post page top logo

Get Latest Modern Desktop Certification Exam Dumps with Free MD-100 Practice questions|2022

Get refreshed MD-100 Exam Dumps questions with verified Answers and explanations, Practice on Certspilot 2022 Updated md-100 free Practice exam and Pass Exam in the first attempt. Get access to latest MD-100 Dumps.

Our below MD-100 Practice exam questions will help you in passing your Modern Desktop Certification Exam on first attempt. Just practice on these MD-100 questions and check what Certspilot provide actually in MD-100 braindumps.

Microsoft MD-100 Free Dumps Are Below To Let You Check The Updated Dumps

1. Your network contains an Active Directory domain. The domain contains the computers shown in the following table.

On which computers can you perform an in-place upgrade to Windows 10 Enterprise?

2. You have a workgroup computer named Computer1 that runs Windows 10. Computer1 contains five local user accounts.

You need to ensure that all users who sign in to Computer1 see a picture named Image1.jpg as the desktop background.

What should you do?

3. You install Windows 10 Enterprise on a new computer. You need to force activation on the computer.

Which command should you run?

4. You install Windows 10 Pro on a computer named CLIENT1.

You need to ensure that all per-user services are disabled on CLIENT1. The solution must minimize administrative effort.

What should you use?

5. You plan to install Windows 10 Pro by using an answer file. You open Windows System Image Manager.

You need to create an answer file. What should you do first?

6. You have a computer that runs Windows 10 Home.

You need to upgrade the computer to Windows 10 Enterprise as quickly as possible. The solution must retain the user settings.

What should you do first?

7. You have a computer named Computer1 that runs Windows 10.

The relevant services on Computer1 are shown in the following table.

Which service will start after you restart Computer1?

8. Your company has an isolated network used for testing. The network contains 20 computers that run Windows

The computers are in a workgroup. During testing, the computers must remain in the

You discover that none of the computers are activated.

You need to recommend a solution to activate the computers without connecting the network to the Internet. What should you include in the recommendation?

9. Your company has an isolated network used for testing. The network contains 20 computers that run Windows

The computers are in a workgroup. During testing, the computers must remain in the

You discover that none of the computers are activated.

You need to recommend a solution to activate the computers without connecting the network to the Internet. What should you include in the recommendation?

10. On Computer1, you need to configure the custom Visual Effects performance settings. Which user accounts can you use?

11. Which users can sign in to Computer2 by using Remote Desktop?

12. You need to sign in as LocalAdmin on Computer11. What should you do first?

13. An employee reports that she must perform a BitLocker recovery on her laptop. The employee does not have

her BitLocker recovery key but does have a Windows 10 desktop computer. What should you instruct the employee to do from the desktop computer?

14. You need to meet the technical requirements for EFS on ComputerA. What should you do?

15. You have a computer named Computer1 that runs Windows 10.

You need to configure User Account Control (UAC) to prompt administrators for their credentials. Which settings should you modify?

16. You have several computers that run Windows 10. The computers are in a workgroup. You need to prevent users from using Microsoft Store apps on their computer.

What are two possible ways to achieve the goal? Each correct answer presents a complete solution.

NOTE: Each correct selection is worth one point.

17. You have a computer named Computer1 that runs Windows 10.

You need to prevent standard users from changing the wireless network settings on Computer1. The solution must allow administrators to modify the wireless network settings.

What should you use?

18. Your network contains an Active Directory domain named contoso.com. The domain contains a computer named Computer1 that runs Windows 10.

On Computer1, you create a folder and assign Full control permissions to Everyone. You share the folder as Share1 and assign the permissions shown in the following table.

When accessing Share1, which two actions can be performed by User1 but not by User2? Each correct answer presents part of the solution.

NOTE: Each correct selection is worth one point.

 

19. Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.

A user named User1 has a computer named Computer1 that runs Windows 10. Computer1 is joined to an Azure Active Directory (Azure AD) tenant named contoso.com. User1 joins Computer1 to contoso.com by using user1@contoso.com.

Computer1 contains a folder named Folder1. Folder1 is in drive C and is shared as Share1. Share1 has the permission shown in the following table.

A user named User2 has a computer named Computer2 that runs Windows 10. User2 joins Computer2 to contoso.com by using user2@contoso.com.

User2 attempts to access Share1 and receives the following error message: “The username or password is incorrect.”

You need to ensure that User2 can connect to Share1.

Solution: In Azure AD, you create a group named Group1 that contains User1 and User2. You grant Group1 Change access to Share1.

Does this meet the goal?

20. Note: This question is part of a series of questions that present the same scenario. Each question in
the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.

A user named User1 has a computer named Computer1 that runs Windows 10. Computer1 is joined to an Azure Active Directory (Azure AD) tenant named contoso.com. User1 joins Computer1 to contoso.com by using user1@contoso.com.

Computer1 contains a folder named Folder1. Folder1 is in drive C and is shared as Share1. Share1 has the permission shown in the following table.

A user named User2 has a computer named Computer2 that runs Windows 10. User2 joins Computer2 to contoso.com by using user2@contoso.com.

User2 attempts to access Share1 and receives the following error message: “The username or password is incorrect.”

You need to ensure that User2 can connect to Share1.

Solution: You create a local user account on Computer1 and instruct User2 to use the local account to connect to Share1.

Does this meet the goal?

21. Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.

A user named User1 has a computer named Computer1 that runs Windows 10. Computer1 is joined to an Azure Active Directory (Azure AD) tenant named contoso.com. User1 joins Computer1 to contoso.com by using user1@contoso.com.

Computer1 contains a folder named Folder1. Folder1 is in drive C and is shared as Share1. Share1 has the permission shown in the following table.

A user named User2 has a computer named Computer2 that runs Windows 10. User2 joins Computer2 to contoso.com by using user2@contoso.com.

User2 attempts to access Share1 and receives the following error message: “The username or password is incorrect.”

You need to ensure that User2 can connect to Share1.

Solution: In Azure AD, you create a group named Group1 that contains User1 and User2. You grant Group1 Modify access to Folder1.

Does this meet the goal?

22. You have a computer named Computer1 that runs Windows 10. Computer1 contains a folder named Folder1. You need to log any users who take ownership of the files in Folder1.

Which two actions should you perform? Each correct answer presents part of the solution.

NOTE: Each correct selection is worth one point.

23. You are a network administrator at your company.

The company uses an application that checks for network connectivity to a server by sending a ping request to the IPv6 address of the server. If the server replies, the application loads.

A user cannot open the application.

You manually send the ping request from the computer of the user and the server does not reply. You send the ping request from your computer and the server replies.

You need to ensure that the ping request works from the user’s computer. Which Windows Defender firewall rule is a possible cause of the issue?

24. You have a workgroup computer that runs Windows 10. You create a local user named User1.

User1 needs to be able to share and manage folders located in a folder named C:\Share by using the Shared Folders snap-in. The solution must use the principle of least privilege.

To which group should you add User1?

25. Your network contains an Active Directory domain. The domain contains a computer named Computer1 that

runs Windows 10.

You need to view the settings to Computer1 by Group Policy objects (GPOs) in the domain and local Group Policies.

Which command should you run?

26. Your network contains an Active Directory domain. The domain contains computers that run Windows 10.

You need to provide a user with the ability to remotely create and modify shares on the computers. The solution must use the principle of least privilege.

To which group should you add the user?

27. You have a computer named Computer1 that runs Windows 10 Current branch. Computer1 belongs to a workgroup.

You run the following commands on Computer1.

New-LocalUser –Name User1 –NoPassword Add-LocalGroupMember Users –Member User1

What is the effect of the configurations?

28. You have a computer that runs Windows 10 and is joined to Azure Active Directory (Azure AD). You attempt to open Control Panel and receive the error message shown on the following exhibit.

You need to be able to access Control Panel. What should you modify?

29. You have a public computer named Computer1 that runs Windows 10. Computer1 contains a folder named Folder1.

You need to provide a user named User1 with the ability to modify the permissions of Folder1. The solution must use the principle of least privilege.

Which NTFS permission should you assign to User1?

30. You have 10 computers that run Windows 10 and have BitLocker Drive Encryption (BitLocker) enabled. You plan to update the firmware of the computers.

You need to ensure that you are not prompted for the BitLocker recovery key on the next restart. The drive must be protected by BitLocker on subsequent restarts.

Which cmdlet should you run?

31. Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.

 After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.

A user named User1 has a computer named Computer1 that runs Windows 10. Computer1 is joined to an Azure Active Directory (Azure AD) tenant named contoso.com. User1 joins Computer1 to contoso.com by using user1@contoso.com.

Computer1 contains a folder named Folder1. Folder1 is in drive C and is shared as Share1. Share1 has the permission shown in the following table.

A user named User2 has a computer named Computer2 that runs Windows 10. User2 joins Computer2 to contoso.com by using user2@contoso.com.

User2 attempts to access Share1 and receives the following error message: “The username or password is incorrect.”

You need to ensure that User2 can connect to Share1.

Solution: You create a local group on Computer1 and add the Guest account to the group. You grant the group Modify access to Share1.

Does this meet the goal?

32. Your network contains an Active Directory domain. The domain contains 1,000 computers that run Windows 10.

You need to prevent the computers of the research department from appearing in Network in File Explorer. What should you do?

33. You deploy Windows 10 to 20 new laptops.

The laptops will be used by users who work at customer sites. Each user will be assigned one laptop and one Android device.

You need to recommend a solution to lock the laptop when the users leave their laptop for an extended period.

Which two actions should you include in the recommendation? Each correct answer presents part of the solution.

NOTE: Each correct selection is worth one point.

34. You have a workgroup computer named Computer1 that runs Windows 10. Computer1 has the user accounts shown in the following table.

User3, User4, and Administrator sign in and sign out on Computer1. User1 and User2 have never signed in to Computer1.

You are troubleshooting policy issues on Computer1. You sign in to Computer1 as Administrator. You add the Resultant Set of Policy (RSoP) snap-in to an MMC console.

Which users can you select in the RSoP wizard?

 

35. Your network contains an Active Directory domain. The domain contains a computer named Computer1 that runs Windows 10. Computer1 contains a folder named Folder1.

You plan to share Folder1. Everyone will have Read share permissions, and administrators will have Full control share permission.

You need to prevent the share from appearing when users browse the network. What should you do?

36. Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.

You have a computer that runs Windows 10. The computer contains a folder. The folder contains sensitive data.

You need to log which user reads the contents of the folder and modifies and deletes files in the folder.

Solution: From the properties of the folder, you configure the Auditing settings and from Audit Policy in the local Group Policy, you configure Audit object access.

Does this meet the goal?

37. You have a computer named Computer1 that runs Windows 10. On Computer1, you turn on File History.

You need to protect a folder named D:\Folder1 by using File History. What should you do?

38. Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.

You have a computer that runs Windows 10. The computer contains a folder. The folder contains sensitive data.

You need to log which user reads the contents of the folder and modifies and deletes files in the folder.

Solution: From the properties of the folder, you configure the Auditing settings and from the Audit Policy in the local Group Policy, you configure Audit system events.

Does this meet the goal?

39. Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these
questions will not appear in the review screen.
You have a computer that runs Windows 10. The computer contains a folder named D:\Scripts. D:\Scripts contains several PowerShell scripts.

You need to ensure that you can run the PowerShell scripts without specifying the full path to the scripts. The solution must persist between PowerShell sessions.

Solution: At a command prompt, you run set.exe path=d:\scripts.

Does this meet the goal?

40. Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.

You have a computer that runs Windows 10. The computer contains a folder named D:\Scripts. D:\Scripts contains several PowerShell scripts.

You need to ensure that you can run the PowerShell scripts without specifying the full path to the scripts. The solution must persist between PowerShell sessions.

Solution: From a command prompt, you run set.exe PATHEXT=d:\scripts.

Does this meet the goal?

41. Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.

You have a computer that runs Windows 10. The computer contains a folder named D:\Scripts. D:\Scripts contains several PowerShell scripts.

You need to ensure that you can run the PowerShell scripts without specifying the full path to the scripts. The solution must persist between PowerShell sessions.

Solution: From PowerShell, you run $env:Path += ";d:\scripts\".

Does this meet the goal?

42. Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.

You have a workgroup computer that runs Windows 10. The computer contains the local user accounts shown in the following table.

You need to configure the desktop background for User1 and User2 only.

Solution: From the local computer policy, you configure the Filter Options settings for the computer policy. Does this meet the goal?

43. Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.

You have a workgroup computer that runs Windows 10. The computer contains the local user accounts shown in the following table.

You need to configure the desktop background for User1 and User2 only.

Solution: You create a new local group to which you add User1 and User2. You create a local Group Policy Object (GPO) and configure the Desktop Wallpaper setting in the GPO. At a command prompt, you run the gpupdate.exe /Force command.

Does this meet the goal?

44. Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.

You have a workgroup computer that runs Windows 10. The computer contains the local user accounts shown in the following table.

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.

You have a workgroup computer that runs Windows 10. The computer contains the local user accounts shown in the following table.

45. Your network contains an Active Directory domain. The domain contains two computers named Computer1 and Computer2 that run Windows 10.

You need to modify the registry of Computer1 by using Registry Editor from Computer2. Which two registry hives can you modify? Each correct answer presents part of the solution. NOTE: Each correct selection is worth one point.

46. Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.

You have a computer that runs Windows 10. The computer contains a folder. The folder contains sensitive data.

You need to log which user reads the contents of the folder and modifies and deletes files in the folder.

Solution: From the properties of the folder, you configure the Auditing settings and from the Audit Policy in the local Group Policy, you configure Audit directory service access.

Does this meet the goal?

47. You have a computer named Computer1 that runs Windows10. Computer1 is in a workgroup. Computer1 contains the users shown in the following table.

You need to apply the same Group Policy settings to only User1, User2 and User3. The solution must use a minimum number of local Group Policy objects (GPOs).

How many local GPOs should you create?

48. You have a workgroup computer that runs Windows 10.

You need to set the minimum password length to 12 characters. What should you use?

49. You customize the Start menu on a computer that runs Windows 10 as shown in the following exhibit.

You need to add Remote Desktop Connection to Group1 and remove Group3 from the Start menu.

Which two actions should you perform from the Start menu customizations? Each correct answer presents part of the solution.

NOTE: Each correct selection is worth one point.

50. You have a computer named Computer1 that runs Windows 10. On Computer1, you turn on File History.

You need to protect a folder named D:\Folder1 by using File History. What should you do?


 

Download full version

Related Exams

About The Author

Certspilot

Certspilot is a platform where you can get to access to free Practice test questions for all IT certification like Microsoft, AWS, CompTIA, Salesforce, Cisco, CISSP and others certifications exam, you can download Updated and Valid Exam Dumps in PDF format and prepare yourself for certification exam in very short time. If you have any other question or need assistance regarding to your certification exam, click on Live Chat Icon and get in touch with our customer support agent, we are available 24/7 for customer support or send email at
support@certspilot.com.

Leave a Comment