This page was exported from Exam for engine [ http://blog.test4engine.com ] Export date:Mon Nov 18 2:54:31 2024 / +0000 GMT ___________________________________________________ Title: MD-100 Dumps for Pass Guaranteed - Pass MD-100 Exam 2022 [Q33-Q47] --------------------------------------------------- MD-100 Dumps for Pass Guaranteed - Pass MD-100 Exam 2022 MD-100 Exam Dumps - Try Best MD-100 Exam Questions from Training Expert Test4Engine NO.33 You have a computer named Computer1 that runs Windows 10.You need to configure User Account Control (UAC) to prompt administrators for their credentials.Which settings should you modify?  Administrators Properties in Local Users and Groups  User Account Control Settings in Control Panel  Security Options in Local Group Policy Editor  User Rights Assignment in Local Group Policy Editor Explanation/Reference:References:https://docs.microsoft.com/en-us/windows/security/identity-protection/user-account-control/user-account- control-security-policy-settingsNO.34 Your network contains an Active Directory domain named adatum.com that uses Key Management Service (KMS) for activation.You deploy a computer that runs Windows 10 to the domain.The computer fails to activate.You suspect that the activation server has an issue.You need to identify which server hosts KMS.How should you complete the command? To answer, select the appropriate options in the answer area.NOTE: Each correct selection is worth one point. Explanation:References:https://blogs.technet.microsoft.com/odsupport/2011/11/14/how-to-discover-office-and-windows-kms-hosts-via-dns-and-remove-unauthorized-instances/NO.35 You install Windows 10 Enterprise on a new computer.You need to force activation on the computer.Which command should you run?  slmgr /upk  Sec-RDLicenseConfiguration -Force  Sec-MsolLicense -AddLicense  slmgr /ato References:https://docs.microsoft.com/en-us/windows/deployment/volume-activation/activate-using-key-management-service-vamtNO.36 Your domain contains named Computer named Computer1 that runs Windows 10. Computer1 does not have a TPM.You need to be able to encrypt the C drive by using Bitlocker Drive Encryption (BitLocker). The solution must ensure that the recovery key is stored in Active Directory.Which two Group Policy settings should you configure? To answer, select the appropriate settings in the answer area.NOTE: Each correct selection is worth one point. References:https://docs.microsoft.com/en-us/windows/security/information-protection/bitlocker/bitlocker-group-policy-settings#bkmk-rec1NO.37 You have a computer named Computer1 that runs Windows 10.You need to prevent standard users from changing the wireless network settings on Computer1. The solution must allow administrators to modify the wireless network settings.What should you use?  Windows Configuration Designer  MSConfig  Local Group Policy Editor  an MMC console that has the Group Policy Object Editor snap-in NO.38 Your network contains an Active Directory domain. the domain contains a computer named Computer1 that runs Windows 10. The domain contains the users shown in the following table.Computer contains the shared folders shown in the following table.The shared folders have the permissions shown in the following table.For each of the following statements, select Yes if the statement is true. Otherwise select No.NOTE: Each correct selection is worth one point. NO.39 You deploy Windows 10 to a new computer named Computer1.You sign in to Computer1 and create a user named User1.You create a file named LayoutModification.xml in theC:UsersDefaultAppDataLocalMicrosoftWindowsShellfolder. LayoutModification.xml contains the following markup.What is the effect of the configuration? To answer, select the appropriate options in the answer area.NOTE: Each correct selection is worth one point. ExplanationReferences:https://docs.microsoft.com/en-us/windows/configuration/configure-windows-10-taskbarNO.40 Please wait while the virtual machine loads. Once loaded, you may proceed to the lab section. This may take a few minutes, and the wait time will not be deducted from your overall test time.When the Next button is available, click it to access the lab section. In this section, you will perform a set of tasks in a live environment. While most functionality will be available to you as it would be in a live environment, some functionality (e.g., copy and paste, ability to navigate to external websites) will not be possible by design.Scoring is based on the outcome of performing the tasks stated in the lab. In other words, it doesn’t matter how you accomplish the task, if you successfully perform it, you will earn credit for that task.Labs are not timed separately, and this exam may more than one lab that you must complete. You can use as much time as you would like to complete each lab. But, you should manage your time appropriately to ensure that you are able to complete the lab(s) and all other sections of the exam in the time provided.Please note that once you submit your work by clicking the Next button within a lab, you will NOT be able to return to the lab.Username and passwordUse the following login credentials as needed:To enter your password, place your cursor in the Enter password box and click on the password below.Username: Contoso/AdministratorPassword: Passw0rd!The following information is for technical support purposes only:Lab Instance: 11145882You need to create an HTML report that shows which policies and policy settings are applied to CONTOSOUser1 on Client1. You must save the output to a file named Report.html in a folder named Folder1 on the C drive of Client1.To complete this task, sign in to the required computer or computers. See explanation below.ExplanationOn Client1, log in as administrator.Open command prompt and type:gpresult /h CONTOSOUser1C:Folder1Report.htmlNO.41 Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.A user named User2 has a computer named Computer2 that runs Windows 10. User2 joins Computer2 to contoso.com by using user2@contoso.com.Computer1 contains a folder named Folder1. Folder1 is in drive C and is shared as Share1. Share1 has the permission shown in the following table.A user named User2 has a computer named Computer2 that runs Windows 10. User2 joins Computer2 to contoso.com by using user2@contoso.com.User2 attempts to access Share1 and receives the following error message: “The username or password is incorrect.” You need to ensure that User2 can connect to Share1.Solution: You create a local user account on Computer1 and instruct User2 to use the local account to connect to Share1.Does this meet the goal?  Yes  No NO.42 You have a computer named Computer1 that runs Windows 10 and contains the following files:* C:Folder1File1.bat* C:Folder1File1.exe* C:Folder1File1.cmdA user named User1 is assigned Read & execute to all the files.Computer1 is configured as shown in the exhibit.Use the drop-down menus to select the answer choice that completes each statement based on the information presented in the graphic.NOTE: Each correct selection is worth one point. Explanation:References:https://stackoverflow.com/questions/148968/windows-batch-files-bat-vs-cmdNO.43 You have a computer named Computer1 that runs Windows 10. Computer1 contains a registry key named Key1 that has the values shown in the exhibit. (Click the Exhibit tab.).You have a Registration Entries (.reg) file named File1.reg that contains the following text.Windows Registry Editor Version 5.00[HKEY_LOCAL_MACHINESOFTWAREKey1]“String1″=-@=”2″You need to identify the effect of importing File1.reg to Computer1.What should you identify? To answer, select the appropriate options in the answer area.NOTE: Each correct selection is worth one point. ExplanationBox 1: String1 will be deleted.To delete a value, append equals and then minus to the value. For example:“String1″=-Box 2: Value1 will have a value of 1@=”2″ sets the default value to 1 but Value1 already has a DWORD value.A DWORD (32-bit) value is a hexadecimal value. Value1 is 0x00000001 which is 1.References:https://www.computerhope.com/issues/ch000848.htmhttps://www.computerperformance.co.uk/vista/reg-create/NO.44 You need to sign in as LocalAdmin on Computer11.What should you do first?  From the LAPS UI tool, view the administrator account password for the computer object of Computer11.  From Local Security Policy, edit the policy password settings on Computer11.  From the LAPS UI tool, reset the administrator account password for the computer object of Computer11.  From Microsoft Intune, edit the policy password settings on Computer11. References:https://technet.microsoft.com/en-us/mt227395.aspxTopic 1, Fabrikam, Inc.Existing EnvironmentFabrikam, Inc. is a distribution company that has 500 employees and 100 contractors.Active DirectoryThe network contains an Active Directory forest named fabrikam.com. The forest is synced to Microsoft Azure Active Directory (Azure AD). All the employees are assigned Microsoft 365 E3 licenses.The domain contains a user account for an employee named User10.Client ComputersAll the employees have computers that run Windows 10 Enterprise. All the computers are installed without Volume License Keys. Windows 10 license keys are never issued.All the employees register their computer to Azure AD when they first receive the computer.User10 has a computer named Computer10.All the contractors have their own computer that runs Windows 10. None of the computers are joined to Azure AD.Operational ProceduresFabrikam has the following operational procedures:Updates are deployed by using Windows Update for Business.When new contractors are hired, administrators must help the contactors configure the following settings on their computer:– User certificates– Browser security and proxy settings– Wireless network connection settingsSecurity policiesThe following security policies are enforced on all the client computers in the domain:All the computers are encrypted by using BitLocker Drive Encryption (BitLocker). BitLocker recovery information is stored in Active Directory and Azure AD.The local Administrators group on each computer contains an enabled account named LocalAdmin.The LocalAdmin account is managed by using Local Administrator Password Solution (LAPS).Problem StatementsFabrikam identifies the following issues:Employees in the finance department use an application named Application1. Application1 frequently crashes due to a memory error. When Application1 crashes, an event is written to the application log and an administrator runs a script to delete the temporary files and restart the application.When employees attempt to connect to the network from their home computer, they often cannot establish a VPN connection because of misconfigured VPN settings.An employee has a computer named Computer11. Computer11 has a hardware failure that prevents the computer from connecting to the network.User10 reports that Computer10 is not activated.Technical RequirementsFabrikam identifies the following technical requirements for managing the client computers:Provide employees with a configuration file to configure their VPN connection.Use the minimum amount of administrative effort to implement the technical requirements.Identify which employees’ computers are noncompliant with the Windows Update baseline of the company.Ensure that the service desk uses Quick Assist to take remote control of an employee’s desktop during support calls.Automate the configuration of the contractors’ computers. The solution must provide a configuration file that the contractors can open from a Microsoft SharePoint site to apply the required configurations.NO.45 You have a computer that runs Windows 10. You view the domain services status as shown in the following exhibit.Use the drop-down menus to select the answer choice that completes each statement based on the information presented in the graphic.NOTE: Each correct selection is worth one point. Explanation:Device is Azure AD joined; not domain joined.The MDM URLs in the exhibit indicate the device is enrolled in Intune.References:https://docs.microsoft.com/en-us/azure/active-directory/devices/troubleshoot-device-dsregcmdhttps://github.com/MicrosoftLearning/MD-101T00-ManagingModernDesktops/blob/master/Instructions/Labs/0403-Enrolling%20devices%20in%20Intune.mdNO.46 You need to Windows 10 to 20 new laptops.The laptops will be recommend a solution to lock the laptop when the users leave their laptop for an extended period.Which two actions should you include in the recommendation? Each correct answer presents part of the solution.NOTE: Each correct selection is worth one point.  From the settings app, configure the Dynamic lock settings.  From the Settings app, configure the lock screen settings.  Enable Bluetooth discovery.  From the Settings app, configure the Screen timeout settings  Pair the Android device the laptop.  From Sign-in option, configure the Windows hello settings. Explanationhttps://support.microsoft.com/en-us/help/4028111/windows-lock-your-windows-10-pc-automatically-when-you-NO.47 You have a computer named Computer1 that runs Windows 10. Computer1 contains a folder named Data on drive C. The Advanced Security Settings for the Data folder are shown in the exhibit. (Click the Exhibit tab.)You share C:Data as shown in the following table.User1 is a member of the Users group.Administrators are assigned Full control NTFS permissions to C:Data.For each of the following statements, select Yes if the statement is true. Otherwise, select No.NOTE: Each correct selection is worth one point. ExplanationNO, NO, YES”For example, for a resource, if you assign a user the Read permission and assign the Modify permission on a groep that the same user is member of, the effective acces permissions are a combination of the Read permissions and the modify permissions, wich is modify permission. When you combine Permissions that include Deny permissions, NTFS will evaluate the the deny permissions before the alloe permissions that are set on the same resource with explicit deny taking precedence over all Allow Permissions” Loading … Latest 100% Passing Guarantee - Brilliant MD-100 Exam Questions PDF: https://www.test4engine.com/MD-100_exam-latest-braindumps.html --------------------------------------------------- Images: https://blog.test4engine.com/wp-content/plugins/watu/loading.gif https://blog.test4engine.com/wp-content/plugins/watu/loading.gif --------------------------------------------------- --------------------------------------------------- Post date: 2022-06-28 09:37:30 Post date GMT: 2022-06-28 09:37:30 Post modified date: 2022-06-28 09:37:30 Post modified date GMT: 2022-06-28 09:37:30