Practice Test Free
  • QUESTIONS
  • COURSES
    • CCNA
    • Cisco Enterprise Core
    • VMware vSphere: Install, Configure, Manage
  • CERTIFICATES
No Result
View All Result
  • Login
  • Register
Quesions Library
  • Cisco
    • 200-301
    • 200-901
      • Multiple Choice
      • Drag Drop
    • 350-401
      • Multiple Choice
      • Drag Drop
    • 350-701
    • 300-410
      • Multiple Choice
      • Drag Drop
    • 300-415
      • Multiple Choice
      • Drag Drop
    • 300-425
    • Others
  • AWS
    • CLF-C02
    • SAA-C03
    • SAP-C02
    • ANS-C01
    • Others
  • Microsoft
    • AZ-104
    • AZ-204
    • AZ-305
    • AZ-900
    • AI-900
    • SC-900
    • Others
  • CompTIA
    • SY0-601
    • N10-008
    • 220-1101
    • 220-1102
    • Others
  • Google
    • Associate Cloud Engineer
    • Professional Cloud Architect
    • Professional Cloud DevOps Engineer
    • Others
  • ISACA
    • CISM
    • CRIS
    • Others
  • LPI
    • 101-500
    • 102-500
    • 201-450
    • 202-450
  • Fortinet
    • NSE4_FGT-7.2
  • VMware
  • >>
    • Juniper
    • EC-Council
      • 312-50v12
    • ISC
      • CISSP
    • PMI
      • PMP
    • Palo Alto Networks
    • RedHat
    • Oracle
    • GIAC
    • F5
    • ITILF
    • Salesforce
Contribute
Practice Test Free
  • QUESTIONS
  • COURSES
    • CCNA
    • Cisco Enterprise Core
    • VMware vSphere: Install, Configure, Manage
  • CERTIFICATES
No Result
View All Result
Practice Test Free
No Result
View All Result
Home Dump Free

MD-100 Dump Free

Table of Contents

Toggle
  • MD-100 Dump Free – 50 Practice Questions to Sharpen Your Exam Readiness.
  • Access Full MD-100 Dump Free

MD-100 Dump Free – 50 Practice Questions to Sharpen Your Exam Readiness.

Looking for a reliable way to prepare for your MD-100 certification? Our MD-100 Dump Free includes 50 exam-style practice questions designed to reflect real test scenarios—helping you study smarter and pass with confidence.

Using an MD-100 dump free set of questions can give you an edge in your exam prep by helping you:

  • Understand the format and types of questions you’ll face
  • Pinpoint weak areas and focus your study efforts
  • Boost your confidence with realistic question practice

Below, you will find 50 free questions from our MD-100 Dump Free collection. These cover key topics and are structured to simulate the difficulty level of the real exam, making them a valuable tool for review or final prep.

Question 1

HOTSPOT -
You implement the planned changes for Computer1.
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
NOTE: Each correct selection is worth one point.
Hot Area:
Image

 

Suggested Answer:
Correct Answer Image

Box 1: Yes -
User1 already has full control access through membership of Group1. Therefore, User1 can write to the file.
Box 2: No -
The planned changes will grant User2 full control access to the file. However, User2 is a member of Group2 which has Deny/Write access. The Deny permission will always take precedence. Therefore, User2 will not be able to write to the file.
Box 3: No -
The planned changes will grant User3 full control access to the folder. That permission will be inherited by the file. However, User3 is a member of Group2 which has Deny/Write access. The Deny permission will always take precedence. Therefore, User3 will not be able to write to the file.

Question 2

HOTSPOT -
You have a computer named Computer1 that runs Windows 10. Computer1 is in a workgroup.
Computer1 contains the local users shown in the following table.
Image
You create a folder named Folder1 that has the permissions shown in the following table.
Image
You create a file named File1.txt in Folder1 and allow Group2 Full control permissions to File1.txt.
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
NOTE: Each correct selection is worth one point.
Hot Area:
Image

 

Suggested Answer:
Correct Answer Image

Reference:
https://www.dell.com/support/article/za/en/zadhs1/sln156352/understanding-file-and-folder-permissions-in-windows?lang=en

Question 3

SIMULATION -
Please wait while the virtual machine loads. Once loaded, you may proceed to the lab section. This may take a few minutes, and the wait time will not be deducted from your overall test time.
When the Next button is available, click it to access the lab section. In this section, you will perform a set of tasks in a live environment. While most functionality will be available to you as it would be in a live environment, some functionality (e.g., copy and paste, ability to navigate to external websites) will not be possible by design.
Scoring is based on the outcome of performing the tasks stated in the lab. In other words, it doesn't matter how you accomplish the task, if you successfully perform it, you will earn credit for that task.
Labs are not timed separately, and this exam may more than one lab that you must complete. You can use as much time as you would like to complete each lab.
But, you should manage your time appropriately to ensure that you are able to complete the lab(s) and all other sections of the exam in the time provided.
Please note that once you submit your work by clicking the Next button within a lab, you will NOT be able to return to the lab.
Username and password -
Image
Use the following login credentials as needed:
To enter your password, place your cursor in the Enter password box and click on the password below.
Username: Contoso/Administrator -
Password: Passw0rd!
The following information is for technical support purposes only:
Lab Instance: 11145882 -
Image
Image
You have already prepared Client1 for remote management.
You need to forward all events from the Application event log on Client1 to DC1.
To complete this task, sign in to the required computer or computers.

 

Suggested Answer: See explanation below.

Configuring the event source computer
1. Run the following command from an elevated privilege command prompt on the Windows Server domain controller to configure Windows Remote Management: winrm qc -q
2. Start group policy by running the following command:
%SYSTEMROOT%System32gpedit.msc
3. Under the Computer Configuration node, expand the Administrative Templates node, then expand the Windows Components node, then select the Event
Forwarding node.
4. Right-click the SubscriptionManager setting, and select Properties. Enable the SubscriptionManager setting, and click the Show button to add a server address to the setting. Add at least one setting that specifies the event collector computer. The SubscriptionManager Properties window contains an Explain tab that describes the syntax for the setting.
5. After the SubscriptionManager setting has been added, run the following command to ensure the policy is applied: gpupdate /force
Configuring the event collector computer
1. Run the following command from an elevated privilege command prompt on the Windows Server domain controller to configure Windows Remote Management: winrm qc -q
2. Run the following command to configure the Event Collector service: wecutil qc /q
3. Create a source initiated subscription. This can either be done programmatically, by using the Event Viewer, or by using Wecutil.exe. If you use Wecutil.exe, you must create an event subscription XML file and use the following command: wecutil cs configurationFile.xml
Reference:
https://docs.microsoft.com/en-us/windows/win32/wec/setting-up-a-source-initiated-subscription#forwarding-the-security-log

Question 4

HOTSPOT -
You need to meet the technical requirements for the helpdesk users.
What should you do? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
Hot Area:
Image

 

Suggested Answer:
Correct Answer Image

Reference:
https://www.itprotoday.com/compute-engines/what-group-policy-creator-owners-group

Question 5

HOTSPOT
-
You have a computer that runs Windows 10 and contains a user named User1.
You need to ensure that User1 can add a third-party driver package for a printer to the driver store of the computer. The solution must use the principle of the least privilege.
To which local group should you add User1, and what should User1 run? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
Image

 

Suggested Answer:
Correct Answer Image

Question 6

SIMULATION -
Please wait while the virtual machine loads. Once loaded, you may proceed to the lab section. This may take a few minutes, and the wait time will not be deducted from your overall test time.
When the Next button is available, click it to access the lab section. In this section, you will perform a set of tasks in a live environment. While most functionality will be available to you as it would be in a live environment, some functionality (e.g., copy and paste, ability to navigate to external websites) will not be possible by design.
Scoring is based on the outcome of performing the tasks stated in the lab. In other words, it doesn't matter how you accomplish the task, if you successfully perform it, you will earn credit for that task.
Labs are not timed separately, and this exam may more than one lab that you must complete. You can use as much time as you would like to complete each lab.
But, you should manage your time appropriately to ensure that you are able to complete the lab(s) and all other sections of the exam in the time provided.
Please note that once you submit your work by clicking the Next button within a lab, you will NOT be able to return to the lab.
Username and password -
Image
Use the following login credentials as needed:
To enter your password, place your cursor in the Enter password box and click on the password below.
Username: Contoso/Administrator -
Password: Passw0rd!
The following information is for technical support purposes only:
Lab Instance: 10921597 -
Image
You need to ensure that a local user named User1 can establish a Remote Desktop connection to Client2.
To complete this task, sign in to the required computer or computers.

 

Suggested Answer: See explanation below.

Add User to Remote Desktop Users Group via Settings App
1. Open the Settings app on Client2 and go to System -> Remote Desktop. Click on the Select users that can remotely access this PC link on the right side.
2. When the Remote Desktop Users dialog opens, click on Add.
3. Click on Advanced.
4. Click on Find Now and then select any user account you want to add to the ג€Remote Desktop Usersג€ group, and click OK.
5. Click OK and you're done.
Reference:
https://www.top-password.com/blog/add-user-to-remote-desktop-users-group-in-windows-10/

Question 7

You have a Microsoft 365 tenant that contains 70 remote users.
The remote users work from various locations.
Recently, each remote user purchased a personal computer that runs Windows 10 Home.
You need to configure the VPN settings on the computers automatically by using the least amount of administrative effort.
What should you use?

A. an unattend answer file

B. a Group Policy Object (GPO)

C. Windows Autopilot

D. a provisioning package

 

Suggested Answer: D

Reference:
https://docs.microsoft.com/en-us/windows/configuration/provisioning-packages/provisioning-packages

Question 8

HOTSPOT -
You have a computer named Computer1 that runs Windows 10.
Computer1 contains the folders shown in the following table.
Image
You include Folder1, Folder2, and Folder3 in the Documents library.
You configure File History to run every 15 minutes, and then turn on File History.
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
NOTE: Each correct selection is worth one point.
Hot Area:
Image

 

Suggested Answer:
Correct Answer Image

Question 9

An employee reports that she must perform a BitLocker recovery on her laptop. The employee does not have her BitLocker recovery key but does have a
Windows 10 desktop computer.
What should you instruct the employee to do from the desktop computer?

A. Run the manage-bde.exe ג€"status command

B. From BitLocker Recovery Password Viewer, view the computer object of the laptop

C. Go to https://aad.portal.azure.com and view the object of the laptop

D. Run the Enable-BitLockerAutoUnlock cmdlet

 

Suggested Answer: C

The BitLocker recovery key is stored in Azure Active Directory.
Reference:
https://celedonpartners.com/blog/storing-recovering-bitlocker-keys-azure-active-directory/

Question 10

You customize the Start menu on a computer that runs Windows 10 as shown in the following exhibit.
Image
You need to add Remote Desktop Connection to Group1 and remove Group3 from the Start menu.
Which two actions should you perform from the Start menu customizations? Each correct answer presents part of the solution.
NOTE: Each correct selection is worth one point.

A. Unlock Group1.

B. Remove Command Prompt from Group1.

C. Delete Group3.

D. Add Remote Desktop Connection to Group1.

E. Rename Group3 as Group1.

 

Suggested Answer: AD

A: You have to unlock Group1 before you can make any changes to it.
D: If you drag the Remote Desktop Connection from Group3 to Group1, Group3 will disappear.

Question 11

SIMULATION -
Please wait while the virtual machine loads. Once loaded, you may proceed to the lab section. This may take a few minutes, and the wait time will not be deducted from your overall test time.
When the Next button is available, click it to access the lab section. In this section, you will perform a set of tasks in a live environment. While most functionality will be available to you as it would be in a live environment, some functionality (e.g., copy and paste, ability to navigate to external websites) will not be possible by design.
Scoring is based on the outcome of performing the tasks stated in the lab. In other words, it doesn't matter how you accomplish the task, if you successfully perform it, you will earn credit for that task.
Labs are not timed separately, and this exam may more than one lab that you must complete. You can use as much time as you would like to complete each lab.
But, you should manage your time appropriately to ensure that you are able to complete the lab(s) and all other sections of the exam in the time provided.
Please note that once you submit your work by clicking the Next button within a lab, you will NOT be able to return to the lab.
Username and password -
Image
Use the following login credentials as needed:
To enter your password, place your cursor in the Enter password box and click on the password below.
Username: Contoso/Administrator -
Password: Passw0rd!
The following information is for technical support purposes only:
Lab Instance: 10921597 -
Image
You need to create a user account named User5 on Client2. The solution must meet the following requirements:
âś‘ Prevent User5 from changing the password of the account.
âś‘ Ensure that User5 can perform backups.
âś‘ Use the principle of least privilege.
To complete this task, sign in to the required computer or computers.

 

Suggested Answer: See explanation below.

1. On Client2, press the Win + X keys on your keyboard. Then, click or tap the Computer Management option from the menu.
2. Expand the Local Users and Groups from the left side of the window, and select Users.
3. Right-click somewhere on the blank space found in the middle section of the window, and click or tap on New User. This opens the New User window, where you can enter all the details about the new user account.
4. Type the user name and, optionally, its full name and description.
5. Type the password to be used for that user and confirm it.
6. Select the User cannot change password check box.
7. Click Create and Windows immediately creates the user account. When you are done creating user accounts, click Close in the New User window.
1. Press the Win + R keys to open Run, type secpol.msc into Run, and click/tap on OK to open Local Security Policy.
2. Expand open Local Policies in the left pane of Local Security Policy, click/tap on User Rights Assignment, and double click/tap on the Back up files and directories policy in the right pane.
3. Click/tap on the Add User or Group button.
4. Click/tap on the Object Types button.
5. Check all the boxes for Object types, and click/tap on the OK.
6. Click/tap on the Advanced button.
7. Click/tap on the Find Now button, select the name of the user or group
8. Click/tap on OK.
9. Click/tap on OK.
10.When finished, you can close Local Users and Groups.
Reference:
https://www.digitalcitizen.life/geeks-way-creating-user-accounts-and-groups
https://docs.microsoft.com/en-us/windows/security/threat-protection/security-policy-settings/user-rights-assignment

Question 12

HOTSPOT -
You have computers that run Windows 10 Enterprise as shown in the following table.
Image
Both computers have applications installed and contain user data.
You plan to configure both computers to run Windows 10 Enterprise LTSC 2019 and to retain all the existing applications and data.
You need to recommend a method to deploy Windows 10 Enterprise LTSC 2019 to the computers. The solution must minimize effort to install and configure the applications.
What should you include in the recommendation for each computer? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
Hot Area:
Image

 

Suggested Answer:
Correct Answer Image

Reference:
https://docs.microsoft.com/en-us/windows/deployment/upgrade/windows-10-upgrade-paths

Question 13

DRAG DROP
-
Your network contains an Active Directory domain named contoso.com. The domain contains the objects shown in the following table.
Image
BitLocker Drive Encryption (BitLocker) recovery passwords are stored in Active Directory.
User1 enables the following on Computer1:
• BitLocker on drive C
• BitLocker on a removable drive named E
Which object stores the BitLocker recovery passwords for each drive? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
Image

 

Suggested Answer:
Correct Answer Image

Question 14

HOTSPOT -
You have two workgroup computers named Computer1 and Computer2 that run Windows 10. The computers contain the local security principals shown in the following table.
Image
Which security principals can be members of GroupA and GroupC? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
Hot Area:
Image

 

Suggested Answer:
Correct Answer Image

Question 15

DRAG DROP -
You have a Windows 10 image that was updated to the latest version of Windows 10.
You plan to create a new WinPE bootable ISO file.
You obtain the latest WinPE source files.
You need to create the new ISO file to support PowerShell scripting.
Which three commands should you run in sequence? To answer, move the appropriate commands from the list of commands to the answer area and arrange them in the correct order.
Select and Place:
Image

 

Suggested Answer:
Correct Answer Image

Step 1: copype -
Create working files.
No matter what type of media you're going to create, the first thing to do is create a working set of Windows PE files on your technician PC.
1. Make sure your PC has the ADK and ADK Windows PE add-on installed.
2. Start the Deployment and Imaging Tools Environment as an administrator.
3. Run copype to create a working copy of the Windows PE files.
Step 2: dism -
Customize Windows PE. When you add packages to Window PE, it can slow performance and boot time. Only add additional packages when necessary.
Before you can customize WinPE, you need to have a WinPE image to work with. Use DISM to mount the WinPE image into a temporary location on your technician PC.
Step 3: makewinpemedia -
Create bootable media -
Now that you now have a set of working files, you can use MakeWinPEMedia to build bootable WinPE media.
Reference:
https://docs.microsoft.com/en-us/windows-hardware/manufacture/desktop/winpe-create-usb-bootable-drive
https://docs.microsoft.com/en-us/windows-hardware/manufacture/desktop/winpe-mount-and-customize

Question 16

HOTSPOT -
You need to reduce the amount of time it takes to restart Application1 when the application crashes.
What should you include in the solution? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
Hot Area:
Image

 

Suggested Answer:
Correct Answer Image

Reference:
https://www.howto-connect.com/how-to-attach-a-task-to-this-event-in-event-viewer-in-windows-10/

Question 17

You have a computer named Computer1 that runs Windows 10. Computer1 contains a folder named Folder1.
You need to log any users who take ownership of the files in Folder1.
Which two actions should you perform? Each correct answer presents part of the solution.
NOTE: Each correct selection is worth one point.

A. Modify the folder attributes of Folder1.

B. Modify the Advanced Security Settings for Folder1.

C. From a Group Policy object (GPO), configure the Audit Sensitive Privilege Use setting.

D. From a Group Policy object (GPO), configure the Audit File System setting.

E. Install the Remote Server Administration Tools (RSAT).

 

Suggested Answer: BC

Reference:
https://docs.microsoft.com/en-us/windows/security/threat-protection/auditing/audit-sensitive-privilege-use

Question 18

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
You have a computer that runs Windows 10. The computer contains a folder named D:Scripts. D:Scripts contains several PowerShell scripts.
You need to ensure that you can run the PowerShell scripts without specifying the full path to the scripts. The solution must persist between PowerShell sessions.
Solution: From PowerShell, you run $env:Path += ";d:scripts".
Does this meet the goal?

A. Yes

B. No

 

Suggested Answer: A

Reference:
https://docs.microsoft.com/en-us/powershell/module/microsoft.powershell.core/about/about_environment_variables?view=powershell-7

Question 19

You have a public computer named Public1 that runs Windows 10.
Users use Public1 to browse the internet by using Microsoft Edge.
You need to view events associated with website phishing attacks on Public1.
Which Event Viewer log should you view?

A. Applications and Services Logs > Microsoft > Windows > SmartScreen > Debug

B. Applications and Services Logs > Microsoft > Windows > Security-Mitigations > User Mode

C. Applications and Services Logs > Microsoft > Windows > Windows Defender > Operational

D. Applications and Services Logs > Microsoft > Windows > DeviceGuard > Operational

 

Suggested Answer: A

Question 20

SIMULATION -
Please wait while the virtual machine loads. Once loaded, you may proceed to the lab section. This may take a few minutes, and the wait time will not be deducted from your overall test time.
When the Next button is available, click it to access the lab section. In this section, you will perform a set of tasks in a live environment. While most functionality will be available to you as it would be in a live environment, some functionality (e.g., copy and paste, ability to navigate to external websites) will not be possible by design.
Scoring is based on the outcome of performing the tasks stated in the lab. In other words, it doesn't matter how you accomplish the task, if you successfully perform it, you will earn credit for that task.
Labs are not timed separately, and this exam may more than one lab that you must complete. You can use as much time as you would like to complete each lab.
But, you should manage your time appropriately to ensure that you are able to complete the lab(s) and all other sections of the exam in the time provided.
Please note that once you submit your work by clicking the Next button within a lab, you will NOT be able to return to the lab.
Username and password -
Image
Use the following login credentials as needed:
To enter your password, place your cursor in the Enter password box and click on the password below.
Username: Contoso/Administrator -
Password: Passw0rd!
The following information is for technical support purposes only:
Lab Instance: 11145882 -
Image
Image
Administrators report that they cannot use Event Viewer to remotely view the event logs on Client3.
You need to ensure that the administrators can access the event logs remotely on Client3. The solution must ensure that Windows Firewall remains enabled.
To complete this task, sign in to the required computer or computers.

 

Suggested Answer: See explanation below.

1. Go to Control Panel -> System and Security -> Windows Firewall.
2. Click on the Advanced settings link in the left-hand side.
Reference Image
3. Enable COM+ Network Access (DCOM-In).
Reference Image
4. Enable all the rules in the Remote Event Log Management group.
Reference Image
Reference: alt="Reference Image" />
3. Enable COM+ Network Access (DCOM-In).
Reference Image
4. Enable all the rules in the Remote Event Log Management group.
<img src="https://www.examtopics.com/assets/media/exam-media/04292/0034700003.jpg" alt="Reference Image" />
Reference:
https://www.zubairalexander.com/blog/unable-to-access-event-viewer-on-a-remote-computer/

Question 21

You have a VPN server that accepts PPTP and L2TP connections and is configured as shown in the following exhibit.
Image
A user named User1 has a computer that runs Windows 10 and has a VPN connection configured as shown in the following exhibit.
Image
User1 fails to establish a VPN connection when connected to a home network.
You need to identify which VPN client setting must be modified.
What should you identify?

A. ServerAddress

B. TunnelType

C. AuthenticationMethod

D. L2tpIPsecAuth

E. EncryptionLevel

 

Suggested Answer: A

The server address is a private IP address. This needs to be the public IP address of the VPN server.

Question 22

You have a computer named Computer1 that runs Windows 11 and hosts two Hyper-V virtual machines named VM1 and VM2.
You need to ensure that VM1 can connect to the network shares on VM2. The solution must prevent Computer1 from establishing network connections to VM1 or VM2.
Which type of virtual switch should you use?

A. external

B. private

C. internal

 

Suggested Answer: B

Question 23

HOTSPOT -
Your network contains an on-premises Active Directory forest named contoso.com. The forest contains a user named User1 and two computers named
Computer1 and Computer2 that run Windows 10.
User1 is configured as shown in the following exhibit.
Image
You rename file Server1ProfilesUser1.V6NTUSER.DAT as NTUSER.MAN.
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
NOTE: Each correct selection is worth one point.
Hot Area:
Image

 

Suggested Answer:
Correct Answer Image

Box 1: No -
User profiles become mandatory profiles when the administrator renames the NTuser.dat file (the registry hive) of each user's profile in the file system of the profile server from NTuser.dat to NTuser.man. The .man extension causes the user profile to be a read-only profile.
A mandatory user profile is a roaming user profile that has been pre-configured by an administrator to specify settings for users. Settings commonly defined in a mandatory profile include (but are not limited to): icons that appear on the desktop, desktop backgrounds, user preferences in Control Panel, printer selections, and more. Configuration changes made during a user's session that are normally saved to a roaming user profile are not saved when a mandatory user profile is assigned.
Box 2: Yes -
The local profile will still be updated and saved.
In a local user profile, the setting changes made to a computer are saved locally on that computer.
Box 3: No -
Reference:
https://docs.microsoft.com/en-us/windows/client-management/mandatory-user-profile

Question 24

You have a workgroup computer that runs Windows 10.
You need to set the minimum password length to 12 characters.
What should you use?

A. Local Group Policy Editor

B. User Accounts in Control Panel

C. System Protection in System Properties

D. Sign-in options in the Settings app

 

Suggested Answer: A

You can set the password length on computers that are not domain joined by using the Local Security Policy or the Local Group Policy Editor.
Note:
There are several versions of this question in the exam. The question has two possible correct answers:
1. Local Group Policy Editor
2. Local Security Policy
Other incorrect answer options you may see on the exam include the following:
1. Credential Manager in Control Panel
2. Email & accounts in the Settings app
3. Local Users and Groups in Computer Management
Reference:
https://docs.microsoft.com/en-us/windows/security/threat-protection/security-policy-settings/how-to-configure-security-policy-settings

Question 25

You have a computer that is configured as shown in the following exhibit.
Image
What can the computer connect to?

A. all the local computers and the remote computers within your corporate network only

B. all the local computers and the remote computers, including Internet hosts

C. only other computers on the same network segment that have automatic private IP addressing (APIPA)

D. only other computers on the same network segment that have an address from a class A network ID

 

Suggested Answer: C

The computer has IPv4 address of 169.254.30.20. 169.254.x.x is an automated APIPA address.

Question 26

You have an Azure Active Directory (Azure AD) tenant named contoso.com that contains a user named UserA.
You have two computers named Computer1 and Computer2 that run Windows 10 and are joined to contoso.com.
You need to ensure that UserA can connect to Computer2 from Computer1 by using Remote Desktop.
Which three actions should you perform? Each correct answer presents part of the solution.
NOTE: Each correct selection is worth one point.

A. On Computer1, modify the registry.

B. On Computer2, modify the registry.

C. On Computer1, modify the properties of UserA.

D. On Computer1, enable Remote Desktop.

E. On Computer2, modify the properties of UserA.

F. On Computer 2, enable Remote Desktop.

G. On Computer2, add the Everyone group to the Remote Desktop Users group.

H. On Computer1, add the Everyone group to the Remote Desktop Users group.
 

Suggested Answer: EFG

Reference:
https://docs.microsoft.com/en-us/windows/client-management/connect-to-remote-aadj-pc

Question 27

DRAG DROP -
You have a computer named Computer1 that runs Windows 8.1. Computer1 has a local user named User1 who has a customized profile.
On Computer1, you perform a clean installation of Windows 10 without formatting the drives.
You need to migrate the settings of User1 from Windows 8.1 to Windows 10.
Which two actions should you perform? To answer, drag the appropriate actions to the correct targets. Each action may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.
NOTE: Each correct selection is worth one point.
Select and Place:
Image

 

Suggested Answer:
Correct Answer Image

The User State Migration Tool (USMT) includes two tools that migrate settings and data: ScanState and LoadState. ScanState collects information from the source computer, and LoadState applies that information to the destination computer. In this case the source and destination will be the same computer.
As we have performed a clean installation of Windows 10 without formatting the drives, User1's customized Windows 8.1 user profile will be located in the
Windows.old folder. Therefore, we need to run scanstate.exe on the Windows.old folder.
User1's Windows 10 profile will be in the C:Users folder so we need to run loadstate.exe to apply the changes in the C:Users folder.
Reference:
https://docs.microsoft.com/en-us/windows/deployment/usmt/offline-migration-reference
https://docs.microsoft.com/en-us/windows/deployment/usmt/usmt-how-it-works
https://docs.microsoft.com/en-us/windows/deployment/usmt/usmt-common-migration-scenarios#bkmk-fourpcrefresh

Question 28

You install Windows 10 Pro on a computer named CLIENT1 and join the device to an Active Directory domain.
You need to ensure that all per-user services are disabled on CLIENT1. The solution must minimize administrative effort.
What should you use?

A. a Group Policy administrative template

B. the sfc command

C. Services

D. Group Policy preferences

 

Suggested Answer: D

Reference:
https://docs.microsoft.com/en-us/windows/application-management/per-user-services-in-windows

Question 29

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
You deploy Windows 10 to a computer named Computer1.
Computer1 contains a folder named C:Folder1. Folder1 contains multiple documents.
You need to ensure that you can recover the files in Folder1 by using the Previous Versions tab.
Solution: You select Folder is ready for archiving from the properties of Folder1.
Does this meet the goal?

A. Yes

B. No

 

Suggested Answer: B

The previous versions feature in Windows 10 allows you to restore a previous version of files, folders, and drives that were saved or backed up as part of a restore point, File History, and/or Windows Backup.
Reference:
https://www.tenforums.com/tutorials/79490-restore-previous-versions-files-folders-drives-windows-10-a.html

Question 30

You have a computer named Computer1 that runs Windows 10.
Computer1 has a folder named C:Folder1.
You need to meet the following requirements:
âś‘ Log users that access C:Folder1.
âś‘ Log users that modify and delete files in C:Folder1.
Which two actions should you perform?

A. From the properties of C:Folder1, configure the Auditing settings.

B. From the properties of C:Folder1, select the Encryption contents to secure data option.

C. From the Audit Policy in the local Group Policy, configure Audit directory service access.

D. From the Audit Policy in the local Group Policy, you configure Audit object access.

E. From the Audit Policy in the local Group Policy, you configure Audit system events.

 

Suggested Answer: AD

Files and folders are objects and are audited through object access.
Reference:
https://www.netwrix.com/how_to_detect_who_changed_file_or_folder_owner.html

Question 31

You have a Windows 10 device that has two local users named User1 and User2.
User1 performs the tasks shown in the following table.
Image
The results of which tasks will be visible when User2 signs in to the device?

A. Task3 only

B. Task2 and Task3 only

C. Task3 and Task4 only

D. Task2, Task3, and Task4 only

E. Task1, Task2, Task3, and Task4

 

Suggested Answer: D

Question 32

A user has a computer that runs Windows 10. The user has access to the following storage locations:
âś‘ A USB flash drive
âś‘ Microsoft OneDrive
âś‘ OneDrive for Business
âś‘ A drive mapped to a network share
âś‘ A secondary partition on the system drive
You need to configure Back up using File History from the Settings app.
Which two storage locations can you select for storing File History data? Each correct answer presents a complete solution.
NOTE: Each correct selection is worth one point.

A. OneDrive for Business

B. OneDrive

C. the USB flash drive

D. the secondary partition on the system drive

E. the drive mapped to a network share

 

Suggested Answer: CD

Question 33

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
You have a computer that runs Windows 10. The computer contains a folder named D:Scripts. D:Scripts contains several PowerShell scripts.
You need to ensure that you can run the PowerShell scripts without specifying the full path to the scripts. The solution must persist between PowerShell sessions.
Solution: From System Properties, you add D:Scripts to the PATH environment variable.
Does this meet the goal?

A. Yes

B. No

 

Suggested Answer: B

Question 34

HOTSPOT -
You have a computer named Computer5 that runs Windows 10 that is used to share documents in a workgroup.
You create three users named User-a, User-b, and User-c by using Computer Management. The users plan to access Computer5 from the network only.
You have a folder named Data. The Advanced Security Settings for the Data folder are shown in the Security exhibit. (Click the Security tab).
Image
You share the Data folder. The permissions for User-a are shown in the User-a exhibit (Click the User-a tab.)
Image
The permissions for User-b are shown in the User-b exhibit. (Click the User-b tab.)
Image
The permissions for User-c are shown in the User-c exhibit. (Click the User-c tab.)
Image
For each of the following statements, select Yes if the statements is true. Otherwise, select No.
NOTE: Reach correct selection is worth one point.
Hot Area:
Image

 

Suggested Answer:
Correct Answer Image

Box 1: No -
User-a only has Read share permission so he cannot modify files in the Data share.
Box 2: No -
User-b only has Read share permission so he cannot delete files in the Data share.
Box 3: Yes -
User-c has Read and Change share permission so he can read files in the Data share. User-c does not have an entry in the Advanced Security Settings for the
Data folder. However, User-c would be a member of the Users group by default and that group has Full Control permission to the folder.

Question 35

Your network contains an Active Directory domain. The domain contains a computer named Computer1 that runs Windows 10.
Computer1 has a Trusted Platform Module (TPM) version 1.2.
The domain contains a domain controller named DC1 that has all the Remote Server Administration Tools (RSAT) installed.
BitLocker Drive Encryption (BitLocker) recovery passwords are stored in Active Directory.
You enable BitLocker on the operating system drive of Computer1.
A software update on Computer1 disables the TPM, and BitLocker enters recovery mode.
You need to recover your BitLocker password for Computer1.
What should you use to retrieve the recovery password?

A. Disk Management

B. manage ג€"bde with the ג€"unlock parameter

C. Active Directory Users and Computers

D. repair-bde with the ג€"f parameter

 

Suggested Answer: C

Question 36

HOTSPOT -
You have a computer that runs Windows 10.
From the Settings app, you view the connection properties shown in the following exhibit.
Image
Use the drop-down menus to select the answer choice that completes each statement based on the information presented in the graphic.
NOTE: Each correct selection is worth one point.
Hot Area:
Image

 

Suggested Answer:
Correct Answer Image

Question 37

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
You have a laptop named Computer1 that runs Windows 10.
When in range, Computer1 connects automatically to a Wi-Fi network named Wireless1.
You need to prevent Computer1 from automatically connecting to Wireless1.
Solution: From the Services console, you disable the Link-Layer Topology Discovery Mapper service.
Does this meet the goal?

A. Yes

B. No

 

Suggested Answer: B

Link-Layer Topology Discovery is used by their Network Map feature to display a graphical representation of the local area network (LAN) or wireless LAN
(WLAN), to which the computer is connected.
Reference:
https://en.wikipedia.org/wiki/Link_Layer_Topology_Discovery

Question 38

Your company has a main office and a branch office. The offices connect to each other by using a WAN link. Access to the Internet is provided through the main office.
The branch office contains 25 computers that run Windows 10. The computers contain small hard drives that have very little free disk space.
You need to prevent the computers in the branch office from downloading updates from peers on the network.
What should you do?

A. From the Settings app, modify the Delivery Optimizations settings.

B. Configure the network connections as metered connections.

C. Configure the computers to use BranchCache in hosted cache mode.

D. Configure the updates to use the Semi-Annual Channel (Targeted) channel.

 

Suggested Answer: C

Reference:
https://docs.microsoft.com/en-us/windows/deployment/update/waas-branchcache

Question 39

You have a computer that runs Windows 10 Home.
You need to upgrade the computer to Windows 10 Enterprise as quickly as possible. The solution must retain the user settings.
What should you do first?

A. Run the scanstate command.

B. Perform an in-place upgrade to Windows Pro.

C. Install the latest feature updates.

D. Run the sysprep command.

 

Suggested Answer: B

Reference:
https://docs.microsoft.com/en-us/windows/deployment/upgrade/windows-10-upgrade-paths

Question 40

HOTSPOT -
You are troubleshooting a Windows 10 update that fails to install.
You need to start Windows 10 with non-essential, third-party services disabled and all startup tasks disabled. The solution must minimize administrative effort to disable the services and tasks.
What should you use? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
Hot Area:
Image

 

Suggested Answer:
Correct Answer Image

Box 1: System Configuration -
A lot of the time when seeking help from the internet you will be asked to perform a ג€clean bootג€ of Windows. This simply means preventing all non Windows programs and services from starting so the system is running more cleanly and no third party software is launched on boot. Here is how to perform a clean boot of
Windows with a few extra options for making sure normal booting is as clean as possible.
1. Click Start and type msconfig into the search box or press Win key+R to show the Run dialog and type msconfig.
2. With the System Configuration (msconfig) window open, go to the Services tab and put a tick in the ג€Hide all Microsoft servicesג€ box at the bottom left before hitting Disable all. As a lot of software installs system services you need to disable them too and letting Windows load all its services and only stopping those from third parties will mean the operating system itself will run normally.
Reference Image
Box 2: Task Manager -
Disabling Startup Programs in Windows 10 or 8 or 8.1
Windows 8, 8.1, and 10 make it really simple to disable startup applications. All you have to do is open up Task Manager by right-clicking on the Taskbar, or using the CTRL + SHIFT + ESC shortcut key, clicking ג€More Details,ג€ switching to the Startup tab, and then using the Disable button.
Reference Image
Reference: alt="Reference Image" />
Box 2: Task Manager -
Disabling Startup Programs in Windows 10 or 8 or 8.1
Windows 8, 8.1, and 10 make it really simple to disable startup applications. All you have to do is open up Task Manager by right-clicking on the Taskbar, or using the CTRL + SHIFT + ESC shortcut key, clicking ג€More Details,ג€ switching to the Startup tab, and then using the Disable button.
<img src="https://www.examtopics.com/assets/media/exam-media/04292/0051400001.jpg" alt="Reference Image" />
Reference:
https://www.raymond.cc/blog/disable-third-party-services-and-programs-for-clean-boot-in-windows/

Question 41

HOTSPOT -
You have a workgroup computer named Computer1 that runs Windows 10 and has the users shown in the following table.
Image
[1]
Computer1 has the Local ComputerAdministrators Policy shown in the following table.
Image
Computer1 has the Local ComputerNon-Administrators Policy shown in the following table.
Image
Computer1 has the local computer policy shown in the following table.
Image
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
NOTE: Each correct selection is worth one point.
Hot Area:
Image

 

Suggested Answer:
Correct Answer Image

Box 1: No -
The Desktop Wallpaper setting in the Local ComputerNon-Administrators Policy specifies the path to the wallpaper image. Therefore, User1 will not be able to change the wallpaper.
Box 2: Yes -
The Remove Recycle Bin from desktop setting in the Local ComputerAdministrators Policy is Not Configured which means it will not overwrite the setting in the
Local Computer Policy. The Remove Recycle Bin from desktop setting in the Local Computer Policy is Disabled. Therefore, the Recycle Bin icon is not removed.
In other words, it will be visible on the desktop.
Box 3: No -
The Remove Recycle Bin from desktop setting in the Local ComputerNon-Administrators Policy is enabled. Therefore, the Recycle Bin will be removed for User1.

Question 42

HOTSPOT
-
You have a Windows 10 device.
You need to ensure that only priority notifications are displayed during business hours.
Which settings in the Settings app should you configure, and where will standard notifications be sent during business hours? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
Image

 

Suggested Answer:
Correct Answer Image

Question 43

Your network contains an Active Directory domain. The domain contains the objects shown in the following table.
Image
The domain is configured to store BitLocker Drive Encryption (BitLocker) recovery passwords.
User1 encrypts an external disk on Computer1 by using BitLocker to Go.
User2 moves the external disk to Computer2 and unlocks the disk.
You need to view the BitLocker recovery password.
Which objects are used to store the recovery password?

A. Computer1 and Computer2 only

B. User1 only

C. Computer1 only

D. User1 and Computer1 only

E. User1 and User2 only

 

Suggested Answer: C

Reference:
https://docs.microsoft.com/en-us/windows/security/information-protection/bitlocker/bitlocker-and-adds-faq

Question 44

Your network contains an Active Directory domain. The domain contains computers that run Windows 10.
You must ensure that Windows BitLocker Drive Encryption is enabled on all client computers, even though a Trusted Platform Module (TPM) chip is installed in only some of them.
You need to accomplish this goal by using one Group Policy object (GPO).
What should you do?

A. Enable the Allow enhanced PINs for startup policy setting, and select the Allow BitLocker without a compatible TPM check box.

B. Enable the Enable use of BitLocker authentication requiring preboot keyboard input on slates policy setting, and select the Allow BitLocker without a compatible TPM check box.

C. Enable the Require additional authentication at startup policy setting, and select the Allow BitLocker without a compatible TPM check box.

D. Enable the Control use of BitLocker on removable drives policy setting, and select the Allow BitLocker without a compatible TPM check box.

 

Suggested Answer: C

We need to allow Windows BitLocker Drive Encryption on all client computers (including client computers that do not have Trusted Platform Module (TPM) chip).
We can do this by enabling the option to allow BitLocker without a compatible TPM in the group policy. The "Allow BitLocker without a compatible TPM" option is a checkbox in the "Require additional authentication at startup" group policy setting. To access the "Allow BitLocker without a compatible TPM" checkbox, you need to first select Enabled on the "Require additional authentication at startup" policy setting.
Reference:
https://docs.microsoft.com/en-us/windows/security/information-protection/bitlocker/bitlocker-group-policy-settings#bkmk-unlockpol4

Question 45

You have a computer named Computer1 that runs Windows 10.
You need to prevent standard users from changing the wireless network settings on Computer1. The solution must allow administrators to modify the wireless network settings.
What should you use?

A. Windows Configuration Designer

B. MSConfig

C. Local Group Policy Editor

D. an MMC console that has the Group Policy Object Editor snap-in

 

Suggested Answer: C

Question 46

You have a computer named Computer1 that has the following configurations:
• RAM: 4 GB
• CPU: 1.6 GHz
• Hard drive: 128 GB
• Operating system: Windows 10 Pro in S mode
You need to upgrade Computer1 to Windows 11.
What should you do first?

A. Increase the amount of RAM.

B. Increase the storage capacity of the hard drive.

C. Switch out of S mode.

D. Upgrade the CPU.

 

Suggested Answer: C

Question 47

HOTSPOT -
You have the computers shown in the following table.
Image
You need to identify which computers support the features.
âś‘ BitLocker Drive Encryption (BitLocker)
âś‘ Microsoft Application Virtualization (App-V)
Which computers support the features? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
Hot Area:
Image

 

Suggested Answer:
Correct Answer Image

Reference:
https://www.microsoft.com/en-us/windowsforbusiness/compare

Question 48

Your network contains an Active Directory domain named contoso.com.
A user named User1 has a personal computer named Computer1 that runs Windows 10 Pro. User1 has a VPN connection to the corporate network.
You need to ensure that when User1 connects to the VPN, network traffic uses a proxy server located in the corporate network. The solution must ensure that
User1 can access the Internet when disconnected from the VPN.
What should you do?

A. From Control Panel, modify the Windows Defender Firewall settings

B. From the Settings app, modify the Proxy settings for the local computer

C. From Control Panel, modify the properties of the VPN connection

D. From the Settings app, modify the properties of the VPN connection

 

Suggested Answer: D

In the Properties of the VPN you can add a proxy setting. The proxy setting will only be active when the user connects to the VPN.

Question 49

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
You have a computer that runs Windows 10. The computer contains a folder. The folder contains sensitive data.
You need to log which user reads the contents of the folder and modifies and deletes files in the folder.
Solution: From the properties of the folder, you configure the Auditing settings and from the Audit Policy in the local Group Policy, you configure Audit directory service access.
Does this meet the goal?

A. Yes

B. No

 

Suggested Answer: B

Files and folders are objects and are audited through object access, not though directory service access.
Reference:
https://www.netwrix.com/how_to_detect_who_changed_file_or_folder_owner.html

Question 50

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
You have a computer that runs Windows 10. The computer contains a folder named D:Scripts. D:Scripts contains several PowerShell scripts.
You need to ensure that you can run the PowerShell scripts without specifying the full path to the scripts. The solution must persist between PowerShell sessions.
Solution: From a command prompt, you run set.exe PATHEXT=d:scripts.
Does this meet the goal?

A. Yes

B. No

 

Suggested Answer: B

Access Full MD-100 Dump Free

Looking for even more practice questions? Click here to access the complete MD-100 Dump Free collection, offering hundreds of questions across all exam objectives.

We regularly update our content to ensure accuracy and relevance—so be sure to check back for new material.

Begin your certification journey today with our MD-100 dump free questions — and get one step closer to exam success!

Share18Tweet11
Previous Post

MB-800 Dump Free

Next Post

MLS-C01 Dump Free

Next Post

MLS-C01 Dump Free

MS-100 Dump Free

MS-101 Dump Free

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recommended

XK0-005 Mock Test Free

XK0-004 Mock Test Free

SY0-701 Mock Test Free

SY0-601 Mock Test Free

SY0-501 Mock Test Free

SSCP Mock Test Free

  • About
  • DMCA
  • Privacy & Policy
  • Contact

PracticeTestFree.com materials do not contain actual questions and answers from Cisco's Certification Exams. PracticeTestFree.com doesn't offer Real Microsoft Exam Questions. PracticeTestFree.com doesn't offer Real Amazon Exam Questions.

  • Login
  • Sign Up
No Result
View All Result
  • Quesions
    • Cisco
    • AWS
    • Microsoft
    • CompTIA
    • Google
    • ISACA
    • ECCouncil
    • F5
    • GIAC
    • ISC
    • Juniper
    • LPI
    • Oracle
    • Palo Alto Networks
    • PMI
    • RedHat
    • Salesforce
    • VMware
  • Courses
    • CCNA
    • ENCOR
    • VMware vSphere
  • Certificates

Welcome Back!

Login to your account below

Forgotten Password? Sign Up

Create New Account!

Fill the forms below to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Insert/edit link

Enter the destination URL

Or link to existing content

    No search term specified. Showing recent items. Search or use up and down arrow keys to select an item.