Practice Test Free
  • QUESTIONS
  • COURSES
    • CCNA
    • Cisco Enterprise Core
    • VMware vSphere: Install, Configure, Manage
  • CERTIFICATES
No Result
View All Result
  • Login
  • Register
Quesions Library
  • Cisco
    • 200-301
    • 200-901
      • Multiple Choice
      • Drag Drop
    • 350-401
      • Multiple Choice
      • Drag Drop
    • 350-701
    • 300-410
      • Multiple Choice
      • Drag Drop
    • 300-415
      • Multiple Choice
      • Drag Drop
    • 300-425
    • Others
  • AWS
    • CLF-C02
    • SAA-C03
    • SAP-C02
    • ANS-C01
    • Others
  • Microsoft
    • AZ-104
    • AZ-204
    • AZ-305
    • AZ-900
    • AI-900
    • SC-900
    • Others
  • CompTIA
    • SY0-601
    • N10-008
    • 220-1101
    • 220-1102
    • Others
  • Google
    • Associate Cloud Engineer
    • Professional Cloud Architect
    • Professional Cloud DevOps Engineer
    • Others
  • ISACA
    • CISM
    • CRIS
    • Others
  • LPI
    • 101-500
    • 102-500
    • 201-450
    • 202-450
  • Fortinet
    • NSE4_FGT-7.2
  • VMware
  • >>
    • Juniper
    • EC-Council
      • 312-50v12
    • ISC
      • CISSP
    • PMI
      • PMP
    • Palo Alto Networks
    • RedHat
    • Oracle
    • GIAC
    • F5
    • ITILF
    • Salesforce
Contribute
Practice Test Free
  • QUESTIONS
  • COURSES
    • CCNA
    • Cisco Enterprise Core
    • VMware vSphere: Install, Configure, Manage
  • CERTIFICATES
No Result
View All Result
Practice Test Free
No Result
View All Result
Home Practice Test Free

MD-100 Practice Test Free

Table of Contents

Toggle
  • MD-100 Practice Test Free – 50 Real Exam Questions to Boost Your Confidence
  • Free Access Full MD-100 Practice Test Free Questions

MD-100 Practice Test Free – 50 Real Exam Questions to Boost Your Confidence

Preparing for the MD-100 exam? Start with our MD-100 Practice Test Free – a set of 50 high-quality, exam-style questions crafted to help you assess your knowledge and improve your chances of passing on the first try.

Taking a MD-100 practice test free is one of the smartest ways to:

  • Get familiar with the real exam format and question types
  • Evaluate your strengths and spot knowledge gaps
  • Gain the confidence you need to succeed on exam day

Below, you will find 50 free MD-100 practice questions to help you prepare for the exam. These questions are designed to reflect the real exam structure and difficulty level. You can click on each Question to explore the details.

Question 1

HOTSPOT -
Your network contains an Active Directory domain named adatum.com that uses Key Management Service (KMS) for activation.
You deploy a computer that runs Windows 10 to the domain.
The computer fails to activate.
You suspect that the activation server has an issue.
You need to identify which server hosts KMS.
How should you complete the command? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
Hot Area:
 Image

 


Suggested Answer:
Correct Answer Image

Reference:
https://docs.microsoft.com/en-us/office/troubleshoot/activation/discover-remove-unauthorized-office-windows-kms-hosts

Question 2

You have 100 computers that run Windows 10. The computers are joined to an Azure AD tenant and enrolled in Microsoft Intune. The computers are in remote locations and connected to public networks.
You need to recommend a solution for help desk administrators that meets the following requirements:
• Connect remotely to a user's computer to perform troubleshooting.
• Connect to a user's computer without disrupting the desktop of the computer.
• Remotely view services, performance counters, registry settings, and event logs.
Which tool should you include in the recommendation?

A. Quick Assist

B. Intune

C. Remote Assistance

D. Windows Admin Center

E. Remote Desktop

 


Suggested Answer: C

 

Question 3

HOTSPOT -
You have 20 computers that run Windows 11.
You need to enable Windows Sandbox on the computers.
How should you complete the command? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
Hot Area:
 Image

 


Suggested Answer:
Correct Answer Image

Box 1: Enable-WindowsOptionalFeature
To Enable Windows 10 Sandbox with PowerShell,
1. Open PowerShell as Administrator.
2. Type or copy-paste the following command:
Enable-WindowsOptionalFeature -FeatureName “Containers-DisposableClientVM” -All -Online
3. When prompted to restart the computer, type Y, and press Enter.
4. The change can be undone with the following command:
5. Disable-WindowsOptionalFeature -FeatureName “Containers-DisposableClientVM” -Online
Box 2: “Containers-DisposableClientVM”
Reference:
https://winaero.com/enable-windows-10-sandbox-powershell-dism/

Question 4

You have a computer that is configured as shown in the following exhibit.
 Image
What can the computer connect to?

A. all the local computers and the remote computers within your corporate network only

B. all the local computers and the remote computers, including Internet hosts

C. only other computers on the same network segment that have automatic private IP addressing (APIPA)

D. only other computers on the same network segment that have an address from a class A network ID

 


Suggested Answer: C

The computer has IPv4 address of 169.254.30.20. 169.254.x.x is an automated APIPA address.

Question 5

Your network contains an Active Directory domain. The domain contains 100 computers that run Windows 11.
You need to defer the deployment of quality updates by using Group Policy.
What is the maximum amount of time that you can defer the updates?

A. 180 days

B. seven days

C. 30 days

D. 365 days

 


Suggested Answer: B

 

Question 6

Which users can sign in to Computer3 when the computer starts in Safe Mode?

A. User31 only

B. User31 and User32 only

C. User31 and Admin1 only

D. User31, User 32, User33, and Admin1

E. User31, User32, and User33 only

 


Suggested Answer: A

Only users with membership of the local Administrators group can log on to a computer in safe mode. Admin1 cannot log in because Computer3 is not joined to the domain.
Reference:
https://support.microsoft.com/en-us/windows/advanced-startup-options-including-safe-mode-b90e7808-80b5-a291-d4b8-1a1af602b617

Question 7

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
You have a computer named Computer1 that runs Windows 10.
You test Windows updates on Computer1 before you make the updates available to other computers.
You install a quality update that conflicts with a custom device driver.
You need to remove the update from Computer1.
Solution: From an elevated command prompt, you run the wusa.exe command and specify the /uninstall parameter.
Does this meet the goal?

A. Yes

B. No

 


Suggested Answer: A

Reference:
https://support.microsoft.com/en-us/help/934307/description-of-the-windows-update-standalone-installer-in-windows

Question 8

Your network contains an Active Directory domain that is synced to a Microsoft Azure Active Directory (Azure AD) tenant. All users have been issued with laptop computers as well as desktop computers that run Windows 10 Enterprise. All users have Microsoft 365 E3 licenses.
A user named Mia Hamm informs you that she must perform a BitLocker recovery on her laptop but she does not have her BitLocker recovery key.
You need to ensure that Mia Hamm can perform a BitLocker recovery on her laptop.
What should you do?

A. Instruct Mia Hamm to log on to her desktop computer and run the repair-bde.exe command.

B. Instruct Mia Hamm to use the BitLocker Recovery Password Viewer to view the computer object of the laptop.

C. Instruct Mia Hamm to log on to her desktop computer and go to https://account.activedirectory.windowsazure.com and view the user account profile.

D. Instruct Mia Hamm to run the Enable-BitLocker cmdlet on her laptop.

 


Suggested Answer: C

The BitLocker recovery key is stored in Azure Active Directory.
Reference:
https://celedonpartners.com/blog/storing-recovering-bitlocker-keys-azure-active-directory/

Question 9

A user named User1 has a computer named Computer1 that runs Windows 10.
User1 connects to a Microsoft Azure virtual machine named VM1 by using Remote Desktop.
User1 creates a VPN connection named VPN1 to connect to a partner organization.
When the VPN1 connection is established, User1 cannot connect to VM1. When User1 disconnects from VPN1, the user can connect to VM1.
You need to ensure that User1 can connect to VM1 while connected to VPN1.
What should you do?

A. From the proxy settings, add the IP address of VM1 to the bypass list to bypass the proxy.

B. From the properties of VPN1, clear the Use default gateway on remote network check box.

C. From the properties of the Remote Desktop connection to VM1, specify a Remote Desktop Gateway (RD Gateway).

D. From the properties of VPN1, configure a static default gateway address.

 


Suggested Answer: B

Reference:
https://www.stevejenkins.com/blog/2010/01/using-the-local-default-gateway-with-a-windows-vpn-connection/

Question 10

You have a public computer named Computer1 that runs Windows 10. Computer1 contains a folder named Folder1.
You need to provide a user named User1 with the ability to modify the permissions of Folder1. The solution must use the principle of least privilege.
Which NTFS permission should you assign to User1?

A. Full control

B. Modify

C. Write

D. Read & execute

 


Suggested Answer: A

The NTFS Full control permission is required to change permissions.
Reference:
https://www.ntfs.com/ntfs-permissions-file-folder.htm

Question 11

HOTSPOT -
Your network contains an Active Directory domain named adatum.com. The domain contains two computers named Computer1 and Computer2 that run Windows
10.
The domain contains the user accounts shown in the following table.
 Image
Computer2 contains the local groups shown in the following table.
 Image
The relevant user rights assignments for Computer2 are shown in the following table.
 Image
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
NOTE: Each correct selection is worth one point.
Hot Area:
 Image

 


Suggested Answer:
Correct Answer Image

Box 1: Yes –
User1 is an administrator and has the Allow log on through Remote Desktop Services.
Box 2: No –
User2 is a member of Group2 which has the Deny log on through Remote Desktop Services.
Box 3: Yes –
User3 is a member of the administrators group and has the Allow log on through Remote Desktop Services.
Note: Deny permissions take precedence over Allow permissions. If a user belongs to two groups, and one of them has a specific permission set to Deny, that user is not able to perform tasks that require that permission even if they belong to a group that has that permission set to Allow.
Reference:
https://docs.microsoft.com/en-us/azure/devops/organizations/security/about-permissions?view=azure-devops&tabs=preview-page%2Ccurrent-page

Question 12

You have a computer named Computer1 that runs Windows 10.
You need to enable boot logging on Computer1.
What should you do?

A. At a command prompt, run the bcdboot.exe command and specify the /v parameter.

B. From the Settings app, configure the Start settings.

C. From System Properties in Control Panel, configure the Startup and Recovery settings.

D. From System Configuration configure the Boot settings.

 


Suggested Answer: D

Reference:
https://www.windowscentral.com/how-enable-boot-log-windows-10

Question 13

You have a computer named Computer1 that runs Windows 10.
You need to configure User Account Control (UAC) to prompt administrators for their credentials.
Which settings should you modify?

A. Administrators Properties in Local Users and Groups

B. User Account Control Settings in Control Panel

C. Security Options in Local Group Policy Editor

D. User Rights Assignment in Local Group Policy Editor

 


Suggested Answer: C

Reference:
https://docs.microsoft.com/en-us/windows/security/identity-protection/user-account-control/user-account-control-security-policy-settings

Question 14

HOTSPOT -
You have two workgroup computers named Computer1 and Computer2 that run Windows 10. The computers contain the local security principals shown in the following table.
 Image
Which security principals can be members of GroupA and GroupC? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
Hot Area:
 Image

 


Suggested Answer:
Correct Answer Image

 

Question 15

Your network contains an Active Directory domain. The domain contains 1,000 computers that run Windows 10.
You discover that when users are on their lock screen, they see a different background image every day, along with tips for using different features in Windows 10.
You need to disable the tips and the daily background image for all the Windows 10 computers.
Which Group Policy settings should you modify?

A. Turn off the Windows Welcome Experience

B. Turn off Windows Spotlight on Settings

C. Do not suggest third-party content in Windows spotlight

D. Turn off all Windows spotlight features

 


Suggested Answer: D

Reference:
https://docs.microsoft.com/en-us/windows/configuration/windows-spotlight

Question 16

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
You have a computer that runs Windows 10. The computer contains a folder. The folder contains sensitive data.
You need to log which user reads the contents of the folder and modifies and deletes files in the folder.
Solution: From the properties of the folder, you configure the Auditing settings and from Audit Policy in the local Group Policy, you configure Audit object access.
Does this meet the goal?

A. Yes

B. No

 


Suggested Answer: A

Files and folders are objects and are audited through object access.
Reference:
https://www.netwrix.com/how_to_detect_who_changed_file_or_folder_owner.html

Question 17

HOTSPOT -
Your network contains the segments shown in the following table.
 Image
You have a computer that runs Windows 10.
The network interface of the computer is configured as shown in the exhibit. (Click the Exhibit tab.)
 Image
You need to identify which IP address the computer will have on the network when the computer connects to the segments.
Which IP address should you identify for each segment? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
Hot Area:
 Image

 


Suggested Answer:
Correct Answer Image

 

Question 18

Your network contains 500 computers that run Windows 11 and have Delivery Optimization enabled.
All the computers contain the following:
• Microsoft 365 apps
• A Microsoft Store app named App1
• A Windows 11 driver named Driver1
What can use Delivery Optimization to download updates?

A. Driver1 only

B. Microsoft 365 apps only

C. Microsoft 365 apps and Driver1 only

D. Microsoft 365 apps, Driver1, and App1

 


Suggested Answer: D

 

Question 19

SIMULATION -
Please wait while the virtual machine loads. Once loaded, you may proceed to the lab section. This may take a few minutes, and the wait time will not be deducted from your overall test time.
When the Next button is available, click it to access the lab section. In this section, you will perform a set of tasks in a live environment. While most functionality will be available to you as it would be in a live environment, some functionality (e.g., copy and paste, ability to navigate to external websites) will not be possible by design.
Scoring is based on the outcome of performing the tasks stated in the lab. In other words, it doesn't matter how you accomplish the task, if you successfully perform it, you will earn credit for that task.
Labs are not timed separately, and this exam may more than one lab that you must complete. You can use as much time as you would like to complete each lab.
But, you should manage your time appropriately to ensure that you are able to complete the lab(s) and all other sections of the exam in the time provided.
Please note that once you submit your work by clicking the Next button within a lab, you will NOT be able to return to the lab.
Username and password -
 Image
Use the following login credentials as needed:
To enter your password, place your cursor in the Enter password box and click on the password below.
Username: Contoso/Administrator -
Password: Passw0rd!
The following information is for technical support purposes only:
Lab Instance: 10921597 -
 Image
You need to ensure that a local user named User1 can establish a Remote Desktop connection to Client2.
To complete this task, sign in to the required computer or computers.

 


Suggested Answer: See explanation below.

Add User to Remote Desktop Users Group via Settings App
1. Open the Settings app on Client2 and go to System -> Remote Desktop. Click on the Select users that can remotely access this PC link on the right side.
2. When the Remote Desktop Users dialog opens, click on Add.
3. Click on Advanced.
4. Click on Find Now and then select any user account you want to add to the ג€Remote Desktop Usersג€ group, and click OK.
5. Click OK and you’re done.
Reference:
https://www.top-password.com/blog/add-user-to-remote-desktop-users-group-in-windows-10/

Question 20

Your network contains an Active Directory domain named contoso.com. The domain contains a computer named Computer1 that runs Windows 10.
On Computer1, you create a folder and assign Full control permissions to Everyone.
You share the folder as Share1 and assign the permissions shown in the following table.
 Image
When accessing Share1, which two actions can be performed by User1 but not by User2? Each correct answer presents part of the solution.
NOTE: Each correct selection is worth one point.

A. Delete a file created by another user.

B. Set the permissions for a file.

C. Rename a file created by another user.

D. Take ownership of file.

E. Copy a file created by another user to a subfolder.

 


Suggested Answer: BD

Reference:
https://www.varonis.com/blog/ntfs-permissions-vs-share/

Question 21

You sign in to a computer that runs Windows 10 Pro.
You need to ensure that after a restart, the computer starts automatically in Safe Mode with Networking.
What should you use to configure the restart options?

A. bootcfg

B. BCDEdit

C. Windows System Image Manager (Windows SIM)

D. bootrec

 


Suggested Answer: B

Reference:
https://www.lifewire.com/how-to-force-windows-to-restart-in-safe-mode-2625163

Question 22

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
You manage devices that run Windows 10.
Ten sales users will travel to a location that has limited bandwidth that is expensive. The sales users will be at the location for three weeks.
You need to prevent all Windows updates from downloading for the duration of the trip. The solution must not prevent access to email and the Internet.
Solution: From Accounts in the Settings app, you turn off Sync settings.
Does this meet the goal?

A. Yes

B. No

 


Suggested Answer: B

 

Question 23

You have a computer named Computer1. Computer1 runs Windows 10 Pro.
Computer1 is experiencing connectivity issues.
You need to view the IP addresses of any remote computer that Computer1 has an active TCP connection to.
Should you do?

A. In Windows Administrative Tools, open Performance Monitor.

B. In the Control Panel, open Network and Internet. Then select Network and Sharing Center.

C. In Windows Administrative Tools, open Resource Monitor.

D. In the Setting app, open Update and Security. Then open Windows Security and select Firewall and Network protection.

 


Suggested Answer: C

 

Question 24

You have a computer that runs Windows 10. You use the computer to test new Windows features.
You need to configure the computer to receive preview builds of Windows 10 as soon as possible.
What should you configure from Update & Security in the Settings app?

A. Windows Insider Program

B. Windows Update

C. Delivery Optimization

D. For developers

 


Suggested Answer: A

Reference:
https://insider.windows.com/en-us/getting-started/

Question 25

You need to meet the technical requirements for the San Diego office computers.
Which Windows 10 deployment method should you use?

A. wipe and load refresh

B. in-place upgrade

C. provisioning packages

D. Windows Autopilot

 


Suggested Answer: D

The requirement states: The computers in the San Diego office must be upgraded automatically to Windows 10 Enterprise and must be joined to Azure AD the first time a user starts each new computer. End users must not be required to accept the End User License Agreement (EULA).
Windows Autopilot is a collection of technologies used to set up and pre-configure new devices, getting them ready for productive use. You can also use Windows
Autopilot to reset, repurpose and recover devices.
The OEM Windows 10 installation on the new computers can be transformed into a ג€business-readyג€ state, applying settings and policies, installing apps, and even changing the edition of Windows 10 being used (e.g. from Windows 10 Pro to Windows 10 Enterprise) to support advanced features.
The only interaction required from the end user is to connect to a network and to verify their credentials. Everything beyond that is automated.
Reference:
https://docs.microsoft.com/en-us/windows/deployment/windows-autopilot/windows-autopilot

Question 26

HOTSPOT -
You have a computer named Computer1 that runs Windows 10. Computer1 contains a registry key named Key1 that has the values shown in the exhibit. (Click the Exhibit tab.).
 Image
You have a Registration Entries (.reg) file named File1.reg that contains the following text.
Windows Registry Editor Version 5.00
[HKEY_LOCAL_MACHINESOFTWAREKey1]
"String1"=-
@="2"
You need to identify the effect of importing File1.reg to Computer1.
What should you identify? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
Hot Area:
 Image

 


Suggested Answer:
Correct Answer Image

Box 1: String1 will be deleted.
To delete a value, append equals and then minus to the value. For example:
“String1″=-
Box 2: Value1 will have a value of 1
@=”2” sets the default value to 1 but Value1 already has a DWORD value.
A DWORD (32-bit) value is a hexadecimal value. Value1 is 0x00000001 which is 1.
Reference:
https://www.computerhope.com/issues/ch000848.htm

https://www.computerperformance.co.uk/vista/reg-create/

Question 27

HOTSPOT -
You manage Windows updates for a computer that runs Windows 10.
You need to identify the following:
✑ Which update types can be paused
✑ The maximum number of days that the updates can be paused
What should you identify? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
Hot Area:
 Image

 


Suggested Answer:
Correct Answer Image

Box 1: Feature updates and quality updates only
Quality updates can be paused.
Feature updates can be deferred.
Box 2: 35 –
Quality updates can be paused for up to 35 days.
Note: To help ensure device compliance and user productivity, Microsoft sends different types of updates including:
Quality updates. These monthly updates include bug fixes and security enhancements. Because quality updates are cumulative and don’t require a complete reinstallation, the packages are smaller, and they download and install quickly.
Feature updates. These twice-yearly updates include new features and significant enhancements to the Windows operating system.
Device driver updates. These small pieces of software are the updates made to the device drivers by original equipment manufacturer (OEM) vendors. Microsoft
Update is used as a channel for distributing these updates.
Microsoft Defender definition updates. These updates include current threat information for Microsoft Defender.
Reference:
https://techcommunity.microsoft.com/t5/hybrid-work/managing-windows-10-updates-for-a-remote-work-world/m-p/1510387

Question 28

You need to meet the technical requirements for EFS on ComputerA.
What should you do?

A. Run certutil.exe, and then add a certificate to the local computer certificate store.

B. Run cipher.exe, and then add a certificate to the local computer certificate store.

C. Run cipher.exe, and then add a certificate to the local Group Policy.

D. Run certutil.exe, and then add a certificate to the local Group Policy.

 


Suggested Answer: B

Reference:
https://docs.microsoft.com/en-us/windows/security/information-protection/windows-information-protection/create-and-verify-an-efs-dra-certificate

Question 29

You have several computers that run Windows 10. The computers are in a workgroup and have BitLocker Drive Encryption (BitLocker) enabled.
You join the computers to Microsoft Azure Active Directory (Azure AD).
You need to ensure that you can recover the BitLocker recovery key for the computers from Azure AD.
What should you do first?

A. Disable BitLocker.

B. Add a BitLocker key protector.

C. Suspend BitLocker.

D. Disable the TMP chip.

 


Suggested Answer: B

Reference:
https://docs.microsoft.com/en-us/windows/security/information-protection/bitlocker/prepare-your-organization-for-bitlocker-planning-and-policies#bitlocker-key-
protectors

Question 30

SIMULATION -
Please wait while the virtual machine loads. Once loaded, you may proceed to the lab section. This may take a few minutes, and the wait time will not be deducted from your overall test time.
When the Next button is available, click it to access the lab section. In this section, you will perform a set of tasks in a live environment. While most functionality will be available to you as it would be in a live environment, some functionality (e.g., copy and paste, ability to navigate to external websites) will not be possible by design.
Scoring is based on the outcome of performing the tasks stated in the lab. In other words, it doesn't matter how you accomplish the task, if you successfully perform it, you will earn credit for that task.
Labs are not timed separately, and this exam may more than one lab that you must complete. You can use as much time as you would like to complete each lab.
But, you should manage your time appropriately to ensure that you are able to complete the lab(s) and all other sections of the exam in the time provided.
Please note that once you submit your work by clicking the Next button within a lab, you will NOT be able to return to the lab.
Username and password -
 Image
Use the following login credentials as needed:
To enter your password, place your cursor in the Enter password box and click on the password below.
Username: Contoso/Administrator -
Password: Passw0rd!
The following information is for technical support purposes only:
Lab Instance: 10921597 -
 Image
You need to create a user account named User5 on Client2. The solution must meet the following requirements:
✑ Prevent User5 from changing the password of the account.
✑ Ensure that User5 can perform backups.
✑ Use the principle of least privilege.
To complete this task, sign in to the required computer or computers.

 


Suggested Answer: See explanation below.

1. On Client2, press the Win + X keys on your keyboard. Then, click or tap the Computer Management option from the menu.
2. Expand the Local Users and Groups from the left side of the window, and select Users.
3. Right-click somewhere on the blank space found in the middle section of the window, and click or tap on New User. This opens the New User window, where you can enter all the details about the new user account.
4. Type the user name and, optionally, its full name and description.
5. Type the password to be used for that user and confirm it.
6. Select the User cannot change password check box.
7. Click Create and Windows immediately creates the user account. When you are done creating user accounts, click Close in the New User window.
1. Press the Win + R keys to open Run, type secpol.msc into Run, and click/tap on OK to open Local Security Policy.
2. Expand open Local Policies in the left pane of Local Security Policy, click/tap on User Rights Assignment, and double click/tap on the Back up files and directories policy in the right pane.
3. Click/tap on the Add User or Group button.
4. Click/tap on the Object Types button.
5. Check all the boxes for Object types, and click/tap on the OK.
6. Click/tap on the Advanced button.
7. Click/tap on the Find Now button, select the name of the user or group
8. Click/tap on OK.
9. Click/tap on OK.
10.When finished, you can close Local Users and Groups.
Reference:
https://www.digitalcitizen.life/geeks-way-creating-user-accounts-and-groups
https://docs.microsoft.com/en-us/windows/security/threat-protection/security-policy-settings/user-rights-assignment

Question 31

You have a workgroup computer that runs Windows 10.
You need to set the minimum password length to 12 characters.
What should you use?

A. Local Group Policy Editor

B. Local Users and Groups in Computer Management

C. Email & accounts in the Settings app

D. Credential Manager in Control Panel

 


Suggested Answer: B

 

Question 32

HOTSPOT -
You need to meet the technical requirements for the HR department users.
Which permissions should you assign to the HR department users for the D:Reports folder? To answer, select the appropriate permissions in the answer area.
NOTE: Each correct selection is worth one point.
Hot Area:
 Image

 


Suggested Answer:
Correct Answer Image

Reference:
https://www.online-tech-tips.com/computer-tips/set-file-folder-permissions-windows/

Question 33

You have 10 computers that run Windows 8.1 and have the following configurations:
• A single MBR disk
• A disabled TPM chip
• Disabled hardware virtualization
• UEFI firmware running in BIOS mode
• Enabled Data Execution Prevention (DEP)
You plan to upgrade the computers to Windows 10.
You need to ensure that the computers can use Secure Boot.
Which two actions should you perform? Each correct answer presents part of the solution.
NOTE: Each correct selection is worth one point.

A. Enable hardware virtualization.

B. Disable DEP.

C. Convert the MBR disk to a GPT disk.

D. Enable the TPM chip.

E. Convert the firmware from BIOS to UEFI.

 


Suggested Answer: CE

 

Question 34

HOTSPOT -
Your network contains an Active Directory domain. The domain contains the users shown in the following table.
 Image
The domain contains a computer named Computer1 that runs Windows 10. Computer1 contains a folder named Folder1 that has the following permissions:
✑ User2: Deny Write
✑ Group1: Allow Read
✑ Group2: Allow Modify
Folder1 is shared as Share1$. Share1$ has the following configurations:
✑ Everyone: Allow Full control
✑ Access-based enumeration: Enabled
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
NOTE: Each correct selection is worth one point.
Hot Area:
 Image

 


Suggested Answer:
Correct Answer Image

Box 1: Yes –
Box 2: Yes –
Box 3: No –
Share1$ is a hidden share and is therefore not visible in File Explorer, even with access based enumeration enabled.
Reference:
https://www.varonis.com/blog/ntfs-permissions-vs-share/

http://www.ntfs.com/ntfs-permissions-file-advanced.htm

https://docs.microsoft.com/en-us/windows-server/storage/dfs-namespaces/enable-access-based-enumeration-on-a-namespace

Question 35

Your network contains an Active Directory domain. The domain contains two computers named Computer1 and Computer2 that run Windows 10.
You need to modify the registry of Computer1 by using Registry Editor from Computer2.
Which two registry hives can you modify? Each correct answer presents part of the solution.
NOTE: Each correct selection is worth one point.

A. HKEY_CURRENT_USER

B. HKEY_LOCAL_MACHINE

C. HKEY_USERS

D. HKEY_CLASSES_ROOT

E. HKEY_CURRENT_CONFIG

 


Suggested Answer: BC

 

Question 36

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
You have two computers named Computer1 and Computer2 that run Windows 10.
You have an Azure Active Directory (Azure AD) user account named
admin@contoso.com
that is in the local Administrators group on each computer.
You sign in to Computer1 by using
admin@contoso.com
.
You need to ensure that you can use Event Viewer on Computer1 to connect to the event logs on Computer2.
Solution: On Computer2, you enable the Remote Event Log Management inbound rule from Windows Defender Firewall.
Does this meet the goal?

A. Yes

B. No

 


Suggested Answer: A

Reference:
https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/cc766438(v=ws.11)?redirectedfrom=MSDN

Question 37

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
You have a computer named Computer1 that runs Windows 10.
You test Windows updates on Computer1 before you make the updates available to other computers.
You install a quality update that conflicts with a custom device driver.
You need to remove the update from Computer1.
Solution: From System Restore, you revert the system state to a restore point that was created before the update was installed.
Does this meet the goal?

A. Yes

B. No

 


Suggested Answer: A

 

Question 38

Your network contains an Active Directory domain. The domain contains 10 computers that run Windows 10.
On a different computer named Computer1, you plan to create a collector-initiated subscription to gather the event logs from the Windows 10 computers.
You need to configure the environment to support the event log collection.
Which two actions should you perform? Each correct answer presents part of the solution.
NOTE: Each correct selection is worth one point.

A. Add Computer1 to the Event Log Readers group on the Windows 10 computers

B. Add Computer1 to the Event Log Readers group on Computer1

C. On the Windows 10 computers, change the Startup Type of Windows Event Collector to Automatic

D. Enable Windows Remote Management (WinRM) on the Windows 10 computers

E. Enable Windows Remote Management (WinRM) on Computer1

 


Suggested Answer: AD

Reference:
https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/cc748890(v=ws.11)

Question 39

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
You have computers that run Windows 11 as shown in the following table.
 Image
You ping 192.168.10.15 from Computer1 and discover that the request timed out.
You need to ensure that you can successfully ping 192.168.10.15 from Computer1.
Solution: On Computer1, you turn off Windows Defender Firewall.
Does this meet the goal?

A. Yes

B. No

 


Suggested Answer: B

 

Question 40

You have a Microsoft Azure Active Directory (Azure AD) tenant.
Some users sign in to their computer by using Windows Hello for Business.
A user named User1 purchases a new computer and joins the computer to Azure AD.
User1 is not able to use Windows Hello for Business on his computer. User1 sign-in options are shown on the exhibit. (Click the Exhibit tab.)
 Image
You open Device Manager and confirm that all the hardware works correctly.
You need to ensure that User1 can use Windows Hello for Business facial recognition to sign in to the computer.
What should you do first?

A. Purchase an infrared (IR) camera.

B. Upgrade the computer to Windows 10 Enterprise.

C. Enable UEFI Secure Boot.

D. Install a virtual TPM driver.

 


Suggested Answer: A

Windows Hello facial recognition requires an infrared (IR) camera. If your device does not have an infrared camera (or any other biometric device such as a fingerprint scanner), you will see the message shown in the exhibit. The question states that Device Manager shows all hardware is working properly. Therefore, it is not the case that the computer has an IR camera but it isn’t working properly. The problem must be that the computer does not have an IR camera.
Incorrect Answers:
B: Windows 10 Enterprise is not required for Windows Hello. Windows Hello also works on Windows 10 Pro.
C: UEFI Secure Boot is not required for Windows Hello.
D: A virtual TPM driver is not required for Windows Hello.
Reference:
https://docs.microsoft.com/en-us/windows/security/identity-protection/hello-for-business/hello-planning-guide

Question 41

You have 10 computers that run Windows 10 and have BitLocker Drive Encryption (BitLocker) enabled.
You plan to update the firmware of the computers.
You need to ensure that you are not prompted for the BitLocker recovery key on the next restart. The drive must be protected by BitLocker on subsequent restarts.
Which cmdlet should you run?

A. Unlock-BitLocker

B. Disable-BitLocker

C. Add-BitLockerKeyProtector

D. Suspend-BitLocker

 


Suggested Answer: D

Reference:
https://support.microsoft.com/en-us/help/4057282/bitlocker-recovery-key-prompt-after-surface-uefi-tpm-firmware-update

Question 42

You need to sign in as LocalAdmin on Computer11.
What should you do first?

A. From the LAPS UI tool, view the administrator account password for the computer object of Computer11.

B. From Windows Configuration Designer, create a configuration package that sets the password of the LocalAdmin account on Computer11.

C. Use a Group Policy object (GPO) to set the local administrator password.

D. From Microsoft Intune, set the password of the LocalAdmin account on Computer11.

 


Suggested Answer: A

Reference:
https://technet.microsoft.com/en-us/mt227395.aspx

Question 43

Which users can create a new group on Computer3?

A. User31 and User32 only

B. Admin1, User31, and User32 only

C. User31 only

D. Admin1 and User31 only

 


Suggested Answer: D

Reference:
https://ss64.com/nt/syntax-security_groups.html

Question 44

You have computers that run Windows 10. The computers are joined to an Azure Active Directory (Azure AD) tenant and enrolled in Microsoft Intune.
You need to recommend a solution for help desk administrators that meets the following requirements:
✑ The administrators must assist users remotely by connecting to each user's computer.
✑ The remote connections must be initiated by the administrators. The users must approve the connection.
✑ Both the users and the administrators must be able to see the screen of the users' computer.
✑ The administrators must be able to make changes that require running applications as a member of each computer's Administrators group.
Which tool should you include in the recommendation?

A. Remote Desktop

B. Intune

C. Remote Assistance

D. Quick Assist

 


Suggested Answer: B

Reference:
https://docs.microsoft.com/en-us/mem/intune/remote-actions/remote-assist-mobile-devices

Question 45

You have a computer named Client' that runs Windows 11.
You perform the following actions on Client1:
✑ Enable Hyper-V.
Create a virtual machine that runs Windows 11 Pro.
 Image
You need to connect to VM1 by using enhanced session mode.
What should you do first?

A. Enable Remote Desktop on VM1.

B. Enable Remote Assistance on Client1.

C. Enable Remote Assistance on VM1.

D. Enable Remote Desktop on Client1.

 


Suggested Answer: C

Configure VM for Remote Desktop –
Enhanced Session Mode requires Remote Desktop to be enabled in the VM.
Note: Enhanced Session Mode lets Hyper-V connect to virtual machines using RDP (remote desktop protocol). Not only does this improve your general virtual machine viewing experience, connecting with RDP also allows the virtual machine to share devices with your computer.
Reference:
https://docs.microsoft.com/en-us/virtualization/hyper-v-on-windows/user-guide/enhanced-session-mode

Question 46

SIMULATION -
Please wait while the virtual machine loads. Once loaded, you may proceed to the lab section. This may take a few minutes, and the wait time will not be deducted from your overall test time.
When the Next button is available, click it to access the lab section. In this section, you will perform a set of tasks in a live environment. While most functionality will be available to you as it would be in a live environment, some functionality (e.g., copy and paste, ability to navigate to external websites) will not be possible by design.
Scoring is based on the outcome of performing the tasks stated in the lab. In other words, it doesn't matter how you accomplish the task, if you successfully perform it, you will earn credit for that task.
Labs are not timed separately, and this exam may more than one lab that you must complete. You can use as much time as you would like to complete each lab.
But, you should manage your time appropriately to ensure that you are able to complete the lab(s) and all other sections of the exam in the time provided.
Please note that once you submit your work by clicking the Next button within a lab, you will NOT be able to return to the lab.
Username and password -
 Image
Use the following login credentials as needed:
To enter your password, place your cursor in the Enter password box and click on the password below.
Username: Contoso/Administrator -
Password: Passw0rd!
The following information is for technical support purposes only:
Lab Instance: 11145882 -
 Image
 Image
Administrators report that they cannot use Event Viewer to remotely view the event logs on Client3.
You need to ensure that the administrators can access the event logs remotely on Client3. The solution must ensure that Windows Firewall remains enabled.
To complete this task, sign in to the required computer or computers.

 


Suggested Answer: See explanation below.

1. Go to Control Panel -> System and Security -> Windows Firewall.
2. Click on the Advanced settings link in the left-hand side.
Reference Image
3. Enable COM+ Network Access (DCOM-In).
Reference Image
4. Enable all the rules in the Remote Event Log Management group.
Reference Image
Reference: alt=”Reference Image” />
3. Enable COM+ Network Access (DCOM-In).
Reference Image
4. Enable all the rules in the Remote Event Log Management group.
<img src=”https://www.examtopics.com/assets/media/exam-media/04292/0034700003.jpg” alt=”Reference Image” />
Reference:
https://www.zubairalexander.com/blog/unable-to-access-event-viewer-on-a-remote-computer/

Question 47

You have a computer that runs Windows 10.
You can start the computer but cannot sign in.
You need to start the computer into the Windows Recovery Environment (WinRE).
What should you do?

A. Turn off the computer. Turn on the computer, and then press F8.

B. Turn off the computer. Turn on the computer, and then press F10.

C. From the sign-in screen, hold the Shift key, and then click Restart.

D. Hold Alt+Ctrl+Delete for 10 seconds.

 


Suggested Answer: C

Reference:
https://docs.microsoft.com/en-us/windows-hardware/manufacture/desktop/windows-recovery-environment–windows-re–technical-reference

Question 48

You have a Windows 10 device.
You need to enable an experimental feature in Microsoft Edge.
What should you enter in the address bar?

A. edge://flags

B. edge://components

C. edge://management

D. edge://extensions

 


Suggested Answer: A

 

Question 49

You need to recommend a solution to configure the employee VPN connections.
What should you include in the recommendation?

A. Remote Access Management Console

B. Group Policy Management Console (GPMC)

C. Connection Manager Administration Kit (CMAK)

D. Microsoft Intune

 


Suggested Answer: D

Reference:
https://docs.microsoft.com/en-us/windows-server/remote/remote-access/vpn/always-on-vpn/deploy/vpn-deploy-client-vpn-connections#bkmk_ProfileXML

Question 50

You have a computer that runs Windows 10 and has File History enabled. File History is configured to save copies of files every 15 minutes.
At 07:55, you create a file named D:Folder1File1.docx.
You add D:Folder1 to File History and manually run File History at 08:00.
You modify File1.docx at the following times:
✑ 08:05
✑ 08:12
08:20
 Image
✑ 08:24
✑ 08:50
At 08:55, you attempt to restore File1.docx.
How many previous versions of File1.docx will be available to restore?

A. 2

B. 3

C. 4

D. 5

 


Suggested Answer: C

 

Free Access Full MD-100 Practice Test Free Questions

If you’re looking for more MD-100 practice test free questions, click here to access the full MD-100 practice test.

We regularly update this page with new practice questions, so be sure to check back frequently.

Good luck with your MD-100 certification journey!

Share18Tweet11
Previous Post

MB-800 Practice Test Free

Next Post

MLS-C01 Practice Test Free

Next Post

MLS-C01 Practice Test Free

MS-100 Practice Test Free

MS-101 Practice Test Free

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recommended

Network+ Practice Test

Comptia Security+ Practice Test

A+ Certification Practice Test

Aws Cloud Practitioner Exam Questions

Aws Cloud Practitioner Practice Exam

Comptia A+ Practice Test

  • About
  • DMCA
  • Privacy & Policy
  • Contact

PracticeTestFree.com materials do not contain actual questions and answers from Cisco's Certification Exams. PracticeTestFree.com doesn't offer Real Microsoft Exam Questions. PracticeTestFree.com doesn't offer Real Amazon Exam Questions.

  • Login
  • Sign Up
No Result
View All Result
  • Quesions
    • Cisco
    • AWS
    • Microsoft
    • CompTIA
    • Google
    • ISACA
    • ECCouncil
    • F5
    • GIAC
    • ISC
    • Juniper
    • LPI
    • Oracle
    • Palo Alto Networks
    • PMI
    • RedHat
    • Salesforce
    • VMware
  • Courses
    • CCNA
    • ENCOR
    • VMware vSphere
  • Certificates

Welcome Back!

Login to your account below

Forgotten Password? Sign Up

Create New Account!

Fill the forms below to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Insert/edit link

Enter the destination URL

Or link to existing content

    No search term specified. Showing recent items. Search or use up and down arrow keys to select an item.