Practice Test Free
  • QUESTIONS
  • COURSES
    • CCNA
    • Cisco Enterprise Core
    • VMware vSphere: Install, Configure, Manage
  • CERTIFICATES
No Result
View All Result
  • Login
  • Register
Quesions Library
  • Cisco
    • 200-301
    • 200-901
      • Multiple Choice
      • Drag Drop
    • 350-401
      • Multiple Choice
      • Drag Drop
    • 350-701
    • 300-410
      • Multiple Choice
      • Drag Drop
    • 300-415
      • Multiple Choice
      • Drag Drop
    • 300-425
    • Others
  • AWS
    • CLF-C02
    • SAA-C03
    • SAP-C02
    • ANS-C01
    • Others
  • Microsoft
    • AZ-104
    • AZ-204
    • AZ-305
    • AZ-900
    • AI-900
    • SC-900
    • Others
  • CompTIA
    • SY0-601
    • N10-008
    • 220-1101
    • 220-1102
    • Others
  • Google
    • Associate Cloud Engineer
    • Professional Cloud Architect
    • Professional Cloud DevOps Engineer
    • Others
  • ISACA
    • CISM
    • CRIS
    • Others
  • LPI
    • 101-500
    • 102-500
    • 201-450
    • 202-450
  • Fortinet
    • NSE4_FGT-7.2
  • VMware
  • >>
    • Juniper
    • EC-Council
      • 312-50v12
    • ISC
      • CISSP
    • PMI
      • PMP
    • Palo Alto Networks
    • RedHat
    • Oracle
    • GIAC
    • F5
    • ITILF
    • Salesforce
Contribute
Practice Test Free
  • QUESTIONS
  • COURSES
    • CCNA
    • Cisco Enterprise Core
    • VMware vSphere: Install, Configure, Manage
  • CERTIFICATES
No Result
View All Result
Practice Test Free
No Result
View All Result
Home Mock Test Free

MD-100 Mock Test Free

Table of Contents

Toggle
  • MD-100 Mock Test Free – 50 Realistic Questions to Prepare with Confidence.
  • Access Full MD-100 Mock Test Free

MD-100 Mock Test Free – 50 Realistic Questions to Prepare with Confidence.

Getting ready for your MD-100 certification exam? Start your preparation the smart way with our MD-100 Mock Test Free – a carefully crafted set of 50 realistic, exam-style questions to help you practice effectively and boost your confidence.

Using a mock test free for MD-100 exam is one of the best ways to:

  • Familiarize yourself with the actual exam format and question style
  • Identify areas where you need more review
  • Strengthen your time management and test-taking strategy

Below, you will find 50 free questions from our MD-100 Mock Test Free resource. These questions are structured to reflect the real exam’s difficulty and content areas, helping you assess your readiness accurately.

Question 1

HOTSPOT -
Your company uses a Key Management Service (KMS) to activate computers that run Windows 10.
A user works remotely and establishes a VPN connection once a month.
The computer of the user fails to be activated.
Which command should you run on the computer to initiate activation? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
Hot Area:
 Image

 


Suggested Answer:
Correct Answer Image

To activate online, type slmgr.vbs /ato.
Reference:
https://docs.microsoft.com/en-us/windows/deployment/volume-activation/activate-using-key-management-service-vamt
https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2012-R2-and-2012/dn502540(v=ws.11)

Question 2

You install Windows 10 Enterprise on a new computer.
You need to force activation on the computer.
Which command should you run?

A. slmgr /upk

B. Set-RDLicenseConfiguration -Force

C. Set-MsolLicense -AddLicense

D. slmgr /ato

 


Suggested Answer: D

Reference:
https://docs.microsoft.com/en-us/windows/deployment/volume-activation/activate-using-key-management-service-vamt

Question 3

HOTSPOT -
You have the computer shown in the following table.
 Image
You plan to configure deployment rings for Windows 10 quality and feature updates.
What is the maximum number of days you can defer installing quality updates, and which computers support installing feature updates from Windows Update? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
Hot Area:
 Image

 


Suggested Answer:
Correct Answer Image

Reference:
https://docs.microsoft.com/en-us/windows/deployment/update/waas-configure-wufb

Question 4

Your network contains an Active Directory domain. The domain contains a computer named Computer1 that runs Windows 10.
The domain contains the users shown in the following table.
 Image
Computer1 has four printers as shown in the following table.
 Image
Which printers will be available to User1 when the user signs in to Computer1?

A. Printer3 only

B. Printer1 and Printer3 only

C. Printer1, Printer2, and Printer3 only

D. Printer1, Printer3, and Printer4 only

E. Printer1, Printer2, Printer3, and Printer4

 


Suggested Answer: E

 

Question 5

HOTSPOT -
You have the network shown in the following exhibit.
 Image
Computer1, Computer2, and Computer3 run Windows 10. Windows Defender Firewall is configured to allow ICMP traffic.
RTR1 is a router.
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
NOTE: Each correct selection is worth one point.
Hot Area:
 Image

 


Suggested Answer:
Correct Answer Image

Box 1: Yes –
Through RTR1 which has been configured as the default gateway for Comptuer1.
Box 2: Yes –
Through RTR1 which has been configured as the default gateway for Comptuer1.
Box 3: No –
Computer3 has not been configured with a default gateway.

Question 6

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
You have a laptop named Computer1 that runs Windows 10.
When in range, Computer1 connects automatically to a Wi-Fi network named Wireless1.
You need to prevent Computer1 from automatically connecting to Wireless1.
Solution: From the Services console, you disable the Link-Layer Topology Discovery Mapper service.
Does this meet the goal?

A. Yes

B. No

 


Suggested Answer: B

Link-Layer Topology Discovery is used by their Network Map feature to display a graphical representation of the local area network (LAN) or wireless LAN
(WLAN), to which the computer is connected.
Reference:
https://en.wikipedia.org/wiki/Link_Layer_Topology_Discovery

Question 7

You have a workgroup computer that runs Windows 10.
You need to set the minimum password length to 12 characters.
What should you use?

A. User Accounts in Control Panel

B. Local Security Policy

C. Credential Manager in Control Panel

D. Email & accounts in the Settings app

 


Suggested Answer: B

You can set the password length on computers that are not domain joined by using the Local Security Policy or the Local Group Policy Editor.
Note:
There are several versions of this question in the exam. The question has two possible correct answers:
1. Local Group Policy Editor
2. Local Security Policy
Other incorrect answer options you may see on the exam include the following:
1. System Protection in System Properties
2. Local Users and Groups in Computer Management
3. Sign-in options in the Settings app
Reference:
https://docs.microsoft.com/en-us/windows/security/threat-protection/security-policy-settings/how-to-configure-security-policy-settings

Question 8

HOTSPOT -
Your network contains an Active Directory domain that contains the objects shown in the following table.
 Image
Computer1 contains the shared folders shown in the following table.
 Image
The computers have the network configurations shown in the following table.
 Image
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
NOTE: Each correct selection is worth one point.
Hot Area:
 Image

 


Suggested Answer:
Correct Answer Image

Box 1: Yes –
User1 is in Group1 which has permission to access the share so the share will be visible.
Box 2: No –
User2 is in Group2 which does not have permission to access Share1. Access-based enumeration is enabled so Share1 will not be listed as User2 does not have permission to access it.
Box 3: No –
Share2$ is a hidden share (dollar sign appended) so the share will never be listed.

Question 9

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
You have a workgroup computer that runs Windows 10. The computer contains the local user accounts shown in the following table.
 Image
You need to configure the desktop background for User1 and User2 only.
Solution: You create two new local Group Policy Objects (GPOs) and apply one GPO to User1 and the other GPO to User2. You configure the Desktop Wallpaper setting in each GPO.
Does this meet the goal?

A. Yes

B. No

 


Suggested Answer: A

Reference:
https://www.windowscentral.com/how-apply-local-group-policy-settings-specific-users-windows-10

Question 10

You have an Azure Active Directory (Azure AD) tenant that contains a user named
user1@contoso.com
.
You have a computer named Computer1 that runs Windows 10.
You join Computer1 to Azure AD. You enable Remote Desktop on Computer1.
User1@contoso.com
attempts to connect to Computer1 by using Remote Desktop and receives the following error message: `The logon attempt failed.`
You need to ensure that the user can connect to Computer1 by using Remote Desktop.
What should you do first?

A. In Azure AD, assign user1@contoso.com the Cloud device administrator role.

B. From the local Group Policy, modify the Allow log on through Remote Desktop Services user right.

C. In Azure AD, assign user1@contoso.com the Security administrator role.

D. On Computer1, create a local user and add the new user to the Remote Desktop Users group.

 


Suggested Answer: B

Reference:
https://docs.microsoft.com/en-us/windows/security/threat-protection/security-policy-settings/allow-log-on-through-remote-desktop-services

Question 11

You have 100 computers that run Windows 10. The computers are joined to an Azure AD tenant and enrolled in Microsoft Intune. The computers are in remote locations and connected to public networks.
You need to recommend a solution for help desk administrators that meets the following requirements:
• Connect remotely to a user's computer to perform troubleshooting.
• Connect to a user's computer without disrupting the desktop of the computer.
• Remotely view services, performance counters, registry settings, and event logs.
Which tool should you include in the recommendation?

A. Quick Assist

B. Intune

C. Remote Assistance

D. Windows Admin Center

E. Remote Desktop

 


Suggested Answer: C

 

Question 12

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
Your company has an on-premises network that contains an Active Directory domain. The domain is synced to Microsoft Azure Active Directory (Azure AD). All computers in the domain run Windows 10 Enterprise.
You are logged on as the local administrator on a Computer named Computer1.
A user named Mia Hamm has a computer named Computer2. Mia Hamm reports that she is experiencing problems with Computer2.
You want to use Event Viewer on Computer1 to view the event logs on Computer2.
What should you do?

A. On Computer1, run the Connect-WSMan -ComputerName “Computer1” cmdlet.

B. On Computer1, run the Get-Eventlog -List -ComputerName “Computer1” cmdlet.

C. On Computer1, log on as a domain administrator, then open Event Viewer and select the Connect to another computer ג€¦ option.

D. On Computer1, open the Windows Defender Firewall and enable the Remote Event Log Management inbound rule.

 


Suggested Answer: C

You are logged on as a local administrator. You need the required permissions to access Event Viewer logs on all remote Windows computers.
Reference:
https://docs.microsoft.com/en-us/windows/win32/winrm/about-windows-remote-management

Question 13

HOTSPOT -
You have a computer that runs Windows 11 and hosts three Hyper-V virtual machines named VM1, VM2, and VM3. The virtual machines are configured as shown in the following exhibit.
 Image
Use the drop-down menus to select the answer choice that completes each statement based on the information presented in the graphic.
NOTE: Each correct selection is worth one point.
Hot Area:
 Image

 


Suggested Answer:
Correct Answer Image

Box 1: VM1, MV2, and VM3 support
Production checkpoints requires configuration version 6.2 or higher.
Box 2: Only VM1, and VM2 support
Hibernation support requires configuration version 9.0 or higher.
Reference:
https://docs.microsoft.com/en-us/windows-server/virtualization/hyper-v/deploy/upgrade-virtual-machine-version-in-hyper-v-on-windows-or-windows-
server

Question 14

HOTSPOT -
You have a computer named Computer1 that runs Windows 10 and is joined to an Active Directory domain named adatum.com.
A user named Admin1 signs in to Computer1 and runs the whoami command as shown in the following exhibit.
 Image
Use the drop-down menus to select the answer choice that completes each statement based on the information presented in the graphic.
NOTE: Each correct selection is worth one point.
Hot Area:
 Image

 


Suggested Answer:
Correct Answer Image

Reference:
https://docs.microsoft.com/en-us/windows/win32/secauthz/mandatory-integrity-control

Question 15

Your network contains an Active Directory domain named contoso.com.
A user named User1 has a personal computer named Computer1 that runs Windows 10 Pro. User1 has a VPN connection to the corporate network.
You need to ensure that when User1 connects to the VPN, network traffic uses a proxy server located in the corporate network. The solution must ensure that
User1 can access the Internet when disconnected from the VPN.
What should you do?

A. From Control Panel, modify the Windows Defender Firewall settings

B. From the Settings app, modify the Proxy settings for the local computer

C. From Control Panel, modify the properties of the VPN connection

D. From the Settings app, modify the properties of the VPN connection

 


Suggested Answer: D

In the Properties of the VPN you can add a proxy setting. The proxy setting will only be active when the user connects to the VPN.

Question 16

You have a computer that runs Windows 10.
You sign in by using your Microsoft account and set up the Microsoft OneDrive sync app to connect to your personal OneDrive account.
You plan to configure OneDrive to back up the important PC Folders.
Which three folders can be backed up by OneDrive?

A. Desktop, Documents, and Pictures

B. Desktop, Music, and Pictures

C. Documents, Music, and Videos

D. Music, Pictures, and Videos

 


Suggested Answer: A

Reference:
https://support.microsoft.com/en-us/office/back-up-your-documents-pictures-and-desktop-folders-with-onedrive-d61a7930-a6fb-4b95-b28a-6552e77c3057

Question 17

You have an Azure Active Directory (Azure AD) tenant named contoso.com.
You have a workgroup computer named Computer1 that runs Windows 10.
You need to add Computer1 to contoso.com.
What should you use?

A. Computer Management

B. dsregcmd.exe

C. the Settings app

D. netdom.exe

 


Suggested Answer: C

You join a computer to a domain, including an Azure AD domain in the Settings panel in Windows 10, under System->About
Reference:
https://aadguide.azurewebsites.net/aadjoin/

Question 18

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
You deploy Windows 10 to a computer named Computer1.
Computer1 contains a folder named C:Folder1. Folder1 contains multiple documents.
You need to ensure that you can recover the files in Folder1 by using the Previous Versions tab.
Solution: You select Folder is ready for archiving from the properties of Folder1.
Does this meet the goal?

A. Yes

B. No

 


Suggested Answer: B

The previous versions feature in Windows 10 allows you to restore a previous version of files, folders, and drives that were saved or backed up as part of a restore point, File History, and/or Windows Backup.
Reference:
https://www.tenforums.com/tutorials/79490-restore-previous-versions-files-folders-drives-windows-10-a.html

Question 19

HOTSPOT -
You have a workgroup computer named Computer1 that runs Windows 10 and has the users shown in the following table.
 Image
User Account Control (UAC) on Computer1 is configured as shown in the following exhibit.
 Image
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
NOTE: Each correct selection is worth one point.
Hot Area:
 Image

 


Suggested Answer:
Correct Answer Image

Box 1: Yes –
User Account Control: Behavior of the elevation prompt for administrators in Admin Approval Mode is set to Prompt for consent When an operation requires elevation of privilege, the user is prompted to select either Permit or Deny. If the user selects Permit, the operation continues with the user’s highest available privilege.
Box 2: Yes –
User1 is a member of Administrators group.
User Account Control: Behavior of the elevation prompt for administrators in Admin Approval Mode is set to Prompt for consent When an operation requires elevation of privilege, the user is prompted to select either Permit or Deny. If the user selects Permit, the operation continues with the user’s highest available privilege.
Box 3: Yes –
User Account Control: Behavior of the elevation prompt for standard users is set to Prompt for credentials (Default) When an operation requires elevation of privilege, the user is prompted to enter an administrative user name and password. If the user enters valid credentials, the operation continues with the applicable privilege.
Reference:
https://docs.microsoft.com/en-us/windows/security/identity-protection/user-account-control/user-account-control-security-policy-settings

Question 20

Your company purchases 20 laptops that use a new hardware platform.
In a test environment, you deploy Windows 10 to the new laptops.
Some laptops frequently generate stop errors.
You need to identify the cause of the issue.
What should you use?

A. Reliability Monitor

B. Task Manager

C. System Configuration

D. Performance Monitor

 


Suggested Answer: A

Reference:
https://lifehacker.com/how-to-troubleshoot-windows-10-with-reliability-monitor-1745624446

Question 21

HOTSPOT
-
You have a workgroup computer named Computer1 that runs Windows 10 and contains the users in the following table.
 Image
You need to identify which users can start the Windows Recovery Environment (WinRE) command prompt on Computer1.
Which user should you identify for each scenario? To answer, select the appropriate options in the answer area.
 Image

 


Suggested Answer:
Correct Answer Image

 

Question 22

You are troubleshooting the failed installation of a VPN application on a device. During the installation, the application displays a Stop error, and you must restart the device. After the restart, you discover that the device can no longer connect to the network.
What should you use to resolve the issue?

A. Network reset

B. Network Adapter troubleshooter

C. Incoming Connections troubleshooter

D. Remote Assistance

 


Suggested Answer: C

 

Question 23

A user purchases a new computer that has Windows 10 Home preinstalled. The computer has a biometric fingerprint reader.
You need to ensure that the user can use the fingerprint reader to sign in to the computer by using an Azure Active Directory (Azure AD) account.
What should you do first?

A. Register the computer to Azure AD.

B. Install the latest feature updates on the computer.

C. Upgrade the computer to Windows 10 Enterprise.

D. Upgrade the computer to Windows 10 Pro.

 


Suggested Answer: B

 

Question 24

Your company has an on-premises network that contains an Active Directory domain. The domain is synced to Microsoft Azure Active Directory (Azure AD). All computers in the domain run Windows 10 Enterprise.
You have a computer named Computer1 that has a folder named C:Folder1.
You want to use File History to protect C:Folder1.
Solution: You enable File History on Computer1. You then encrypt the contents of Folder1.
Does this meet the goal?

A. Yes

B. No

 


Suggested Answer: B

File History only backs up copies of files that are in Libraries, and Desktop folders and the OneDrive files available offline on your PC. If you have files or folders elsewhere that you want backed up, you can add them to one of these folders.
Reference:
https://support.microsoft.com/en-us/help/17128/windows-8-file-history

Question 25

HOTSPOT -
You have a computer that runs Windows 10. You view the domain services status as shown in the following exhibit.
 Image
Use the drop-down menus to select the answer choice that completes each statement based on the information presented in the graphic.
NOTE: Each correct selection is worth one point.
Hot Area:
 Image

 


Suggested Answer:
Correct Answer Image

Device is Azure AD joined; not domain joined.
The MDM URLs in the exhibit indicate the device is enrolled in Endpoint Manager.
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/devices/troubleshoot-device-dsregcmd
https://github.com/MicrosoftLearning/MD-101T00-ManagingModernDesktops/blob/master/Instructions/Labs/0403-Enrolling%20devices%20in%20Intune.md

Question 26

You have a computer named Computer1 that runs Windows 11 and hosts two Hyper-V virtual machines named VM1 and VM2.
You need to ensure that VM1 can connect to the network shares on VM2. The solution must prevent Computer1 from establishing network connections to VM1 or VM2.
Which type of virtual switch should you use?

A. external

B. private

C. internal

 


Suggested Answer: B

 

Question 27

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
A user named User1 has a computer named Computer1 that runs Windows 10. Computer1 is joined to an Azure Active Directory (Azure AD) tenant named contoso.com. User1 joins Computer1 to contoso.com by using
user1@contoso.com
.
Computer1 contains a folder named Folder1. Folder1 is in drive C and is shared as Share1. Share1 has the permission shown in the following table.
 Image
A user named User2 has a computer named Computer2 that runs Windows 10. User2 joins Computer2 to contoso.com by using
user2@contoso.com
.
User2 attempts to access Share1 and receives the following error message: `The username or password is incorrect.`
You need to ensure that User2 can connect to Share1.
Solution: You create a local user account on Computer1 and instruct User2 to use the local account to connect to Share1.
Does this meet the goal?

A. Yes

B. No

 


Suggested Answer: B

 

Question 28

HOTSPOT -
You have a computer that runs Windows 10. The computer is in a workgroup. The computer is used to provide visitors with access to the Internet.
You need to configure the computer to meet the following requirements:
✑ Always sign in automatically as User1.
✑ Start an application named App1.exe at sign-in.
What should you use to meet each requirement? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
Hot Area:
 Image

 


Suggested Answer:
Correct Answer Image

Reference:
http://www.itexpertmag.com/server/complete-manageability-at-no-extra-cost

Question 29

HOTSPOT -
You have a computer named Computer5 that runs Windows 10 that is used to share documents in a workgroup.
You create three users named User-a, User-b, and User-c by using Computer Management. The users plan to access Computer5 from the network only.
You have a folder named Data. The Advanced Security Settings for the Data folder are shown in the Security exhibit. (Click the Security tab).
 Image
You share the Data folder. The permissions for User-a are shown in the User-a exhibit (Click the User-a tab.)
 Image
The permissions for User-b are shown in the User-b exhibit. (Click the User-b tab.)
 Image
The permissions for User-c are shown in the User-c exhibit. (Click the User-c tab.)
 Image
For each of the following statements, select Yes if the statements is true. Otherwise, select No.
NOTE: Reach correct selection is worth one point.
Hot Area:
 Image

 


Suggested Answer:
Correct Answer Image

Box 1: No –
User-a only has Read share permission so he cannot modify files in the Data share.
Box 2: No –
User-b only has Read share permission so he cannot delete files in the Data share.
Box 3: Yes –
User-c has Read and Change share permission so he can read files in the Data share. User-c does not have an entry in the Advanced Security Settings for the
Data folder. However, User-c would be a member of the Users group by default and that group has Full Control permission to the folder.

Question 30

Your company uses Microsoft Deployment Toolkit (MDT) to deploy Windows 10 to new computers.
The company purchases 1,000 new computers.
You need to ensure that the Hyper-V feature is enabled on the computers during the deployment.
What are two possible ways to achieve this goal? Each correct answer presents a complete solution.
NOTE: Each correct selection is worth one point.

A. Add a task sequence step that adds a provisioning package.

B. In a Group Policy object (GPO), from Computer Configuration, configure Application Control Policies.

C. Add a custom command to the Unattend.xml file.

D. Add a configuration setting to Windows Deployment Services (WDS).

E. Add a task sequence step that runs dism.exe.

 


Suggested Answer: CE

A common way to add a feature such as Hyper-V in MDT is to use the Install Roles and Features task sequence action. However, that is not an option in this question.
The two valid options are to a command to the Unattend.xml file or to add a task sequence step that runs dism.exe.
To add Hyper-V using dism.exe, you would run the following dism command:
DISM /Online /Enable-Feature /All /FeatureName:Microsoft-Hyper-V
Reference:
https://docs.microsoft.com/en-us/windows/deployment/deploy-windows-mdt/create-a-windows-10-reference-image
https://mdtguy.wordpress.com/2016/09/14/mdt-fundamentals-adding-features-using-dism-from-within-the-task-sequence/
https://docs.microsoft.com/en-us/virtualization/hyper-v-on-windows/quick-start/enable-hyper-v

Question 31

You have a computer named Computer1 that runs Windows 11.
You are often prompted to restart Computer1 after Windows updates are installed.
You need to minimize disruptions caused by restarting Computer1.
What should you configure?

A. Download updates over metered connections

B. Delivery Optimization

C. Focus assist

D. Active hours

 


Suggested Answer: D

 

Question 32

SIMULATION -
Please wait while the virtual machine loads. Once loaded, you may proceed to the lab section. This may take a few minutes, and the wait time will not be deducted from your overall test time.
When the Next button is available, click it to access the lab section. In this section, you will perform a set of tasks in a live environment. While most functionality will be available to you as it would be in a live environment, some functionality (e.g., copy and paste, ability to navigate to external websites) will not be possible by design.
Scoring is based on the outcome of performing the tasks stated in the lab. In other words, it doesn't matter how you accomplish the task, if you successfully perform it, you will earn credit for that task.
Labs are not timed separately, and this exam may more than one lab that you must complete. You can use as much time as you would like to complete each lab.
But, you should manage your time appropriately to ensure that you are able to complete the lab(s) and all other sections of the exam in the time provided.
Please note that once you submit your work by clicking the Next button within a lab, you will NOT be able to return to the lab.
Username and password -
 Image
Use the following login credentials as needed:
To enter your password, place your cursor in the Enter password box and click on the password below.
Username: Contoso/Administrator -
Password: Passw0rd!
The following information is for technical support purposes only:
Lab Instance: 10921597 -
 Image
You need to ensure that you can successfully ping DC1 from Client3 by using the IP4 address of DC1.
To complete this task, sign in to the required computer or computers.

 


Suggested Answer: See explanation below.

✑ On Client3, press Windows+R to access Run.
✑ Type cmd and click OK to access the command prompt.
Type ipconfig and press Enter to check that you have a valid IP address.
Reference Image
✑ On Client3, press Windows+R to access Run.
✑ Type cmd and click OK to access the command prompt.
✑ Type “ping” and the IP address of the Domain Controller (e.g. “ping 172.16.1.43″).
Reference: alt=”Reference Image” />
✑ On Client3, press Windows+R to access Run.
✑ Type cmd and click OK to access the command prompt.
✑ Type “ping” and the IP address of the Domain Controller (e.g. “ping 172.16.1.43”).
Reference:
http://www.turn-n-burn.com/DestinyNetworks/Downloads/WebHelp3-1-1/Ping_the_Domain_Controller.htm

Question 33

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
A user named User1 has a computer named Computer1 that runs Windows 10. Computer1 is joined to an Azure Active Directory (Azure AD) tenant named contoso.com. User1 joins Computer1 to contoso.com by using
user1@contoso.com
.
Computer1 contains a folder named Folder1. Folder1 is in drive C and is shared as Share1. Share1 has the permission shown in the following table.
 Image
A user named User2 has a computer named Computer2 that runs Windows 10. User2 joins Computer2 to contoso.com by using
user2@contoso.com
.
User2 attempts to access Share1 and receives the following error message: `The username or password is incorrect.`
You need to ensure that User2 can connect to Share1.
Solution: In Azure AD, you create a group named Group1 that contains User1 and User2. You grant Group1 Modify access to Folder1.
Does this meet the goal?

A. Yes

B. No

 


Suggested Answer: A

Reference:
https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/cc754178(v%3dws.10)

Question 34

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
You have two computers named Computer1 and Computer2 that run Windows 10.
You have an Azure Active Directory (Azure AD) user account named
admin@contoso.com
that is in the local Administrators group on each computer.
You sign in to Computer1 by using
admin@contoso.com
.
You need to ensure that you can use Event Viewer on Computer1 to connect to the event logs on Computer2.
Solution: On Computer2, you enable the Remote Event Log Management inbound rule from Windows Defender Firewall.
Does this meet the goal?

A. Yes

B. No

 


Suggested Answer: A

Reference:
https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/cc766438(v=ws.11)?redirectedfrom=MSDN

Question 35

Your network contains an Active Directory domain. The domain contains 500 computers that run Windows 10. The computers are used as shown in the following table.
 Image
You need to apply updates based on the computer usage.
What should you configure?

A. Notifications & actions from System in the Settings apps.

B. the Windows Update for Business settings by using a Group Policy Object (GPO)

C. the Windows Installer settings by using a Group Policy Object (GPO)

D. Delivery Optimization from Update & Security in the Settings apps

 


Suggested Answer: B

Reference:
https://docs.microsoft.com/en-us/windows/deployment/update/waas-wufb-group-policy

Question 36

SIMULATION -
Please wait while the virtual machine loads. Once loaded, you may proceed to the lab section. This may take a few minutes, and the wait time will not be deducted from your overall test time.
When the Next button is available, click it to access the lab section. In this section, you will perform a set of tasks in a live environment. While most functionality will be available to you as it would be in a live environment, some functionality (e.g., copy and paste, ability to navigate to external websites) will not be possible by design.
Scoring is based on the outcome of performing the tasks stated in the lab. In other words, it doesn't matter how you accomplish the task, if you successfully perform it, you will earn credit for that task.
Labs are not timed separately, and this exam may more than one lab that you must complete. You can use as much time as you would like to complete each lab.
But, you should manage your time appropriately to ensure that you are able to complete the lab(s) and all other sections of the exam in the time provided.
Please note that once you submit your work by clicking the Next button within a lab, you will NOT be able to return to the lab.
Username and password -
 Image
Use the following login credentials as needed:
To enter your password, place your cursor in the Enter password box and click on the password below.
Username: Contoso/Administrator -
Password: Passw0rd!
The following information is for technical support purposes only:
Lab Instance: 11145882 -
 Image
 Image
You need to ensure that C:ScriptsConfigure.ps1 runs every time a user sign in to Client2.
To complete this task, sign in to the required computer or computers.

 


Suggested Answer: See explanation below.

Go to the Start menu, type ג€Task Schedulerג€ and select it from the search results.
Reference Image
Task Scheduler can also be accessed in the Control Panel under Administrative Tools.
In the right side of the Task Scheduler menu, under Actions, select ג€Create Task.ג€
Reference Image
On the General tab, enter a name and description for the task you’re creating. Check the box ג€Run with highest privileges.ג€
Once you have filled out a name and description, click the ג€Triggersג€ tab, and then click ג€New.ג€
In this menu, under ג€Begin the task:ג€ select ג€At log on.ג€ Choose which user you would like the task to run for at log on. For our purposes, Any user.
Configure any of the applicable advanced settings you would like.
After you are finished configuring the new trigger, click OK and then select the ג€Actionsג€ tab. Click ג€Newג€ to make a new action.
Reference Image
Choose ג€Start a programג€ under the Action menu and then click ג€Browseג€ to point to C:ScriptsConfigure.ps1.
Click OK to exit out of the Actions menu. The ג€Conditionsג€ and ג€Settingsג€ tabs can be left alone.
Click OK on the Create Task menu, and you are finished.
Reference: alt=”Reference Image” />
Task Scheduler can also be accessed in the Control Panel under Administrative Tools.
In the right side of the Task Scheduler menu, under Actions, select ג€Create Task.ג€
Reference Image
On the General tab, enter a name and description for the task you’re creating. Check the box ג€Run with highest privileges.ג€
Once you have filled out a name and description, click the ג€Triggersג€ tab, and then click ג€New.ג€
In this menu, under ג€Begin the task:ג€ select ג€At log on.ג€ Choose which user you would like the task to run for at log on. For our purposes, Any user.
Configure any of the applicable advanced settings you would like.
After you are finished configuring the new trigger, click OK and then select the ג€Actionsג€ tab. Click ג€Newג€ to make a new action.
<img src=”https://www.examtopics.com/assets/media/exam-media/04292/0019300001.jpg” alt=”Reference Image” />
Choose ג€Start a programג€ under the Action menu and then click ג€Browseג€ to point to C:ScriptsConfigure.ps1.
Click OK to exit out of the Actions menu. The ג€Conditionsג€ and ג€Settingsג€ tabs can be left alone.
Click OK on the Create Task menu, and you are finished.
Reference:
https://www.howtogeek.com/138159/how-to-enable-programs-and-custom-scripts-to-run-at-boot/

Question 37

You have a computer that runs Windows 10.
You discover that Windows updates are failing to install on the computer.
You need to generate a log file that contains detailed information about the failures.
Which cmdlet should you run?

A. Getג€”LogProperties

B. Getג€”WindowsErrorReporting

C. Getג€”WindowsUpdateLog

D. Getג€”WinEvent

 


Suggested Answer: C

Reference:
https://docs.microsoft.com/en-us/powershell/module/windowsupdate/get-windowsupdatelog?view=win10-ps

Question 38

You have a computer that runs Windows 10 Pro. The computer contains the users shown in the following table.
 Image
You need to use a local Group Policy Object (GPO) to configure one group of settings for all the members of the local Administrators group and another group of settings for all non-administrators.
What should you do?

A. Use the runas command to open Gpedit.msc as each user.

B. Run mmc as User1 and add the Group Policy Object Editor snap-in twice.

C. Open Gpedit.msc as User1 and add two Administrative Templates.

D. Run mmc as User1 and add the Security Templates snap-in twice.

 


Suggested Answer: B

Add the Group Policy Object Editor snap-in twice. Select Browse > Users > Administrators when you add the first snap-in and select Browse > Users > Non-
Administrators when you add the second snap-in.

Question 39

You have several computers that run Windows 10. The computers are in a workgroup and have BitLocker Drive Encryption (BitLocker) enabled.
You join the computers to Microsoft Azure Active Directory (Azure AD).
You need to ensure that you can recover the BitLocker recovery key for the computers from Azure AD.
What should you do first?

A. Disable BitLocker.

B. Add a BitLocker key protector.

C. Suspend BitLocker.

D. Disable the TMP chip.

 


Suggested Answer: B

Reference:
https://docs.microsoft.com/en-us/windows/security/information-protection/bitlocker/prepare-your-organization-for-bitlocker-planning-and-policies#bitlocker-key-
protectors

Question 40

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
You have a computer named Computer1 that runs Windows 10.
You test Windows updates on Computer1 before you make the updates available to other computers.
You install a quality update that conflicts with a custom device driver.
You need to remove the update from Computer1.
Solution: From an elevated command prompt, you run the wusa.exe command and specify the /uninstall parameter.
Does this meet the goal?

A. Yes

B. No

 


Suggested Answer: A

Reference:
https://support.microsoft.com/en-us/help/934307/description-of-the-windows-update-standalone-installer-in-windows

Question 41

You have a computer that runs Windows 10 and is joined to Azure Active Directory (Azure AD).
You attempt to open Control Panel and receive the error message shown on the following exhibit.
 Image
You need to be able to access Control Panel.
What should you modify?

A. the PowerShell execution policy

B. the local Group Policy

C. the Settings app

D. a Group Policy preference

 


Suggested Answer: B

Reference:
https://windows10skill.com/this-operation-has-been-cancelled-due-to-restrictions-in-effect-on-this-pc/

Question 42

You have a computer that is configured as shown in the following exhibit.
 Image
What can the computer connect to?

A. all the local computers and the remote computers within your corporate network only

B. all the local computers and the remote computers, including Internet hosts

C. only other computers on the same network segment that have automatic private IP addressing (APIPA)

D. only other computers on the same network segment that have an address from a class A network ID

 


Suggested Answer: C

The computer has IPv4 address of 169.254.30.20. 169.254.x.x is an automated APIPA address.

Question 43

You enable controlled folder access in audit mode for several computers that run Windows 10.
You need to review the events audited by controlled folder access.
Which Event Viewer log should you view?

A. WindowsSecurity

B. Applications and ServicesMicrosoftWindowsKnown FoldersOperational

C. Applications and ServicesMicrosoftWindowsWindows DefenderOperational

 


Suggested Answer: C

Review controlled folder access events in Windows Event Viewer
The following controlled folder access events appear in Windows Event Viewer under Microsoft/Windows/Windows Defender/Operational folder.
Reference:
https://docs.microsoft.com/en-us/microsoft-365/security/defender-endpoint/evaluate-controlled-folder-access

Question 44

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
A user named User1 has a computer named Computer1 that runs Windows 10. Computer1 is joined to an Azure Active Directory (Azure AD) tenant named contoso.com. User1 joins Computer1 to contoso.com by using
user1@contoso.com
.
Computer1 contains a folder named Folder1. Folder1 is in drive C and is shared as Share1. Share1 has the permission shown in the following table.
 Image
A user named User2 has a computer named Computer2 that runs Windows 10. User2 joins Computer2 to contoso.com by using
user2@contoso.com
.
User2 attempts to access Share1 and receives the following error message: `The username or password is incorrect.`
You need to ensure that User2 can connect to Share1.
Solution: In Azure AD, you create a group named Group1 that contains User1 and User2. You grant Group1 Change access to Share1.
Does this meet the goal?

A. Yes

B. No

 


Suggested Answer: B

Azure AD cannot be used to control Share permissions on on-premisses computer folders.
Reference:
https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/cc754178(v%3dws.10)

Question 45

HOTSPOT -
You have a workgroup computer named Computer1 that runs Windows 10. From File Explorer, you open OneDrive as shown in the following exhibit.
 Image
Use the drop-down menus to select the answer choice that answers each question based on the information presented on the graphic.
NOTE: Each correct selection is worth one point.
Hot Area:
 Image

 


Suggested Answer:
Correct Answer Image

 

Question 46

Which users can sign in to Computer3 when the computer starts in Safe Mode?

A. User31 only

B. User31 and User32 only

C. User31 and Admin1 only

D. User31, User 32, User33, and Admin1

E. User31, User32, and User33 only

 


Suggested Answer: A

Only users with membership of the local Administrators group can log on to a computer in safe mode. Admin1 cannot log in because Computer3 is not joined to the domain.
Reference:
https://support.microsoft.com/en-us/windows/advanced-startup-options-including-safe-mode-b90e7808-80b5-a291-d4b8-1a1af602b617

Question 47

Your company is not connected to the internet. The company purchases several new computers with Windows 10 Pro for its users.
None of the new computers are activated.
You need to activate the computers without connecting the network to the Internet.
What should you do?

A. Make use of the Volume Activation Management Tool (VAMT).

B. Make use of the Key Management Service (KMS).

C. Make use of the Windows Process Activation Service.

D. Run the Get-WmiObject -query cmdlet.

 


Suggested Answer: B

You can configure one of the computers as a Key Management Service (KMS) host and activate the KMS host by phone. The other computers in the isolated network can then activate using the KMS host.
Installing a KMS host key on a computer running Windows 10 allows you to activate other computers running Windows 10 against this KMS host and earlier versions of the client operating system, such as Windows 8.1 or Windows 7. Clients locate the KMS server by using resource records in DNS, so some configuration of DNS may be required. This scenario can be beneficial if your organization uses volume activation for clients and MAK-based activation for a smaller number of servers. To enable KMS functionality, a KMS key is installed on a KMS host; then, the host is activated over the Internet or by phone using
Microsoft’s activation services.
Reference:
https://docs.microsoft.com/en-us/windows/deployment/volume-activation/activate-using-key-management-service-vamt

Question 48

You have a computer named Computer1 that runs Windows 10.
On Computer1, you create the local users shown in the following table.
 Image
Which two user profiles will persist after each user signs out? Each correct answer presents part of the solution.
NOTE: Each correct selection is worth one point.

A. User1

B. User2

C. User3

D. User4

E. User5

 


Suggested Answer: AE

 

Question 49

HOTSPOT -
You have 100 computers that run Windows 10 and are members of an Active Directory domain.
Two support technicians named Tech1 and Tech2 will be responsible for monitoring the performance of the computers.
You need to configure the computers to meet the following requirements:
✑ Ensure that Tech1 can create and manage Data Collector Sets (DCSs).
✑ Ensure that Tech2 can start and stop the DCSs.
✑ Use the principle of least privilege.
To which group should you add each technician? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
Hot Area:
 Image

 


Suggested Answer:
Correct Answer Image

Reference:
https://docs.microsoft.com/en-us/windows/security/identity-protection/access-control/active-directory-security-groups

Question 50

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
You have a computer that runs Windows 10. The computer contains a folder. The folder contains sensitive data.
You need to log which user reads the contents of the folder and modifies and deletes files in the folder.
Solution: From the properties of the folder, you configure the Auditing settings and from Audit Policy in the local Group Policy, you configure Audit object access.
Does this meet the goal?

A. Yes

B. No

 


Suggested Answer: A

Files and folders are objects and are audited through object access.
Reference:
https://www.netwrix.com/how_to_detect_who_changed_file_or_folder_owner.html

Access Full MD-100 Mock Test Free

Want a full-length mock test experience? Click here to unlock the complete MD-100 Mock Test Free set and get access to hundreds of additional practice questions covering all key topics.

We regularly update our question sets to stay aligned with the latest exam objectives—so check back often for fresh content!

Start practicing with our MD-100 mock test free today—and take a major step toward exam success!

Share18Tweet11
Previous Post

MB-800 Mock Test Free

Next Post

MLS-C01 Mock Test Free

Next Post

MLS-C01 Mock Test Free

MS-100 Mock Test Free

MS-101 Mock Test Free

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recommended

Network+ Practice Test

Comptia Security+ Practice Test

A+ Certification Practice Test

Aws Cloud Practitioner Exam Questions

Aws Cloud Practitioner Practice Exam

Comptia A+ Practice Test

  • About
  • DMCA
  • Privacy & Policy
  • Contact

PracticeTestFree.com materials do not contain actual questions and answers from Cisco's Certification Exams. PracticeTestFree.com doesn't offer Real Microsoft Exam Questions. PracticeTestFree.com doesn't offer Real Amazon Exam Questions.

  • Login
  • Sign Up
No Result
View All Result
  • Quesions
    • Cisco
    • AWS
    • Microsoft
    • CompTIA
    • Google
    • ISACA
    • ECCouncil
    • F5
    • GIAC
    • ISC
    • Juniper
    • LPI
    • Oracle
    • Palo Alto Networks
    • PMI
    • RedHat
    • Salesforce
    • VMware
  • Courses
    • CCNA
    • ENCOR
    • VMware vSphere
  • Certificates

Welcome Back!

Login to your account below

Forgotten Password? Sign Up

Create New Account!

Fill the forms below to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Insert/edit link

Enter the destination URL

Or link to existing content

    No search term specified. Showing recent items. Search or use up and down arrow keys to select an item.