You are on page 1of 133
MD — 100 : Windows 10 Examination Reviewer @ Instructions for use The MD-100: Windows 10 practice test is designed to help candidates prepare for and pass the Microsoft MD-100 exam. This exam is aimed at administrators who want to validate their skills Qualified candidates should be able to deploy Windows manage devices and data. Configure connectivity and maintain Windows in an enterprise environment. Candidates must also be familiar with M365 workloads. Ci) MD-100 This test contains 151 questions and covers the following objectives: Deploy Windows (15-20%) - 23 Manage Devices and Data (35-40%) - 61 Configure Connectivity (15-20%) - 21 Maintain Windows (25-30%) - 46 Deploy Windows @ Deploy Windows/10 Configure tanguage packs 2 Add languages to Window images: tios./acs microso com/anushvindows-hatdvara/manulacursdbioaladd language packs tevandous hie me if-c0227 © Migrate User Data ee User State Migration Tool (USMT) Techies! Reference hps/oes microee# comin ua)indauslseoioymentuervent + Peron a lean instalation 2 New Computer Daployment: ips J/decs mics comfen-slvindows deployment vindows-10-deplovment-scenatiosdnen- somite ‘= Peter an place upgrade (using tools such as MOT, WOS, ADK, ec) 2 Parr an inpace upgrade ta Windows 10 with MDT: lips docs mics comer us/vindowsdoploymonupyraivpgrads :uindoa-1Dvitsthe-meroaop-deployment olive me 409527 ‘© Scleciho appropiate Windows ection: ‘Compare Windows 10 business edtion: fos vArmw micrsof conlensusMVindowsForBusinessiComoare 2 Compare Windows 10 Home and Pro: ilps. moumciwsob.comen-uséandansicompate + Troublesneot actvaton sssuss > Using the Actvaton troubleshoot. ‘Volume Action: higs:/soca marsea8 com nus uindnwa/Sencymertanme-ectshon/uslums ection nds We de 8027 ‘Windows 10 Subseition Action: hipeoes merase comin usluindositeploymertvindous 10.ubecition aslaatianat.ne d=4039027 Deploy Windows Perform BOstinstallaion configuration Configure Edge and Intemet Explorer © Group Policy and Mobile Device Management (MDM) settings for Micrasoft Edge: hips docs. microsoft comven-usimicrosof.-edge/deploy/evailable-policies © Group Policy and Internet Explorer 11: htiosi/doos microsoft com/en. s/intemet exploreriie! 1-depiov quide/qroup-policy-andie12wtme_id=4039827 Configure mobiity settings Configure cellular settings for tablets and PCs: hiipsi/docs microsoft comien. uswindows/configuration/provisioring-apn’awt mc \G=4030827 © Azure AD, Microsoft Intune and Windows 10 —Using the cloud to modemize enterprise mobility s/techcomm unity microsofL. com/5/nterorise- Mobilty. Securitviba.o/enterorisemobiltyandsecurity Configure Sign-in options ‘Windows Hello for Business: hitps/idocs microsoft com/en usiwindows/securtyidentty protection/nello. for-businessihellodentity-veriication?t me id=4030827 Customize the Windows desktop Manage windows 10 Start and taskbar layout: ittps:/docs microsof comlen uswindows/confiquration/windows. 10.startlayout-oplions.and policies? wi me id=4030827 Manage Devices and Data ‘MahaGé local users, local groups, and devices ‘¢ Manage devices in directories © Manage corporate devices: hts docs microsoft com/en-us/windows/client-managemenk/manage-corporate devices? me id=4030827 © Manage locel groups © Assign local admins to Azure AD joined devices: ips docs microsoft comlen.usiazure/active- directorvidevices/assiqnloca-admin?wtsmc id=4029827 © Manage local users © Local accounts: hitps:/docs microsoft com/en-usWindows/secuntvidentity-protection/acress.cortraltocal- accounts?wtme id=4030827 Manage Devices and Data @ (CORAGUFE data access and protection ‘© Configure NTFS permissions © Access Control Overview: hitos docs microsoft com/en-usiwindows/secunty/idenily-protectamaccess- conirolaccess-controfwt mc id=4030827 ‘© Configure shared permissions © File Seer and SMB: tps (does microsoft comven-us Wwindows-server/storagesfile.serverifie.server-smb- ovewiew?wtime id=4039827 Manage Devices and Data e® (Configure devices by using local policies © Configure local reaistry © Open Registry Eattor in Windows 10: hitps://support microsoft comien-aufhelp 4027573iwindows-10-open- registry editor ‘* Implement Local Policy © Local Group Policy Editor: htips/idocs microsoft com/en-usiprevious-versions/windowsit-pro!windaws- servet-2008.R2-and-2008/cc725970(v=ws.11)2wL.me id=4030827 ‘* Troubleshoot group policies on devices © 10. Common problems Causing Group Policy to not app hitps #isocialtechnet microsoft, com/wiki/contents/arlicles!22457.10-common-problems-causing-aroup-policy- fo-notappiv aspx Manage Devices and Data @ Manage Windows security ‘© Configure User Account control (UAC) © User Account Control: https docs microsoft com/er-us/windows/securitidentity-orotectioniuser-account coniroluser-account-controloverviewwime id=4030827 ‘© Configure Windows Defender Firewall © Windows defender frewall tps /idocs microsoft com/en-us/windows/securitythreat-rotectionwindows- {irewallwindows-frewal-with-advanced.secutty-design-auide ‘© implement encryption © BitLocker: itps:idocs microsoft com/en-us/windows/securitwinformation-protection/itlocker/bitlacker overview Configure Connectivity @ configure Networking Configure cient IP settings (Change TCPIP Settings: hiips://suppatt microsoft comien-usihelp/1069windows-change-tep-ip-settings Configure mobile networking Configure celular settings for tablets and PCs: hitpsiidocs mcrosoft comien- uswindows/configuration/prowsioning-aprwt mc id=4030827 Configure VPN client ‘Connect to VPN in Windows 10: hitps//suoport microsof..comn/en aumnelp/205 1O/windows-10-connect-o.von Troubleshoot networking Fix network connection issues in Windows: https /suppart microsoft com/en-au/help/107.4wincows-fhe nnetwork-connaction issues Configure Wi-Fi profiles Wireless Profile Samples: hips:/docs microsoft com/en-us/windows/win32 natvewilwireless-profile. samples Configure Connectivity @ configure remoteeonnEEtivis: ‘© Configure remote management ‘= Windows Remote Management: https:iiiocs micrasof.comlen. usiwindowstwins 2iwinm/portaindexwt me id=4039627 © Enable PowerShell Remoting © Enable-PSRemoting: hiips:idocs microsoft com/en-usiwindows/confiquration/provisioning. apnwt me id=4020827 © Configure VPN clent © Conect to VPN in Windows 10: https /suppor microsofl.comlen-au/help/20510\windows-10-connect-to-ypn ‘© Troubleshoot networking © Fix network connection issues in Windows: hitps'/isupport microsoft com/en auihelp/10744.windows fh. network: connection issites © Configure WiFi profiles © Wireless Profile Samples: hitps //docs microsofl.comien-usiwindows/win32/nativewifiwireless-profle- samples Maintain Windows @ configure systerrianeeatalrecovery © Perform file recovery (including OneDrive) © Backup files and restore your files; hitos//support microsoft com/en-au/help/4027408windows-10-backup. and-esiore © Restore deleted files or folders in OneDrive: Htns:/support office. comfen-us/aticie/Restore-deleted-fles-or- {olders-n-GneDrive-949adaB0-0075-4ab3-a953.c908 305284" © Recover Windows 10 ‘© Recovery options in Windows 10: hits “support microsoft com/en.awhelp/1241S/windows.10.recovery. options ‘© Troubleshoot startuprboot process ‘= Troubleshoot windows boot problems for IT Pros: hitps:/docs microsoft. comien awwindonsicient management/advanced-roubleshooling-boot-problems © Secure Windows 10 boot process: hts /idocs microsoft comven.uss windows/secuntvinformation.. protection(secure-the.windows.10.boot-process © Howto use Windows Recovery Erwironment (WinRE) to troubleshoot common starlup issues bts /support microsoft. conden aufhelp’4026030/now-to-use-windows-recovery-ervironment-winre-to-roubleshoot- ‘commons me ig=4028007 Maintain Windows @ Manage updates ‘© Check for updates © Update Windows 10; hips /isupport microsoft. com/en-au/help/4027687iwindows-10-update ‘© Troubleshoot updates © Windows Update troubleshooting: hips Jidocs microsoft.com/en-us/windovis/deoloyment/ update ndows- undate-troubleshooting?wtme id=4039827 © Validate test updates © Prepare senicing strategy for Windows 10 updates: htipsvidocs microsoft com‘en. ushwindowss(deploymentupdateiwaas servicing strateqy -windows-10-updates?wt me ‘© Select the appropriate servicing channel © Windows as.a service: hilps’idocs microsoft comfen-usiwindowsideploymenVupdate/waas- overview2utme id=4030827 © Configure Windows update options ‘© Configure Windows Update for Business: htips/idocs microsoft com/en: usiwindows/deploymentupdateiwaas-confiqure- wut 1039827 Maintain Windows @ Monitor and manage Windows © Gonfigure and analyze event logs = Use Windows Event Forwarding to help with intrusion detection: ittps/docs microsoft comlen. siwindows'security/threat-protection/use.windows-evert-forwarding to-assist.in-ntrusion. detection?ime id=4039827 © Windows event collector: htipsi/docs microsoft com/en-us/nindows)win32iweciwindows.event collectorindex wa. me id=4030827 * Manage performance = Performance — Windows 10 Engineering: ntos:idocs microsoft com/en-us/wvindows-hardwareitestweq/weo performance?wi me id=4039827 © Manage Windows 10 environment © Client management: hits idocs microsoft com/en usiwindows/cient. management//2wt me i © Manage applications in Windows 10: htips:/docs microsoft com/en-usiwindows/apolication management/"9vi.me id=4030827 1039827 Q Dump Questions Topic 1 - Questionset 1 @ Question 1 ‘Your company has an isolated network used for testing, The network contains 20 computers that run Windows 10. The Computers are in a workgroup. During testing, the computers must remain in the workgroup. ‘You discover that none of the computers are activated. ‘You need to recommend a solution to activate the computers without connecting the network to the inieret ‘What should you include in the recommendation? A. Volume Activation Management Tool (VAMT) 8. Key Management Senice (KMS) C. Adtive Directory based activation D. the Get WindowsDeveloperlicense cmdlet Topic 1 - Question set 1 @ Question2 ‘You plan to deploy Windows 10 to 100 secure computers. You need to select a version of Windows 10 that meets the following requiremerts:| = Uses Microsoft Edge as the default browser @ Minimizes the attack surface on the computer == Supports joining Microsoft Azure Active Directory (Azure AD) «© Only allows the installation of applications fram the Microsoft Store ‘What i the best version to achieve the goal? More than one answer choice may achieve the goal. Select the BEST answer. Windows 10 Pro in S mode Windows 10 Home in S mode Windows 19 Pro Windows 10 Enterprise seapr Topic 1 - Question set 1 @ Question 3 DRAG DROP - ‘You have a computer named Computert that runs Windows 7. Computer has a local user named Usert who has a customized profile (On Gomputert, you perfor a clean installation of Windows 10 without formating the dives ‘You need to migrate the settings of User! trom Windows7 to Windows 10. Which two actions should you perform? To answer, drag the appropriate actions to the correct targets. Each action may be Used once, more than once, or not atall You may need to drag the spit bar between panes or scrol to view content. NOTE: Each correct selection is worth one point Select and Place Topic 1 - Questionset 1 @ Question4 Note: This question is part of a series of questions that present the same scenaro. Each question in he series contains a unique solution that might meet the stated goals. ‘Some question sels might have more than one correct solution, while others might not have a correct solution. After you answer a question in this section, you will NOT be able to retum to it. As aresut, these questions will not appear inthe review screen You have a computer named Compulert that runs Windows —n Asetvice named Appicationt is corfigured as shown in the exhibit. ‘You discover that a user used the Servicet account to sign into Computert and deleted son files. You need to ensure that the identty used by Application! cannot be used by a Use! 10 Si irnyane into sign in to the desktop on Computert. The solution must use the pnnciple of least privileg: Solution: On Computer’, you configure Application’ to sign in as the LocalSystem account ar select the Allow service to interact with desitop check box. You delete the Senicet accourt Does this meet the goal? A. Yes B No Topic 1 - Questionset 1 @ Question5 Note: This question is part of a series of questions that present the same scenario. Each ‘question inthe series contains a unique solution that might meet the stated goals. Some ‘question sels might have more than one correct solution, while others might not have a correct solution, ‘After you answer a question in this section, you will NOT be able to retum to it ‘Asa result, these questions will not appear in the review screen You have a computer named Computert that runs Windows 10, Assenvice named Application’ is configured as shown in the exnibit ‘You discover that a user used the Servicet account to sign into Computert and deleted some files. You need to ensure that the identty used by Applicationt cannot be used by ‘user to sign info sign into the desktop on Computert. The solution myst use the principle of east privilege. Solution: On Computer, you assign Servicet the deny log on locally user night. Does this meet the goal? A Yes B No (50 wy sr) tae bets Denne Set tome Sota | Co Coe Ser) 2 Topic 1 - Questionset 1 @ Question6 Note: Ths queston is pat ofa series of questions hat presen ne same scenario. Ean SRR lS ‘question in the series contains a unique solution that might meet te stated goals. Some ‘question sets might have more than one correct solution, wile others might not have ams "Besoin correct solution, ame ‘After you answer a question in this section, you will NOT be able to retum to it eben ‘Asa resuf, these questions will not appear in the review screen Ari You have a computer named Computert that runs Windows 10. Cine oar Asenvice named Application’ is configured as shown in the exhibit ce ‘You discover that a user used the Servicet account fo sign into Computer and deleted Grinsenw some files. You need to ensure that the identty used by Applicationt cannot be used by a user fo sign in to sign into the desktop on Compufer1. The solution must use the principle of least privilege Solution: On Computer, you assign Service’ the deny log on as a service user right Does this meet the goal? A Yes B No a Topic 1 - Questionset 1 @ Question7 ‘You have a Microsoft Azure Active Ditectory (Azure AD) tenant. Signin options ‘Some users sign in to their computer by using Windows Hello for Business, ‘A.user named Usert purchases a new computer and joins the computer to Azure AD. User’ attempts to configure the sign-in options and receives the e1ror message shown in “see ngs eh rane ye gaan ‘the exhibit. \ ° ‘Windows Hello You open Device Manager and confi that al he hardware works conecty Seneca emilee ‘You need to ensure that User! can use Windows Hello for Business facial recognition {o sign into the computer. ins i avon se ‘What should you do fist? A. Purchase an infrared (IR) camera, 1B. Upgrade the computer to Windows 10 Enterprise, Enable UEFI Secure Boot D._ Install virtual TPM driver. 2 Topic 1 - Questionset 1 @ Question 8 ‘Your company uses Microsoft Deployment Tookit (MDT) to deploy Windows 10 to new computers. ‘The company purchases 1,000 new computers ‘You need to ensure that the Hyper-V fealure Is enabled on the computers during the deployment ‘What are two possible ways to achieve the goal? Each correct answer presents part of the solution, NOTE: Each correct selection is worth one point A Adda task sequence step that adds a provisioning package. B._ In a Group Policy abject (GPO), from Computer Configuration, configure Application Control Policies. © Adda custom command to the Unattend xm! fle D. Adda configuration setting to Windows Deployment Services (WDS), E. Adda task sequence step that runs dism exe. a Topic 1 - Question set 1 @ Question9 ‘Your network contains an Active Directory domain that is synced to @ Microsoft Azure Active Directory (Azure AD) tenant. Your company purchases a Mictosof 365 subscription. ‘You need to migrate the Documents folder of users to Microsoft OneDive for Business ‘What should you coniqure? A. One Drive Group Policy settings 1B. roaming user profiles C. Enterprise State Roaming D._ Folder Redirection Group Policy settings Topic 2 - Question set 2 @ Question 1 Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a Unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might nol have a corect solution ‘Afler you answer a question in this section, you will NOT be able to elu toi As a result, these questions will not appear in the review screen ‘You have a computer named Computert that runs Windows 10, The computer contains a folder. The folder contains sensitive data, ‘You need to log which user reads the contents of the folder and modifies and deletes files in the folder Solution: From the properties of the folder, yau configure the Auditing settings and from Audit Pokcy inthe local Group Policy, ‘you configure Audit object access. Does this meet the goal? A Yes B. No 25 Topic 2 - Question set 2 @ Question2 Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a Unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might nol have a corect solution ‘Afler you answer a question in this section, you will NOT be able to elu toi As a result, these questions will not appear in the review screen ‘You have a computer named Computert that runs Windows 10, The computer contains a folder. The folder contains sensitive data, ‘You need to log which user reads the contents of the folder and modifies and deletes files in the folder Solution: From the properties of the folder, you configure the Auditing settings and frem the Audit Policy inthe local Group Policy, you configure Audit directory service access, Does this meet the goal? A. Yes B No 26 Topic 2 - Question set 2 @ Question3 HOTSPOT - ‘You have a computer named Computer 1 that runs Windows 10. ‘You turn on System Protection and create a restore point named Pointt ‘You perform the folowing changes: = Add four files named Filet tt, File2 dl, File3 sys, and File4 exe to the desktop. «© Run a configuration script that adds the following four registry keys ~ Key! toHKEY_CURRENT_USER Key2 to HKEY_CLASSES_ROOT Key3 to HKEY LOCAL MACHINE'SYSTEM ~ Key4 to HKEY_CURRENT_CONFIG ‘You restore Point! Which flles and registry Keys are removed? To answer, select the appropriate optians in the answer area NOTE: Each correct selection is worth one point Hot Area: a Topic 2 - Question set 2 @ Question4 HOTSPOT - You have 10 computers that run Windows 10. ‘You have a Windows Server Update Senvces (WSUS) server. ‘You need to configure the computets to instal updates from WSUS, Which two settings should you configure? To answer, select the appropriate options in the answer area NOTE: Each correct selection is worth one point Hot Avea: 2 Topic 2 - Question set 2 @ Question5 ‘Your network contains an Active Directory domain. The domain contains 1,000 computers that run Windows 10. ‘You discover that when users are on their lock screen, they see a different background image every day, along with tips for Using diferent features in Windows 10. ‘You need to disable the tips and the daily backaround image for all he Windows 10 computers Which Group Policy setings should you modify? A. Tum off the Windows Welcome Experience B_ Tum off Windows Spotlight on Settings © Donot suggest third party content in Windows spotlight D. Tum off all Windows spotlight features Topic 2 - Question set 2 HOTSPOT - Question6 ‘You have a computer named Computert that runs Windows 10. Computert contains a foider named Data on drive C The Advanced Secunty Settings for the Data folder are shown in the exhibit. (Click the Exhibi You shave C:\Data as shown in he following table. Group or wer ‘Share permision Adana ‘Change Users Read User ‘Change is tue Otherwise, select No. NOTE: Each correct selection is worth one point Hot Area: it tab.) issions to C:)Data. © statement oo aa Init soenpinti. Rimes te Tremble rea <= 2 xaos In Ppetmee Dilnine mentee =e ae 0 Topic 2 - Question set 2 @ Question7 ‘You have a file named Regt reg that contains the following content windows stry Pater Yersion 5.90 [nner_cunssts_acon\izectory\Bactground\ shel \sotepad) (c1asees_#002\Dixectory\Eacksrourd\ shell \Motepad\ comand] feraoteped. exe” A. Akey named command will be renamed as nolepad.exe, B. In akey named Notepad, the command value will be set to @: C. In akey named command, the default value \ jotepad exe" willbe set to notepad exe. 2 Topic 2 - Question set 2 @ Question 8 ‘You have a computer named Computert that runs Windows 10, (On Computert, you create the local users shown in the following table. Which three user profiles will persist after each user signs out? Each correct answer presents part of the solution. NOTE: Each correct selection is worth one point A. Usert User? Users D. User E Users 2 Name Member of User! Users User2 Users, Guests User3 Power Users, Guest User4. Guests, Users, Administrators Users Users, Distributed COM Users Topic 2 - Question set 2 @ Question9 HOTSPOT - ‘You have a computer that runs Windows 10. The computer is ina workgroup. The computer is used to provide visitors with access to the Intemet ‘You need to configure the computer to meet the folowing requirements: = Always sign n automatically as User’ <@ Slait an application named App'texe at signin. ‘What should you use to meet each requirement? To answer, select the appropiate options in the answer area, NOTE: Each correct selection is worth one point Hot Avea: 2 Topic 2 - Question set 2 @ Question 10 You have 20 computers that un Windows 10. The computers ate in a workgroup. You need to create a local user named Admin1 on all the computers. Admin? must be a memiber of the Remote Management Users group. ‘What should you do? A 8 © D. From Windows Configuration Designer, create a provisioning package, and then run the provisioning package on each computer (Create a script that runs the New-ADUser emalet and the Set-AdGroup cma Create & Group Policy object (GPO) that contains the Local User Group Policy preference. Greate a script that runs the New-MsolUser cmalet and the Add-ADComputerServiceAccount cmdlet Topic 2 - Question set 2 @ Question 11 ‘You have several computers that run Windows 10. The computers are in a workaroup and have BitLocker Drive Encryption (BitLocker) enabled. ‘You join the computers to Microsoft Azure Active Directory (Azure AD) ‘You need to ensure that you can recover the BitLocker recovery key for the computers from Azure AD. ‘What should you do firs? A. Disable BitLocker B. Adda BitLocker key protector. Suspend BitLocker. D. Disablethe TMP chip, Topic 2 - Question set 2 @ Question 12 HOTSPOT - ‘Your network contains an Active Directory forest. The forest contains a root domain named contaso.com and a child domain named corp contoso com. ‘You have a computer named Compulert that tuns Windaws 10. Computert is joined to the corp cantoso com domain, Computer’ contains a folder named Foldert. In the Securty settings of Folder’, Everyone is assigned the Full control permissions ‘On Computer, you share Folder! as Sharet and assign the Read permissions for Shavet to the Users group. For each af the following statements, select Yes ifthe statement is rue. Otherwise, select No. NOTE: Each correct selection is worth one point Hot Avea: 36 Topic 2 - Question set 2 @ Question 13 HOTSPOT You have a computer named Computer that runs Windows 10. Computer Computer! contains the folders chown in the folowing table, 5 isin a workgroup Name Volume File sytem Permission Folder c NIFS Fall contol to Everyone Folder? ec NTFS Fall contol to Everyone Folder} 1D NIFS. Full control to Everyone Name Member of User! Users 4 . ymed C:Foldert User2 Backup Operators, Users tre appropriate options inthe answer area 1] User3 Cryptographic Operators, Users "sens ‘Administrators, Users a Topic 2 - Question set 2 @ Question 14 HOTSPOT - ‘You have a computer named Comoutert that runs Windows 10 and is joined to an Aciive Directory domain named adatum. com, ‘Auuser named Admint signs in to Computert and runs the whoami command ‘as shown in the following exhibit. Use the drop-down menus fo select the answer choice that completes each statement based onthe information presented in the graphic. NOTE: Each corect selection is worth one point Hot Area le assatnssan se fos fry fg eRe ie Semeeme £ eaten cher £ Piemonte Sinanger laeereese ee SMES er ee emricinieciian By" ese ae tection ‘eden Bette de lmasoriclape lawn eames fen hig stato itimdeniiige Gange be Be tee 28 Topic 2 - Question set 2 @ Question 15 You have a computer named Computert that runs Windows 10. You need to configure User Account Gontral (UAG) to prompt administrators for their cradertias ‘Which settings should you mosity? Administrators Propettes in Local Users and Groups User Account Conitol Settings in Control Panel ‘Security Options in Local Group Poicy Eaitor User Rights Assignment in Local Group Policy Editor com> 2 Topic 2 - Question set 2 @ Question 16 ‘You have several computers that run Windows 10. The computers are ina workgroup. ‘You need to prevent users from using Microsoft Store apps on their computer ‘What are two possible ways fo achieve the goal? Each corect answer presents part ofthe solion NOTE: Each correct selection is worth one point. From Secuty Settings in the local Group Policy, configure Secutity Options. From Administrative Templates inthe local Group Poicy, configure the Store setings From Security Settings in the local Group Policy, configure Software Restriction Policies. From Secuiity Setings in the local Group Policy, configure Application Control Policies. pomp “0 Topic 2 - Question set 2 @ Question 17 ‘You have a computer named Comoutert that runs Windows 10, ‘You need to prevent standard users from changing the wireless network seitings on Computer. The solution must allow administrators fo modify the wireless network setings, ‘What should you use? Windows Configuration Designer MSConfig Local Group Policy Ealtor A B. c D._an MMC console that has the Group Policy Object Editor snap-in a Topic 2 - Question set 2 Question 18 HOTSPOT - ‘You have three computers that run Windows 10 as shown in the folowing table. Name TPM version Operating system Computer! None Windows 10 Enterprise Computer? 2.0 Windows 10 Pro Computer3 12 Windows 10 Enterprise ‘disabled on ‘Which volumes can you encrypt by using BitLocker Drive Encryption (BitLocker? To answer, select the appropriate options in the answer area, NOTE: Each correct selection is worth one point Hot Area: 2 Topic 2 - Question set 2 Windows 10. Question 19 Your network contains an Active Directory domain named contoso.com. The domain contains named Computert that runs On Computer’, you create an NTFS folder and assign Full contol permissions to Everyone. ‘You shave the folder as Share? and assign the permissions shown in the folowing table. Name _| Permission Userl_—_| Full control V User? | Change the salon h two actions can be performed by Usert but not by User2? Each comect answer presents part of NOTE: Each correct selection is worth one point moos Delete a fle created by another user. Set the permissions for a file Rename a file crealed by another user Take ownership of fle. Copy afile created by another user to a subfolder. 4a Topic 2 - Question set 2 HOTSPOT ‘You have a computer that runs Windows 10. The computer contains a folder named CSOs that is shared in ISOs. ‘You run several commands on the computer as shown in the folowing exhibit Question 20 Use the drop-down menus to select the answer choice that completes each statement based on the information presented in the graphic. NOTE: Each correct selection is worth one point Hot Avea: Topic 2 - Question set 2 @ Question 21 Note: This question is pat ofa series of questions thal present the same scenario Each question inthe series contains @ unique solution that mighl meet the stated goals. Some question sets might have more than ane correct solution, while others might nat have a correct ‘solution. ‘iter you answer a question inthis section, you vill NOT be able to return to. As a result these questions wll not appear inthe review ‘A.user named User’ has a computer named Computer! that runs Windows 10. Computer! isjoined to an Azure Active Directory (Azure ‘AD) tenant named contoso.com. User! joins Computert to contaso.com by using user! @contoso.com. Corrputer{ contains a folder narned Foldert-Foldert isin erive Cand is shared as Share1. Sharet has the persion shown in the folowing table [Group ‘Share permission A Bveyooe Full onal hat runs Windows 10. User2 joins Computer? to contose.com by using ul ArureAD wel cota com | Ovze Unie masrigreiv ewewes wrener ms aS nl QFTOF Message: 4€ceThe usemame or passwords incorrect #€ ‘You need to ensure that User? can connectio Share! Solution: In Azure AD, you create group named Group! that contains Usert and User2. You grant Group Change access to Sharet Does this meet the goat? AL Yes B. No Answer B 45 Topic 2 - Question set 2 @ Question 22 Note: This questions pat ofa series of questions thal present the same scenario Each question inthe series contains @ unique solution thal mighi meet the stated goals. Some question sets might have more than ane correct solution, while others might nat have a correct ‘solution, ‘iter you answer a question inthis section, you wll NOT be able to return to. As a result, these questions vill net appear in the review ‘A.user named User2 has a computer named Computer? that runs Windows 10. User? joins Computer2 to contose.com by using ‘user2@contoso.com. Computer! contains 2 folder named Foldert. Folder! isin drive C and is shared as Share. Share! hasthe permission shavinin the folowing table | Group [Everson '[AaweAD user Tsontsacon | Onner ——— SSS ld error message: a€ceThe usemame or passwords incorrect 3€ ‘You need to ensure that User? can connect ta Sharet Solution: You create a local user account on Computer! and instruct Uses? to use the local account to connectto Sharet Does this meet the goal? A Yes B. No hat runs Windows 10. User? joins Computer? to contose.com by using 4 Topic 2 - Question set 2 @ Question 23 Note: This questions pat ofa series of questions thal present the same scenario Each question inthe series contains @ unique solution thal mighi meet the stated goals. Some question sets might have more than ane correct solution, while others might nat have a correct ‘solution, ‘iter you answer a question inthis section, you wll NOT be able to return to. As a result, these questions vill net appear in the review ‘A.user named User! has a computer named Computert that runs Windows 10. Computer! isjoined to an Azure Active Directory (Azure ‘AD) tenant named contoso.com. User! joins Computer! 9 cortaso.com by using user! @contaso,com. Computer’ contains afolder famed Folder! Foldert isin drive C and is shared as Share1. Sharet has the permission shown in the folloing table Group ‘Stare permission Evenone Ful cote AnreAD sel onion com | Orme Userz attempts io access Share! ard recewes he folowing error message: 4€ceThe username or passwordis incorrect 4€ ‘You need to ensure that User2 can connectto Share! Solution: n Azure AD, you createa group named Group! that contains Usert and User2. You atant Group! Modty access o Foldert Does this meet the goal? hat runs Windows 10. User? joins Computer2 to contoso.com by using AD Yes B. No ASHER a Topic 2 - Question set 2 @ Question 24 ‘You have a computer named Computert that runs Windows 10. Computert contains a folder named Folder’ ‘You need to log any users who take ownership of the fles in Foldert ‘Which two actions should you perform? Each correct answer presents part of the solution, NOTE: Each correct selection is worth one point ‘A. Modity the folder attributes of Faldert B. Modily the Advanced Secuily Settings for Foldert From a Group Policy object (GPO), configure the Audit Sensitive Privilege Use setting 1D. From a Group Policy object (GPO), configure the Auct File System setting E. Install the Remote Server Administration Tools (RSAT), 4 Topic 2 - Question set 2 @ Question 25 HotsPor - “Your network: contains an Active Directory domsin The domain contain the users shown in the following tl Se ast ied 1 Ts {= User Dany Wrt= = Group! low Road = Group? Alow Mecty Folder! ie shared as Sharet8. Share’ has the folloing configurations se Everyone” fll Full eal ‘> Access based enumeration. Enabled For each ofthe ‘ollouing statements, selact Yea the statement eros Others, seine la NOTE: Each conect selection worn one port, Hoc ea swe Some we sti Unters 6) ()ernecnia nnn nado G) ie) pcccmraeracmoe {cmc ten tn Sv 0 0 {ees et on Ft ieee 140 Compitrt that ne Windows 10. Computer? certain folder nara Felder that ha the following eur ooF ° “ Topic 2 - Question set 2 @ Question 26 You are a network administrator at your company, ‘Tne company uses an application that checks for network connectivity to a sener by sending a ping request to the IPV6 address of the server replies, the application loads. ‘Auuser cannot open the application ‘You manually send the ping request from the computer of the user and the server does nat reply. You sand the ping request from your computer and the server replies. You need to ensure that the ping request works from the user4e™s computer Which Windows Defender firewall ie is a possible cause of the issue? File and Printer Shanng (NB-Datagram4n) File and Printer Sharing (Echo equest ICMPYé-Out) File and Printer Sharing (NB-Datagram-Out) File ang Printer Sharing (Echo Request |CMPV6-In) son 50 Topic 2 - Question set 2 @ Question 27 HOTSPOT Use tne drop-down menus to select the answer choice that completes each statement based on the information presented on the graphic. NOTE. Each correct selection is worth one point Hot Area: Topic 2 - Question set 2 @ Question 28 HOTSPOT - ‘You have a computer named Computeré that runs Windows 10 that is used to share documents in a workgroup. ‘You create three users named User-a, User-b, User-c. The users pian to access Computerd from the network only ‘You have a folder named Data. The Advanced Security Setings for the Data folder are shown in the Security exhibit. (Click the Security Exhibit tab). 2 Topic 2 - Question set 2 Question 28 You share the Data folder. The permission for Usera are shown in the User-a exhibit (Click the User a tab). [are shown inthe User-b exhibit. (Glick the Userb tab) | esr == (veomesoraure faa = Topic 2 - Question set 2 @ Question 28 The permissions for user-c are shown in the User-c exhibit. (Click the User-c tab.) For each of the following statements, select Yes ifthe statements is rue. Otherwise, select No NOTE. Reach correct selection is worth one point. fo Hot Area: \= Answer | Dea Statements Yes No is . é ‘User-a can modi fies in the Data share, o 0 User-a can mod fes inthe Data share. 0 ‘User-b can delete files inthe Data share, Oo 0 User can det flesin the Data share 0 oO User can read files in the Data share, Oo 0 Use can read fis in the Data shar Qo Topic 2 - Question set 2 @ Question 29 HotsPor - Name Path ‘Yo have computer that ins Windows 10 ond corti th flrs shou in he meen rar eee a Folie Colic FoldeB Folder Folie Fide Foe ‘You crete he groupe shown nthe eon tbl Tae Veabers Geol Goa, Uae Gros? Toa, ie OnFoldaA. you remove pemissionnheriace at ‘To each flde, you assign the NTFS permissione shai in the flowing tale ‘Gruss User, Users Fa each of he lowing statements slat You Whe sete ite. Gers, select Na HGH Cah care soon oh om pont Fae Perma ne Aes Feld Mako gt Answer Read w Group? Tae Wee Gong? Foe Res Gaps ‘Statements, Yes No ‘Statements Yes No. srt can nnd nt sin Fl o © set can read and ula sin Fle @ o ‘sa can dt afield oo Use cand a lesa Fle. o 6 ‘User can dll al fies in Folder io} 1G} User can delat afles in FoldrC. o O 55 Topic 2 - Question set 2 @ Question 30 ‘Your network contains an Active Directory domain. The domain contains @ computer named Computer! that runs Windows ‘You need to view the settings to Computer? by Group Policy ebjects (@POs) inthe domain and local Group Policies ‘Which command should you run? copresut secedit gpupdate gptixup com> 6 Topic 2 - Question set 2 @ Question 31 ‘Your network contains an Active Directory domain. The domain contains computers that run Windows 10. ‘You need to provide a user with the abil to remotely create and modify shares on the computers. The solution must use the principle of east privilege To which group should you add the user? Power Users Remote Management Users Administrators Network Configuration Operators comp st Topic 2 - Question set 2 @ Question 32 You have @ computernamed Computer’ that runs Windows 10. Computer belongsto @ workgroup. You run the following commands on Computer New-LocalUser a€"Name User1 a€NoPassword ‘Add-LocalGroupMember User 4€"Member User! ‘What is the effect ofthe configurations? ‘A. User is prevented from signing in until the user is assigned additional user rights. B. Usert appears on the sign-in screenand can sign in without a password. C. User! is prevented from signing in until an administrator manually sets a password forthe user. D. Usert appears on the sign-in screenand must set a new password on the first sign-in attempts 58 Topic 2 - Question set 2 @ Question 32 ‘You have a computer that runs Windows 10 and is joined to Azure Active Directory (Azure AD). You attempt to open Control Panel and receive the error message shown on the following exit. B. the Local Group Policy G_ the Settings app D. a Group policy preference 0 Topic 2 - Question set 2 @ Question 33 HOTSPOT ‘Your domain contains narned Computer named Compuitert that runs Windows 10. Computert does not have a TPH ‘You need tobe able to encrypt the C cve by using Blocker Drive Encryption (BitLocker). The solution mustensure thatthe recovery key is storedin Actne Directory. ‘Whichtwo Group Policy settings should you configure? To answer, select the appropriate settingsin the answer area NOTE: Each correct selection is worth ane point Hot Area [ g & “a 60 Topic 2 - Question set 2 @ Question 35 ‘You have a public computer named Computer! that runs Windows 10) Computer contains a folder named Foldert ‘You need to provide a user named User‘ with the ability to modify the permissions of Folder1. The solution rust use the principle of east privilege ‘Which NTFS permission should you assign to Usert? A. Full control B. Modify Write D. Read & execute a Topic 3 - Question set 3 @ Question 1 ‘Your company has a wireless access point that uses WPA2 Enterprise ‘You need to configure @ computer to connect to the wireless access point. ‘What should you do first? Create a provisioning package in Windows Configuration Designer. Request a passotrase. Request and install a certificate Create a Connection Manager Administration Kit (CMAK) package com> 2 Topic 3 - Question set 3 @ Question2 ‘A.user named User has a computernamed Computer! that runs Windows 10, User connectsto a Microsoft Azure virtual machine named VM" by using Remote Desktop. User createsa VPN connectionto a partner organization ‘When the VPN connection is established, User! cannot connectto VM1. When User! disconnectsfrom the VPN, the user can connect to VM You need to ensure that User! can connectto VMI while connected othe VPN. ‘What should you do? ‘A. Fromthe proxy settings, add the IP address of VM/ to the bypass list to bypass the proxy. B. Fromthe properties of VPN, clear the Use default gateway on remote network checkbox C. Fromthe properties of the Remote Desktop connectionto VM1, specify a Remote Desktop Gateway (RD Gateway) D. Fromthe properties of VPN1, configurea static default gateway address. 8 Topic 3 - Question set 3 @ Question 3 Your network contains an Active Directory domain. The domain contains a user named Admin‘. All computers run Windows 10. You enable Windows PowerShell remoting on the computers, You need to ensure that Admin1 can establish remote PowerShell connectionsto the computers. The solution must use the principle of least privilege. ‘To which group should you add Admin1? A. Access Control Assistance Operators B. Power Users C. Remote Desktop Users D. Remote Management Users Topic 3 - Question set 3 @ Question4 You have 200 computers that run Windows 10 and are joined to an Active Directory domain You need to enable Windows Remote Management (WinRM) on all the computers by using Group Policy. Which three actions should you perform?Each correct answer presents part ofthe solution. NOTE: Each correct selectionis worth one point. Set the Startup Type of the Windows Remote Management (WS-Management) service to Automatic. Enable the Windows Firewall: Allow inbound remote administration exception setting. Enable the Allow remote server managementthrough WinRM setting, Enable the Windows Firewall: Allow inbound Remote Desktop exceptions setting Enable the Allow Remote Shell access setting Set the Startup Type ofthe Remote Registry service to Automatic. m™moom> 65 Topic 3 - Question set 3 @ Question5 Auserhas a computerthat runs Windows 10. ete adr Eeloi ae ‘When the user connects the computerto the corporate si = network, the user cannot accessthe internal corporate i"\"/\e"s\se1 stint 2 servers. The user can access servers onthe Intemet. ms sins Sue tneetrrd You run the ipconfig command and receivethe following "f= eee eeL le), output ee j a Fai ‘You senda ping request and successfully ping the Beas tee ae default gateway, the ONS servers, and the DHCP server. sr sae Sense Which configuration on the computer causes the issue?" ew on oe ‘A. the DNS servers aaa B. the IPv4address 08 oer Te C. the subnet mask D. the default gateway address 8

You might also like