Download Windows 10.MD-100.NewDumps.2022-05-08.336q.vcex

Vendor: Microsoft
Exam Code: MD-100
Exam Name: Windows 10
Date: May 08, 2022
File Size: 24 MB

How to open VCEX files?

Files with VCEX extension can be opened by ProfExam Simulator.

Demo Questions

Question 1
Your network contains an Active Directory domain. All users have been issued with new computers that run Windows 10 Enterprise. All users have Microsoft 365 E3 licenses. 
A user named Mia Hamm has an Active Directory user account named MHamm and a computer named Computer1. Mia Hamm reports that Computer1 is not activated. 
You need to ensure that Mia Hamm can activate Computer1. 
What should you do?
  1. Assign a Windows 10 Enterprise license to MHamm, and then activate Computer1.
  2. From the Microsoft Deployment Toolkit (MDT), redeploy Computer1.
  3. From System Properties on Computer1, enter a Volume License Key, and then activate Computer1.
  4. Instruct Mia Hamm to perform a local AutoPilot Reset on Computer1, and then activate Computer1.
Correct answer: D
Explanation:
Mia Hamm reports that Computer1 is not activated. The solution is to perform a local AutoPilot Reset on the computer. This will restore the computer settings to a fully-configured or known IT-approved state. When the user signs in to Computer1 after the reset, the computer should activate. You can use Autopilot Reset to remove personal files, apps, and settings from your devices. The devices remain enrolled in Intune and are returned to a fully- configured or known IT-approved state. You can Autopilot Reset a device locally or remotely from the Intune for Education portal. Incorrect Answers:A: All users have Microsoft 365 E3 licenses. This license includes Windows 10 Enterprise so we don't need to assign a Windows 10 Enterprise license to Mia Hamm. B: Redeploying Computer1 is not required.C: A Volume License Key is not required.References:https://docs.microsoft.com/en-us/windows/deployment/windows-autopilot/windows-autopilot-requirements-licensing https://docs.microsoft.com/en-us/intune-education/autopilot-reset
Mia Hamm reports that Computer1 is not activated. 
The solution is to perform a local AutoPilot Reset on the computer. This will restore the computer settings to a fully-configured or known IT-approved state. When the user signs in to Computer1 after the reset, the computer should activate. 
You can use Autopilot Reset to remove personal files, apps, and settings from your devices. The devices remain enrolled in Intune and are returned to a fully- configured or known IT-approved state. You can Autopilot Reset a device locally or remotely from the Intune for Education portal. 
Incorrect Answers:
A: All users have Microsoft 365 E3 licenses. This license includes Windows 10 Enterprise so we don't need to assign a Windows 10 Enterprise license to Mia Hamm. 
B: Redeploying Computer1 is not required.
C: A Volume License Key is not required.
References:
https://docs.microsoft.com/en-us/windows/deployment/windows-autopilot/windows-autopilot-requirements-licensing 
https://docs.microsoft.com/en-us/intune-education/autopilot-reset
Question 2
Your network contains an Active Directory domain that is synced to a Microsoft Azure Active Directory (Azure AD) tenant. 
The company plans to purchase computers pre installed with Windows 10 Pro for all users. 
The company the following requirements:
  • The new computers must be upgraded to Windows 10 Enterprise automatically. 
  • The new computers must be joined to Azure AD automatically when the user starts the new computers for the first time. 
  • The users must not be required to accept the End User License Agreement (EULA). 
You need to deploy the new computers. 
What should you do?
  1. Make use of the wipe and load refresh deployment method.
  2. Perform in-place upgrade on the new computers.
  3. Provide provisioning packages for the new computers.
  4. Make use of Windows Autopilot.
Correct answer: D
Explanation:
Windows Autopilot is a collection of technologies used to set up and pre-configure new devices, getting them ready for productive use. You can also use Windows Autopilot to reset, repurpose and recover devices. The OEM Windows 10 installation on the new computers can be transformed into a "business-ready" state, applying settings and policies, installing apps, and even changing the edition of Windows 10 being used (e.g. from Windows 10 Pro to Windows 10 Enterprise) to support advanced features. The only interaction required from the end user is to connect to a network and to verify their credentials. Everything beyond that is automated. References:https://docs.microsoft.com/en-us/windows/deployment/windows-autopilot/windows-autopilot
Windows Autopilot is a collection of technologies used to set up and pre-configure new devices, getting them ready for productive use. You can also use Windows 
Autopilot to reset, repurpose and recover devices. 
The OEM Windows 10 installation on the new computers can be transformed into a "business-ready" state, applying settings and policies, installing apps, and even changing the edition of Windows 10 being used (e.g. from Windows 10 Pro to Windows 10 Enterprise) to support advanced features. 
The only interaction required from the end user is to connect to a network and to verify their credentials. 
Everything beyond that is automated. 
References:
https://docs.microsoft.com/en-us/windows/deployment/windows-autopilot/windows-autopilot
Question 3
Your company is not connected to the internet. The company purchases several new computers with Windows 10 Pro for its users. 
None of the new computers are activated. 
You need to activate the computers without connecting the network to the Internet. 
What should you do?
  1. Make use of the Volume Activation Management Tool (VAMT).
  2. Make use of the Key Management Service (KMS).
  3. Make use of the Windows Process Activation Service.
  4. Run the Get-WmiObject -query cmdlet.
Correct answer: B
Explanation:
You can configure one of the computers as a Key Management Service (KMS) host and activate the KMS host by phone. The other computers in the isolated network can then activate using the KMS host. Installing a KMS host key on a computer running Windows 10 allows you to activate other computers running Windows 10 against this KMS host and earlier versions of the client operating system, such as Windows 8.1 or Windows 7. Clients locate the KMS server by using resource records in DNS, so some configuration of DNS may be required. This scenario can be beneficial if your organization uses volume activation for clients and MAK-based activation for a smaller number of servers. To enable KMS functionality, a KMS key is installed on a KMS host; then, the host is activated over the Internet or by phone using Microsoft's activation services. References:https://docs.microsoft.com/en-us/windows/deployment/volume-activation/activate-using-key-management-service-vamt
You can configure one of the computers as a Key Management Service (KMS) host and activate the KMS host by phone. The other computers in the isolated network can then activate using the KMS host. 
Installing a KMS host key on a computer running Windows 10 allows you to activate other computers running Windows 10 against this KMS host and earlier versions of the client operating system, such as Windows 8.1 or Windows 7. Clients locate the KMS server by using resource records in DNS, so some configuration of DNS may be required. This scenario can be beneficial if your organization uses volume activation for clients and MAK-based activation for a smaller number of servers. To enable KMS functionality, a KMS key is installed on a KMS host; then, the host is activated over the Internet or by phone using Microsoft's activation services. 
References:
https://docs.microsoft.com/en-us/windows/deployment/volume-activation/activate-using-key-management-service-vamt
Question 4
Your network contains an Active Directory domain. All users have been issued with computers that run Windows 8.1. 
A user named Mia Hamm has a computer named Computer1. You upgrade Computer1 to Windows 10 by performing a clean installation of Windows 10 without formatting the drives. 
You need to migrate the settings for Mia Hamm from Windows 8.1 to Windows 10. 
Which two actions should you perform? 
NOTE: Each correct selection is worth one point.
  1. Run scanstate.exe and specify the C:\Users folder
  2. Run loadstate.exe and specify the C:\Windows.old folder
  3. Run usmultils.exe and specify the C:\Users folder
  4. Run scanstate.exe and specify the C:\Windows.old folder
  5. Run loadstate.exe and specify the C:\Users folder
  6. Run usmultils.exe and specify the C:\Windows.old folder
Correct answer: DE
Explanation:
D: As we have performed a clean installation of Windows 10 without formatting the drives, User1's Windows 8.1 user profile will be located in the \Windows.old folder. Therefore, we need to run scanstate.exe on the \Windows.old folder. E: User1's Windows 10 profile will be in the C:\Users folder so we need to run loadstate.exe to apply the changes in the C:\Users folder.References:https://docs.microsoft.com/en-us/windows/deployment/usmt/usmt-how-it-works https://docs.microsoft.com/en-us/windows/deployment/usmt/usmt-common-migration-scenarios#bkmk-fourpcrefresh
D: As we have performed a clean installation of Windows 10 without formatting the drives, User1's Windows 8.1 user profile will be located in the \Windows.old folder. Therefore, we need to run scanstate.exe on the \Windows.old folder. 
E: User1's Windows 10 profile will be in the C:\Users folder so we need to run loadstate.exe to apply the changes in the C:\Users folder.
References:
https://docs.microsoft.com/en-us/windows/deployment/usmt/usmt-how-it-works 
https://docs.microsoft.com/en-us/windows/deployment/usmt/usmt-common-migration-scenarios#bkmk-fourpcrefresh
Question 5
You have a computer named Computer1 that runs Windows 10. 
You deploy an application named Application1 to Computer1. 
You need to assign credentials to Application1. 
You need to meet the following requirements:
  • Ensure that the credentials for Application1 cannot be used by any user to log on to Computer1. 
  • Ensure that the principle of least privilege is maintained. 
What should you do?
  1. Configure Application1 to sign in as the Local System account and select the Allow service to interact with desktop check box.
  2. Create a user account for Application1 and assign that user account the Deny log on locally user right
  3. Create a user account for Application1 and assign that user account the Deny log on as a service user right
  4. Configure Application1 to sign in as the Local Service account and select the Allow service to interact with desktop check box.
Correct answer: B
Explanation:
By using the Service1 account as the identity used by Application1, we are applying the principle of least privilege as required in this question. However, the Service1 account could be used by a user to sign in to the desktop on the computer. To sign in to the desktop on the computer, an account needs the log on locally right which all user accounts have by default. Therefore, we can prevent this by assigning Service1 the deny log on locally user right. Incorrect Answers:A: Configuring Application1 to sign in as the Local System account would ensure that the identity used by Application1 cannot be used by a user to sign in to the desktop on Computer1. However, this does not use the principle of least privilege. The Local System account has full access to the system. Therefore, this solution does not meet the goal. C: A service account needs the log on as a service user right. When you assign an account to be used by a service, that account is granted the log on as a service user right. Therefore, assigning Service1 the deny log on as a service user right would mean the service would not function. D: The Local Service Account is a predefined local account used by the service control manager.References:https://docs.microsoft.com/en-us/windows/security/threat-protection/security-policy-settings/deny-log-on-locally
By using the Service1 account as the identity used by Application1, we are applying the principle of least privilege as required in this question. 
However, the Service1 account could be used by a user to sign in to the desktop on the computer. To sign in to the desktop on the computer, an account needs the log on locally right which all user accounts have by default. Therefore, we can prevent this by assigning Service1 the deny log on locally user right. 
Incorrect Answers:
A: Configuring Application1 to sign in as the Local System account would ensure that the identity used by Application1 cannot be used by a user to sign in to the desktop on Computer1. However, this does not use the principle of least privilege. The Local System account has full access to the system. Therefore, this solution does not meet the goal. 
C: A service account needs the log on as a service user right. When you assign an account to be used by a service, that account is granted the log on as a service user right. Therefore, assigning Service1 the deny log on as a service user right would mean the service would not function. 
D: The Local Service Account is a predefined local account used by the service control manager.
References:
https://docs.microsoft.com/en-us/windows/security/threat-protection/security-policy-settings/deny-log-on-locally
Question 6
Your network contains an Active Directory domain that is synced to a Microsoft Azure Active Directory (Azure AD) tenant.  
All users have been issued with laptop computers as well as desktop computers that run Windows 10 Enterprise. All users have Microsoft 365 E3 licenses. 
A user named Mia Hamm informs you that she must perform a BitLocker recovery on her laptop but she does not have her BitLocker recovery key. 
You need to ensure that Mia Hamm can perform a BitLocker recovery on her laptop. 
What should you do?
  1. Instruct Mia Hamm to log on to her desktop computer and run the repair-bde.exe command.
  2. Instruct Mia Hamm to use the BitLocker Recovery Password Viewer to view the computer object of the laptop.
  3. Instruct Mia Hamm to log on to her desktop computer and go to https://account.activedirectory.windowsazure.com and view the user account profile.
  4. Instruct Mia Hamm to run the Enable-BitLocker cmdlet on her laptop.
Correct answer: C
Explanation:
The BitLocker recovery key is stored in Azure Active Directory. References:https://celedonpartners.com/blog/storing-recovering-bitlocker-keys-azure-active-directory/
The BitLocker recovery key is stored in Azure Active Directory. 
References:
https://celedonpartners.com/blog/storing-recovering-bitlocker-keys-azure-active-directory/
Question 7
Your company has an on-premises network that contains an Active Directory domain. The domain is synced to Microsoft Azure Active Directory (Azure AD). 
All computers in the domain run Windows 10 Enterprise. 
You have a computer named Computer1 that has a folder named Folder1. 
You must provide users in group named Group1 with the ability to view the list of files in Folder1.  
Your solution must ensure that the principle of least privilege is maintained. 
What should you do?
  1. Assign the Full control permissions for the Folder1 folder to Group1.
  2. Assign the Read permissions for the Folder1 folder to Group1.
  3. Assign the List folder permissions for the Folder1 folder to Group1.
  4. Assign the Take ownership permissions for the Folder1 folder to Group1.
Correct answer: C
Explanation:
References:https://www.online-tech-tips.com/computer-tips/set-file-folder-permissions-windows/
References:
https://www.online-tech-tips.com/computer-tips/set-file-folder-permissions-windows/
Question 8
You have a computer named Computer1 that runs Windows 10. 
Computer1 has a folder named C:\Folder1.
You need to meet the following requirements:
  • Log users that access C:\Folder1.
  • Log users that modify and delete files in C:\Folder1.
Which two actions should you perform?
  1. From the properties of C:\Folder1, configure the Auditing settings.
  2. From the properties of C:\Folder1, select the Encryption contents to secure data option.
  3. From the Audit Policy in the local Group Policy, configure Audit directory service access.
  4. From the Audit Policy in the local Group Policy, you configure Audit object access.
  5. From the Audit Policy in the local Group Policy, you configure Audit system events.
Correct answer: AD
Explanation:
Files and folders are objects and are audited through object access. References:https://www.netwrix.com/how_to_detect_who_changed_file_or_folder_owner.html
Files and folders are objects and are audited through object access. 
References:
https://www.netwrix.com/how_to_detect_who_changed_file_or_folder_owner.html
Question 9
Your company has a computer named Computer1 that runs Windows 10. Computer1 is used to provide guests with access to the Internet. Computer1 is a member of a workgroup. 
You want to configure Computer1 to use a user account sign in automatically when the the computer is started.  
The user must not be prompted for a user name and password. 
What should you do?
  1. Configure Group Policy preferences.
  2. Run the BCDBoot command.
  3. Edit the Registry.
  4. Run the MSConfig command.
Correct answer: C
Explanation:
In the registry, add a default user name and a default password in the HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon sbukey. References:https://support.microsoft.com/en-us/help/324737/how-to-turn-on-automatic-logon-in-windows
In the registry, add a default user name and a default password in the HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon sbukey. 
References:
https://support.microsoft.com/en-us/help/324737/how-to-turn-on-automatic-logon-in-windows
Question 10
Please wait while the virtual machine loads. Once loaded, you may proceed to the lab section. This may take a few minutes, and the wait time will not be deducted from your overall test time. When the Next button is available, click it to access the lab section. In this section, you will perform a set of tasks in a live environment. While most functionality will be available to you as it would be in a live environment, some functionality (e.g., copy and paste, ability to navigate to external websites) will not be possible by design. 
Scoring is based on the outcome of performing the tasks stated in the lab. In other words, it doesn't matter how you accomplish the task, if you successfully perform it, you will earn credit for that task. Labs are not timed separately, and this exam may more than one lab that you must complete. You can use as much time as you would like to complete each lab. But, you should manage your time appropriately to ensure that you are able to complete the lab(s) and all other sections of the exam in the time provided. 
Please note that once you submit your work by clicking the Next button within a lab, you will NOT be able to return to the lab. 
You have a computer named Computer1 that runs Windows 10. 
Computer1 has a folder named C:\Folder1.
You need to meet the following requirements:
  • Provide a user named Jon Ross with the ability to modify the permissions of C:\Folder1.
  • Ensure that the principle of least privilege is maintained. 
What should you do? 
To complete this task, sign in to the required computer or computers.
  1. See the explanation.
Correct answer: A
Explanation:
In Windows Explorer, right-click the C:\Folder1 folder, and then click Properties. Click on the Security tab, and then click Edit. In the Permissions dialog box, add Jon Ross. Specify the Allow Modify permissions for the Jon Ross. Click OK twice to close the Security dialog box. Click OK twice to close the Properties dialog box.References:https://docs.microsoft.com/en-us/iis/web-hosting/configuring-servers-in-the-windows-web-platform/configuring-share-and-ntfs-permissions
  1. In Windows Explorer, right-click the C:\Folder1 folder, and then click Properties. 
  2. Click on the Security tab, and then click Edit. 
  3. In the Permissions dialog box, add Jon Ross. 
  4. Specify the Allow Modify permissions for the Jon Ross. 
  5. Click OK twice to close the Security dialog box. 
  6. Click OK twice to close the Properties dialog box.
References:
https://docs.microsoft.com/en-us/iis/web-hosting/configuring-servers-in-the-windows-web-platform/configuring-share-and-ntfs-permissions
HOW TO OPEN VCE FILES

Use VCE Exam Simulator to open VCE files
Avanaset

HOW TO OPEN VCEX AND EXAM FILES

Use ProfExam Simulator to open VCEX and EXAM files
ProfExam Screen

ProfExam
ProfExam at a 20% markdown

You have the opportunity to purchase ProfExam at a 20% reduced price

Get Now!