“Windows 10 – Microsoft” Exam MD-100. If you passed Exam 70-698 before it expired on March 31, 2019, you only need to take MD-101 to earn the Modern Desktop certification.
Candidates for this exam are administrators who deploy, configure, secure, manage, and monitor devices and client applications in an enterprise environment. Candidates manage identity, access, policies, updates, and apps.
As an administrator, candidates typically collaborate with the M365 Enterprise Administrator to design and implement a device
the strategy that meets the business needs of a modern organization.
Here you can get the latest free MD-100 exam exercise questions and answers for free and easily improve your skills!
MD-100 exam: Candidates must be familiar with M365 workloads and must be proficient and experienced in deploying, configuring, and maintaining Windows 10 and non-Windows devices and technologies. Follow the link to find more information about https://www.leads4pass.com/md-100.html exam.
Table of Contents:
[PDF] Free Microsoft MD-100 pdf dumps download from Google Drive: https://drive.google.com/open?id=1iawkwFKMZK6pwqdi7lw3THZhJaVyUXRa
Exam MD-100: Windows 10 – Microsoft:https://www.microsoft.com/en-us/learning/exam-MD-100.aspx
Skills measured
QUESTION 1
Your network contains an Active Directory domain. The domain contains 1,000 computers that run Windows 10.
You discover that when users are on their lock screen, they see a different background image every day, along with tips
for using different features in Windows 10.
You need to disable the tips and the daily background image for all the Windows 10 computers.
Which Group Policy settings should you modify?
A. Turn off the Windows Welcome Experience
B. Turn off Windows Spotlight on Settings
C. Do not suggest third-party content in Windows spotlight
D. Turn off all Windows spotlight features
Correct Answer: D
References: https://docs.microsoft.com/en-us/windows/configuration/windows-spotlight
QUESTION 2
You have a file named Reg1.reg that contains the following content.
What is the effect of importing the file?
A. A key named command will be renamed as notepad.exe.
B. In a key named Notepad, the command value will be set to @=”notepad.exe”.
C. In a key named command, the default value will be set to notepad.exe.
Correct Answer: B
QUESTION 3
Your company has a main office and a branch office. The offices connect to each other by using a WAN link. Access to
the Internet is provided through the main office.
The branch office contains 25 computers that run Windows 10. The computers contain small hard drives that have very
little free disk space.
You need to prevent the computers in the branch office from downloading updates from peers on the network.
What should you do?
A. From the Settings app, modify the Delivery Optimizations settings.
B. Configure the network connections as metered connections.
C. Configure the computers to use BranchCache in hosted cache mode.
D. Configure the updates to use the Semi-Annual Channel (Targeted) channel.
Correct Answer: C
References: https://docs.microsoft.com/en-us/windows/deployment/update/waas-branchcache
QUESTION 4
You have a computer named Computer1 that runs Windows 10. Computer1 contains a folder named Folder1.
You need to log any users who take ownership of the files in Folder1.
Which two actions should you perform? Each correct answer presents part of the solution.
NOTE: Each correct selection is worth one point.
A. Modify the folder attributes of Folder1.
B. Modify the Advanced Security Settings for Folder1.
C. From a Group Policy object (GPO), configure the Audit Sensitive Privilege Use setting.
D. From a Group Policy object (GPO), configure the Audit File System setting.
E. Install the Remote Server Administration Tools (RSAT).
Correct Answer: BD
References: https://www.netwrix.com/how_to_detect_who_changed_file_or_folder_owner.html
QUESTION 5
You are a network administrator at your company.
A user attempts to start a computer and receives the following error message: “Bootmgr is missing.”
You need to resolve the issue.
You start the computer in the recovery mode.
Which command should you run next? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
Hot Area:
Correct Answer:
QUESTION 6
You have a computer named Computer1 that runs Windows 10 and contains the following files:
C:\Folder1\File1.bat
C:\Folder1\File1.exe
C:\Folder1\File1.cmd
A user named User1 is assigned Read and execute to all the files.
Computer1 is configured as shown in the exhibit.
Use the drop-down menus to select the answer choice that completes each statement based on the information
presented in the graphic. NOTE: Each correct selection is worth one point.
Hot Area:
Correct Answer:
QUESTION 7
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains
a unique solution that might meet the stated goals. Some question sets might have more than one correct solution,
while
others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not
appear in the review screen.
You have a computer named Computer1 that runs Windows 10.
You test Windows updates on Computer1 before you make the updates available to other users at your company.
You install a quality update that conflicts with a customer device driver.
You need to remove the update from Computer1.
Solution: From System Restore, you revert the system state to a restore point that was created before the update was
installed.
Does this meet the goal?
A. Yes
B. No
Correct Answer: B
References: https://support.microsoft.com/en-us/help/934307/description-of-the-windows-update-standalone-installer-in-windows
QUESTION 8
Your company has a wireless access point that uses WPA2-Enterprise. You need to configure a computer to connect to
the wireless access point. What should you do first?
A. Create a provisioning package in Windows Configuration Designer.
B. Request a passphrase.
C. Request and install a certificate.
D. Create a Connection Manager Administration Kit (CMAK) package.
Correct Answer: B
References: https://support.microsoft.com/en-za/help/17137/windows-setting-up-wireless-network
QUESTION 9
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains
a unique solution that might meet the stated goals. Some question sets might have more than one correct solution,
while
others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not
appear in the review screen.
You have a computer named Computer1 that runs Windows 10. The computer contains a folder. The folder contains
sensitive data.
You need to log which user reads the contents of the folder and modifies and deletes files in the folder.
Solution: From the properties of the folder, you configure the Auditing settings and from Audit Policy in the local Group
Policy, you configure Audit object access.
Does this meet the goal?
A. Yes
B. No
Correct Answer: A
References: https://www.netwrix.com/how_to_detect_who_changed_file_or_folder_owner.html
QUESTION 10
You enable Windows PowerShell remoting on a computer that runs Windows 10.
You need to limit which PowerShell cmdlets can be used in a remote session.
Which three actions should you perform in sequence? To answer, move the appropriate actions from the list of actions
to the answer area and arrange them in the correct order.
Select and Place:
Correct Answer:
References: https://www.petri.com/powershell-remoting-restricting-user-commands
QUESTION 11
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains
a unique solution that might meet the stated goals. Some question sets might have more than one correct solution,
while
others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not
appear in the review screen.
You have a computer named Computer1 that runs Windows 10.
A service named Application1 is configured as shown in the exhibit.
You discover that a user used the Service1 account to sign in to Computer1 and deleted some files.
You need to ensure that the identity used by Application1 cannot be used by a user to sign in to sign in to the desktop
on Computer1. The solution must use the principle of least privilege.
Solution: On Computer1, you assign Service1 the deny log on locally user right.
Does this meet the goal?
A. Yes
B. No
Correct Answer: B
References: https://docs.microsoft.com/en-us/windows/security/threat-protection/security-policy-settings/deny-log-on-locally
QUESTION 12
You have a public computer named Computer1 that runs Windows 10/ Computer1 contains a folder named Folder1.
You need to provide a user named User1 with the ability to modify the permissions of Folder1. The solution must use
the principle of least privilege.
Which NTFS permission should you assign to User1?
A. Full control
B. Modify
C. Write
D. Read and execute
Correct Answer: B
References:
https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/cc754344%28v%3dws.10%29
QUESTION 13
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains
a unique solution that might meet the stated goals. Some question sets might have more than one correct solution,
while
others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not
appear in the review screen.
A user named User1 has a computer named Computer1 that runs Windows 10. Computer1 is joined to an Azure Active
Directory (Azure AD) tenant named contoso.com. User1 joins Computer1 to contoso.com by using
[email protected].
Computer1 contains a folder named Folder1. Folder1 is in drive C and is shared as Share1. Share1 has the permission
shown in the following table.
A user named User2 has a computer named Computer2 that runs Windows 10. User2 joins Computer2 to contoso.com
by using [email protected].
User2 attempts to access Share1 and receives the following error message: “The username or password is incorrect.”
You need to ensure that User2 can connect to Share1.
Solution: In Azure AD, you create a group named Group1 that contains User1 and User2. You grant Group1 Modify
access to Folder1.
Does this meet the goal?
A. Yes
B. No
Correct Answer: A
References: https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/cc754178(v%3dws.10)
Lead4pass employs the most authoritative exam specialists from Microsoft, Cisco, CompTIA, IBM, Oracle, etc.
We update exam data throughout the year. Highest pass rate! We have a large user base. We are an industry leader! Choose Lead4Pass to pass the exam with ease!
Summarize:
It’s not easy to pass the Microsoft exam, but with accurate learning materials and proper practice, you can crack the exam with excellent results. Lead4pass provides you with the most relevant learning materials that you can use to help you prepare.