MD-100 Dumps MD-100 Braindumps MD-100 Real Questions MD-100 Practice Test MD-100 Actual Questions Microsoft MD-100 Windows 10 https://killexams.com/pass4sure/exam-detail/MD-100 Question: 60 HOTSPOT You have 20 computers that run Windows 11. You need to enable Windows Sandbox on the computers. How should you complete the command? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point. Answer: Explanation: Box 1: Enable-WindowsOptionalFeature To Enable Windows 10 Sandbox with PowerShell, Question: 61 You have a Microsoft Azure Active Directory (Azure AD) tenant. Some users sign in to their computer by using Windows Hello for Business. A user named User1 purchases a new computer and joins the computer to Azure AD. User1 attempts to configure the sign-in options and receives the error message shown in the exhibit. You open Device Manager and confirm that all the hardware works correctly. You need to ensure that User1 can use Windows Hello for Business facial recognition to sign in to the computer. What should you do first? A. Purchase an infrared (IR) camera. B. Upgrade the computer to Windows 10 Enterprise. C. Enable UEFI Secure Boot. D. Install a virtual TPM driver. Answer: B Explanation: References: https://docs.microsoft.com/en-us/windows/security/identity-protection/hello-for-business/hello-planning-guide Question: 62 You have a public computer named Computer1 that runs Windows 10/ Computer1 contains a folder named Folder1. You need to provide a user named User1 with the ability to modify the permissions of Folder1. The solution must use the principle of least privilege. Which NTFS permission should you assign to User1? A. Full control B. Modify C. Write D. Read & execute Answer: A Explanation: References: https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/cc732880%28v%3dws.10%29 http://www.mdmarra.com/2013/11/full-control-v-modify-why-you-should-be.html Question: 63 You have a computer that runs Windows 10. You need to configure a picture password. What should you do? A. From Control Panel, configure the User Accounts settings. B. From the Settings app, configure the Sign-in options. C. From the Local Group Policy Editor, configure the Account Policies settings. D. From Windows PowerShell, run the Set-LocalUser cmdlet and specify the InputObject parameter. Answer: B Question: 64 HOTSPOT You have computers that run Windows 10 Enterprise as shown in the following table. Both computers have applications installed and contain user data. You plan to configure both computers to run Windows 10 Enterprise LTSC 2019 and to retain all the existing applications and data. You need to recommend a method to deploy Windows 10 Enterprise LTSC 2019 to the computers. The solution must minimize effort to install and configure the applications. What should you include in the recommendation for each computer? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point. Answer: Explanation: Graphical user interface, text, application, chat or text message Description automatically generated References: https://docs.microsoft.com/en-us/windows/deployment/upgrade/windows-10-upgrade-paths Question: 65 CORRECT TEXT Please wait while the virtual machine loads. Once loaded, you may proceed to the lab section. This may take a few minutes, and the wait time will not be deducted from your overall test time. When the Next button is available, click it to access the lab section. In this section, you will perform a set of tasks in a live environment. While most functionality will be available to you as it would be in a live environment, some functionality (e.g., copy and paste, ability to navigate to external websites) will not be possible by design. Scoring is based on the outcome of performing the tasks stated in the lab. In other words, it doesn’t matter how you accomplish the task, if you successfully perform it, you will earn credit for that task. Labs are not timed separately, and this exam may more than one lab that you must complete. You can use as much time as you would like to complete each lab. But, you should manage your time appropriately to ensure that you are able to complete the lab(s) and all other sections of the exam in the time provided. Please note that once you submit your work by clicking the Next button within a lab, you will NOT be able to return to the lab. Username and password Use the following login credentials as needed: To enter your password, place your cursor in the Enter password box and click on the password below. Username: Contoso/Administrator Password: Passw0rd! The following information is for technical support purposes only: Lab Instance: 10921597 You need to create a user account named User5 on Client2. The solution must meet the following requirements: Prevent User5 from changing the password of the account. Ensure that User5 can perform backups. Use the principle of least privilege. To complete this task, sign in to the required computer or computers. Answer: On Client2, press the Win + X keys on your keyboard. Then, click or tap the Computer Management option from the menu. Expand the Local Users and Groups from the left side of the window, and select Users. Right-click somewhere on the blank space found in the middle section of the window, and click or tap on New User. This opens the New User window, where you can enter all the details about the new user account. Type the user name and, optionally, its full name and description. Type the password to be used for that user and confirm it. Select the User cannot change password check box. Click Create and Windows immediately creates the user account. When you are done creating user accounts, click Close in the New User window. Press the Win + R keys to open Run, type secpol.msc into Run, and click/tap on OK to open Local Security Policy. Expand open Local Policies in the left pane of Local Security Policy, click/tap on User Rights Assignment, and double click/tap on the Back up files and directories policy in the right pane. Click/tap on the Add User or Group button. Click/tap on the Object Types button. Check all the boxes for Object types, and click/tap on the OK. Click/tap on the Advanced button. Click/tap on the Find Now button, select the name of the user or group Click/tap on OK. Click/tap on OK. When finished, you can close Local Users and Groups. Question: 66 Your company has an on-premises network that contains an Active Directory domain. The domain is synced to Microsoft Azure Active Directory (Azure AD). All computers in the domain run Windows 10 Enterprise. You have a computer named Computer1 that has a folder named C:Folder1. You want to use File History to protect C:Folder1. Solution: You enable File History on Computer1. You then encrypt the contents of Folder1. Does this meet the goal? A. Yes B. No Answer: B Explanation: File History only backs up copies of files that are in Libraries, and Desktop folders and the OneDrive files available offline on your PC. If you have files or folders elsewhere that you want backed up, you can add them to one of these folders. Reference: https://support.microsoft.com/en-us/help/17128/windows-8-file-history Question: 67 HOTSPOT For each of the following statements, select Yes if the statement is true. Otherwise, select No. NOTE: Each correct selection is worth one point. Answer: Explanation: Graphical user interface, text, application, email Description automatically generated Question: 68 Your network an Active Directory domain named adatum.com. The domain contains 50 computers that runs Windows 8.1. The computer has locally installed desktop application that are compatible with Windows 10. You need to upgrade the computers to windows 10, The solution must preserver the locally installed desktop applications. Solution: You use Microsoft Deployment Toolkit (MDT) and create a task sequence. One each compute, you run the task sequence. Does the meet the goal? A. Yes B. No Answer: B Question: 69 You have a computer named Computer1 that runs Windows 10. Computer1 is in a workgroup. Computer1 contains the local users shown in the following table. The Users group has Modify permissions to a folder named D:Folder1. User3 creates a file named File1.docx in Folder1. Which users can take ownership of File1.docx? A. Administrator and User1 only B. Administrator only C. Administrator, User1, and User2 D. Administrator and User2 only Answer: B Explanation: Only a member of the Administrator’s group can take ownership of a file or folder. Question: 70 HOTSPOT You have a computer that runs Windows 10. You view the domain services status as shown in the following exhibit. Use the drop-down menus to select the answer choice that completes each statement based on the information presented in the graphic. NOTE: Each correct selection is worth one point. Answer: Explanation: Device is Azure AD joined; not domain joined. The MDM URLs in the exhibit indicate the device is enrolled in Intune. References: https://docs.microsoft.com/en-us/azure/active-directory/devices/troubleshoot-device-dsregcmd https://github.com/MicrosoftLearning/MD-101T00-ManagingModernDesktops/blob/master/Instructions/Labs/0403- Enrolling%20devices%20in%20Intune.md Question: 71 Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution. After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen. You manage devices that run Windows 10. Ten sales users will travel to a location that has limited bandwidth that is expensive. The sales users will be at the location for three weeks. You need to prevent all Windows updates from downloading for the duration of the trip. The solution must not prevent access to email and the Internet. Solution: From Accounts in the Settings app, you turn off Sync settings. Does this meet the goal? A. Yes B. No Answer: B Question: 72 HOTSPOT You have two workgroup computers named Computer1 and Computer2 that run Windows 10. The computers contain the local security principals shown in the following table. Which security principals can be members of GroupA and GroupC? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point. Answer: Explanation: Graphical user interface, text, application, chat or text message Description automatically generated Question: 73 You have a file named Reg1.reg that contains the following content. What is the effect of importing the file? A. A key named command will be renamed as notepad.exe. B. In a key named Notepad, the command value will be set to @="notepad.exe". C. In a key named command, the default value will be set to notepad.exe. Answer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