Update MD-100 Questions And Answers For Windows 10 Certification Exam

You will be strongly recommended to pass MD-100 Windows 10 certification exam to complete Microsoft 365 Certified: Modern Desktop Administrator Associate certification. We have updated MD-100 questions and answers to help you prepare for Microsoft MD-100 exam well. You can choose to read MD-100 updated dumps questions online before taking real MD-100 Windows 10 exam. Also, we have valid MD-101 exam dumps for your M365 Modern Desktop Administrator certification.

You can read MD-100 free dumps online first.

1. Testlet 1

Case Study

This is a case study. Case studies are not timed separately. You can use as much exam times as you would like to complete each case. However, there may be additional studies and sections on this exam. You must manage your time to ensure that you are able to complete all questions included on this exam in the time provided.

To answer the questions included in a case study, you will need to reference information that is provided in the case study. Case studies might contain exhibits and other resources that provide more information about the scenario that is described in the case study. Each question is independent of the other questions in this case study.

At the end of this case study, a review screen will appear. This screen allows you to review your answers and to make changes before you move to the next section of the exam. After you begin a new section, you cannot return to this section.

To start the case study

To display the first question in this case study, click the Next button . Use the buttons in the left pane to explore the content of the case study before you answer the questions. Clicking these buttons displays information such as business requirements, existing environment, and problem statements. When you are ready to answer a question, click the Question button to return to the question.

Overview

Existing Environment

Fabrikam, Inc. is a distribution company that has 500 employees and 100 contractors.

Active Directory

The network contains an Active Directory forest named fabrikam.com. The forest is synced to Microsoft Azure Active Directory (Azure AD). All the employees are assigned Microsoft 365 E3 licenses.

The domain contains a user account for an employee named User10.

Client Computers

All the employees have computers that run Windows 10 Enterprise. All the computers are installed without Volume License Keys. Windows 10 license keys are never issued.

All the employees register their computer to Azure AD when they first receive the computer.

User10 has a computer named Computer10.

All the contractors have their own computer that runs Windows 10. None of the computers are joined to Azure AD.

Operational Procedures

Fabrikam has the following operational procedures:

- Updates are deployed by using Windows Update for Business.

- When new contractors are hired, administrators must help the contactors configure the following settings on their computer:

- User certificates

- Browser security and proxy settings

- Wireless network connection settings

Security policies

The following security policies are enforced on all the client computers in the domain:

- All the computers are encrypted by using BitLocker Drive Encryption (BitLocker). BitLocker recovery information is stored in Active Directory and Azure AD.

- The local Administrators group on each computer contains an enabled account named LocalAdmin.

- The LocalAdmin account is managed by using Local Administrator Password Solution (LAPS).

Problem Statements

Fabrikam identifies the following issues:

- Employees in the finance department use an application named Application1. Application1 frequently crashes due to a memory error. When Application1 crashes, an event is written to the application log and an administrator runs a script to delete the temporary files and restart the application.

- When employees attempt to connect to the network from their home computer, they often cannot establish a VPN connection because of misconfigured VPN settings.

- An employee has a computer named Computer11. Computer11 has a hardware failure that prevents the computer from connecting to the network.

- User10 reports that Computer10 is not activated.

Technical requirements

Fabrikam identifies the following technical requirements for managing the client computers:

- Provide employees with a configuration file to configure their VPN connection.

- Use the minimum amount of administrative effort to implement the technical requirements.

- Identify which employees’ computers are noncompliant with the Windows Update baseline of the company.

- Ensure that the service desk uses Quick Assist to take remote control of an employee’s desktop during support calls.

- Automate the configuration of the contractors’ computers. The solution must provide a configuration file that the contractors can open from a Microsoft SharePoint site to apply the required configurations.

HOTSPOT

You need to implement a solution to configure the contractors’ computers.

What should you do? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point.

2. You need to ensure that User10 can activate Computer10.

What should you do?

3. Testlet 2

Case Study

This is a case study. Case studies are not timed separately. You can use as much exam times as you would like to complete each case. However, there may be additional studies and sections on this exam. You must manage your time to ensure that you are able to complete all questions included on this exam in the time provided.

To answer the questions included in a case study, you will need to reference information that is provided in the case study. Case studies might contain exhibits and other resources that provide more information about the scenario that is described in the case study. Each question is independent of the other questions in this case study.

At the end of this case study, a review screen will appear. This screen allows you to review your answers and to make changes before you move to the next section of the exam. After you begin a new section, you cannot return to this section.

To start the case study

To display the first question in this case study, click the Next button . Use the buttons in the left pane to explore the content of the case study before you answer the questions. Clicking these buttons displays information such as business requirements, existing environment, and problem statements. When you are ready to answer a question, click the Question button to return to the question.

Overview

Contoso, Ltd. is a consulting company that has a main office in Montreal and two branch offices in Seattle and New York.

Contoso has IT, human resources (HR), and finance departments.

Contoso recently opened a new branch office in San Diego. All the users in the San Diego office work from home.

Existing environment

Contoso uses Microsoft 365.

The on-premises network contains an Active Directory domain named contoso.com. The domain is synced to Microsoft Azure Active Directory (Azure AD).

All computers run Windows 10 Enterprise.

You have four computers named Computer1, Computer2, Computer3, and ComputerA. ComputerA is in a workgroup on an isolated network segment and runs the Long Term Servicing Channel version of Windows 10. ComputerA connects to a manufacturing system and is business critical. All the other computers are joined to the domain and run the Semi-Annual Channel version of Windows 10.

In the domain, you create four groups named Group1, Group2, Group3, and Group4.

Computer2 has the local Group Policy settings shown in the following table.

The computers are updated by using Windows Update for Business.

The domain has the users shown in the following table.

Computer1 has the local users shown in the following table.

Requirements

Planned Changes

Contoso plans to purchase computers preinstalled with Windows 10 Pro for all the San Diego office users.

Technical requirements

Contoso identifies the following technical requirements:

- The computers in the San Diego office must be upgraded automatically to Windows 10 Enterprise and must be joined to Azure AD the first time a user starts each new computer. End users must not be required to accept the End User License Agreement (EULA).

- Helpdesk users must be able to troubleshoot Group Policy object (GPO) processing on the Windows 10 computers. The helpdesk users must be able to identify which Group Policies are applied to the computers.

- Users in the HR department must be able to view the list of files in a folder named D:Reports on Computer3.

- ComputerA must be configured to have an Encrypting File System (EFS) recovery agent.

- Quality update installations must be deferred as long as possible on ComputerA.

- Users in the IT department must use dynamic look on their primary device.

- User6 must be able to connect to Computer2 by using Remote Desktop.

- The principle of least privilege must be used whenever possible.

- Administrative effort must be minimized whenever possible.

- Assigned access must be configured on Computer1.

You need to meet the technical requirements for the San Diego office computers.

Which Windows 10 deployment method should you use?

4. HOTSPOT

You need to meet the technical requirement for Computer1.

What should you do? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point.

5. Question Set 3

Your company has an isolated network used for testing. The network contains 20 computers that run Windows 10. The computers are in a workgroup. During testing, the computers must remain in the workgroup.

You discover that none of the computers are activated.

You need to recommend a solution to activate the computers without connecting the network to the Internet.

What should you include in the recommendation?

6. You plan to deploy Windows 10 to 100 secure computers.

You need to select a version of Windows 10 that meets the following requirements:

- Uses Microsoft Edge as the default browser

- Minimizes the attack surface on the computer

- Supports joining Microsoft Azure Active Directory (Azure AD)

- Only allows the installation of applications from the Microsoft Store

What is the best version to achieve the goal? More than one answer choice may achieve the goal. Select the BEST answer.

7. DRAG DROP

You have a computer named Computer1 that runs Windows 7. Computer1 has a local user named User1 who has a customized profile.

On Computer1, you perform a clean installation of Windows 10 without formatting the drives.

You need to migrate the settings of User1 from Windows7 to Windows 10.

Which two actions should you perform? To answer, drag the appropriate actions to the correct targets. Each action may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content. NOTE: Each correct selection is worth one point.

8. Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.

You have a computer named Computer1 that runs Windows10.

A service named Application1 is configured as shown in the exhibit.

You discover that a user used the Service1 account to sign in to Computer1 and deleted some files.

You need to ensure that the identity used by Application1 cannot be used by a user to sign in to sign in to the desktop on Computer1. The solution must use the principle of least privilege.

Solution: On Computer1, you configure Application1 to sign in as the LocalSystem account and select the Allow service to interact with desktop check box. You delete the Service1 account.

Does this meet the goal?

9. Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.

You have a computer named Computer1 that runs Windows 10.

A service named Application1 is configured as shown in the exhibit.

You discover that a user used the Service1 account to sign in to Computer1 and deleted some files.

You need to ensure that the identity used by Application1 cannot be used by a user to sign in to sign in to the desktop on Computer1. The solution must use the principle of least privilege.

Solution: On Computer1, you assign Service1 the Deny log on locally user right.

Does this meet the goal?

10. Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.

You have a computer named Computer1 that runs Windows 10.

A service named Application1 is configured as shown in the exhibit.

You discover that a user used the Service1 account to sign in to Computer1 and deleted some files.

You need to ensure that the identity used by Application1 cannot be used by a user to sign in to sign in to the desktop on Computer1. The solution must use the principle of least privilege.

Solution: On Computer1, you assign Service1 the Deny log on as a service user right.

Does this meet the goal?

11. You have a Microsoft Azure Active Directory (Azure AD) tenant.

Some users sign in to their computer by using Windows Hello for Business.

A user named User1 purchases a new computer and joins the computer to Azure AD.

User1 is not able to use Windows Hello for Business on his computer.

User1 sign-in options are shown on the exhibit.

You open Device Manager and confirm that all the hardware works correctly.

You need to ensure that User1 can use Windows Hello for Business facial recognition to sign in to the computer.

What should you do first?

12. Your company uses Microsoft Deployment Toolkit (MDT) to deploy Windows 10 to new computers. The company purchases 1,000 new computers. You need to ensure that the Hyper-V feature is enabled on the computers during the deployment.

What are two possible ways to achieve this goal? Each correct answer presents a complete solution. NOTE: Each correct selection is worth one point.

13. Your network contains an Active Directory domain that is synced to a Microsoft Azure Active Directory (Azure AD) tenant. Your company purchases a Microsoft 365 subscription. You need to migrate the Documents folder of users to Microsoft OneDrive for Business.

What should you configure?

14. Your network contains an Active Directory domain. The domain contains a user named User1.

User1 creates a Microsoft account. User1 needs to sign in to cloud resources by using the Microsoft account without being prompted for credentials.

Which settings should User1 configure?

15. HOTSPOT

Your network contains an Active Directory domain named adatum.com that uses Key Management Service (KMS) for activation.

You deploy a computer that runs Windows 10 to the domain.

The computer fails to activate.

You suspect that the activation server has an issue.

You need to identify which server hosts KMS.

How should you complete the command? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point.

16. HOTSPOT

You deploy Windows 10 to a new computer named Computer1.

You sign in to Computer1 and create a user named User1.

You create a file named LayoutModification.xml in the C:UsersDefaultAppDataLocalMicrosoftWindows Shellfolder. LayoutModification.xml contains the following markup.

What is the effect of the configuration? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point.

17. You have an Azure Active Directory (Azure AD) tenant named contoso.com.

You have a workgroup computer named Computer1 that runs Windows 10.

You need to add Computer1 to contoso.com.

What should you use?

18. Testlet 1

Case Study

This is a case study. Case studies are not timed separately. You can use as much exam times as you would like to complete each case. However, there may be additional studies and sections on this exam. You must manage your time to ensure that you are able to complete all questions included on this exam in the time provided.

To answer the questions included in a case study, you will need to reference information that is provided in the case study. Case studies might contain exhibits and other resources that provide more information about the scenario that is described in the case study. Each question is independent of the other questions in this case study.

At the end of this case study, a review screen will appear. This screen allows you to review your answers and to make changes before you move to the next section of the exam. After you begin a new section, you cannot return to this section.

To start the case study

To display the first question in this case study, click the Next button. Use the buttons in the left pane to explore the content of the case study before you answer the questions. Clicking these buttons displays information such as business requirements, existing environment, and problem statements. When you are ready to answer a question, click the Question button to return to the question.

Overview

Existing Environment

Fabrikam, Inc. is a distribution company that has 500 employees and 100 contractors.

Active Directory

The network contains an Active Directory forest named fabrikam.com. The forest is synced to Microsoft Azure Active Directory (Azure AD). All the employees are assigned Microsoft 365 E3 licenses.

The domain contains a user account for an employee named User10.

Client Computers

All the employees have computers that run Windows 10 Enterprise. All the computers are installed without Volume License Keys. Windows 10 license keys are never issued. All the employees register their computer to Azure AD when they first receive the computer.

User10 has a computer named Computer10. All the contractors have their own computer that runs Windows 10. None of the computers are joined to Azure AD.

Operational Procedures

Fabrikam has the following operational procedures:

- Updates are deployed by using Windows Update for Business.

- When new contractors are hired, administrators must help the contactors configure the following settings on their computer:

- User certificates

- Browser security and proxy settings

- Wireless network connection settings

Security policies

The following security policies are enforced on all the client computers in the domain:

- All the computers are encrypted by using BitLocker Drive Encryption (BitLocker). BitLocker recovery information is stored in Active Directory and Azure AD.

- The local Administrators group on each computer contains an enabled account named LocalAdmin.

- The LocalAdmin account is managed by using Local Administrator Password Solution (LAPS).

Problem Statements

Fabrikam identifies the following issues:

- Employees in the finance department use an application named Application1. Application1 frequently crashes due to a memory error. When Application1 crashes, an event is written to the application log and an administrator runs a script to delete the temporary files and restart the application.

- When employees attempt to connect to the network from their home computer, they often cannot establish a VPN connection because of misconfigured VPN settings.

- An employee has a computer named Computer11. Computer11 has a hardware failure that prevents the computer from connecting to the network.

- User10 reports that Computer10 is not activated.

Technical requirements

Fabrikam identifies the following technical requirements for managing the client computers:

- Provide employees with a configuration file to configure their VPN connection.

- Use the minimum amount of administrative effort to implement the technical requirements.

- Identify which employees’ computers are noncompliant with the Windows Update baseline of the company.

- Ensure that the service desk uses Quick Assist to take remote control of an employee’s desktop during support calls.

- Automate the configuration of the contractors’ computers. The solution must provide a configuration file that the contractors can open from a Microsoft SharePoint site to apply the required configurations.

You need to sign in as LocalAdmin on Computer11.

What should you do first?

19. An employee reports that she must perform a BitLocker recovery on her laptop. The employee does not have her BitLocker recovery key but does have a Windows 10 desktop computer.

What should you instruct the employee to do from the desktop computer?

20. Testlet 2

Case Study

This is a case study. Case studies are not timed separately. You can use as much exam time as youwould like to complete each case. However, there may be additional case studies and sections on this exam. You must manage your time to ensure that you are able to complete all questions included on this exam in the time provided.

To answer the questions included in a case study, you will need to reference information that is provided in the case study. Case studies might contain exhibits and other resources that provide more information about the scenario that is described in the case study. Each question is independent of the other questions in this case study.

At the end of this case study, a review screen will appear. This screen allows you to review your answers and to make changes before you move to the next section of the exam. After you begin a new section, you cannot return to this section.

To start the case study

To display the first question in this case study, click the Next button. Use the buttons in the left pane to explore the content of the case study before you answer the questions. Clicking these buttons displays information such as business requirements, existing environment, and problem statements. When you are ready to answer a question, click the Question button to return to the question.

Overview

Contoso, Ltd. is a consulting company that has a main office in Montreal and two branch offices in Seattle and New York.

Contoso has IT, human resources (HR), and finance departments.

Contoso recently opened a new branch office in San Diego. All the users in the San Diego office work from home.

Existing environment

Contoso uses Microsoft 365.

The on-premises network contains an Active Directory domain named contoso.com. The domain is synced to Microsoft Azure Active Directory (Azure AD).

All computers run Windows 10 Enterprise.

You have four computers named Computer1, Computer2, Computer3, and ComputerA. ComputerA is in a workgroup on an isolated network segment and runs the Long Term Servicing Channel version of Windows 10. ComputerA connects to a manufacturing system and is business critical. All the other computers are joined to the domain and run the Semi-Annual Channel version of Windows 10.

In the domain, you create four groups named Group1, Group2, Group3, and Group4.

Computer2 has the local Group Policy settings shown in the following table.

The computers are updated by using Windows Update for Business.

Computer1 has the local users shown in the following table.

Requirements

Planned Changes

Contoso plans to purchase computers preinstalled with Windows 10 Pro for all the San Diego office users.

Technical requirements

Contoso identifies the following technical requirements:

- The computers in the San Diego office must be upgraded automatically to Windows 10 Enterprise and must be joined to Azure AD the first time a user starts each new computer. End users must not be required to accept the End User License Agreement (EULA).

- Helpdesk users must be able to troubleshoot Group Policy object (GPO) processing on the Windows 10 computers. The helpdesk users must be able to identify which Group Policies are applied to the computers.

- Users in the HR department must be able to view the list of files in a folder named D:Reports on Computer3.

- ComputerA must be configured to have an Encrypting File System (EFS) recovery agent.

- Quality update installations must be deferred as long as possible on ComputerA.

- Users in the IT department must use dynamic lock on their primary device.

- User6 must be able to connect to Computer2 by using Remote Desktop.

- The principle of least privilege must be used whenever possible.

- Administrative effort must be minimized whenever possible.

- Kiosk (assigned access) must be configured on Computer1.

HOTSPOT

You need to meet the technical requirements for the helpdesk users.

What should you do? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point.

21. HOTSPOT

You need to meet the technical requirements for the HR department users.

Which permissions should you assign to the HR department users for the D:Reports folder? To answer, select the appropriate permissions in the answer area. NOTE: Each correct selection is worth one point.

22. You need to meet the technical requirements for EFS on Computer A.

What should you do?

23. Question Set 3

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.

You have a computer that runs Windows 10. The computer contains a folder. The folder contains sensitive data.

You need to log which user reads the contents of the folder and modifies and deletes files in the folder.

Solution: From the properties of the folder, you configure the Auditing settings and from the Audit Policy in the local Group Policy, you configure Audit directory service access.

Does this meet the goal?

24. HOTSPOT

You have a computer named Computer 1 that runs Windows 10. You turn on System Protection and create a restore point named Point1.

You perform the following changes:

- Add four files named File1.txt, File2.dll, File3.sys, and File4.exe to the desktop.

- Run a configuration script that adds the following four registry keys:

- Key1 to HKEY_CURRENT_USER

- Key2 to HKEY_CLASSES_ROOT

- Key3 to HKEY_LOCAL_MACHINESYSTEM

- Key4 to HKEY_CURRENT_CONFIG You restore Point1.

Which files and registry keys are removed? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point.

25. HOTSPOT

You have 10 computers that run Windows 10. You have a Windows Server Update Services (WSUS) server. You need to configure the computers to install updates from WSUS.

Which two settings should you configure? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point.

26. Your network contains an Active Directory domain. The domain contains 1,000 computers that run Windows 10.

You discover that when users are on their lock screen, they see a different background image every day, along with tips for using different features in Windows 10.

You need to disable the tips and the daily background image for all the Windows 10 computers.

Which Group Policy settings should you modify?

27. HOTSPOT

You have a computer named Computer1 that runs Windows 10. Computer1 contains a folder named Data on drive C.

The Advanced Security Settings for the Data folder are shown in the exhibit. (Click the Exhibit tab.)

You share C:Data as shown in the following table.

User1 is a member of the Users group. Administrators are assigned Full control NTFS permissions to C:Data.

For each of the following statements, select Yes if the statement is true. Otherwise, select No. NOTE: Each correct selection is worth one point.

28. You have a file named Reg1.reg that contains the following content.

What is the effect of importing the file?

29. You have a computer named Computer1 that runs Windows 10.

On Computer1, you create the local users shown in the following table.

Which three user profiles will persist after each user signs out? Each correct answer presents part of the solution. NOTE: Each correct selection is worth one point.

30. HOTSPOT

You have a computer that runs Windows 10. The computer is in a workgroup. The computer is used to provide visitors with access to the Internet.

You need to configure the computer to meet the following requirements:

- Always sign in automatically as User1.

- Start an application named App1.exe at sign-in.

What should you use to meet each requirement? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point.

31. You have 20 computers that run Windows 10. The computers are in a workgroup.

You need to create a local user named Admin1 on all the computers. Admin1 must be a member of the Remote Management Users group.

What should you do?

32. You have several computers that run Windows 10. The computers are in a workgroup and have BitLocker Drive Encryption (BitLocker) enabled.

You join the computers to Microsoft Azure Active Directory (Azure AD).

You need to ensure that you can recover the BitLocker recovery key for the computers from Azure AD.

What should you do first?

33. HOTSPOT

Your network contains an Active Directory forest. The forest contains a root domain named contoso.com and a child domain named corp.contoso.com. You have a computer named Computer1 that runs Windows 10. Computer1 is joined to the corp.contoso.com

domain.

Computer1 contains a folder named Folder1. In the Security settings of Folder1, Everyone is assigned the Full control permissions.

On Computer1, you share Folder1 as Share1 and assign the Read permissions for Share1 to the Users group.

For each of the following statements, select Yes if the statement is true. Otherwise, select No. NOTE: Each correct selection is worth one point.

34. HOTSPOT

You have a computer named Computer1 that runs Windows 10.

Computer1 is in a workgroup. Computer1 contains the folders shown in the following table.

On Computer1, you create the users shown in the following table.

User1 encrypts a file named File1.txt that is in a folder named C:Folder1.

What is the effect of the configuration? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point.

35. HOTSPOT

You have a computer named Computer1 that runs Windows 10 and is joined to an Active Directory domain named adatum.com.

A user named Admin1 signs in to Computer1 and runs the whoami command as shown in the following exhibit.

Use the drop-down menus to select the answer choice that completes each statement based on the information presented in the graphic. NOTE: Each correct selection is worth one point.

36. You have a computer named Computer1 that runs Windows 10.

You need to configure User Account Control (UAC) to prompt administrators for their credentials.

Which settings should you modify?

37. You have several computers that run Windows 10. The computers are in a workgroup. You need to prevent users from using Microsoft Store apps on their computer.

What are two possible ways to achieve the goal? Each correct answer presents a complete solution. NOTE: Each correct selection is worth one point.

38. You have a computer named Computer1 that runs Windows 10.

You need to prevent standard users from changing the wireless network settings on Computer1. The solution must allow administrators to modify the wireless network settings.

What should you use?

39. HOTSPOT

You have three computers that run Windows 10 as shown in the following table.

All the computers have C and D volumes. The Require additional authentication at startup Group Policy settings is disabled on all the computers.

Which volumes can you encrypt by using BitLocker Drive Encryption (BitLocker)? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point.

40. Your network contains an Active Directory domain named contoso.com. The domain contains named Computer1 that runs Windows 10. On Computer1, you create an NTFS folder and assign Full control permissions to Everyone.

You share the folder as Share1 and assign the permissions shown in the following table.

When accessing Share1, which two actions can be performed by User1 but not by User2? Each correct answer presents part of the solution. NOTE: Each correct selection is worth one point.

41. HOTSPOT

You have a computer that runs Windows 10. The computer contains a folder named C:ISOs that is shared in ISOs.

You run several commands on the computer as shown in the following exhibit.

Use the drop-down menus to select the answer choice that completes each statement based on the information presented in the graphic. NOTE: Each correct selection is worth one point.

42. Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.

A user named User1 has a computer named Computer1 that runs Windows 10. Computer1 is joined to an Azure Active Directory (Azure AD) tenant named contoso.com. User1 joins Computer1 to contoso.com by using [email protected].

Computer1 contains a folder named Folder1. Folder1 is in drive C and is shared as Share1.

Share1 has the permission shown in the following table.

A user named User2 has a computer named Computer2 that runs Windows 10. User2 joins Computer2 to contoso.com by using [email protected].

User2 attempts to access Share1 and receives the following error message: “The username or password is incorrect.”

You need to ensure that User2 can connect to Share1.

Solution: In Azure AD, you create a group named Group1 that contains User1 and User2. You grant Group1 Change access to Share1.

Does this meet the goal?

43. Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.

A user named User2 has a computer named Computer2 that runs Windows 10. User2 joins Computer2 to contoso.com by using [email protected].

Computer1 contains a folder named Folder1. Folder1 is in drive C and is shared as Share1.

Share1 has the permission shown in the following table.

A user named User2 has a computer named Computer2 that runs Windows 10. User2 joins Computer2 to contoso.com by using [email protected].

User2 attempts to access Share1 and receives the following error message: “The username or password is incorrect.”

You need to ensure that User2 can connect to Share1.

Solution: You create a local user account on Computer1 and instruct User2 to use the local account to connect to Share1.

Does this meet the goal?

44. Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.

A user named User1 has a computer named Computer1 that runs Windows 10. Computer1 is joined to an Azure Active Directory (Azure AD) tenant named contoso.com. User1 joins Computer1 to contoso.com by using [email protected].

Computer1 contains a folder named Folder1. Folder1 is in drive C and is shared as Share1.

Share1 has the permission shown in the following table.

A user named User2 has a computer named Computer2 that runs Windows 10. User2 joins Computer2 to

contoso.com by using [email protected]. User2 attempts to access Share1 and receives the following error message: “The username or password is incorrect.”

You need to ensure that User2 can connect to Share1.

Solution: In Azure AD, you create a group named Group1 that contains User1 and User2. You grant Group1 Modify access to Folder1.

Does this meet the goal?

45. You have a computer named Computer1 that runs Windows 10. Computer1 contains a folder named Folder1. You need to log any users who take ownership of the files in Folder1.

Which two actions should you perform? Each correct answer presents part of the solution. NOTE: Each correct selection is worth one point.

46. HOTSPOT

Your network contains an Active Directory domain.

The domain contains the users shown in the following table.

The domain contains a computer named Computer1 that runs Windows 10.

Computer1 contains a folder named Folder1 that has the following permissions:

- User2: Deny Write

- Group1: Allow Read

- Group2: Allow Modify

Folder1 is shared as Share1$. Share1$ has the following configurations:

- Everyone: Allow Full control

- Access-based enumeration: Enabled

For each of the following statements, select Yes if the statement is true. Otherwise, select No. NOTE: Each correct selection is worth one point.

47. You are a network administrator at your company.

The company uses an application that checks for network connectivity to a server by sending a ping request to the IPv6 address of the server. If the server replies, the application loads. A user cannot open the application. You manually send the ping request from the computer of the user and the server does not reply. You send the ping request from your computer and the server replies.

You need to ensure that the ping request works from the user’s computer.

Which Windows Defender firewall rule is a possible cause of the issue?

48. HOTSPOT

Use the drop-down menus to select the answer choice that completes each statement based on the information presented on the graphic.

NOTE: Each correct selection is worth one point.

49. HOTSPOT

You have a computer named Computer5 that runs Windows 10 that is used to share documents in a workgroup.

You create three users named User-a, User-b, User-c. The users plan to access Computer5 from the network only.

You have a folder named Data. The Advanced Security Settings for the Data folder are shown in the Security exhibit. (Click the Security tab).

You share the Data folder.

The permissions for User-a are shown in the User-a exhibit (Click the User-a tab.)

The permissions for user-b are shown in the User-b exhibit. (Click the User-b tab.)

The permissions for user-c are shown in the User-c exhibit. (Click the User-c tab.)

For each of the following statements, select Yes if the statements is true. Otherwise, select No. NOTE: Reach correct selection is worth one point.

50. HOTSPOT

You have a computer that runs Windows 10 and contains the folders shown in the following table.

You create the groups shown in the following table.

On FolderA, you disable permission inheritance and select the option to remove all inherited permissions. To each folder, you assign the NTFS permissions shown in the following table.

For each of the following statements, select Yes if the statement is true. Otherwise, select No. NOTE: Each correct selection is worth one point.


 

Great MS-101 Updated Exam Dumps To Ensure Your Success
Updated AZ-400 Dumps V12.02 For Microsoft Azure DevOps Solutions Certification Exam

Add a Comment

Your email address will not be published. Required fields are marked *