Number: MD-100 Passing Score: 800 Time Limit: 120 Min: Website: VCE To PDF Converter: Facebook: Twitter
Number: MD-100 Passing Score: 800 Time Limit: 120 Min: Website: VCE To PDF Converter: Facebook: Twitter
Number: MD-100 Passing Score: 800 Time Limit: 120 Min: Website: VCE To PDF Converter: Facebook: Twitter
39q
Number: MD-100
Passing Score: 800
Time Limit: 120 min
MD-100
Website: https://vceplus.com
VCE to PDF Converter: https://vceplus.com/vce-to-pdf/
Facebook: https://www.facebook.com/VCE.For.All.VN/
Twitter : https://twitter.com/VCE_Plus
https://vceplus.com/
Windows 10 (beta)
Question Set 1
https://vceplus.com/
www.vceplus.com - Free Questions & Answers - Online Courses - Convert VCE to PDF - VCEplus.com
QUESTION 1
You plan to deploy Windows 10 to 100 secure computers.
You need to select a version of Windows 10 that meets the following requirements:
What is the best version to achieve the goal? More than one answer choice may achieve the goal. Select the BEST answer.
Correct Answer: C
Section: [none]
Explanation
Explanation/Reference:
References: https://www.microsoft.com/en-
za/windows/compare
QUESTION 2
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might
meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
https://vceplus.com/
www.vceplus.com - Free Questions & Answers - Online Courses - Convert VCE to PDF - VCEplus.com
You discover that a user used the Service1 account to sign in to Computer1 and deleted some files.
You need to ensure that the identity used by Application1 cannot be used by a user to sign in to sign in to the desktop on Computer1. The solution must use the
principle of least privilege.
Solution: On Computer1, you configure Application1 to sign in as the LocalSystem account and select the Allow service to interact with desktop check box. You
delete the Service1 account.
https://vceplus.com/
www.vceplus.com - Free Questions & Answers - Online Courses - Convert VCE to PDF - VCEplus.com
https://vceplus.com/
A. Yes
B. No
Correct Answer: B
Section: [none]
Explanation
Explanation/Reference:
QUESTION 3
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might
meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
https://vceplus.com/
www.vceplus.com - Free Questions & Answers - Online Courses - Convert VCE to PDF - VCEplus.com
You discover that a user used the Service1 account to sign in to Computer1 and deleted some files.
You need to ensure that the identity used by Application1 cannot be used by a user to sign in to sign in to the desktop on Computer1. The solution must use the
principle of least privilege.
Solution: On Computer1, you assign Service1 the deny log on locally user right.
https://vceplus.com/
www.vceplus.com - Free Questions & Answers - Online Courses - Convert VCE to PDF - VCEplus.com
A. Yes
B. No
Correct Answer: B
Section: [none]
Explanation
Explanation/Reference:
References:
https://docs.microsoft.com/en-us/windows/security/threat-protection/security-policy-settings/deny-log-on-locally
QUESTION 4
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might
meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
https://vceplus.com/
www.vceplus.com - Free Questions & Answers - Online Courses - Convert VCE to PDF - VCEplus.com
You discover that a user used the Service1 account to sign in to Computer1 and deleted some files.
You need to ensure that the identity used by Application1 cannot be used by a user to sign in to sign in to the desktop on Computer1. The solution must use the
principle of least privilege.
Solution: On Computer1, you assign Service1 the deny log on as a service user right.
https://vceplus.com/
www.vceplus.com - Free Questions & Answers - Online Courses - Convert VCE to PDF - VCEplus.com
A. Yes
B. No
Correct Answer: A
Section: [none]
Explanation
Explanation/Reference:
References:
https://docs.microsoft.com/en-us/windows/security/threat-protection/security-policy-settings/deny-log-on-as-a-service
https://vceplus.com/
www.vceplus.com - Free Questions & Answers - Online Courses - Convert VCE to PDF - VCEplus.com
Testlet 1
Case Study
This is a case study. Case studies are not timed separately. You can use as much exam times as you would like to complete each case. However, there
may be additional studies and sections on this exam. You must manage your time to ensure that you are able to complete all questions included on this exam in
the time provided.
To answer the questions included in a case study, you will need to reference information that is provided in the case study. Case studies might contain exhibits
and other resources that provide more information about the scenario that is described in the case study. Each question is independent of the other questions in
this case study.
At the end of this case study, a review screen will appear. This screen allows you to review your answers and to make changes before you move to the next
section of the exam. After you begin a new section, you cannot return to this section.
Overview
Existing Environment
Fabrikam, Inc. is a distribution company that has 500 employees and 100 contractors.
Active Directory
The network contains an Active Directory forest named fabrikam.com. The forest is synced to Microsoft Azure Active Directory (Azure AD). All the employees are
assigned Microsoft 365 E3 licenses.
Client Computers
All the employees have computers that run Windows 10 Enterprise. All the computers are installed without Volume License Keys. Windows 10 license keys are
never issued.
All the employees register their computer to Azure AD when they first receive the computer.
https://vceplus.com/
www.vceplus.com - Free Questions & Answers - Online Courses - Convert VCE to PDF - VCEplus.com
All the contractors have their own computer that runs Windows 10. None of the computers are joined to Azure AD.
Operational Procedures
Security policies
The following security policies are enforced on all the client computers in the domain:
All the computers are encrypted by using BitLocker Drive Encryption (BitLocker). BitLocker recovery information is stored in Active Directory and Azure AD.
The local Administrators group on each computer contains an enabled account named LocalAdmin.
The LocalAdmin account is managed by using Local Administrator Password Solution (LAPS).
Problem Statements
Employees in the finance department use an application named Application1. Application1 frequently crashes due to a memory error. When Application1
crashes, an event is written to the application log and an administrator runs a script to delete the temporary files and restart the application.
When employees attempt to connect to the network from their home computer, they often cannot establish a VPN connection because of misconfigured VPN
settings.
An employee has a computer named Computer11. Computer11 has a hardware failure that prevents the computer from connecting to the network.
User10 reports that Computer10 is not activated.
Technical requirements
Fabrikam identifies the following technical requirements for managing the client computers:
https://vceplus.com/
www.vceplus.com - Free Questions & Answers - Online Courses - Convert VCE to PDF - VCEplus.com
QUESTION 1
You need to sign in as LocalAdmin on Computer11.
A. From the LAPS UI tool, view the administrator account password for the computer object of Computer11.
B. From Local Security Policy, edit the policy password settings on Computer11.
C. From the LAPS UI tool, reset the administrator account password for the computer object of Computer11.
D. From Microsoft Intune, edit the policy password settings on Computer11.
Correct Answer: A
Section: [none]
Explanation
Explanation/Reference:
References: https://technet.microsoft.com/en-
us/mt227395.aspx
https://vceplus.com/
www.vceplus.com - Free Questions & Answers - Online Courses - Convert VCE to PDF - VCEplus.com
Question Set 2
QUESTION 1
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might
meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
You have a computer named Computer1 that runs Windows 10. The computer contains a folder. The folder contains sensitive data.
You need to log which user reads the contents of the folder and modifies and deletes files in the folder.
Solution: From the properties of the folder, you configure the Auditing settings and from the Audit Policy in the local Group Policy, you configure Audit directory
service access.
A. Yes
B. No
Correct Answer: B
Section: [none]
Explanation
Explanation/Reference:
References:
https://www.netwrix.com/how_to_detect_who_changed_file_or_folder_owner.html
QUESTION 2
Your network contains an Active Directory domain. The domain contains 1,000 computers that run Windows 10.
You discover that when users are on their lock screen, they see a different background image every day, along with tips for using different features in Windows 10.
You need to disable the tips and the daily background image for all the Windows 10 computers.
https://vceplus.com/
www.vceplus.com - Free Questions & Answers - Online Courses - Convert VCE to PDF - VCEplus.com
D. Turn off all Windows spotlight features
Correct Answer: D
Section: [none]
Explanation
Explanation/Reference:
References: https://docs.microsoft.com/en-us/windows/configuration/windows-
spotlight
QUESTION 3
You have a file named Reg1.reg that contains the following content.
Correct Answer: B
Section: [none]
Explanation
Explanation/Reference:
QUESTION 4
https://vceplus.com/
www.vceplus.com - Free Questions & Answers - Online Courses - Convert VCE to PDF - VCEplus.com
You have a computer named Computer1 that runs Windows 10.
On Computer1, you create the local users shown in the following table.
Which three user profiles will persist after each user signs out? Each correct answer presents part of the solution.
A. User1
B. User2
C. User3
D. User4
E. User5
Explanation/Reference:
https://vceplus.com/
www.vceplus.com - Free Questions & Answers - Online Courses - Convert VCE to PDF - VCEplus.com
QUESTION 5
You have 20 computers that run Windows 10. The computers are in a workgroup.
You need to create a local user named Admin1 on all the computers. Admin1 must be a member of the Remote Management Users group.
A. From Windows Configuration Designer, create a provisioning package, and then run the provisioning package on each computer.
B. Create a script that runs the New-ADUser cmdlet and the Set-AdGroup cmdlet.
C. Create a Group Policy object (GPO) that contains the Local User Group Policy preference.
D. Create a script that runs the New-MsolUser cmdlet and the Add-ADComputerServiceAccount cmdlet.
Correct Answer: C
Section: [none]
Explanation
Explanation/Reference:
References: https://blogs.technet.microsoft.com/askpfeplat/2017/11/06/use-group-policy-preferences-to-manage-the-local-
administrator-group/
QUESTION 6
You have several computers that run Windows 10. The computers are in a workgroup and have BitLocker Drive Encryption (BitLocker) enabled.
You join the computers to Microsoft Azure Active Directory (Azure AD).
You need to ensure that you can recover the BitLocker recovery key for the computers from Azure AD.
A. Disable BitLocker.
B. Add a BitLocker key protector.
C. Suspend BitLocker.
D. Disable the TMP chip.
Correct Answer: B
Section: [none]
Explanation
Explanation/Reference:
https://vceplus.com/
www.vceplus.com - Free Questions & Answers - Online Courses - Convert VCE to PDF - VCEplus.com
References:
https://docs.microsoft.com/en-us/windows/security/information-protection/bitlocker/prepare-your-organization-for-bitlocker-planning-and-policies#bitlocker-
keyprotectors
QUESTION 7
HOTSPOT
You have a computer named Computer1 that runs Windows 10. Computer1 is in a workgroup.
What is the effect of the configuration? To answer, select the appropriate options in the answer area.
Hot Area:
https://vceplus.com/
www.vceplus.com - Free Questions & Answers - Online Courses - Convert VCE to PDF - VCEplus.com
Correct Answer:
Section: [none]
Explanation
Explanation/Reference:
https://vceplus.com/
www.vceplus.com - Free Questions & Answers - Online Courses - Convert VCE to PDF - VCEplus.com
References: https://support.microsoft.com/en-za/help/310316/how-permissions-are-handled-when-you-copy-and-move-files-and-
folders QUESTION 8
You have a computer named Computer1 that runs Windows 10.
You need to configure User Account Control (UAC) to prompt administrators for their credentials.
Correct Answer: C
Section: [none]
Explanation
Explanation/Reference:
References: https://docs.microsoft.com/en-us/windows/security/identity-protection/user-account-control/user-account-control-security-
policy-settings
QUESTION 9
You have several computers that run Windows 10. The computers are in a workgroup.
You need to prevent users from using Microsoft Store apps on their computer.
What are two possible ways to achieve the goal? Each correct answer presents part of the solution.
A. From Security Settings in the local Group Policy, configure Security Options.
B. From Administrative Templates in the local Group Policy, configure the Store settings.
C. From Security Settings in the local Group Policy, configure Software Restriction Policies.
D. From Security Settings in the local Group Policy, configure Application Control Policies.
Correct Answer: BD
Section: [none]
Explanation
https://vceplus.com/
www.vceplus.com - Free Questions & Answers - Online Courses - Convert VCE to PDF - VCEplus.com
Explanation/Reference:
References: https://www.techrepublic.com/article/how-to-manage-your-organizations-microsoft-store-group-
policy/
QUESTION 10
You have a computer named Computer1 that runs Windows 10.
You need to prevent standard users from changing the wireless network settings on Computer1. The solution must allow administrators to modify the wireless
network settings.
https://vceplus.com/
Correct Answer: C
Section: [none]
Explanation
Explanation/Reference:
QUESTION 11
Your network contains an Active Directory domain named contoso.com. The domain contains named Computer1 that runs Windows 10.
On Computer1, you create an NTFS folder and assign Full control permissions to Everyone.
https://vceplus.com/
www.vceplus.com - Free Questions & Answers - Online Courses - Convert VCE to PDF - VCEplus.com
You share the folder as Share1 and assign the permissions shown in the following table.
When accessing Share1, which two actions can be performed by User1 but not by User2? Each correct answer presents part of the solution.
Correct Answer: BD
Section: [none]
Explanation
Explanation/Reference:
References: https://www.varonis.com/blog/ntfs-permissions-vs-
share/
QUESTION 12
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might
meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
A user named User1 has a computer named Computer1 that runs Windows 10. Computer1 is joined to an Azure Active Directory (Azure AD) tenant named
contoso.com. User1 joins Computer1 to contoso.com by using [email protected].
Computer1 contains a folder named Folder1. Folder1 is in drive C and is shared as Share1. Share1 has the permission shown in the following table.
https://vceplus.com/
www.vceplus.com - Free Questions & Answers - Online Courses - Convert VCE to PDF - VCEplus.com
A user named User2 has a computer named Computer2 that runs Windows 10. User2 joins Computer2 to contoso.com by using [email protected].
User2 attempts to access Share1 and receives the following error message: “The username or password is incorrect.”
Solution: In Azure AD, you create a group named Group1 that contains User1 and User2. You grant Group1 Change access to Share1.
A. Yes
B. No
Correct Answer: B
Section: [none]
Explanation
Explanation/Reference:
References: https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2008-R2-and-
2008/cc754178(v%3dws.10)
QUESTION 13
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might
meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
A user named User2 has a computer named Computer2 that runs Windows 10. User2 joins Computer2 to contoso.com by using [email protected].
Computer1 contains a folder named Folder1. Folder1 is in drive C and is shared as Share1. Share1 has the permission shown in the following table.
https://vceplus.com/
www.vceplus.com - Free Questions & Answers - Online Courses - Convert VCE to PDF - VCEplus.com
A user named User2 has a computer named Computer2 that runs Windows 10. User2 joins Computer2 to contoso.com by using
[email protected]. User2 attempts to access Share1 and receives the following error message: “The username or password is incorrect.” You
Solution: You create a local user account on Computer1 and instruct User2 to use the local account to connect to Share1.
A. Yes
B. No
Correct Answer: B
Section: [none]
Explanation
Explanation/Reference:
QUESTION 14
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might
meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
A user named User1 has a computer named Computer1 that runs Windows 10. Computer1 is joined to an Azure Active Directory (Azure AD) tenant named
contoso.com. User1 joins Computer1 to contoso.com by using [email protected].
Computer1 contains a folder named Folder1. Folder1 is in drive C and is shared as Share1. Share1 has the permission shown in the following table.
A user named User2 has a computer named Computer2 that runs Windows 10. User2 joins Computer2 to contoso.com by using [email protected].
User2 attempts to access Share1 and receives the following error message: “The username or password is incorrect.”
https://vceplus.com/
www.vceplus.com - Free Questions & Answers - Online Courses - Convert VCE to PDF - VCEplus.com
Solution: In Azure AD, you create a group named Group1 that contains User1 and User2. You grant Group1 Modify access to Folder1.
A. Yes
B. No
Correct Answer: A
Section: [none]
Explanation
Explanation/Reference:
References: https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2008-R2-and-
2008/cc754178(v%3dws.10)
QUESTION 15
You have a computer named Computer1 that runs Windows 10. Computer1 contains a folder named Folder1.
You need to log any users who take ownership of the files in Folder1.
Which two actions should you perform? Each correct answer presents part of the solution.
Correct Answer: BD
Section: [none]
Explanation
Explanation/Reference:
References:
https://www.netwrix.com/how_to_detect_who_changed_file_or_folder_owner.html
QUESTION 16
You are a network administrator at your company.
https://vceplus.com/
www.vceplus.com - Free Questions & Answers - Online Courses - Convert VCE to PDF - VCEplus.com
The company uses an application that checks for network connectivity to a server by sending a ping request to the IPv6 address of the server replies, the
application loads.
You manually send the ping request from the computer of the user and the server does not reply. You send the ping request from your computer and the server
replies.
You need to ensure that the ping request works from the user’s computer.
Correct Answer: D
Section: [none]
Explanation
Explanation/Reference:
References: https://www.howtogeek.com/howto/windows-vista/allow-pings-icmp-echo-request-through-your-windows-vista-
firewall/
QUESTION 17
Your network contains an Active Directory domain. The domain contains a computer named Computer1 that runs Windows 10.
You need to view the settings to Computer1 by Group Policy objects (GPOs) in the domain and local Group Policies.
A. gpresult
B. secedit
C. gpupdate
D. gpfixup
Correct Answer: A
https://vceplus.com/
www.vceplus.com - Free Questions & Answers - Online Courses - Convert VCE to PDF - VCEplus.com
Section: [none]
Explanation
Explanation/Reference:
References: https://docs.microsoft.com/en-us/windows-server/administration/windows-
commands/gpresult
QUESTION 18
Your network contains an Active Directory domain. The domain contains computers that run Windows 10.
You need to provide a user with the ability to remotely create and modify shares on the computers. The solution must use the principle of least privilege.
A. Power Users
B. Remote Management Users
C. Administrators
D. Network Configuration Operators
Correct Answer: C
Section: [none]
Explanation
Explanation/Reference:
QUESTION 19
You have a computer named Computer1 that runs Windows 10. Computer1 belongs to a workgroup.
A. User1 is prevented from signing in until the user is assigned additional user rights.
B. User1 appears on the sign-in screen and can sign in without a password.
C. User1 is prevented from signing in until an administrator manually sets a password for the user.
https://vceplus.com/
www.vceplus.com - Free Questions & Answers - Online Courses - Convert VCE to PDF - VCEplus.com
D. User1 appears on the sign-in screen and must set a new password on the first sign-in attempts.
Correct Answer: B
Section: [none]
Explanation
Explanation/Reference:
References: https://docs.microsoft.com/en-us/powershell/module/microsoft.powershell.localaccounts/new-localuser?view=powershell-
5.1
https://vceplus.com/
www.vceplus.com - Free Questions & Answers - Online Courses - Convert VCE to PDF - VCEplus.com
Testlet 1
Case Study
This is a case study. Case studies are not timed separately. You can use as much exam times as you would like to complete each case. However, there
may be additional studies and sections on this exam. You must manage your time to ensure that you are able to complete all questions included on this exam in
the time provided.
To answer the questions included in a case study, you will need to reference information that is provided in the case study. Case studies might contain exhibits
and other resources that provide more information about the scenario that is described in the case study. Each question is independent of the other questions in
this case study.
At the end of this case study, a review screen will appear. This screen allows you to review your answers and to make changes before you move to the next
section of the exam. After you begin a new section, you cannot return to this section.
Contoso, Ltd. is a consulting company that has a main office in Montreal and two branch offices in Seattle and New York.
Contoso recently opened a new branch office in San Diego. All the users in the San Diego office work from home.
Existing environment
The on-premises network contains an Active Directory domain named contoso.com. The domain is synced to Microsoft Azure Active Directory (Azure AD).
You have four computers named Computer1, Computer2, Computer3, and ComputerA. ComputerA is in a workgroup on an isolated network segment and runs
the Long Term Servicing Channel version of Windows 10. ComputerA connects to a manufacturing system and is business critical. All the other computers are
joined to the domain and run the Semi-Annual Channel version of Windows 10.
In the domain, you create four groups named Group1, Group2, Group3, and Group4.
Computer2 has the local Group Policy settings shown in the following table.
https://vceplus.com/
www.vceplus.com - Free Questions & Answers - Online Courses - Convert VCE to PDF - VCEplus.com
The computers are updated by using Windows Update for Business.
Requirements
Planned Changes
Contoso plans to purchase computers preinstalled with Windows 10 Pro for all the San Diego office users.
https://vceplus.com/
www.vceplus.com - Free Questions & Answers - Online Courses - Convert VCE to PDF - VCEplus.com
Technical requirements
The computers in the San Diego office must be upgraded automatically to Windows 10 Enterprise and must be joined to Azure AD the first time a user starts
each new computer. End users must not be required to accept the End User License Agreement (EULA).
Helpdesk users must be able to troubleshoot Group Policy object (GPO) processing on the Windows 10 computers. The helpdesk users must be able to identify
which Group Policies are applied to the computers.
Users in the HR department must be able to view the list of files in a folder named D:\Reports on Computer3.
ComputerA must be configured to have an Encrypting File System (EFS) recovery agent.
Quality update installations must be deferred as long as possible on ComputerA.
Users in the IT department must use dynamic look on their primary device.
User6 must be able to connect to Computer2 by using Remote Desktop.
The principle of least privilege must be used whenever possible.
Administrative effort must be minimized whenever possible.
Assigned access must be configured on Computer1.
QUESTION 1
You need to meet the technical requirement for User6.
Correct Answer: B
Section: [none]
Explanation
Explanation/Reference:
QUESTION 2
You need to meet the technical requirement for the IT department users.
https://vceplus.com/
www.vceplus.com - Free Questions & Answers - Online Courses - Convert VCE to PDF - VCEplus.com
A. Issue computer certificates
B. Distribute USB keys to the IT department users.
C. Enable screen saver and configure a timeout.
D. Turn on Bluetooth.
Correct Answer: D
Section: [none]
Explanation
Explanation/Reference:
References:
https://support.microsoft.com/en-za/help/4028111/windows-lock-your-windows-10-pc-automatically-when-you-step-away-from
https://vceplus.com/
www.vceplus.com - Free Questions & Answers - Online Courses - Convert VCE to PDF - VCEplus.com
Question Set 2
QUESTION 1
A user named User1 has a computer named Computer1 that runs Windows 10.
User1 connects to a Microsoft Azure virtual machine named VM1 by using Remote Desktop.
When the VPN connection is established, User1 cannot connect to VM1. When User1 disconnects from the VPN, the user can connect to VM1.
You need to ensure that User1 can connect to VM1 while connected to the VPN.
A. From the proxy settings, add the IP address of VM1 to the bypass list to bypass the proxy.
B. From the properties of VPN1, clear the Use default gateway on remote network check box.
C. From the properties of the Remote Desktop connection to VM1, specify a Remote Desktop Gateway (RD Gateway).
D. From the properties of VPN1, configure a static default gateway address.
Correct Answer: B
Section: [none]
Explanation
QUESTION 2
You have 200 computers that run Windows 10 and are joined to an Active Directory domain.
You need to enable Windows Remote Management (WinRM) on all the computers by using Group Policy.
Which three actions should you perform? Each correct answer presents part of the solution.
A. Set the Startup Type of the Windows Remote Management (WS-Management) service to Automatic.
B. Enable the Windows Firewall: Allow inbound remote administration exception setting.
C. Enable the Allow remote server management through WinRM setting.
https://vceplus.com/
www.vceplus.com - Free Questions & Answers - Online Courses - Convert VCE to PDF - VCEplus.com
D. Enable the Windows Firewall: Allow inbound Remote Desktop exceptions setting.
E. Enable the Allow Remote Shell access setting.
F. Set the Startup Type of the Remote Registry service to Automatic.
Explanation/Reference:
References: http://www.mustbegeek.com/how-to-enable-winrm-via-group-
policy/
QUESTION 3
A user has a computer that runs Windows 10.
When the user connects the computer to the corporate network, the user cannot access the internal corporate servers. The user can access servers on the
Internet.
You run the ipconfig command and receive the following output.
You send a ping request and successfully ping the default gateway, the DNS servers, and the DHCP server.
https://vceplus.com/
www.vceplus.com - Free Questions & Answers - Online Courses - Convert VCE to PDF - VCEplus.com
Which configuration on the computer causes the issue?
Correct Answer: A
Section: [none]
Explanation
Explanation/Reference:
QUESTION 4
You have 15 computers that run Windows 10. Each computer has two network interfaces named Interface1 and Interface2.
You need to ensure that network traffic uses Interface1, unless Interface1 is unavailable.
Correct Answer: A
Section: [none]
Explanation
Explanation/Reference:
References:
https://tradingtechnologies.atlassian.net/wiki/spaces/KB/pages/27439127/How+to+Change+Network+Adapter+Priorities+in+Windows+10
https://docs.microsoft.com/en-us/powershell/module/nettcpip/set-netipinterface?view=win10-ps
QUESTION 5
Your network contains an Active Directory domain. The domain contains 10 computers that run Windows 10. Users in the finance department use the computers.
https://vceplus.com/
www.vceplus.com - Free Questions & Answers - Online Courses - Convert VCE to PDF - VCEplus.com
You have a computer named Computer1 that runs Windows 10.
From Computer1, you plan to run a script that executes Windows PowerShell commands on the finance department computers.
You need to ensure that you can run the PowerShell commands on the finance department from Computer1.
A. From the local Group Policy, enable the Allow Remote Shell Access setting.
B. From the local Group Policy, enable the Turn on Script Execution setting.
C. From the Windows PowerShell, run the Enable-MMAgent cmdlet.
D. From the Windows PowerShell, run the Enable-PSRemoting cmdlet.
Correct Answer: D
Section: [none]
Explanation
Case Study
This is a case study. Case studies are not timed separately. You can use as much exam times as you would like to complete each case. However, there
may be additional studies and sections on this exam. You must manage your time to ensure that you are able to complete all questions included on this exam in
the time provided.
To answer the questions included in a case study, you will need to reference information that is provided in the case study. Case studies might contain exhibits
and other resources that provide more information about the scenario that is described in the case study. Each question is independent of the other questions in
this case study.
At the end of this case study, a review screen will appear. This screen allows you to review your answers and to make changes before you move to the next
section of the exam. After you begin a new section, you cannot return to this section.
Contoso, Ltd. is a consulting company that has a main office in Montreal and two branch offices in Seattle and New York.
https://vceplus.com/
www.vceplus.com - Free Questions & Answers - Online Courses - Convert VCE to PDF - VCEplus.com
Contoso has IT, human resources (HR), and finance departments.
Contoso recently opened a new branch office in San Diego. All the users in the San Diego office work from home.
Existing environment
The on-premises network contains an Active Directory domain named contoso.com. The domain is synced to Microsoft Azure Active Directory (Azure AD).
You have four computers named Computer1, Computer2, Computer3, and ComputerA. ComputerA is in a workgroup on an isolated network segment and runs
the Long Term Servicing Channel version of Windows 10. ComputerA connects to a manufacturing system and is business critical. All the other computers are
joined to the domain and run the Semi-Annual Channel version of Windows 10.
In the domain, you create four groups named Group1, Group2, Group3, and Group4.
Computer2 has the local Group Policy settings shown in the following table.
https://vceplus.com/
www.vceplus.com - Free Questions & Answers - Online Courses - Convert VCE to PDF - VCEplus.com
Computer1 has the local users shown in the following table.
Requirements
Planned Changes
Contoso plans to purchase computers preinstalled with Windows 10 Pro for all the San Diego office users.
Technical requirements
The computers in the San Diego office must be upgraded automatically to Windows 10 Enterprise and must be joined to Azure AD the first time a user starts
each new computer. End users must not be required to accept the End User License Agreement (EULA).
Helpdesk users must be able to troubleshoot Group Policy object (GPO) processing on the Windows 10 computers. The helpdesk users must be able to identify
which Group Policies are applied to the computers.
Users in the HR department must be able to view the list of files in a folder named D:\Reports on Computer3.
ComputerA must be configured to have an Encrypting File System (EFS) recovery agent.
Quality update installations must be deferred as long as possible on ComputerA.
https://vceplus.com/
www.vceplus.com - Free Questions & Answers - Online Courses - Convert VCE to PDF - VCEplus.com
Users in the IT department must use dynamic look on their primary device.
User6 must be able to connect to Computer2 by using Remote Desktop.
The principle of least privilege must be used whenever possible.
Administrative effort must be minimized whenever possible.
Assigned access must be configured on Computer1.
QUESTION 1
You need to meet the quality update requirement for ComputerA.
https://vceplus.com/
A. 14 days
B. 10 years
C. 5 years
D. 180 days
E. 30 days
Correct Answer: B
Section: [none]
Explanation
Explanation/Reference:
References: https://docs.microsoft.com/en-us/windows/deployment/update/waas-
overview
https://vceplus.com/
www.vceplus.com - Free Questions & Answers - Online Courses - Convert VCE to PDF - VCEplus.com
Question Set 2
QUESTION 1
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might
meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
You test Windows updates on Computer1 before you make the updates available to other users at your company.
You install a quality update that conflicts with a customer device driver.
Solution: From System Restore, you revert the system state to a restore point that was created before the update was installed.
A. Yes
B. No
Correct Answer: B
Section: [none]
Explanation
QUESTION 2
You have 100 computers that run Windows 10. The computers are in a workgroup.
You need to reduce the amount of Internet bandwidth consumed to download updates.
https://vceplus.com/
www.vceplus.com - Free Questions & Answers - Online Courses - Convert VCE to PDF - VCEplus.com
B. BranchCache in distributed cache mode
C. Delivery Optimization
D. Background intelligent Transfer Service (BITS)
Correct Answer: C
Section: [none]
Explanation
Explanation/Reference:
References: https://support.microsoft.com/en-us/help/4468254/windows-update-delivery-optimization-
faq
QUESTION 3
You have a computer that runs Windows 10.
You discover that Windows updates are failing to install on the computer.
You need to generate a log file that contains detailed information about the failures.
A. Get–LogProperties
B. Get–WindowsErrorReporting
C. Get–WindowsUpdateLog
D. Get–WinEvent
Correct Answer: C
Section: [none]
Explanation
Explanation/Reference:
References: https://docs.microsoft.com/en-us/powershell/module/windowsupdate/get-windowsupdatelog?view=win10-
ps
QUESTION 4
HOTSPOT
You are planning a recovery strategy for computers that run Windows 10.
https://vceplus.com/
www.vceplus.com - Free Questions & Answers - Online Courses - Convert VCE to PDF - VCEplus.com
You need to create recovery procedures to roll back feature updates and quality updates.
What should you include in the procedures? To answer, select the appropriate options in the answer area.
Hot Area:
Correct Answer:
https://vceplus.com/
www.vceplus.com - Free Questions & Answers - Online Courses - Convert VCE to PDF - VCEplus.com
Section: [none]
Explanation
Explanation/Reference:
References:
https://www.thewindowsclub.com/rollback-uninstall-windows-10-creators-update https://www.dummies.com/computers/pcs/undo-
windows-update/
QUESTION 5
You have a computer that runs Windows 10.
You need to start the computer into the Windows Recovery Environment (WinRE).
A. Turn off the computer. Turn on the computer, and then press F8.
B. Turn off the computer. Turn on the computer, and then press F10.
C. From the sign-in screen, hold the Shift key, and then click Restart.
D. Hold Alt+Ctrl+Delete for 10 seconds.
Correct Answer: C
Section: [none]
Explanation
Explanation/Reference:
References: https://docs.microsoft.com/en-us/windows-hardware/manufacture/desktop/windows-recovery-environment--windows-re--technical-
reference
QUESTION 6
Your company purchases 20 laptops that use a new hardware platform.
https://vceplus.com/
www.vceplus.com - Free Questions & Answers - Online Courses - Convert VCE to PDF - VCEplus.com
What should you use?
A. Reliability Monitor
B. Task Manager
C. System Configuration
D. Performance Monitor
Correct Answer: A
Section: [none]
Explanation
Explanation/Reference:
References: https://lifehacker.com/how-to-troubleshoot-windows-10-with-reliability-monitor-
1745624446
QUESTION 7
You have a computer named Computer1 that runs Windows 10 and has an application named App1.
You need to use Performance Monitor to collect data about the processor utilization of App1.
A. Process
B. Processor Performance
C. Processor Information
D. Processor
Correct Answer: A
Section: [none]
Explanation
Explanation/Reference:
References:
https://www.cse.wustl.edu/~jain/cse567-06/ftp/os_monitors/index.html
https://vceplus.com/
www.vceplus.com - Free Questions & Answers - Online Courses - Convert VCE to PDF - VCEplus.com
https://vceplus.com/
https://vceplus.com/
www.vceplus.com - Free Questions & Answers - Online Courses - Convert VCE to PDF - VCEplus.com