Download Windows 10.MD-100.CertDumps.2020-10-07.149q.vcex

Vendor: Microsoft
Exam Code: MD-100
Exam Name: Windows 10
Date: Oct 07, 2020
File Size: 11 MB

How to open VCEX files?

Files with VCEX extension can be opened by ProfExam Simulator.

Demo Questions

Question 1
You need to implement a solution to configure the contractors’ computers. 
What should you do? To answer, select the appropriate options in the answer area. 
NOTE: Each correct selection is worth one point.
 
Correct answer: To work with this question, an Exam Simulator is required.
Explanation:
The requirement states: Automate the configuration of the contractors’ computers. The solution must provide a configuration file that the contractors can open from a Microsoft SharePoint site to apply the required configurations. The ‘configuration file’ in this case is known as a ‘provisioning package’. A provisioning package (.ppkg) is a container for a collection of configuration settings. With Windows 10, you can create provisioning packages that let you quickly and efficiently configure a device without having to install a new image. The tool for creating provisioning packages is renamed Windows Configuration Designer, replacing the Windows Imaging and Configuration Designer (ICD) tool. References:https://docs.microsoft.com/en-us/windows/configuration/provisioning-packages/provisioning-install-icdhttps://docs.microsoft.com/en-us/windows/configuration/provisioning-packages/provisioning-packages
The requirement states: Automate the configuration of the contractors’ computers. The solution must provide a configuration file that the contractors can open from a Microsoft SharePoint site to apply the required configurations. 
The ‘configuration file’ in this case is known as a ‘provisioning package’. 
A provisioning package (.ppkg) is a container for a collection of configuration settings. With Windows 10, you can create provisioning packages that let you quickly and efficiently configure a device without having to install a new image. 
The tool for creating provisioning packages is renamed Windows Configuration Designer, replacing the Windows Imaging and Configuration Designer (ICD) tool. 
References:
https://docs.microsoft.com/en-us/windows/configuration/provisioning-packages/provisioning-install-icd
https://docs.microsoft.com/en-us/windows/configuration/provisioning-packages/provisioning-packages
Question 2
You need to ensure that User10 can activate Computer10. 
What should you do?
  1. Request that a Windows 10 Enterprise license be assigned to User10, and then activate Computer10.
  2. From the Microsoft Deployment Toolkit (MDT), add a Volume License Key to a task sequence, and then redeploy Computer10.
  3. From System Properties on Computer10, enter a Volume License Key, and then activate Computer10.
  4. Request that User10 perform a local AutoPilot Reset on Computer10, and then activate Computer10.
Correct answer: D
Explanation:
The case study states: User10 reports that Computer10 is not activated.The solution is to perform a local AutoPilot Reset on the computer.  This will restore the computer settings to a fully-configured or known IT-approved state. When User10 signs in to the computer after the reset, the computer should activate. You can use Autopilot Reset to remove personal files, apps, and settings from your devices. The devices remain enrolled in Intune and are returned to a fully-configured or known IT-approved state. You can Autopilot Reset a device locally or remotely from the Intune for Education portal. Incorrect Answers:A: All users have Microsoft 365 E3 licenses.  This license includes Windows 10 Enterprise so we don’t need to assign a Windows 10 Enterprise license to User10. B: Volume License Keys aren’t required.C: Volume License Keys aren’t required.References:https://docs.microsoft.com/en-us/windows/deployment/windows-autopilot/windows-autopilot-requirements-licensing https://docs.microsoft.com/en-us/intune-education/autopilot-reset
The case study states: User10 reports that Computer10 is not activated.
The solution is to perform a local AutoPilot Reset on the computer.  This will restore the computer settings to a fully-configured or known IT-approved state. When User10 signs in to the computer after the reset, the computer should activate. 
You can use Autopilot Reset to remove personal files, apps, and settings from your devices. The devices remain enrolled in Intune and are returned to a fully-configured or known IT-approved state. You can Autopilot Reset a device locally or remotely from the Intune for Education portal. 
Incorrect Answers:
A: All users have Microsoft 365 E3 licenses.  This license includes Windows 10 Enterprise so we don’t need to assign a Windows 10 Enterprise license to User10. 
B: Volume License Keys aren’t required.
C: Volume License Keys aren’t required.
References:
https://docs.microsoft.com/en-us/windows/deployment/windows-autopilot/windows-autopilot-requirements-licensing 
https://docs.microsoft.com/en-us/intune-education/autopilot-reset
Question 3
You need to meet the technical requirements for the San Diego office computers. 
Which Windows 10 deployment method should you use?
  1. wipe and load refresh
  2. in-place upgrade
  3. provisioning packages
  4. Windows Autopilot
Correct answer: D
Explanation:
The requirement states: The computers in the San Diego office must be upgraded automatically to Windows 10 Enterprise and must be joined to Azure AD the first time a user starts each new computer. End users must not be required to accept the End User License Agreement (EULA). Windows Autopilot is a collection of technologies used to set up and pre-configure new devices, getting them ready for productive use. You can also use Windows Autopilot to reset, repurpose and recover devices.  The OEM Windows 10 installation on the new computers can be transformed into a “business-ready” state, applying settings and policies, installing apps, and even changing the edition of Windows 10 being used (e.g. from Windows 10 Pro to Windows 10 Enterprise) to support advanced features. The only interaction required from the end user is to connect to a network and to verify their credentials. Everything beyond that is automated. References:https://docs.microsoft.com/en-us/windows/deployment/windows-autopilot/windows-autopilot
The requirement states: The computers in the San Diego office must be upgraded automatically to Windows 10 Enterprise and must be joined to Azure AD the first time a user starts each new computer. End users must not be required to accept the End User License Agreement (EULA). 
Windows Autopilot is a collection of technologies used to set up and pre-configure new devices, getting them ready for productive use. You can also use Windows Autopilot to reset, repurpose and recover devices.  
The OEM Windows 10 installation on the new computers can be transformed into a “business-ready” state, applying settings and policies, installing apps, and even changing the edition of Windows 10 being used (e.g. from Windows 10 Pro to Windows 10 Enterprise) to support advanced features. 
The only interaction required from the end user is to connect to a network and to verify their credentials. 
Everything beyond that is automated. 
References:
https://docs.microsoft.com/en-us/windows/deployment/windows-autopilot/windows-autopilot
Question 4
You need to meet the technical requirement for Computer1.
What should you do? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
Correct answer: To work with this question, an Exam Simulator is required.
Explanation:
The requirement states: Kiosk (assigned access) must be configured on Computer1.Kiosk (assigned access) is a feature on Windows 10 that allows you to create a lockdown environment that lets users interact with only one app when they sign into a specified account. With Kiosk (assigned access), users won't be able to get to the desktop, Start menu, or any other app, including the Settings app. Box 1: User 11Kiosk (assigned access) must be configured by a user who is a member of the Local Administrators group on the Computer.  Box 2: User 12.Kiosk (assigned access) must be configured for a user account that is a member of the Users group. References:https://www.windowscentral.com/how-set-assigned-access-windows-10
The requirement states: Kiosk (assigned access) must be configured on Computer1.
Kiosk (assigned access) is a feature on Windows 10 that allows you to create a lockdown environment that lets users interact with only one app when they sign into a specified account. With Kiosk (assigned access), users won't be able to get to the desktop, Start menu, or any other app, including the Settings app. 
Box 1: User 11
Kiosk (assigned access) must be configured by a user who is a member of the Local Administrators group on the Computer.  
Box 2: User 12.
Kiosk (assigned access) must be configured for a user account that is a member of the Users group. 
References:
https://www.windowscentral.com/how-set-assigned-access-windows-10
Question 5
You plan to deploy Windows 10 to 100 secure computers. 
You need to select a version of Windows 10 that meets the following requirements:
  • Uses Microsoft Edge as the default browser 
  • Minimizes the attack surface on the computer 
  • Supports joining Microsoft Azure Active Directory (Azure AD) 
  • Only allows the installation of applications from the Microsoft Store 
What is the best version to achieve the goal? More than one answer choice may achieve the goal. Select the  BEST answer.
  1. Windows 10 Pro in S mode
  2. Windows 10 Home in S mode
  3. Windows 10 Pro
  4. Windows 10 Enterprise
Correct answer: A
Explanation:
Windows 10 in S mode is a version of Windows 10 that's streamlined for security and performance, while providing a familiar Windows experience. To increase security, it allows only apps from the Microsoft Store, and requires Microsoft Edge for safe browsing. Azure AD Domain join is available for Windows 10 Pro in S mode and Windows 10 Enterprise in S mode. It's not available in Windows 10 Home in S mode. References:https://support.microsoft.com/en-gb/help/4020089/windows-10-in-s-mode-faq
Windows 10 in S mode is a version of Windows 10 that's streamlined for security and performance, while providing a familiar Windows experience. To increase security, it allows only apps from the Microsoft Store, and requires Microsoft Edge for safe browsing. 
Azure AD Domain join is available for Windows 10 Pro in S mode and Windows 10 Enterprise in S mode. It's not available in Windows 10 Home in S mode. 
References:
https://support.microsoft.com/en-gb/help/4020089/windows-10-in-s-mode-faq
Question 6
Your company has an isolated network used for testing. The network contains 20 computers that run Windows 10. The computers are in a workgroup. During testing, the computers must remain in the workgroup. 
You discover that none of the computers are activated. 
You need to recommend a solution to activate the computers without connecting the network to the Internet. 
What should you include in the recommendation?
  1. Volume Activation Management Tool (VAMT)
  2. Key Management Service (KMS)
  3. Active Directory-based activation
  4. the Get-WindowsDeveloperLicense cmdlet
Correct answer: B
Explanation:
You can configure one of the computers as a Key Management Service (KMS) host and activate the KMS host by phone.  The other computers in the isolated network can then activate using the KMS host. Installing a KMS host key on a computer running Windows 10 allows you to activate other computers running Windows 10 against this KMS host and earlier versions of the client operating system, such as Windows 8.1 or Windows 7. Clients locate the KMS server by using resource records in DNS, so some configuration of DNS may be required. This scenario can be beneficial if your organization uses volume activation for clients and MAK-based activation for a smaller number of servers. To enable KMS functionality, a KMS key is installed on a KMS host; then, the host is activated over the Internet or by phone using Microsoft’s activation services. References:https://docs.microsoft.com/en-us/windows/deployment/volume-activation/activate-using-key-management-service-vamt
You can configure one of the computers as a Key Management Service (KMS) host and activate the KMS host by phone.  The other computers in the isolated network can then activate using the KMS host. 
Installing a KMS host key on a computer running Windows 10 allows you to activate other computers running Windows 10 against this KMS host and earlier versions of the client operating system, such as Windows 8.1 or Windows 7. Clients locate the KMS server by using resource records in DNS, so some configuration of DNS may be required. This scenario can be beneficial if your organization uses volume activation for clients and MAK-based activation for a smaller number of servers. To enable KMS functionality, a KMS key is installed on a KMS host; then, the host is activated over the Internet or by phone using Microsoft’s activation services. 
References:
https://docs.microsoft.com/en-us/windows/deployment/volume-activation/activate-using-key-management-service-vamt
Question 7
You have a computer named Computer1 that runs Windows 7. Computer1 has a local user named User1 who has a customized profile. 
On Computer1, you perform a clean installation of Windows 10 without formatting the drives. 
You need to migrate the settings of User1 from Windows7 to Windows 10. 
Which two actions should you perform? To answer, drag the appropriate actions to the correct targets. Each action may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content. 
NOTE: Each correct selection is worth one point.
Correct answer: To work with this question, an Exam Simulator is required.
Explanation:
The User State Migration Tool (USMT) includes two tools that migrate settings and data: ScanState and LoadState. ScanState collects information from the source computer, and LoadState applies that information to the destination computer.  In this case the source and destination will be the same computer. As we have performed a clean installation of Windows 10 without formatting the drives, User1’s customized Windows 7 user profile will be located in the \Windows.old folder.  Therefore, we need to run scanstate.exe on the \Windows.old folder.   User1’s Windows 10 profile will be in the C:\Users folder so we need to run loadstate.exe to apply the changes in the C:\Users folder.References:https://docs.microsoft.com/en-us/windows/deployment/usmt/usmt-how-it-workshttps://docs.microsoft.com/en-us/windows/deployment/usmt/usmt-common-migration-scenarios#bkmk-fourpcrefresh
The User State Migration Tool (USMT) includes two tools that migrate settings and data: ScanState and LoadState. ScanState collects information from the source computer, and LoadState applies that information to the destination computer.  In this case the source and destination will be the same computer. 
As we have performed a clean installation of Windows 10 without formatting the drives, User1’s customized Windows 7 user profile will be located in the \Windows.old folder.  Therefore, we need to run scanstate.exe on the \Windows.old folder.   
User1’s Windows 10 profile will be in the C:\Users folder so we need to run loadstate.exe to apply the changes in the C:\Users folder.
References:
https://docs.microsoft.com/en-us/windows/deployment/usmt/usmt-how-it-works
https://docs.microsoft.com/en-us/windows/deployment/usmt/usmt-common-migration-scenarios#bkmk-fourpcrefresh
Question 8
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution. 
After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen. 
You have a computer named Computer1 that runs Windows10. 
A service named Application1 is configured as shown in the exhibit. 
    
You discover that a user used the Service1 account to sign in to Computer1 and deleted some files. 
You need to ensure that the identity used by Application1 cannot be used by a user to sign in to sign in to the desktop on Computer1. The solution must use the principle of least privilege. 
Solution: On Computer1, you configure Application1 to sign in as the LocalSystem account and select the Allow service to interact with desktop check box. You delete the Service1 account. 
Does this meet the goal?
  1. Yes
  2. No
Correct answer: B
Explanation:
Configuring Application1 to sign in as the LocalSystem account would ensure that the identity used by Application1 cannot be used by a user to sign in to the desktop on Computer1.  However, this does not use the principle of least privilege. The LocalSystem account has full access to the system.  Therefore, this solution does not meet the goal. Reference:https://docs.microsoft.com/en-us/windows/security/threat-protection/security-policy-settings/deny-log-on-locally
Configuring Application1 to sign in as the LocalSystem account would ensure that the identity used by Application1 cannot be used by a user to sign in to the desktop on Computer1.  However, this does not use the principle of least privilege. The LocalSystem account has full access to the system.  Therefore, this solution does not meet the goal. 
Reference:
https://docs.microsoft.com/en-us/windows/security/threat-protection/security-policy-settings/deny-log-on-locally
Question 9
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution. 
After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen. 
You have a computer named Computer1 that runs Windows 10. 
A service named Application1 is configured as shown in the exhibit. 
    
You discover that a user used the Service1 account to sign in to Computer1 and deleted some files. 
You need to ensure that the identity used by Application1 cannot be used by a user to sign in to sign in to the desktop on Computer1. The solution must use the principle of least privilege. 
Solution: On Computer1, you assign Service1 the Deny log on locally user right.
Does this meet the goal?
  1. Yes
  2. No
Correct answer: A
Explanation:
By using the Service1 account as the identity used by Application1, we are applying the principle of least privilege as required in this question.   However, the Service1 account could be used by a user to sign in to the desktop on the computer.  To sign in to the desktop on the computer, an account needs the log on locally right which all user accounts have by default. Therefore, we can prevent this by assigning Service1 the deny log on locally user right. References:https://docs.microsoft.com/en-us/windows/security/threat-protection/security-policy-settings/deny-log-on-locally
By using the Service1 account as the identity used by Application1, we are applying the principle of least privilege as required in this question.   
However, the Service1 account could be used by a user to sign in to the desktop on the computer.  To sign in to the desktop on the computer, an account needs the log on locally right which all user accounts have by default. 
Therefore, we can prevent this by assigning Service1 the deny log on locally user right. 
References:
https://docs.microsoft.com/en-us/windows/security/threat-protection/security-policy-settings/deny-log-on-locally
Question 10
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution. 
After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen. 
You have a computer named Computer1 that runs Windows 10. 
A service named Application1 is configured as shown in the exhibit. 
    
You discover that a user used the Service1 account to sign in to Computer1 and deleted some files. 
You need to ensure that the identity used by Application1 cannot be used by a user to sign in to sign in to the desktop on Computer1. The solution must use the principle of least privilege. 
Solution: On Computer1, you assign Service1 the Deny log on as a service user right.
Does this meet the goal?
  1. Yes
  2. No
Correct answer: B
Explanation:
A service account needs the log on as a service user right.  When you assign an account to be used by a service, that account is granted the log on as a service user right.  Therefore, assigning Service1 the deny log on as a service user right would mean the service would not function. To sign in to the desktop on the computer, an account needs the log on locally right which all user accounts have by default.  To meet the requirements of this question, we need to assign Service1 the deny log on locally user right, not the deny log on as a service user right. References:https://docs.microsoft.com/en-us/windows/security/threat-protection/security-policy-settings/deny-log-on-as-a-service
A service account needs the log on as a service user right.  When you assign an account to be used by a service, that account is granted the log on as a service user right.  Therefore, assigning Service1 the deny log on as a service user right would mean the service would not function. 
To sign in to the desktop on the computer, an account needs the log on locally right which all user accounts have by default.  To meet the requirements of this question, we need to assign Service1 the deny log on locally user right, not the deny log on as a service user right. 
References:
https://docs.microsoft.com/en-us/windows/security/threat-protection/security-policy-settings/deny-log-on-as-a-service
HOW TO OPEN VCE FILES

Use VCE Exam Simulator to open VCE files
Avanaset

HOW TO OPEN VCEX AND EXAM FILES

Use ProfExam Simulator to open VCEX and EXAM files
ProfExam Screen

ProfExam
ProfExam at a 20% markdown

You have the opportunity to purchase ProfExam at a 20% reduced price

Get Now!