Windows 10 MD-100 Dumps Questions Updated V14.02

Still looking for the most valid study materials to prepare for MD-100 Windows 10 exam? DumpsBase MD-100 dumps V14.02 have been completed by the professional team. They have collected 225 practice exam questions and answers to ensure that you can pass Windows 10 exam successfully. Just come to DumpsBase to prepare for MD-100 exam well.

You can read MD-100 free dumps online

1. Topic 1, Fabrikam, Inc.

Overview

Existing Environment

Fabrikam, Inc. is a distribution company that has 500 employees and 100 contractors.

Active Directory

The network contains an Active Directory forest named fabrikam.com. The forest is synced to Microsoft Azure Active Directory (Azure AD). All the employees are assigned Microsoft 365 E3 licenses.

The domain contains a user account for an employee named User10.

Client Computers

All the employees have computers that run Windows 10 Enterprise. All the computers are installed without Volume License Keys. Windows 10 license keys are never issued.

All the employees register their computer to Azure AD when they first receive the computer.

User10 has a computer named Computer10.

All the contractors have their own computer that runs Windows 10. None of the computers are joined to Azure AD.

Operational Procedures

Fabrikam has the following operational procedures:

Updates are deployed by using Windows Update for Business.

When new contractors are hired, administrators must help the contactors configure the following settings on their computer:

- User certificates

- Browser security and proxy settings

- Wireless network connection settings

Security policies

The following security policies are enforced on all the client computers in the domain:

- All the computers are encrypted by using BitLocker Drive Encryption (BitLocker). BitLocker recovery information is stored in Active Directory and Azure AD.

- The local Administrators group on each computer contains an enabled account named LocalAdmin.

- The LocalAdmin account is managed by using Local Administrator Password Solution (LAPS).

Problem Statements

Fabrikam identifies the following issues:

- Employees in the finance department use an application named Application1. Application1 frequently crashes due to a memory error. When Application1 crashes, an event is written to the application log and an administrator runs a script to delete the temporary files and restart the application.

- When employees attempt to connect to the network from their home computer, they often cannot establish a VPN connection because of misconfigured VPN settings.

- An employee has a computer named Computer11. Computer11 has a hardware failure that prevents the computer from connecting to the network.

- User10 reports that Computer10 is not activated.

Technical requirements

Fabrikam identifies the following technical requirements for managing the client computers:

- Provide employees with a configuration file to configure their VPN connection.

- Use the minimum amount of administrative effort to implement the technical requirements.

- Identify which employees’ computers are noncompliant with the Windows Update baseline of the company.

- Ensure that the service desk uses Quick Assist to take remote control of an employee’s desktop during support calls.

- Automate the configuration of the contractors’ computers. The solution must provide a configuration file that the contractors can open from a Microsoft SharePoint site to apply the required configurations.

An employee reports that she must perform a BitLocker recovery on her laptop. The employee does not have her BitLocker recovery key but does have a Windows 10 desktop computer.

What should you instruct the employee to do from the desktop computer?

2. You need to recommend a solution to monitor update deployments.

What should you include in the recommendation?

3. You need to take remote control of an employee’s computer to troubleshoot an issue.

What should you send to the employee to initiate a remote session?

4. You need to recommend a solution to configure the employee VPN connections.

What should you include in the recommendation?

5. You need to sign in as LocalAdmin on Computer11.

What should you do first?

6. You need to ensure that User10 can activate Computer10.

What should you do?

7. HOTSPOT

You need to implement a solution to configure the contractors’ computers.

What should you do? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point.

8. HOTSPOT

You need to reduce the amount of time it takes to restart Application1 when the application crashes.

What should you include in the solution? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point.

9. Topic 2, Contoso, Ltd

Overview

Contoso, Ltd. is a consulting company that has a main office in Montreal and two branch offices in Seattle and New York.

Contoso has IT, human resources (HR), and finance departments.

Contoso recently opened a new branch office in San Diego. All the users in the San Diego office work from home.

Existing environment

Contoso uses Microsoft 365.

The on-premises network contains an Active Directory domain named contoso.com. The domain is synced to Microsoft Azure Active Directory (Azure AD).

All computers run Windows 10 Enterprise.

You have four computers named Computer1, Computer2, Computer3, and ComputerA. ComputerA is in a workgroup on an isolated network segment and runs the Long Term Servicing Channel version of Windows 10. ComputerA connects to a manufacturing system and is business critical. All the other computers are joined to the domain and run the Semi-Annual Channel version of Windows 10.

In the domain, you create four groups named Group1, Group2, Group3, and Group4.

Computer2 has the local Group Policy settings shown in the following table.

The computers are updated by using Windows Update for Business.

The domain has the users shown in the following table.

Computer1 has the local users shown in the following table.

Requirements

Planned Changes

Contoso plans to purchase computers preinstalled with Windows 10 Pro for all the San Diego office users.

Technical requirements

Contoso identifies the following technical requirements:

- The computers in the San Diego office must be upgraded automatically to Windows 10 Enterprise and must be joined to Azure AD the first time a user starts each new computer. End users must not be required to accept the End User License Agreement (EULA).

- Helpdesk users must be able to troubleshoot Group Policy object (GPO) processing on the Windows 10 computers. The helpdesk users must be able to identify which Group Policies are applied to the computers.

- Users in the HR department must be able to view the list of files in a folder named D:Reports on Computer3.

- Computer A must be configured to have an Encrypting File System (EFS) recovery agent.

- Quality update installations must be deferred as long as possible on ComputerA.

- Users in the IT department must use dynamic look on their primary device.

- User6 must be able to connect to Computer2 by using Remote Desktop.

- The principle of least privilege must be used whenever possible.

- Administrative effort must be minimized whenever possible.

- Assigned access must be configured on Computer1.

HOTSPOT

You need to meet the technical requirements for the helpdesk users.

What should you do? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point.

10. You need to meet the quality update requirement for Computer A.

For how long should you defer the updates?

11. You need to meet the technical requirements for EFS on ComputerA.

What should you do?

12. You need to meet the technical requirements for the San Diego office computers.

Which Windows 10 deployment method should you use?

13. HOTSPOT

You need to meet the technical requirements for the HR department users.

Which permissions should you assign to the HR department users for the D:Reports folder? To answer, select the appropriate permissions in the answer area. NOTE: Each correct selection is worth one point.

14. HOTSPOT

You need to meet the technical requirement for Computer1.

What should you do? To answer, select the appropriate options in the answer area.

15. You need to meet the technical requirement for User6.

What should you do?

16. You need to meet the technical requirement for the IT department users.

What should you do first?

17. Topic 3, Mix Questions

HOTSPOT

You have a Microsoft Azure Active Directory (Azure AD) tenant named contoso.com that contain the users shown in the following table.

You have a computer named Computer1 that runs Windows 10.

User1 joins Computer1 to Azure AD by using [email protected].

For each of the following statements, select Yes if the statement is true. Otherwise, select No. NOTE: Each correct selection is worth one point.

18. Your network contains an Active Directory domain. The domain contains 1,000 computers that run Windows 10.

You discover that when users are on their lock screen, they see a different background image every day, along with tips for using different features in Windows 10.

You need to disable the tips and the daily background image for all the Windows 10 computers.

Which Group Policy settings should you modify?

19. HOTSPOT

You have a computer that runs Windows 10 and contains the folders shown in the following table.

You create the groups shown in the following table.

On FolderA, you remove permission inheritance.

To each folder, you assign the NTFS permissions shown in the following table.

For each of the following statements, select Yes if the statement is true. Otherwise, select No. NOTE: Each correct selection is worth one point.

20. Your company purchases 20 laptops that use a new hardware platform.

In a test environment, you deploy Windows 10 to the new laptops.

Some laptops frequently generate stop errors.

You need to identify the cause of the issue.

What should you use?

21. HOTSPOT

Your network contains the segments shown in the following table.

You have a computer that runs Windows 10.

The network interface of the computer is configured as shown in the exhibit. (Click the Exhibit tab.)

You need to identify which IP address the computer will have on the network when the computer connects to the segments.

Which IP address should you identify for each segment? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point.

22. You have a computer that runs Windows 10. The computer contains a folder. The folder contains sensitive data.

You need to log which user reads the contents of the folder and modifies and deletes files

in the folder.

You need to log which user reads the contents of the folder and modifies and deletes files in the folder.

Solution: from the properties of the folder, you configure the Auditing settings and from the Audit Policy in the local Group Policy, you configure Audit system events.

Does this meet the goal?

23. Your network contains an Active Directory domain named contoso.com. The domain contains two computers named Computer1 and Computer2 that run Windows 10.

On Computer1, you need to run the Invoke-Command cmdlet to execute several PowerShell commands on Computer2.

What should you do first?

24. Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.

You have a computer named Computer1 that runs Windows 10.

You test Windows updates on Computer1 before you make the updates available to other computers.

You install a quality update that conflicts with a customer device driver.

You need to remove the update from Computer1.

Solution: From an elevated command prompt, you run the vmic qfe delete command.

Does this meet the goal?

25. Your network contains an Active Directory domain. The domain contains a user named User1.

User1 creates a Microsoft account.

User1 needs to sign in to cloud resources by using the Microsoft account without being prompted for credentials.

Which settings should User1 configure?

26. You have a computer named Computer1 that runs Windows10. Computer1 is in a workgroup.

Computer1 contains the users shown in the following table.

You need to apply the same Group Policy settings to only User1, User2 and User3. The solution must use a minimum number of local Group Policy objects (GPOs).

How many local GPOs should you create?

27. Your company uses Microsoft Deployment Toolkit (MDT) to deploy Windows 10 to new computers.

The company purchases 1,000 new computers.

You need to ensure that the Hyper-V feature is enabled on the computers during the deployment.

What are two possible ways to achieve the goal? Each correct answer presents part of the solution. NOTE: Each correct selection is worth one point.

28. You deploy Windows 10 to several computers. The computers will be used by users who frequently present their desktop to other users.

You need to prevent applications from generating toast notifications in the notification area.

Which settings should you configure from the Settings app?

29. Your network contains an Active Directory domain. The domain contains 10 computers that run Windows 10.

On a different computer named Computer1, you plan to create a collector-initiated subscription to gather the event logs from the Windows 10 computers.

You need to configure the environment to support the event log collection.

Which two actions should you perform? Each correct answer presents part of the solution. NOTE: Each correct selection is worth one point.

30. HOTSPOT

You have a computer named Computer1 that runs Windows 10.

Computer1 has the local users shown in the following table.

Which users can analyze the event logs on Computer1? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point.

31. Your network contains an Active Directory domain. The domain contains a computer named Computer1 that runs Windows 10.

The domain contains the users shown in the following table.

Computer1 has the local users shown in the following table.

All users have Microsoft accounts.

Which two users can be configured to sign in by using their Microsoft account? Each correct answer presents part of the solution. NOTE: Each correct selection is worth one point.

32. HOTSPOT

You have four computers that run Windows 10. The computers are configured as shown in the following table.

On Computer1, you create a user named User1. In the domain, you create a user named User2.

You create the groups shown in the following table.

You need to identify to which computers User1 can sign in, and to which groups you can add User2.

What should you identify? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point.

33. Your network contains an Active Directory domain. The domain contains a user named Admin1. All computers run Windows 10.

You enable Windows PowerShell remoting on the computers.

You need to ensure that Admin1 can establish remote PowerShell connections to the computers. The solution must use the principle of least privilege.

To which group should you add Admin1?

34. CORRECT TEXT

Please wait while the virtual machine loads. Once loaded, you may proceed to the lab section. This may take a few minutes, and the wait time will not be deducted from your overall test time.

When the Next button is available, click it to access the lab section. In this section, you will perform a set of tasks in a live environment. While most functionality will be available to you as it would be in a live environment, some functionality (e.g., copy and paste, ability to navigate to external websites) will not be possible by design.

Scoring is based on the outcome of performing the tasks stated in the lab. In other words, it doesn’t matter how you accomplish the task, if you successfully perform it, you will earn credit for that task.

Labs are not timed separately, and this exam may more than one lab that you must complete. You can use as much time as you would like to complete each lab. But, you should manage your time appropriately to ensure that you are able to complete the lab(s) and all other sections of the exam in the time provided.

Please note that once you submit your work by clicking the Next button within a lab, you will NOT be able to return to the lab.

Username and password

Use the following login credentials as needed:

To enter your password, place your cursor in the Enter password box and click on the password below.

Username: Contoso/Administrator

Password: Passw0rd!

The following information is for technical support purposes only:

Lab Instance: 11145882

Users in the Finance group report that they cannot copy files to Client1Finance.

You need to resolve the issue.

To complete this task, sign in to the required computer or computers.

35. Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.

You have two computers named Computer1 and Computer2 that run Windows 10.

You have an Azure Active Directory (Azure AD) user account named [email protected] that is in the local Administrators group on each computer.

You sign in to Computer1 by using [email protected].

You need to ensure that you can use Event Viewer on Computer1 to connect to the event logs on Computer2.

Solution: On Computer2, you create a Windows Defender Firewall rule that allows eventwr.exe.

Does this meet the goal?

36. You have a computer that runs Windows 10.

You can start the computer but cannot sign in.

You need to start the computer into the Windows Recovery Environment (WinRE).

What should you do?

37. Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.

A user named User1 has a computer named Computer1 that runs Windows 10. Computer1 is joined to an Azure Active Directory (Azure AD) tenant named contoso.com. User1 joins Computer1 to contoso.com by using [email protected].

Computer1 contains a folder named Folder1. Folder1 is in drive C and is shared as Share1.

Share1 has the permission shown in the following table.

A user named User2 has a computer named Computer2 that runs Windows 10. User2 joins Computer2 to contoso.com by using [email protected].

User2 attempts to access Share1 and receives the following error message: “The username or password is incorrect.”

You need to ensure that User2 can connect to Share1.

Solution: In Azure AD, you create a group named Group1 that contains User1 and User2.

You grant Group1 Change access to Share1.

Does this meet the goal?

38. HOTSPOT

Your network contains an Active Directory domain. the domain contains a computer named Computer1 that runs Windows 10.

The domain contains the users shown in the following table.

Computer contains the shared folders shown in the following table.

The shared folders have the permissions shown in the following table.

For each of the following statements, select Yes if the statement is true. Otherwise select No. NOTE: Each correct selection is worth one point.

39. HOTSPOT

You deploy Windows 10 to a new computer named Computer1.

You sign in to Computer1 and create a user named User1.

You create a file named LayoutModification.xml in the C:UsersDefaultAppDataLocalMicrosoftWindowsShellfolder. LayoutModification.xml contains the following markup.

What is the effect of the configuration? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point.

40. Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.

You have a computer that runs Windows 10. The computer contains a folder named D:Scripts. D:Scripts contains several PowerShell scripts.

You need to ensure that you can run the PowerShell scripts without specifying the full path to the scripts. The solution must persist between PowerShell sessions.

Solution: At a command prompt, you run set.exe path=d:scripts.

Does this meet the goal?

41. You have a computer named Computer1 that runs Windows 10.

From Event Viewer on Computer1, you have a task named Action1 that is attached to the following event:

✑ Log: System

✑ Source: Kernel-General

✑ Event ID: 16

You need to modify the settings of Action1.

What should you use?

42. HOTSPOT

You have a computer that runs Windows 10.

You view the domain services status as shown in the following exhibit.

Use the drop-down menus to select the answer choice that completes each statement based on the information presented in the graphic. NOTE: Each correct selection is worth one point.

43. You have a computer that runs Windows 10.

The computer fails to start, and you receive the following error message: “BOOTMGR image is corrupt. The system cannot boot”.

You need to repair the system partition.

Which command should you run from Windows Recovery Environment (WinRE)?

44. HOTSPOT

You are planning a recovery strategy for computers that run Windows 10.

You need to create recovery procedures to roll back feature updates and quality updates.

What should you include in the procedures? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point.

45. CORRECT TEXT

Please wait while the virtual machine loads. Once loaded, you may proceed to the lab section. This may take a few minutes, and the wait time will not be deducted from your overall test time.

When the Next button is available, click it to access the lab section. In this section, you will perform a set of tasks in a live environment. While most functionality will be available to you as it would be in a live environment, some functionality (e.g., copy and paste, ability to

navigate to external websites) will not be possible by design.

Scoring is based on the outcome of performing the tasks stated in the lab. In other words, it doesn’t matter how you accomplish the task, if you successfully perform it, you will earn credit for that task.

Labs are not timed separately, and this exam may more than one lab that you must complete. You can use as much time as you would like to complete each lab. But, you should manage your time appropriately to ensure that you are able to complete the lab(s) and all other sections of the exam in the time provided.

Please note that once you submit your work by clicking the Next button within a lab, you will NOT be able to return to the lab.

Username and password

Use the following login credentials as needed:

To enter your password, place your cursor in the Enter password box and click on the password below.

Username: Contoso/Administrator

Password: Passw0rd!

The following information is for technical support purposes only:

Lab Instance: 10921597

You need to connect to your company’s network and create a VPN connection on Client2 named VPN1 that meets the following requirements:

VPN1 must connect to a server named vpn.contoso.com.

Only traffic to your company’s network must be routed through VPN1.

To complete this task, sign in to the required computer or computers.

46. HOTSPOT

Your network contains an Active Directory domain that contains the objects shown in the following table.

Computer1 contains the shared folders shown in the following table.

The computers have the network configurations shown in the following table.

For each of the following statements, select Yes if the statement is true. Otherwise, select No. NOTE: Each correct selection is worth one point.

47. Your network contains an Active Directory domain named contoso.com. The domain contains named Computer1 that runs Windows 10.

On Computer1, you create an NTFS folder and assign Full control permissions to Everyone.

You share the folder as Share1 and assign the permissions shown in the following table.

When accessing Share1, which two actions can be performed by User1 but not by User2? Each correct answer presents part of the solution. NOTE: Each correct selection is worth one point.

48. You have a computer named Computer1 that runs Windows 10.

On Computer1, you create the local users shown in the following table.

Which three user profiles will persist after each user signs out? Each correct answer presents part of the solution. NOTE: Each correct selection is worth one point.

49. You have a computer that runs Windows 10 and has File History enabled. File History is configured to save copies of files every 15 minutes.

At 07:55, you create a file named D:Folder1File1.docx.

You add D:Folder1 to File History and manually run File History at 08:00.

You modify File1.docx at the following times:

✑ 08:05

✑ 08:12

✑ 08:20

✑ 08:24

✑ 08:50

At 08:55, you attempt to restore File1.docx.

How many previous versions of File1.docx will be available to restore?

50. You have a computer named Computer1 that runs Windows 10.

You complete a full back up of Computer1 to an external USB drive. You store the USB drive offsite.

You delete several files from your personal Microsoft OneDrive account by using File Explorer, and then you empty the Recycle Bin on Computer1.

You need to recover the files 60 days after you deleted them in the least amount of time possible.

What should you use?

51. You deploy 100 computers that run Windows 10. Each computer has a cellular connection and a Wi-Fi

connection.

You need to prevent the computers from using the cellular connection unless a user manually connects to the cellular network.

What should you do?

52. You have a computer named LON-CL1.Adatum.com that runs Windows 10.

From Event Viewer, you create a custom view named View1 that has the following filter:

✑ User: User1

✑ Logged: Any time

✑ Event logs: System

✑ Computer: LON-CL1

✑ Event IDs: 10000 C 11000

✑ Event level: Error, Verbose

You open Event Viewer and discover the event shown in the exhibit. (Click the Exhibit tab.)

The event does not appear in View1.

You need to ensure that the event appears in View1.

What should you do?

53. You have a computer named Computer1 that runs Windows 10. Computer1 belongs to a workgroup.

You run the following commands on Computer1.

New-LocalUser CName User1 CNoPassword

Add-LocalGroupMember User CMember User1

What is the effect of the configurations?

54. HOTSPOT

Your network contains an Active Directory domain. The domain contains a group named Group1.

All the computers in the domain run Windows 10. Each computer contains a folder named C:Documents that has the default NTFS permissions set.

You add a folder named C:DocumentsTemplates to each computer.

You need to configure the NTFS permissions to meet the following requirements:

All domain users must be able to open the files in the Templates folder.

Only the members of Group1 must be allowed to edit the files in the Templates folder.

How should you configure the NTFS settings on the Templates folder? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point.

55. Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.

A user named User2 has a computer named Computer2 that runs Windows 10. User2 joins Computer2 to contoso.com by using [email protected].

Computer1 contains a folder named Folder1. Folder1 is in drive C and is shared as Share1.

Share1 has the permission shown in the following table.

A user named User2 has a computer named Computer2 that runs Windows 10. User2 joins Computer2 to contoso.com by using [email protected].

User2 attempts to access Share1 and receives the following error message: “The username or password is incorrect.”

You need to ensure that User2 can connect to Share1.

Solution: You create a local group on Computer1 and add the Guest account to the group.

You grant the group Modify access to Share1.

Does this meet the goal?

56. You have 200 computers that run Windows 10 and are joined to an Active Directory domain.

You need to enable Windows Remote Management (WinRM) on all the computers by using Group Policy.

Which three actions should you perform? Each correct answer presents part of the solution. NOTE: Each correct selection is worth one point.

57. Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.

You have a computer named Computer1 that runs Windows 10.

A service named Application1 is configured as shown in the exhibit.

You discover that a user used the Service1 account to sign in to Computer1 and deleted some files.

You need to ensure that the identity used by Application1 cannot be used by a user to sign in to sign in to the desktop on Computer1. The solution must use the principle of least privilege.

Solution: On Computer1, you assign Service1 the deny log on as a service user right.

Does this meet the goal?

58. You have several computers that run Windows 10. The computers are in a workgroup and have BitLocker Drive Encryption (BitLocker) enabled.

You join the computers to Microsoft Azure Active Directory (Azure AD).

You need to ensure that you can recover the BitLocker recovery key for the computers from Azure AD.

What should you do first?

59. You are a network administrator at your company.

The company uses an application that checks for network connectivity to a server by

sending a ping request to the IPv6 address of the server replies, the application loads.

A user cannot open the application.

You manually send the ping request from the computer of the user and the server does not reply. You send the ping request from your computer and the server replies.

You need to ensure that the ping request works from the user’s computer.

Which Windows Defender firewall rule is a possible cause of the issue?

60. Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.

You manage devices that run Windows 10.

Ten sales users will travel to a location that has limited bandwidth that is expensive. The sales users will be at the location for three weeks.

You need to prevent all Windows updates from downloading for the duration of the trip. The solution must not prevent access to email and the Internet.

Solution: From Network & Internet in the Settings app, you set a data limit.

Does this meet the goal?

61. You plan to deploy Windows 10 to 100 secure computers.

You need to select a version of Windows 10 that meets the following requirements:

✑ Uses Microsoft Edge as the default browser

✑ Minimizes the attack surface on the computer

✑ Supports joining Microsoft Azure Active Directory (Azure AD)

✑ Only allows the installation of applications from the Microsoft Store

What is the best version to achieve the goal? More than one answer choice may achieve the goal. Select the BEST answer.

62. HOTSPOT

You have a computer named Computer1 that runs Windows 10.

Computer1 contains the folders shown in the following table.

You include Folder1, Folder2, and Folder3 in the Documents library.

You configure File History to run every 15 minutes, and then turn on File History.

For each of the following statements, select Yes if the statement in true. Otherwise, select No. NOTE: Each correct selection is worth one point.

63. CORRECT TEXT

Please wait while the virtual machine loads. Once loaded, you may proceed to the lab section. This may take a few minutes, and the wait time will not be deducted from your overall test time.

When the Next button is available, click it to access the lab section. In this section, you will perform a set of tasks in a live environment. While most functionality will be available to you as it would be in a live environment, some functionality (e.g., copy and paste, ability to navigate to external websites) will not be possible by design.

Scoring is based on the outcome of performing the tasks stated in the lab. In other words, it doesn’t matter how you accomplish the task, if you successfully perform it, you will earn credit for that task.

Labs are not timed separately, and this exam may more than one lab that you must complete. You can use as much time as you would like to complete each lab. But, you should manage your time appropriately to ensure that you are able to complete the lab(s) and all other sections of the exam in the time provided.

Please note that once you submit your work by clicking the Next button within a lab, you will NOT be able to return to the lab.

Username and password

Use the following login credentials as needed:

To enter your password, place your cursor in the Enter password box and click on the password below.

Username: Contoso/Administrator

Password: Passw0rd!

The following information is for technical support purposes only:

Lab Instance: 10921597

You need to identify the total number of events that have Event ID 63 in the Application event log. You must type the number of identified events into C:Folder1FileA.txt.

To complete this task, sign in to the required computer or computers and perform the required action.

64. CORRECT TEXT

Please wait while the virtual machine loads. Once loaded, you may proceed to the lab section. This may take a few minutes, and the wait time will not be deducted from your overall test time.

When the Next button is available, click it to access the lab section. In this section, you will perform a set of tasks in a live environment. While most functionality will be available to you as it would be in a live environment, some functionality (e.g., copy and paste, ability to navigate to external websites) will not be possible by design.

Scoring is based on the outcome of performing the tasks stated in the lab. In other words, it doesn’t matter how you accomplish the task, if you successfully perform it, you will earn credit for that task.

Labs are not timed separately, and this exam may more than one lab that you must complete. You can use as much time as you would like to complete each lab. But, you should manage your time appropriately to ensure that you are able to complete the lab(s) and all other sections of the exam in the time provided.

Please note that once you submit your work by clicking the Next button within a lab, you will NOT be able to return to the lab.

Username and password

Use the following login credentials as needed:

To enter your password, place your cursor in the Enter password box and click on the password below.

Username: Contoso/Administrator

Password: Passw0rd!

The following information is for technical support purposes only:

Lab Instance: 11145882

Administrators report that they cannot use Event Viewer to remotely view the event logs on Client3.

You need to ensure that the administrators can access the event logs remotely on Client3.

The solution must ensure that Windows Firewall remains enabled.

To complete this task, sign in to the required computer or computers.

65. HOTSPOT

You have a computer that runs Windows 10. The computer contains a folder named C:ISOs that is shared in ISOs.

You run several commands on the computer as shown in the following exhibit.

Use the drop-down menus to select the answer choice that completes each statement based on the information presented in the graphic. NOTE: Each correct selection is worth one point.

66. Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.

You have a laptop named Computer1 that runs Windows 10.

When in range, Computer1 connects automatically to a Wi-Fi network named Wireless1.

You need to prevent Computer1 from automatically connecting to Wireless1.

Solution: From the Settings app, you modify the properties of the Wireless1 known Wi-Fi network.

Does this meet the goal?

67. You have an Azure Active Directory (Azure AD) tenant named contoso.com that contains a user named UserA.

You have two computers named Computer1 and Computer2 that run Windows 10 and are joined to contoso.com.

You need to ensure that UserA can connect to Computer2 from Computer1 by using Remote Desktop.

Which three actions should you perform? Each correct answer presents part of the solution. NOTE: Each correct selection is worth one point.

68. HOTSPOT

You are a network administrator at your company.

A user attempts to start a computer and receives the following error message: “Bootmgr is missing.”

You need to resolve the issue.

You start the computer in the recovery mode.

Which command should you run next? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point.

69. CORRECT TEXT

Please wait while the virtual machine loads. Once loaded, you may proceed to the lab section. This may take a few minutes, and the wait time will not be deducted from your overall test time.

When the Next button is available, click it to access the lab section. In this section, you will perform a set of tasks in a live environment. While most functionality will be available to you as it would be in a live environment, some functionality (e.g., copy and paste, ability to navigate to external websites) will not be possible by design.

Scoring is based on the outcome of performing the tasks stated in the lab. In other words, it doesn’t matter how you accomplish the task, if you successfully perform it, you will earn credit for that task.

Labs are not timed separately, and this exam may more than one lab that you must complete. You can use as much time as you would like to complete each lab. But, you should manage your time appropriately to ensure that you are able to complete the lab(s) and all other sections of the exam in the time provided.

Please note that once you submit your work by clicking the Next button within a lab, you will NOT be able to return to the lab.

Username and password

Use the following login credentials as needed:

To enter your password, place your cursor in the Enter password box and click on the password below.

Username: Contoso/Administrator

Password: Passw0rd!

The following information is for technical support purposes only:

Lab Instance: 11145882

A web service installed on Client1 is used for testing.

You discover that users cannot connect to the web service by using HTTP.

You need to allow inbound HTTP connections to Client1.

To complete this task, sign in to the required computer or computers.

70. HOTSPOT

Your network contains the segments shown in the following table.

You have computers that run Windows 10 and are configured as shown in the following table.

Windows Defender Firewall has the File and Printer Sharing allowed apps rule shown in the following table.

For each of the following statements, select Yes if the statement is true. Otherwise, select No. NOTE: Each correct selection is worth one point.

71. Your company has a Remote Desktop Gateway (RD Gateway).

You have a server named Server1 that is accessible by using Remote Desktop Services (RDS) through the RD Gateway.

You need to configure a Remote Desktop connection to connect through the gateway.

Which setting should you configure?

72. HOTSPOT

You have a computer named Computer1 that runs Windows 10.

Computer1 contains a registry key named Key1 that has the values shown in the exhibit. (Click the Exhibit tab.).

You have a Registration Entries (.reg) file named File1.reg that contains the following text.

Windows Registry Editor Version 5.00

[HKEY_LOCAL_MACHINESOFTWAREKey1]

"String1"=-@="2"

You need to identify the effect of importing File1.reg to Computer1.

What should you identify? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point.

73. CORRECT TEXT

Please wait while the virtual machine loads. Once loaded, you may proceed to the lab section. This may take a few minutes, and the wait time will not be deducted from your overall test time.

When the Next button is available, click it to access the lab section. In this section, you will perform a set of tasks in a live environment. While most functionality will be available to you as it would be in a live environment, some functionality (e.g., copy and paste, ability to navigate to external websites) will not be possible by design.

Scoring is based on the outcome of performing the tasks stated in the lab. In other words, it doesn’t matter how you accomplish the task, if you successfully perform it, you will earn credit for that task.

Labs are not timed separately, and this exam may more than one lab that you must complete. You can use as much time as you would like to complete each lab. But, you should manage your time appropriately to ensure that you are able to complete the lab(s) and all other sections of the exam in the time provided.

Please note that once you submit your work by clicking the Next button within a lab, you will NOT be able to return to the lab.

Username and password

Use the following login credentials as needed:

To enter your password, place your cursor in the Enter password box and click on the password below.

Username: Contoso/Administrator

Password: Passw0rd!

The following information is for technical support purposes only:

Lab Instance: 11145882

Users who attempt to sign in to the domain from Client3 report that the sign-ins fail.

You need to resolve the issue.

To complete this task, sign in to the required computer or computers.

74. User1 is a member of the Administrators group on a computer that runs Windows 10.

When User1 attempts to view the security settings of a folder named C:SecretData, the user receives the message in the Security exhibit.

On the computer, you sign in as a member of the Administrators group and view the permissions to C:SecretData as shown in the Permissions exhibit.

You need to restore Use1's access to C:SecretData.

What should you do first?

75. CORRECT TEXT

Please wait while the virtual machine loads. Once loaded, you may proceed to the lab section. This may take a few minutes, and the wait time will not be deducted from your overall test time.

When the Next button is available, click it to access the lab section. In this section, you will perform a set of tasks in a live environment. While most functionality will be available to you as it would be in a live environment, some functionality (e.g., copy and paste, ability to navigate to external websites) will not be possible by design.

Scoring is based on the outcome of performing the tasks stated in the lab. In other words, it doesn’t matter how you accomplish the task, if you successfully perform it, you will earn credit for that task.

Labs are not timed separately, and this exam may more than one lab that you must complete. You can use as much time as you would like to complete each lab. But, you should manage your time appropriately to ensure that you are able to complete the lab(s) and all other sections of the exam in the time provided.

Please note that once you submit your work by clicking the Next button within a lab, you will NOT be able to return to the lab.

Username and password

Use the following login credentials as needed:

To enter your password, place your cursor in the Enter password box and click on the password below.

Username: Contoso/Administrator

Password: Passw0rd!

The following information is for technical support purposes only:

Lab Instance: 11145882

You need to ensure that C:ScriptsConfigure.ps1 runs every time a user sign in to Client2.

To complete this task, sign in to the required computer or computers.

76. Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.

You manage devices that run Windows 10.

Ten sales users will travel to a location that has limited bandwidth that is expensive. The sales users will be at the location for three weeks.

You need to prevent all Windows updates from downloading for the duration of the trip. The solution must not prevent access to email and the Internet.

Solution: From Network & Internet in the Settings app, you set the network connections as metered connections.

Does this meet the goal?

77. HOTSPOT

Your network contains an Active Directory forest. The forest contains a root domain named contoso.com and a child domain named corp.contoso.com.

You have a computer named Computer1 that runs Windows 10. Computer1 is joined to the corp.contoso.com domain.

Computer1 contains a folder named Folder1. In the Security settings of Folder1, Everyone is assigned the Full control permissions.

On Computer1, you share Folder1 as Share1 and assign the Read permissions for Share1 to the Users group.

For each of the following statements, select Yes if the statement is true. Otherwise, select No. NOTE: Each correct selection is worth one point.

78. HOTSPOT

Your network contains an Active Directory domain named adatum.com.

The domain contains the users shown in the following table.

The domain contains a computer named Computer1 that runs Windows10.

Computer1 has a file named File1.txt that has the permissions shown in the exhibit. (Click the Exhibit tab.)

For each of the following statements, select Yes if the statement is true. Otherwise, select No. NOTE: Each correct selection is worth one point.

79. Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.

Your network contains an Active Directory domain named contoso.com.

The domain contains the users shown in the following table.

You have a computer named Computer1 that runs Windows 10 and is in a workgroup.

A local standard user on Computer1 named User1 joins the computer to the domain and uses the credentials of User2 when prompted.

You need to ensure that you can rename Computer1 as Computer33.

Solution: You use the credentials of User1 on Computer1.

Does this meet the goal?

80. CORRECT TEXT

Please wait while the virtual machine loads. Once loaded, you may proceed to the lab section. This may take a few minutes, and the wait time will not be deducted from your overall test time.

When the Next button is available, click it to access the lab section. In this section, you will perform a set of tasks in a live environment. While most functionality will be available to you as it would be in a live environment, some functionality (e.g., copy and paste, ability to navigate to external websites) will not be possible by design.

Scoring is based on the outcome of performing the tasks stated in the lab. In other words, it doesn’t matter how you accomplish the task, if you successfully perform it, you will earn credit for that task.

Labs are not timed separately, and this exam may more than one lab that you must complete. You can use as much time as you would like to complete each lab. But, you should manage your time appropriately to ensure that you are able to complete the lab(s) and all other sections of the exam in the time provided.

Please note that once you submit your work by clicking the Next button within a lab, you will NOT be able to return to the lab.

Username and password

Use the following login credentials as needed:

To enter your password, place your cursor in the Enter password box and click on the password below.

Username: Contoso/Administrator

Password: Passw0rd!

The following information is for technical support purposes only:

Lab Instance: 10921597

You need to ensure that Client3 starts in safe mode automatically the next time the computer restarts. After completing the task, you must NOT restart Client3.

To complete this task, sign in to the required computer or computers.

81. HOTSPOT

You have a computer named Computer1 that runs Windows 10. Computer1 is in a workgroup.

Computer1 contains the local users shown in the following table.

You create a folder named Folder1 that has the permissions shown in the following table.

You create a file named File1.txt in Folder1 and allow Group2 Full control permissions to File1.txt.

For each of the following statements, select Yes if the statement is true. Otherwise, select No. NOTE: Each correct selection is worth one point.


 

The Most Update MB-700 Dumps Questions With Verified Answers
Updated PL-400 Dumps Questions For Microsoft Power Platform Developer Exam

Add a Comment

Your email address will not be published. Required fields are marked *