse > Users > Non-
Administrators when you add the second snap-in.

Question 13

Your network contains an Active Directory domain. The domain contains a user named User1.
User1 creates a Microsoft account.
User1 needs to sign in to cloud resources by using the Microsoft account without being prompted for credentials.
Which settings should User1 configure?

A. User Accounts in Control Panel

B. Email & app accounts in the Settings app

C. Users in Computer Management

D. Users in Active Directory Users and Computers

 


Suggested Answer: B

Open the Setting app, select Accounts then select Email and accounts. Here you can add accounts for the cloud resources and configure the login credentials for the accounts. If you configure the accounts with the login credentials of the Microsoft account, you won’t be prompted for credentials when you open the apps.
Reference:
https://support.microsoft.com/en-za/help/4028195/microsoft-account-how-to-sign-in

Question 14

You have several computers that run Windows 10.
All users have Microsoft OneDrive for Business installed.
Users frequently save files to their desktop.
You need to ensure that all the users can recover the files on their desktop from OneDrive for Business.
Which two actions should you perform? Each correct answer presents part of the solution.
NOTE: Each correct selection is worth one point.

A. Copy ADMX and ADML files to C:UsersPublicDesktop

B. From Backup in the Settings app, add a drive

C. Configure the Silently move Windows known folders to OneDrive settings

D. Copy ADMX and ADML files to C:WindowsPolicyDefinitions

E. Configure the Save documents to OneDrive by default setting

 


Suggested Answer: CD

Reference:
https://docs.microsoft.com/en-us/onedrive/plan-onedrive-enterprise
https://docs.microsoft.com/en-us/onedrive/use-group-policy#KFMOptInNoWizard

Question 15

Your company has a Remote Desktop Gateway (RD Gateway).
You have a server named Server1 that is accessible by using Remote Desktop Services (RDS) through the RD Gateway.
You need to configure a Remote Desktop connection to connect through the gateway.
Which setting should you configure?

A. Connection settings

B. Server authentication

C. Local devices and resources

D. Connect from anywhere

 


Suggested Answer: D

 

Question 16

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
You have a computer that runs Windows 10. The computer contains a folder named D:Scripts. D:Scripts contains several PowerShell scripts.
You need to ensure that you can run the PowerShell scripts without specifying the full path to the scripts. The solution must persist between PowerShell sessions.
Solution: From PowerShell, you run $env:Path += ";d:scripts".
Does this meet the goal?

A. Yes

B. No

 


Suggested Answer: A

Reference:
https://docs.microsoft.com/en-us/powershell/module/microsoft.powershell.core/about/about_environment_variables?view=powershell-7

Question 17

Your network contains an Active Directory domain. The domain contains 1,000 computers that run Windows 10.
You need to prevent the computers of the research department from appearing in Network in File Explorer.
What should you do?

A. Configure DNS to use an external provider

B. Modify the %systemroot%system32driversetcNetworks file.

C. Turn off network discovery.

D. Disable the Network List Service.

 


Suggested Answer: C

 

Question 18

Your company has an isolated network used for testing. The network contains 20 computers that run Windows 10. The computers are in a workgroup. During testing, the computers must remain in the workgroup.
You discover that none of the computers are activated.
You need to recommend a solution to activate the computers without connecting the network to the Internet.
What should you include in the recommendation?

A. Volume Activation Management Tool (VAMT)

B. Key Management Service (KMS)

C. Active Directory-based activation

D. the Get-WindowsDeveloperLicense cmdlet

 


Suggested Answer: B

You can configure one of the computers as a Key Management Service (KMS) host and activate the KMS host by phone. The other computers in the isolated network can then activate using the KMS host.
Installing a KMS host key on a computer running Windows 10 allows you to activate other computers running Windows 10 against this KMS host and earlier versions of the client operating system, such as Windows 8.1 or Windows 7. Clients locate the KMS server by using resource records in DNS, so some configuration of DNS may be required. This scenario can be beneficial if your organization uses volume activation for clients and MAK-based activation for a smaller number of servers. To enable KMS functionality, a KMS key is installed on a KMS host; then, the host is activated over the Internet or by phone using
Microsoft’s activation services.
Reference:
https://docs.microsoft.com/en-us/windows/deployment/volume-activation/activate-using-key-management-service-vamt

Question 19

You have a computer named Computer1 that runs Windows 10.
Computer1 was off for one year. During that time, two feature updates and 12 quality updates were released.
From the Microsoft Update Catalog website, you download the missing updates and save the updates to Computer1.
You need to ensure that Computer1 runs the latest version of Windows 10 and is fully updated. The solution must minimize the amount of time required to update the computer.
What should you do?

A. Install the last feature update, and then install the last quality update.

B. Install the last quality update, and then install both feature updates.

C. Install the last quality update, and then install the last feature update.

D. Install the last feature update, and then install all the quality updates released after the feature update.

E. Install all the quality and feature updates in the order in which they were released.

 


Suggested Answer: A

Reference:
https://docs.microsoft.com/en-us/windows/deployment/update/get-started-updates-channels-tools

Question 20

SIMULATION -
You have a computer named Computer1. Computer1 runs Windows 10 Pro.
You have a mobile device. You use Bluetooth to pair the mobile device to Computer1.
You want to enable dynamic lock on Computer1.
What should you do?
To complete this task, sign in to the required computer or computers.

 


Suggested Answer: See explanation below.

1. On Computer1, select the Start button > Settings > Accounts > Sign-in options.
2. Under Dynamic lock, select the Allow Windows to automatically lock your device when you’re away check box.
Reference:
https://support.microsoft.com/en-za/help/4028111/windows-lock-your-windows-10-pc-automatically-when-you-step-away-from

Question 21

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
You have a workgroup computer that runs Windows 10. The computer contains the local user accounts shown in the following table.
 Image
You need to configure the desktop background for User1 and User2 only.
Solution: You create a new local group to which you add User1 and User2. You create a local Group Policy Object (GPO) and configure the Desktop Wallpaper setting in the GPO. At a command prompt, you run the gpupdate.exe /Force command.
Does this meet the goal?

A. Yes

B. No

 


Suggested Answer: A

Reference:
https://www.windowscentral.com/how-apply-local-group-policy-settings-specific-users-windows-10

Question 22

You have a computer that runs Windows 10.
You need to configure a picture password.
What should you do?

A. From Control Panel, configure the User Accounts settings.

B. From the Settings app, configure the Sign-in options.

C. From the Local Group Policy Editor, configure the Account Policies settings.

D. From Windows PowerShell, run the Set-LocalUser cmdlet and specify the InputObject parameter.

 


Suggested Answer: B

 

Question 23

HOTSPOT
-
You have three devices as shown in the following table.
 Image
You plan to install Windows 10 on the devices.
You need to identify which devices support Secure Boot, and which Windows 10 edition is supported for up to 30 months.
What should you identify? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
 Image

 


Suggested Answer:
Correct Answer Image

 

Question 24

You have computers that run Windows 10. The computers are joined to an Azure Active Directory (Azure AD) tenant and enrolled in Microsoft Intune.
You need to recommend a solution for help desk administrators that meets the following requirements:
✑ The administrators must assist users remotely by connecting to each user's computer.
✑ The remote connections must be initiated by the administrators. The users must approve the connection.
✑ Both the users and the administrators must be able to see the screen of the users' computer.
✑ The administrators must be able to make changes that require running applications as a member of each computer's Administrators group.
Which tool should you include in the recommendation?

A. Remote Desktop

B. Intune

C. Remote Assistance

D. Quick Assist

 


Suggested Answer: B

Reference:
https://docs.microsoft.com/en-us/mem/intune/remote-actions/remote-assist-mobile-devices

Question 25

A user has a computer that runs Windows 10. The user has access to the following storage locations:
✑ A USB flash drive
✑ Microsoft OneDrive
✑ OneDrive for Business
✑ A drive mapped to a network share
✑ A secondary partition on the system drive
You need to configure Back up using File History from the Settings app.
Which two storage locations can you select for storing File History data? Each correct answer presents a complete solution.
NOTE: Each correct selection is worth one point.

A. OneDrive for Business

B. OneDrive

C. the USB flash drive

D. the secondary partition on the system drive

E. the drive mapped to a network share

 


Suggested Answer: CD

 

Question 26

You have a Microsoft 365 Enterprise E3 license.
You have a computer named Computer1 that runs Windows 10.
You need to ensure that you can access the files on Computer1 by using a web browser on another computer.
What should you configure?

A. Sync your settings in the Settings app

B. the File Explorer desktop app

C. the Microsoft OneDrive desktop app

D. Default apps in the Settings app

 


Suggested Answer: C

 

Question 27

HOTSPOT -
You are a network administrator at your company.
A user attempts to start a computer and receives the following error message: `Bootmgr is missing.`
You need to resolve the issue.
You start the computer in recovery mode.
Which command should you run next? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
Hot Area:
 Image

 


Suggested Answer:
Correct Answer Image

Reference:
https://neosmart.net/wiki/bootmgr-is-missing/

Question 28

You have a computer that runs Windows 10 and hosts four Hyper-V virtual machines that run Windows 10.
You upgrade the computer to Windows 11.
You need to ensure that the virtual machines support hibernation.
What should you do?

A. Enable integration services.

B. Delete any virtual machine checkpoints.

C. Rebuild the virtual machines as generation 2 virtual machines.

D. Update the configuration version of the virtual machines.

 


Suggested Answer: D

 

Question 29

Your network contains an Active Directory domain. The domain contains 500 computers that run Windows 10. The computers are used as shown in the following table.
 Image
You need to apply updates based on the computer usage.
What should you configure?

A. Notifications & actions from System in the Settings apps.

B. the Windows Update for Business settings by using a Group Policy Object (GPO)

C. the Windows Installer settings by using a Group Policy Object (GPO)

D. Delivery Optimization from Update & Security in the Settings apps

 


Suggested Answer: B

Reference:
https://docs.microsoft.com/en-us/windows/deployment/update/waas-wufb-group-policy

Question 30

HOTSPOT -
You have computers that run Windows 10 as shown in the following table.
 Image
CLIENT1 has the following IP configuration.
 Image
From CLIENT1, you ping CLIENT2 and CLIENT3 successfully, but when you ping CLIENT4, you get a Request timed out response. From CLIENT3, you ping
CLIENT4 successfully.
Which computer and setting are misconfigured? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
Hot Area:
 Image

 


Suggested Answer:
Correct Answer Image

Box 1: Client4 –
Box 2: Subnet mask –
By exclusion.

Question 31

You need to meet the technical requirements for EFS on ComputerA.
What should you do?

A. Run certutil.exe, and then add a certificate to the local computer certificate store.

B. Run cipher.exe, and then add a certificate to the local computer certificate store.

C. Run cipher.exe, and then add a certificate to the local Group Policy.

D. Run certutil.exe, and then add a certificate to the local Group Policy.

 


Suggested Answer: B

Reference:
https://docs.microsoft.com/en-us/windows/security/information-protection/windows-information-protection/create-and-verify-an-efs-dra-certificate

Question 32

SIMULATION -
Please wait while the virtual machine loads. Once loaded, you may proceed to the lab section. This may take a few minutes, and the wait time will not be deducted from your overall test time.
When the Next button is available, click it to access the lab section. In this section, you will perform a set of tasks in a live environment. While most functionality will be available to you as it would be in a live environment, some functionality (e.g., copy and paste, ability to navigate to external websites) will not be possible by design.
Scoring is based on the outcome of performing the tasks stated in the lab. In other words, it doesn't matter how you accomplish the task, if you successfully perform it, you will earn credit for that task.
Labs are not timed separately, and this exam may more than one lab that you must complete. You can use as much time as you would like to complete each lab.
But, you should manage your time appropriately to ensure that you are able to complete the lab(s) and all other sections of the exam in the time provided.
Please note that once you submit your work by clicking the Next button within a lab, you will NOT be able to return to the lab.
Username and password -
 Image
Use the following login credentials as needed:
To enter your password, place your cursor in the Enter password box and click on the password below.
Username: Contoso/Administrator -
Password: Passw0rd!
The following information is for technical support purposes only:
Lab Instance: 10921597 -
 Image
You need to create a file named Private.txt in a folder named Folder1 on the C drive of Client2.
You need to encrypt Private.txt and ensure that a user named User1 can view the contents of Private.txt.
To complete this task, sign in to the required computer or computers.

 


Suggested Answer: See explanation below.

1. After creating Private.txt and saving it Folder1, right-click on the Private.txt, and select Properties from the context menu.
2. On the General tab, click Advanced. Next, check the box ג€Encrypt contents to secure dataג€ and click OK.
3. A window will pop up asking you whether or not you want to encrypt the file and its parent folder. Select the ג€Encrypt the file onlyג€ and click OK.
4. Private.txt will now show its file name in green color.
1. Right-click Private.txt and then select Properties.
2. Click Advanced on the General tab.
3. Click Details on the Advanced Attributes tab to open the User Access dialog box.
4. Click Add to open the Encrypting File System dialog box and then select User1.
5. Click OK to add User1 to the list of users who have access to the file.
6. Click OK until you’ve exited out of the dialog boxes.
Reference:
https://www.top-password.com/blog/password-protect-notepad-text-files-in-windows-10/
https://sourcedaddy.com/windows-7/how-to-grant-users-access-to-an-encrypted-file.html

Question 33

You have a computer named Computer1 that runs Windows 10.
You complete a full back up of Computer1 to an external USB drive. You store the USB drive offsite.
You delete several files from your personal Microsoft OneDrive account by using File Explorer, and then you empty the Recycle Bin on Computer1.
You need to recover the files 60 days after you deleted them in the least amount of time possible.
What should you use?

A. the OneDrive recycle bin

B. the full backup on the external USB drive

C. Recovery in the Settings app

 


Suggested Answer: B

Reference:
https://support.office.com/en-us/article/restore-deleted-files-or-folders-in-onedrive-949ada80-0026-4db3-a953-c99083e6a84f

Question 34

You have a computer that runs Windows 10 and contains a user named User1 and the following local Group Policy Objects (GPOs):
• Local Computer Policy
• Local ComputerUser1 Policy
• Local ComputerAdministrators Policy
• Local ComputerNon-Administrators Policy
You need to ensure that User1 must use a password that is at least 10 characters.
Which GPO should you modify?

A. Local Computer Policy

B. Local ComputerAdministrators Policy

C. Local Computer Non-Administrators Policy

D. Local ComputerUser1 Policy

 


Suggested Answer: D

 

Question 35

HOTSPOT
-
Your network contains an Active Directory domain named contoso.com. The domain contains two computers named Computer1 and Computer2 that run Windows 10. The domain contains the users shown in the following table.
 Image
The relevant group membership on Computer1 is shown in the following table.
 Image
The relevant group membership on Computer2 is shown in the following table.
 Image
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
NOTE: Each correct selection is worth one point.
 Image

 


Suggested Answer:
Correct Answer Image

 

Question 36

You have a Windows 11 Pro device.
You need to perform a scan in Microsoft Defender to check for rootkits.
Which type of scan should you use?

A. full

B. offline

C. custom

D. quick

 


Suggested Answer: B

 

Question 37

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
You manage devices that run Windows 10.
Ten sales users will travel to a location that has limited bandwidth that is expensive. The sales users will be at the location for three weeks.
You need to prevent all Windows updates from downloading for the duration of the trip. The solution must not prevent access to email and the Internet.
Solution: From Accounts in the Settings app, you turn off Sync settings.
Does this meet the goal?

A. Yes

B. No

 


Suggested Answer: B

 

Question 38

Your network contains an Active Directory domain. The domain contains 10 computers that run Windows 10. Users in the finance department use the computers.
You have a computer named Computer1 that runs Windows 10.
From Computer1, you plan to run a script that executes Windows PowerShell commands on the finance department computers.
You need to ensure that you can run the PowerShell commands on the finance department computers from Computer1.
What should you do on the finance department computers?

A. From the local Group Policy, enable the Allow Remote Shell Access setting.

B. From the local Group Policy, enable the Turn on Script Execution setting.

C. From the Windows PowerShell, run the Enable-MMAgent cmdlet.

D. From the Windows PowerShell, run the Enable-PSRemoting cmdlet.

 


Suggested Answer: D

Reference:
https://docs.microsoft.com/en-us/powershell/module/microsoft.powershell.core/enable-psremoting?view=powershell-6

Question 39

You have a computer that runs Windows 11 and hosts the Hyper-V virtual machines shown in the following table.
 Image
You need to install Windows 11 on a virtual machine.
On which virtual machine can you install Windows 11?

A. VM2 only

B. VM4 only

C. VM2 and VM4 only

D. VM2 and VM4 only

E. VM1, VM2, VM3, and VM4

 


Suggested Answer: E

Generation version 1 is required for 32-bit Windows 11.
Generation version 2 is required for 64-bit Windows 11.
Supported VM configuration versions for Semi-Annual Channel hosts
The following table lists the VM configuration versions for hosts running a Semi-Annual Channel version of Windows.
Reference Image
Reference: alt=”Reference Image” />
Reference:
https://docs.microsoft.com/en-us/windows-server/virtualization/hyper-v/plan/should-i-create-a-generation-1-or-2-virtual-machine-in-hyper-v
https://docs.microsoft.com/en-us/windows-server/virtualization/hyper-v/deploy/upgrade-virtual-machine-version-in-hyper-v-on-windows-or-windows-server

Question 40

You manage devices that run Windows 10.
Ten sales users will travel to a location that has limited bandwidth that is expensive. The sales users will be at the location for three weeks.
You need to prevent all Windows updates from downloading for the duration of the trip. The solution must not prevent access to email and the Internet.
What should you do?

A. From Network & Internet in the Settings app, set a data limit.

B. From Accounts in the Settings app, turn off Sync settings.

C. From Network & Internet in the Settings app, set the network connections as metered connections.

D. From Update & Security in the Settings app, pause updates.

 


Suggested Answer: C

 

Question 41

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
You have a computer that runs Windows 10. The computer contains a folder. The folder contains sensitive data.
You need to log which user reads the contents of the folder and modifies and deletes files in the folder.
Solution: From the properties of the folder, you configure the Auditing settings and from the Audit Policy in the local Group Policy, you configure Audit directory service access.
Does this meet the goal?

A. Yes

B. No

 


Suggested Answer: B

Files and folders are objects and are audited through object access, not though directory service access.
Reference:
https://www.netwrix.com/how_to_detect_who_changed_file_or_folder_owner.html

Question 42

Which users can create a new group on Computer3?

A. User31 and User32 only

B. Admin1, User31, and User32 only

C. User31 only

D. Admin1 and User31 only

 


Suggested Answer: D

Reference:
https://ss64.com/nt/syntax-security_groups.html

Question 43

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
You have a computer named Computer1 that runs Windows 10.
A service named Application1 is configured as shown in the exhibit.
 Image
You discover that a user used the Service1 account to sign in to Computer1 and deleted some files.
You need to ensure that the identity used by Application1 cannot be used by a user to sign in to sign in to the desktop on Computer1. The solution must use the principle of least privilege.
Solution: On Computer1, you assign Service1 the Deny log on as a service user right.
Does this meet the goal?

A. Yes

B. No

 


Suggested Answer: B

A service account needs the log on as a service user right. When you assign an account to be used by a service, that account is granted the log on as a service user right. Therefore, assigning Service1 the deny log on as a service user right would mean the service would not function.
To sign in to the desktop on the computer, an account needs the log on locally right which all user accounts have by default. To meet the requirements of this question, we need to assign Service1 the deny log on locally user right, not the deny log on as a service user right.
Reference:
https://docs.microsoft.com/en-us/windows/security/threat-protection/security-policy-settings/deny-log-on-as-a-service

Question 44

You install Windows 10 Pro on a computer named CLIENT1 and join the device to an Active Directory domain.
You need to ensure that all per-user services are disabled on CLIENT1. The solution must minimize administrative effort.
What should you use?

A. the sc command

B. Task Manager

C. Services

D. the sfc command

 


Suggested Answer: A

 

Question 45

Your network contains an Active Directory domain. The domain contains a computer named Computer1 that runs Windows 10.
The domain contains the users shown in the following table.
 Image
Computer1 has the local users shown in the following table.
 Image
All users have Microsoft accounts.
Which two users can be configured to sign in by using their Microsoft account? Each correct answer presents part of the solution.
NOTE: Each correct selection is worth one point.

A. User1

B. User2

C. User3

D. User4

E. User5

 


Suggested Answer: DE

 

Question 46

HOTSPOT -
Your network contains the segments shown in the following table.
 Image
You have computers that run Windows 10 and are configured as shown in the following table.
 Image
Windows Defender Firewall has the File and Printer Sharing allowed apps rule shown in the following table.
 Image
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
NOTE: Each correct selection is worth one point.
Hot Area:
 Image

 


Suggested Answer:
Correct Answer Image

 

Question 47

You have a workgroup computer that runs Windows 10.
You create a local user named User1.
User1 needs to be able to share and manage folders located in a folder named C:Share by using the Shared Folders snap-in. The solution must use the principle of least privilege.
To which group should you add User1?

A. Administrators

B. Device Owners

C. Users

D. Power Users

 


Suggested Answer: A

 

Question 48

HOTSPOT -
You have a workgroup computer named Computer1 that runs Windows 10 and has the users shown in the following table.
 Image
You have a file named File1.reg that contains the following content.
 Image
You need to identify what occurs when User1 and User2 double-click File1.reg.
What should you identify? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
Hot Area:
 Image

 


Suggested Answer:
Correct Answer Image

Box 1:
User1 is a member of the Administrators group so has permission to add keys to both registry hives.
Box 2:
User2 is a standard user so does not have permission to add a key to the HKEY_LOCAL_MACHINE registry hive so Key2 will not be imported.

Question 49

You have a computer named Computer1 that runs Windows 10.
You need to prevent standard users from changing the wireless network settings on Computer1. The solution must allow administrators to modify the wireless network settings.
What should you use?

A. Windows Configuration Designer

B. MSConfig

C. Local Group Policy Editor

D. an MMC console that has the Group Policy Object Editor snap-in

 


Suggested Answer: C

 

Question 50

HOTSPOT -
You have a computer named Computer1 that runs Windows 10 and is joined to an Active Directory domain named adatum.com.
A user named Admin1 signs in to Computer1 and runs the whoami command as shown in the following exhibit.
 Image
Use the drop-down menus to select the answer choice that completes each statement based on the information presented in the graphic.
NOTE: Each correct selection is worth one point.
Hot Area:
 Image

 


Suggested Answer:
Correct Answer Image

Reference:
https://docs.microsoft.com/en-us/windows/win32/secauthz/mandatory-integrity-control

Access Full MD-100 Exam Prep Free

Want to go beyond these 50 questions? Click here to unlock a full set of MD-100 exam prep free questions covering every domain tested on the exam.

We continuously update our content to ensure you have the most current and effective prep materials.

Good luck with your MD-100 certification journey!

Share18Tweet11
Previous Post

MB-800 Exam Prep Free

Next Post

MLS-C01 Exam Prep Free

Next Post

MLS-C01 Exam Prep Free

MS-100 Exam Prep Free

MS-101 Exam Prep Free

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recommended

Network+ Practice Test

Comptia Security+ Practice Test

A+ Certification Practice Test

Aws Cloud Practitioner Exam Questions

Aws Cloud Practitioner Practice Exam

Comptia A+ Practice Test

  • About
  • DMCA
  • Privacy & Policy
  • Contact

PracticeTestFree.com materials do not contain actual questions and answers from Cisco's Certification Exams. PracticeTestFree.com doesn't offer Real Microsoft Exam Questions. PracticeTestFree.com doesn't offer Real Amazon Exam Questions.

  • Login
  • Sign Up
No Result
View All Result
  • Quesions
    • Cisco
    • AWS
    • Microsoft
    • CompTIA
    • Google
    • ISACA
    • ECCouncil
    • F5
    • GIAC
    • ISC
    • Juniper
    • LPI
    • Oracle
    • Palo Alto Networks
    • PMI
    • RedHat
    • Salesforce
    • VMware
  • Courses
    • CCNA
    • ENCOR
    • VMware vSphere
  • Certificates

Welcome Back!

Login to your account below

Forgotten Password? Sign Up

Create New Account!

Fill the forms below to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Insert/edit link

Enter the destination URL

Or link to existing content

    No search term specified. Showing recent items. Search or use up and down arrow keys to select an item.