Text Material Preview
Dumpsinfo is a good website providing the latest exams information and dumps questions for all hot IT certification exams, such as Microsoft, Cisco, Huawei, IBM, VMware, Fortinet, and so on. Features of Dumpsinfo’s products Instant Download Free Update in 3 Months Money back guarantee PDF and Software 24/7 Customer Support Besides, Dumpsinfo also provides unlimited access. You can get all Dumpsinfo files at lowest price. Windows Client MD-100 exam free dumps questions are available below for you to study. Full version: MD-100 Exam Dumps Questions 1. At Members tab, click Add. 2. Open PowerShell as Administrator. 3.You have a computer named Computer1 that runs Windows 11. You need to ensure that you can use the ping command to validate network connectivity to Computer 1. How should you configure Windows Defender Firewall on Computer1? A. Enable the Core Networking - Teredo (UDP-ln) inbound rule. B. Create a new connection security rule. C. Enable the File and Printer Sharing (Echo Request - ICMPv4-ln) inbound rule. D. Add a new port rule to allow ports 80 and 443. Answer: C 1 / 39 https://www.dumpsinfo.com/vendors/microsoft/ https://www.dumpsinfo.com/vendors/cisco/ https://www.dumpsinfo.com/vendors/huawei/ https://www.dumpsinfo.com/vendors/ibm/ https://www.dumpsinfo.com/vendors/vmware/ https://www.dumpsinfo.com/vendors/fortinet/ https://www.dumpsinfo.com/unlimited-access/ https://www.dumpsinfo.com/exam/md-100 4. Under the Computer Configuration node, expand the Administrative Templates node, then expand the Windows Components node, then select the Event Forwarding node. 5.Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution. After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen. You have two computers named Computer1 and Computer2 that run Windows 10. You have an Azure Active Directory (Azure AD) user account named admin@contoso.com that is in the local Administrators group on each computer. You sign in to Computer1 by using admin@contoso.com. You need to ensure that you can use Event Viewer on Computer1 to connect to the event logs on Computer2. Solution: On Computer2, you run the winrm quickconfig command. Does this meet the goal? A. Yes B. No Answer: B Explanation: Windows Remote Management is a component of the Windows Hardware Management features that manage server hardware locally and remotely. References: https://docs.microsoft.com/en-us/windows/win32/winrm/about-windows-remote- management 6.HOTSPOT You have a workgroup computer that runs Windows 10. You need to configure User Account Control (UAC) to meet the following requirements: • Ensure that the local Administrator account is always be prompted to approve elevation of privilege. • Enforce public key infrastructure (PKI) signature checks for any interactive apps that request elevation of privilege. Which two policy settings should you modify? To answer, select the settings in the answer area. NOTE: Each correct selection is worth one point. Answer: 2 / 39 7.Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution. After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen. You have two computers named Computer1 and Computer2 that run Windows 10. You have an Azure Active Directory (Azure AD) user account named admin@contoso.com that is in the local Administrators group on each computer. You sign in to Computer1 by using admin@contoso.com. You need to ensure that you can use Event Viewer on Computer1 to connect to the event logs on Computer2. Solution: On Computer2, you run the Enable-PSRemoting cmdlet. Does this meet the goal? A. Yes B. No Answer: A Explanation: The Enable-PSRemoting cmdlet configures the computer to receive PowerShell remote commands that are sent by using the WS-Management technology. References: https://docs.microsoft.com/en-us/powershell/module/microsoft.powershell.core/enable- psremoting?view=powershell-7 8.You have a Microsoft 365 tenant that contains 70 remote users. The remote users work from various locations. Recently, each remote user purchased a personal computer that runs Windows 10 Home. You need to configure the VPN settings on the computers automatically by using the least amount of administrative effort. What should you use? A. an unattend answer file B. a Group Policy Object (GPO) C. Windows Autopilot D. a provisioning package Answer: D Explanation: Reference: https://docs.microsoft.com/en-us/windows/configuration/provisioning- packages/provisioning-packages 3 / 39 9.Your network contains an Active Directory domain. The domain contains a computer named Computer1 that runs Windows 10. Computer1 contains a folder named Folder1. You plan to share Folder1. Everyone will have Read share permissions, and administrators will have Full control share permission. You need to prevent the share from appearing when users browse the network. What should you do? A. Enable access-based enumeration. B. Deny the List NTFS permissions on Folded. C. Add Folded to a domain-based DFS namespace. D. Name the share Folded$. Answer: D Explanation: Appending a dollar sign to share name prevents a share from appearing when users browse the network. 10.Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution. After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen. Your network contains an Active Directory domain. The domain contains a computer named Computer1 that runs Windows 8.1. Computer1 has apps that are compatible with Windows 10. You need to perform a Windows 10 in-place upgrade on Computer1. Solution: You copy the Windows 10 installation media to a network share. From Windows 8.1 on Computer1, you run setup.exe from the network share. Does this meet the goal? A. Yes B. No Answer: B 11.Your network contains an Active Directory domain. The domain contains 1,000 computers that run Windows 10. You configure Microsoft Edge settings by using domain and local Group Policy Objects (GPOs). You need to generate a report that contains all the Microsoft Edge policy settings applied to a computer. What should you do? A. From Microsoft Edge, open edge://settings. B. From a command prompt, run scanstate and specify the /apps parameter. C. From a command prompt, run scanstate and specify the /genconfig parameter. D. From a command prompt, run gpresult and specify the /H parameter. Answer: D 12.DRAG DROP You enable Windows PowerShell remoting on a computer that runs Windows 10. You need to limit which PowerShell cmdlets can be used in a remote session. Which three actions should you perform in sequence? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order. 4 / 39 Answer: Explanation: 13.You deploy Windows 10 to several computers. The computers will be used by users who frequently present their desktop to other users. You need to prevent applications from generatingtoast notifications in the notification area. Which settings should you configure from the Settings app? 5 / 39 A. Shared experiences B. Privacy C. Focus assist D. Tablet mode Answer: C Explanation: Focus Assist will automatically hide incoming notifications, so they don’t pop up and distract you while you’re playing a game, giving a presentation, or using a full-screen application. 14.HOTSPOT You are a network administrator at your company. A user attempts to start a computer and receives the following error message: “Bootmgr is missing.” You need to resolve the issue. You start the computer in recovery mode. Which command should you run next? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point. Answer: Explanation: References: https://neosmart.net/wiki/bootrec/#Bootrec_in_Windows10 15.Note: This question is part of a series of questions that present the same scenario. Each question 6 / 39 in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution. After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen. You have a computer named Computer1 that runs Windows 10. You test Windows updates on Computer1 before you make the updates available to other users at your company. You install a quality update that conflicts with a customer device driver. You need to remove the update from Computer1. Solution: From System Restore, you revert the system state to a restore point that was created before the update was installed. Does this meet the goal? A. Yes B. No Answer: B Explanation: References: https://support.microsoft.com/en-us/help/934307/description-of-the-windows-update- standalone-installer-in-windows 16.Your company has an on-premises network that contains an Active Directory domain. The domain is synced to Microsoft Azure Active Directory (Azure AD). All computers in the domain run Windows 10 Enterprise. You have a computer named Computer1 that has a folder named C:\Folder1. You want to use File History to protect C:\Folder1. Solution: You enable File History on Computer1. You then encrypt the contents of Folder1. Does this meet the goal? A. Yes B. No Answer: B Explanation: File History only backs up copies of files that are in Libraries, and Desktop folders and the OneDrive files available offline on your PC. If you have files or folders elsewhere that you want backed up, you can add them to one of these folders. Reference: https://support.microsoft.com/en-us/help/17128/windows-8-file-history 17.Your network an Active Directory domain named adatum.com. The domain contains 50 computers that runs Windows 8.1. The computer has locally installed desktop application that are compatible with Windows 10. You need to upgrade the computers to windows 10, The solution must preserver the locally installed desktop applications. Solution. You use System image manager (Windows SIM) to create an answer file. You use Windows Deployment Service (WDS) to add an install image. You start each computer by using PXE, and then install the image. Does this meet the goal? A. Yes B. No Answer: A 18.You need to ensure that User1 can perform a Resultant Set of Policy (RSOP) analysis for User2. 7 / 39 The solution must use the principle of least privilege. What should you do first? A. Add User1 to the local Administrators group. B. Add User2 to the local Performance Monitor Users group. C. Run RSoP from an elevated-privilege account. D. Add User1 to the local Performance Monitor Users group. Answer: D 19.Your network contains an Active Directory domain. The domain contains computers that run Windows 10. You must ensure that Windows BitLocker Drive Encryption is enabled on all client computers, even though a Trusted Platform Module (TPM) chip is installed in only some of them. You need to accomplish this goal by using one Group Policy object (GPO). What should you do? A. Enable the Allow enhanced PINs for startup policy setting, and select the Allow BitLocker without a compatible TPM check box B. Enable the Enable use of BitLocker authentication requiring preboot keyboard input on slates policy setting, and select the Allow BitLocker without a compatible TPM check box C. Enable the Require additional authentication at startup policy setting, and select the Allow BitLocker without a compatible TPM check box D. Enable the Control use of BitLocker on removable drives policy setting, and select the Allow BitLocker without a compatible TPM check box Answer: C Explanation: We need to allow Windows BitLocker Drive Encryption on all client computers (including client computers that do not have Trusted Platform Module (TPM) chip). We can do this by enabling the option to allow BitLocker without a compatible TPM in the group policy. The "Allow BitLocker without a compatible TPM" option is a checkbox in the "Require additional authentication at startup" group policy setting. To access the "Allow BitLocker without a compatible TPM" checkbox, you need to first select Enabled on the "Require additional authentication at startup" policy setting. Reference: https://docs.microsoft.com/en-us/windows/security/information- protection/bitlocker/bitlocker-group-policy-settings#bkmk-unlockpol4 20.You have a computer named Computer1 that runs Windows 10. You restart Computer1 by using Advanced startup and select Boot log. In which folder is the boot log file stored? A. C:\ B. C:\Windows 8 / 39 C. C:\Windows\debug D. C:\Windows\Syscem32\LogFiles Answer: B Explanation: Reference: https://winaero.com/enable-boot-log-windows-10/ 21.You have 15 computers that run Windows 10. Each computer has two network interfaces named Interface1 and Interface2. You need to ensure that network traffic uses Interface1, unless Interface1 is unavailable. What should you do? A. Run the Set-NetIPInterface CInterfaceAlias Interface1 CInterfaceMetric 1 command. B. Run the Set-NetAdapterBinding CName Interface2 CEnabled $true CComponentID ms_tcpip CThrottleLimit 0 command. C. Set a static IP address on Interface 1. D. From Network Connections in Control Pane, modify the Provider Order. Answer: A Explanation: References: https://tradingtechnologies.atlassian.net/wiki/spaces/KB/pages/27439127/How+to+Change+Network+ Adapter+Priorities+in+Windows+10 https://docs.microsoft.com/en-us/powershell/module/nettcpip/set-netipinterface?view=win10-ps 22.Your network contains an Active directory domain. The domain contains 1,000 computers that run Windows 10. You need to prevent computers of the research department from appearing in network in File Explorer. What should you do? A. Disable the Network List Service B. Configure DNS to use an external provider C. Turn off network discovery D. Modify the %systemroot%system32\drivers\etc\Network ile Answer: C 23.Your network contains an Active Directory domain named Contoso.com. A user named User1 has a personal computer named Computer that runs Windows 10 Pro. User1 has a VPN connection to the corporate network. You need to ensure that when User1 connection to the corporate network. You need to ensure that when user1 connects to the VPN, network traffic uses a proxy located in the corporate network. The solution must ensure that User1 can access the internet when disconnected from the VPN. What should you do? A. From the Settings app, modify the properties of the VPN connection. B. From the Setting app, modify proxy settings for the local computer. C. From Control panel, modify the properties of the VPN connection D. From Control Panel, modify the Windows Defender Firewall settings Answer: A 24.You are preparingto deploy Windows 10. 9 / 39 You download and install the Windows Assessment and Deployment Kit (Windows ADK). You need to create a bootable WinPE USB drive. What should you do first? A. Run the MakeWinPEMedia command. B. Download and install Windows Configuration Designer. C. Run the WPEUcil command. D. Download and install the WinPE add-on. Answer: D Explanation: WinPE used to be included in the Windows ADK. However, it is now provided as an add-on so the first step is to download and install the add-on. References: https://docs.microsoft.com/en-us/windows-hardware/manufacture/desktop/winpe-create- usb-bootable-drive https://docs.microsoft.com/en-us/windows-hardware/get-started/adk-install 25. Export the start layout to a file 26.HOTSPOT You have 100 computers that run Windows 10. You have no servers. All the computers are joined to Microsoft Azure Active Directory (Azure AD). The computers have different update settings, and some computers are configured for manual updates. You need to configure Windows Update. The solution must meet the following requirements: ✑ The configuration must be managed from a central location. ✑ Internet traffic must be minimized. ✑ Costs must be minimized. How should you configure Windows Update? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point. Answer: 10 / 39 Explanation: References: https://docs.microsoft.com/en-us/windows/deployment/update/waas-optimize-windows-10-updates https://docs.microsoft.com/en-us/windows/deployment/update/waas-delivery-optimization 27.A user purchases a new computer that has Windows 10 Home preinstalled. The computer has a biometric fingerprint reader. You need to ensure that the user can use the fingerprint reader to sign in to the computer by using an Azure Active Directory (Azure AD) account. What should you do first? A. Register the computer to Azure AD. B. Install the latest feature updates on the computer. C. Upgrade the computer to Windows 10 Enterprise. D. Upgrade the computer to Windows 10 Pro. Answer: D 28.HOTSPOT Your network contains an Active Directory domain named contoso.com. The domain contains two computers named Computerl and Computer2 that run Windows 10. The domain contains the users shown in the following table. The relevant group membership on Computed is shown in the following table. 11 / 39 The relevant group membership on Computed is shown in the following table. For each of the following statements, select Yes if the statement is true. Otherwise, select No. NOTE: Each correct selection is worth one point. Answer: 29.You have a computer named Computed that runs Windows 11. A feature update is installed on Computed. You need to use the Go back recovery option to revert to the previous version. For how many days will the Go back option be available? A. 10 B. 30 C. 90 D. 180 Answer: B 12 / 39 30.HOTSPOT You have a computer named Computer1 that runs Windows 10. Computer1 is in a workgroup. Computer1 contains the local users shown in the following table. Computer1 contains the folders shown in the following table. The Users group has Full control permissions to Folder1, Folder2, and Folder3. User1 encrypts two files named File1.docx and File2.docx in Folder1 by using EFS. Which users can move each file? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point. Answer: 13 / 39 Explanation: EFS works by encrypting a file with a bulk symmetric key. The symmetric key that is used to encrypt the file is then encrypted with a public key that is associated with the user who encrypted the file. Because the encryption & decryption operations are performed at a layer below NTFS, it is transparent to the user and all their applications. Box 1: User1, User2, and Administrator Box 2: User1, User2, and Administrator All three are members of the Users group that has Full control permissions to Folder1, Folder2, and Folder3. 31.HOTSPOT Your network contains an Active Directory domain. The domain contains the users shown in the following table. The domain contains a computer named Computer1. Computer1 contains the users shown in the following table. 14 / 39 On Computer1, you create a restore point named RP1. Which users can restore RP1 on Computer1? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point. Answer: Explanation: Graphical user interface, text, application Description automatically generated 32.Your network contains an Active Directory domain. All users have been issued with new computers that run Windows 10 Enterprise. All users have Microsoft 365 E3 licenses. A user named Mia Hamm has an Active Directory user account named MHamm and a computer named Computer1. Mia Hamm reports that Computer1 is not activated. You need to ensure that Mia Hamm can activate Computer1. What should you do? A. Assign a Windows 10 Enterprise license to MHamm, and then activate Computer1. B. From the Microsoft Deployment Toolkit (MDT), redeploy Computer1. C. From System Properties on Computer1, enter a Volume License Key, and then activate Computer1. D. Instruct Mia Hamm to perform a local AutoPilot Reset on Computer1, and then activate 15 / 39 Computer1. Answer: C 33.HOTSPOT You have two workgroup computers named Computer1 and Computer2 that run Windows 10. The computers contain the local security principals shown in the following table. Which security principals can be members of GroupA and GroupC? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point. Answer: 16 / 39 Explanation: Graphical user interface, text, application, chat or text message Description automatically generated 34.HOTSPOT You have a computer that runs Windows 10. The computer contains two local user accounts named User1 and User2. User2 is a member of the local Administrators group. User1 performs the actions shown in the following table. User2 performs the actions shown in the following table. 17 / 39 For each of the following statements, select Yes if the statement is true. Otherwise, select No. NOTE: Each correct selection is worth one point. Answer: Explanation: Graphical user interface, text, application Description automatically generated 35.You have a computer named Client1 that runs Windows 11. You perform the following actions on Client1: • Enable Hyper-V. • Create a virtual machine that runs Windows 11 Pro. You need to connect to VM1 by using enhanced session mode. What should you do first? A. Enable Remote Assistance on Client1. B. Enable Remote Assistance on VM1. C. Enable Remote Desktop on VM1. D. Enable Remote Desktop on Client1. Answer: B 18 / 39 36.CORRECT TEXT You have a computer named Computer1. Computer1 runs Windows 10 Pro. Computer1 has a cellular connection and a Wi-Fi connection. You want to prevent Computer1from using the cellular connection unless a you manually connects to the cellular network. What should you do? To complete this task, sign in to the required computer or computers. Answer: ✑ Select the Network icon on the lower right corner of the taskbar, and then select the cellular network icon. ✑ Clear the Let Windows manage this connection check box. 37.Your company has several mobile devices that run Windows 10. You need configure the mobile devices to meet the following requirements: ✑ Windows updates may only be download when mobile devices are connect to Wi-Fi. ✑ Access to email and the Internet must be possible at all times. What should you do? A. Open the Settingapp and select Update & Security. Then select and configure Change active hours. B. Open the Setting app and select Network & Internet. Then select Change connection properties, and set the Metered connection option for cellular network connections to On. C. Open the Setting app and select Network & Internet Then select Data Usage and set a data limit. D. Open the Setting app and select Update & Security. Then select and configure Delivery Optimization. Answer: B Explanation: Reference: https://www.makeuseof.com/tag/5-ways-temporarily-turn-off-windows-update-windows-10/ 38.Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution. After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen. You have a computer named Computer1 that runs Windows 10. You test Windows updates on Computer1 before you make the updates available to other computers. You install a quality update that conflicts with a customer device driver. You need to remove the update from Computer1. Solution: From an elevated command prompt, you run the vmic qfe delete command. Does this meet the goal? A. Yes B. No Answer: B 39.Your network contains an Active Directory domain. The domain contains a computer named Computer1 that runs Windows 10. The domain contains the users shown in the following table. 19 / 39 Computer1 has four printers as shown in the following table. Which printers will be available to User1 when the user signs in to Computer1? A. Printer3 only B. Printed and Printer3 only C. Printed, Printer2. and Printer3 only D. Printed, Printer3, and Printer4 only E. Printed, Printer2, Printer3, and Printer4 Answer: E 40.HOTSPOT You have a computer named Computer1 that runs Windows 10 and contains the following files: ✑ C:\Folder1\File1.bat ✑ C:\Folder1\File1.exe ✑ C:\Folder1\File1.cmd A user named User1 is assigned Read & execute to all the files. Computer1 is configured as shown in the exhibit. 20 / 39 Use the drop-down menus to select the answer choice that completes each statement based on the information presented in the graphic. NOTE: Each correct selection is worth one point. Answer: 21 / 39 Explanation: References: https://stackoverflow.com/questions/148968/windows-batch-files-bat-vs-cmd 41.Your network contains an Active Directory domain. The domain contains a user named User1. User1 creates a Microsoft account. User1 needs to sign in to cloud resources by using the Microsoft account without being prompted for credentials. Which settings should User1 configure? A. User Accounts in Control Panel B. Email & app accounts in the Settings app C. Users in Computer Management D. Users in Active Directory Users and Computers Answer: B Explanation: References: https://support.microsoft.com/en-za/help/4028195/microsoft-account-how-to-sign-in 42.CORRECT TEXT Please wait while the virtual machine loads. Once loaded, you may proceed to the lab section. This may take a few minutes, and the wait time will not be deducted from your overall test time. When the Next button is available, click it to access the lab section. In this section, you will perform a set of tasks in a live environment. While most functionality will be available to you as it would be in a live environment, some functionality (e.g., copy and paste, ability to navigate to external websites) will not be possible by design. Scoring is based on the outcome of performing the tasks stated in the lab. In other words, it doesn’t matter how you accomplish the task, if you successfully perform it, you will earn credit for that task. Labs are not timed separately, and this exam may more than one lab that you must complete. You can use as much time as you would like to complete each lab. But, you should manage your time appropriately to ensure that you are able to complete the lab(s) and all other sections of the exam in the time provided. Please note that once you submit your work by clicking the Next button within a lab, you will NOT be able to return to the lab. Username and password 22 / 39 Use the following login credentials as needed: To enter your password, place your cursor in the Enter password box and click on the password below. Username: Contoso/Administrator Password: Passw0rd! The following information is for technical support purposes only: Lab Instance: 11145882 23 / 39 24 / 39 Users in the Finance group report that they cannot copy files to Client1\Finance. You need to resolve the issue. 25 / 39 To complete this task, sign in to the required computer or computers. Answer: ✑ Open File Explorer. ✑ Browse and find the file or folder you want to have full access. ✑ Right-click it, and select Properties. ✑ Click the Security tab to access the NTFS permissions. ✑ Click the Advanced button. ✑ On the "Advanced Security Settings" page, you need to click the Change link, in the Owner's field. ✑ Click the Advanced button. ✑ On the "Select User or Group" page, click the Find Now button. ✑ From the search result, select your user account, and click OK. ✑ On the "Select User or Group" page, click OK. ✑ Click Apply. ✑ Click OK. ✑ Click OK again. ✑ Click OK one more time to complete this task. It's important to note that if you're taking ownership of a folder, you can check theReplace ownership on subcontainers and object option in the Advanced Security Settings page to take control of the subfolders inside of the folder. Now you'll need to grant full access control to your account, to do this use the following steps: ✑ Right-click the file or folder and select Properties. ✑ Click the Security tab to access the NTFS permissions. ✑ Click the Advanced button. ✑ Under the Permissions tab, click Add. ✑ Click Select a principal to add your user account. ✑ On the "Select User or Group" page, click the Find Now button. ✑ From the search result, select your user account, and click OK. ✑ On the "Select User or Group" page, click OK. ✑ On "Permission Entry", check the Full control option. ✑ Click OK. ✑ Click OK. ✑ Click Apply. ✑ Click OK. ✑ Click OK to close the file or folder properties to complete the task. You can now assign the necessary permissions to the Finance group. If you right-click on a file or folder, choose Properties and click on the Security tab, we can now try to edit some permissions. Go ahead and click the Edit button to get started. At this point, there are a couple of things you can do. Firstly, you’ll notice that the Allow column is probably greyed out and can’t be edited. This is because of the inheritance I was talking about earlier. However, you can check items on the Deny column. When you click the Add button, you have to type in the user name or group name into the box and then click on Check Names to make sure it’s correct. If you don’t remember the user or group name, click on the Advanced button and then just click Find Now. It will show you all the users and groups. Click OK and the user or group will be added to the access control list. Now you can check the Allow column or Deny column. 43.CORRECT TEXT Please wait while the virtual machine loads. Once loaded, you may proceed to the lab section. This may take a few minutes, and the wait time will not be deducted from your overall test time. When the Next button is available, click it to access the lab section. In this section, you will perform a 26 / 39 set of tasks in a live environment. While most functionality will beavailable to you as it would be in a live environment, some functionality (e.g., copy and paste, ability to navigate to external websites) will not be possible by design. Scoring is based on the outcome of performing the tasks stated in the lab. In other words, it doesn’t matter how you accomplish the task, if you successfully perform it, you will earn credit for that task. Labs are not timed separately, and this exam may more than one lab that you must complete. You can use as much time as you would like to complete each lab. But, you should manage your time appropriately to ensure that you are able to complete the lab(s) and all other sections of the exam in the time provided. Please note that once you submit your work by clicking the Next button within a lab, you will NOT be able to return to the lab. Username and password Use the following login credentials as needed: To enter your password, place your cursor in the Enter password box and click on the password below. Username: Contoso/Administrator Password: Passw0rd! The following information is for technical support purposes only: Lab Instance: 11145882 27 / 39 28 / 39 Users who attempt to sign in to the domain from Client3 report that the sign-ins fail. You need to resolve the issue. 29 / 39 To complete this task, sign in to the required computer or computers. Answer: ✑ Use a local administrator account to log on to the computer. ✑ Select Start, press and hold (or right-click) Computer > Properties. ✑ Select Change settings next to the computer name. ✑ On the Computer Name tab, select Change. ✑ Under the Member of heading, select Workgroup, type a workgroup name, and then select OK. ✑ When you are prompted to restart the computer, select OK. ✑ On the Computer Name tab, select Change again. ✑ Under the Member of heading, select Domain, and then type the domain name. ✑ Select OK, and then type the credentials of the user who has permissions in the domain. ✑ When you are prompted to restart the computer, select OK. ✑ Restart the computer. 44.You have a file named Reg1.reg that contains the following content. What is the effect of importing the file? A. A key named command will be renamed as notepad.exe. B. In a key named Notepad, the command value will be set to @="notepad.exe". C. In a key named command, the default value will be set to notepad.exe. Answer: C 45. Select the Remote Desktop Users and click OK. 46.You have a computer named Computer1 that runs Windows 10. You need to enable boot logging on Computer1. What should you do? A. At a command prompt, run the bcdboot.exe command and specify the /v parameter. B. From the Settings app, configure the Start settings. C. From System Properties in Control Panel, configure the Startup and Recovery settings. D. From System Configuration configure the Boot settings. Answer: D Explanation: Reference: https://www.windowscentral.com/how-enable-boot-log-windows-10 47.Your network contains an Active Directory domain. The domain contains a computer named Computer1 that runs Windows 10. 30 / 39 You need to view the settings to Computer1 by Group Policy objects (GPOs) in the domain and local Group Policies. Which command should you run? A. gpresult B. secedit C. gpupdate D. gpfixup Answer: A Explanation: References: https://docs.microsoft.com/en-us/windows-server/administration/windows- commands/gpresult 48.Your network contains an Active Directory domain. The domain contains a computer named Compurter1 that runs Windows 10. The domain contains the users shown in the following table. Computer has the local users shown in the following table. All users have Microsoft accounts. Which two user can be configured to sign in by using their Microsoft account? Each correct answer presents part of the solution. NOTE: Each correct selection is worth one point. A. User 1 B. User 2 C. User 3 D. User 4 E. User 5 Answer: C,E 49.You have a workgroup computer that runs Windows 10. You need to set the minimum password length to 12 characters. What should you use? A. Local Group Policy Editor B. User Accounts in Control Panel C. System Protection in System Properties D. Sign-in options in the Settings app Answer: A 31 / 39 50.Your network contains an Active Directory domain. The domain contains 1,000 computers that run Windows 10. You discover a known compatibility issue between a feature update and a device driver on the computers. You need to test the installation of the feature update on a test computer. Which Windows Update setting should you configure by using a Group Policy Object (GPO)? A. Automatic Updates detection frequency B. Disable safeguards for Feature Updates C. Select the target Feature Update version D. Reschedule Automatic Updates scheduled installations Answer: B Explanation: Reference: https://docs.microsoft.com/en-us/windows/deployment/update/safeguard-opt-out 51.Your network contains an Active Directory domain. The domain contains 1,000 computers that run Windows 10. You configure Microsoft Edge settings by using domain and local Group Policy Objects (GPOs). You need to generate a report that contains all the Microsoft Edge policy settings applied to a computer. What should you do? A. From PowerShell. run the Gec-GPO cmdlet. B. From PowerShell. run the Gec-GPOReporc cmdlet. C. From Microsoft Edge, open edge://policy. D. From the Start menu, select Group Policy Object Editor Answer: C Explanation: The Get-GPOReport cmdlet would generate a report for all domain group policy objects. However, this would not display the settings that are applied by local group policy objects. To display the settings applied by both domain and local GPOs, you would have to open Microsoft Edge and enter edge://policy in the address bar. 52.You have an Azure Active Directory (Azure AD) tenant named contoso.com that contains a user named UserA. You have two computers named Computer1 and Computer2 that run Windows 10 and are joined to contoso.com. You need to ensure that UserA can connect to Computer2 from Computer1 by using Remote Desktop. Which three actions should you perform? Each correct answer presents part of the solution. NOTE: Each correct selection is worth one point. A. On Computer1, modify the registry. B. On Computer2, modify the registry. C. On Computer1, modify the properties of UserA. D. On Computer1, enable Remote Desktop. E. On Computer2, modify the properties of UserA. F. On Computer 2, enable Remote Desktop. G. On Computer2, add the Everyone group to the Remote Desktop Users group. H. On Computer1, add the Everyone group to the Remote Desktop Users group. Answer: E,F,G Explanation: Reference: https://docs.microsoft.com/en-us/windows/client-management/connect-to-remote-aadj-pc 32 / 39 53.HOTSPOT You have 20 computers that run Windows 11. You need to enable Windows Sandbox on the computers. How should you complete the command? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point. Answer: Explanation: Box 1: Enable-WindowsOptionalFeature To Enable Windows 10 Sandbox with PowerShell, 54.HOTSPOT For each of the following statements, select Yes if the statement is true. Otherwise, select No. NOTE: Each correct selection is worth one point. Answer: 33 / 39 Explanation: Graphical user interface, text, application, email Description automatically generated 55.You have 10 new Windows 10 devices. You plan to deploy a provisioning package that will configure a wireless network profile. You need to ensure that a support technician can install the provisioning package on the devices. The solution must use the principle of least privilege. To which group should you add the support technician? A. UsersB. Power Users C. Network Configuration Operators D. Administrators Answer: D Explanation: Reference: https://docs.microsoft.com/en-us/windows/configuration/provisioning- packages/provisioning-apply-package 56.You have a public computer named Computer1 that runs Windows 10/ Computer1 contains a folder named Folder1. You need to provide a user named User1 with the ability to modify the permissions of Folder1. The solution must use the principle of least privilege. Which NTFS permission should you assign to User1? A. Full control B. Modify C. Write D. Read & execute Answer: A Explanation: References: https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows- server-2008-R2-and-2008/cc732880%28v%3dws.10%29 http://www.mdmarra.com/2013/11/full-control-v-modify-why-you-should-be.html 57.HOTSPOT 34 / 39 Your network contains an Active Directory domain. the domain contains a computer named Computer1 that runs Windows 10. The domain contains the users shown in the following table. Computer contains the shared folders shown in the following table. The shared folders have the permissions shown in the following table. For each of the following statements, select Yes if the statement is true. Otherwise select No. NOTE: Each correct selection is worth one point. Answer: 35 / 39 Explanation: Box 1: No Share1$ is a hidden share (dollar sign appended) so the share will never be visible. Box 2: Yes User2 is in Group1 and Group2. Both groups have access to Share1$. Therefore, the contents of the shared folder will be visible. Box 3: No User1 is in Group1. Group1 does not have the necessary security permission to access Share2. You need both security permissions (NTFS permissions) AND share permissions to view the contents of a shared folder. User1 has the necessary share permissions (Everyone: Read), but not the security permission. 58.HOTSPOT Use the drop-down menus to select the answer choice that completes each statement based on the information presented on the graphic. 36 / 39 NOTE: Each correct selection is worth one point. 37 / 39 Answer: 59.You have a computer named Computer1 that runs Windows 10. Computer1 contains a folder named Folder1. You need to log any users who take ownership of the files in Folder1. Which two actions should you perform? Each correct answer presents part of the solution. NOTE: Each correct selection is worth one point. A. Modify the folder attributes of Folder1. B. Modify the Advanced Security Settings for Folder1. C. From a Group Policy object (GPO), configure the Audit Sensitive Privilege Use setting. D. From a Group Policy object (GPO), configure the Audit File System setting. E. Install the Remote Server Administration Tools (RSAT). Answer: B,C Explanation: References: https://docs.microsoft.com/en-us/windows/security/threat-protection/auditing/audit- sensitive-privilege-use 60.Your company has a branch office that contains 25 workgroup computers. The computers run Windows 10 Pro. Users report that they cannot see other computers from Network in File Explorer. What should you do to resolve the issue? A. Set Network profile to Private. B. Turn off random hardware addresses for the network connection. C. Set Network profile to Public. D. Configure the network connection as a metered connection. Answer: A 61.HOTSPOT You have a computer that runs Windows 10. The computer is in a workgroup. The computer is used to provide visitors with access to the Internet. You need to configure the computer to meet the following requirements: ✑ Always sign in automatically as User1. ✑ Start an application named App1.exe at sign-in. 38 / 39 What should you use to meet each requirement? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point. Answer: Explanation: References: http://www.itexpertmag.com/server/complete-manageability-at-no-extra-cost 39 / 39