Download Windows 10.MD-100.Prep4Sure.2019-06-18.42q.vcex

Vendor: Microsoft
Exam Code: MD-100
Exam Name: Windows 10
Date: Jun 18, 2019
File Size: 1 MB

How to open VCEX files?

Files with VCEX extension can be opened by ProfExam Simulator.

Demo Questions

Question 1
You need to ensure that User10 can activate Computer10.
What should you do?
  1. Request that a Windows 10 Enterprise license be assigned to User10, and then activate Computer10.
  2. From the Microsoft Deployment Toolkit (MDT), add a Volume License Key to a task sequence, and then redeploy Computer10.
  3. From System Properties on Computer10, enter a Volume License Key, and then activate Computer10.
  4. Request that User10 perform a local AutoPilot Reset on Computer10, and then activate Computer10.
Correct answer: D
Explanation:
References:https://docs.microsoft.com/en-us/windows/deployment/windows-autopilot/windows-autopilot-requirements-licensing
References:
https://docs.microsoft.com/en-us/windows/deployment/windows-autopilot/windows-autopilot-requirements-licensing
Question 2
Your company has an isolated network used for testing. The network contains 20 computers that run Windows 10. The computers are in a workgroup. During testing, the computers must remain in the workgroup. 
You discover that none of the computers are activated. 
You need to recommend a solution to activate the computers without connecting the network to the Internet. 
What should you include in the recommendation?
  1. Volume Activation Management Tool (VAMT)
  2. Key Management Service (KMS)
  3. Active Directory-based activation
  4. the Get-WindowsDeveloperLicense cmdlet
Correct answer: B
Explanation:
References:https://docs.microsoft.com/en-us/windows/deployment/volume-activation/activate-using-key-management-service-vamt
References:
https://docs.microsoft.com/en-us/windows/deployment/volume-activation/activate-using-key-management-service-vamt
Question 3
You plan to deploy Windows 10 to 100 secure computers. 
You need to select a version of Windows 10 that meets the following requirements:
  • Uses Microsoft Edge as the default browser 
  • Minimizes the attack surface on the computer 
  • Supports joining Microsoft Azure Active Directory (Azure AD) 
  • Only allows the installation of applications from the Microsoft Store 
What is the best version to achieve the goal? More than one answer choice may achieve the goal. Select the BEST answer.
  1. Windows 10 Pro in S mode
  2. Windows 10 Home in S mode
  3. Windows 10 Pro
  4. Windows 10 Enterprise
Correct answer: C
Explanation:
References:https://www.microsoft.com/en-za/windows/compare
References:
https://www.microsoft.com/en-za/windows/compare
Question 4
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen. 
You have a computer named Computer1 that runs Windows10. 
A service named Application1 is configured as shown in the exhibit. 
  
You discover that a user used the Service1 account to sign in to Computer1 and deleted some files. 
You need to ensure that the identity used by Application1 cannot be used by a user to sign in to sign in to the desktop on Computer1. The solution must use the principle of least privilege. 
Solution: On Computer1, you configure Application1 to sign in as the LocalSystem account and select the Allow service to interact with desktop check box. You delete the Service1 account.
Does this meet the goal?
  1. Yes
  2. No
Correct answer: B
Question 5
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen. 
You have a computer named Computer1 that runs Windows 10. 
A service named Application1 is configured as shown in the exhibit. 
  
You discover that a user used the Service1 account to sign in to Computer1 and deleted some files. 
You need to ensure that the identity used by Application1 cannot be used by a user to sign in to sign in to the desktop on Computer1. The solution must use the principle of least privilege. 
Solution: On Computer1, you assign Service1 the deny log on locally user right.
Does this meet the goal?
  1. Yes
  2. No
Correct answer: B
Explanation:
References:https://docs.microsoft.com/en-us/windows/security/threat-protection/security-policy-settings/deny-log-on-locally
References:
https://docs.microsoft.com/en-us/windows/security/threat-protection/security-policy-settings/deny-log-on-locally
Question 6
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen. 
You have a computer named Computer1 that runs Windows 10. 
A service named Application1 is configured as shown in the exhibit. 
  
You discover that a user used the Service1 account to sign in to Computer1 and deleted some files. 
You need to ensure that the identity used by Application1 cannot be used by a user to sign in to sign in to the desktop on Computer1. The solution must use the principle of least privilege. 
Solution: On Computer1, you assign Service1 the deny log on as a service user right.
Does this meet the goal?
  1. Yes
  2. No
Correct answer: A
Explanation:
References:https://docs.microsoft.com/en-us/windows/security/threat-protection/security-policy-settings/deny-log-on-as-a-service
References:
https://docs.microsoft.com/en-us/windows/security/threat-protection/security-policy-settings/deny-log-on-as-a-service
Question 7
You have a Microsoft Azure Active Directory (Azure AD) tenant. 
Some users sign in to their computer by using Windows Hello for Business. 
A user named User1 purchases a new computer and joins the computer to Azure AD. 
User1 attempts to configure the sign-in options and receives the error message shown in the exhibit. 
  
You open Device Manager and confirm that all the hardware works correctly. 
You need to ensure that User1 can use Windows Hello for Business facial recognition to sign in to the computer. 
What should you do first?
  1. Purchase an infrared (IR) camera.
  2. Upgrade the computer to Windows 10 Enterprise.
  3. Enable UEFI Secure Boot.
  4. Install a virtual TPM driver.
Correct answer: B
Explanation:
References:https://docs.microsoft.com/en-us/windows/security/identity-protection/hello-for-business/hello-planning-guide
References:
https://docs.microsoft.com/en-us/windows/security/identity-protection/hello-for-business/hello-planning-guide
Question 8
Your company uses Microsoft Deployment Toolkit (MDT) to deploy Windows 10 to new computers. 
The company purchases 1,000 new computers. 
You need to ensure that the Hyper-V feature is enabled on the computers during the deployment. 
What are two possible ways to achieve the goal? Each correct answer presents part of the solution. 
NOTE: Each correct selection is worth one point.
  1. Add a task sequence step that adds a provisioning package.
  2. In a Group Policy object (GPO), from Computer Configuration, configure Application Control Policies.
  3. Add a custom command to the Unattend.xml file.
  4. Add a configuration setting to Windows Deployment Services (WDS).
  5. Add a task sequence step that runs dism.exe.
Correct answer: AC
Explanation:
References:https://docs.microsoft.com/en-us/windows/deployment/deploy-windows-mdt/create-a-windows-10-reference-image
References:
https://docs.microsoft.com/en-us/windows/deployment/deploy-windows-mdt/create-a-windows-10-reference-image
Question 9
Your network contains an Active Directory domain that is synced to a Microsoft Azure Active Directory (Azure AD) tenant. 
Your company purchases a Microsoft 365 subscription. 
You need to migrate the Documents folder of users to Microsoft OneDrive for Business. 
What should you configure?
  1. One Drive Group Policy settings
  2. roaming user profiles
  3. Enterprise State Roaming
  4. Folder Redirection Group Policy settings
Correct answer: A
Explanation:
References:https://docs.microsoft.com/en-us/onedrive/redirect-known-folders?redirectSourcePath=%252fen-us%252farticle%252fredirect-windows-known-folders-to-onedrive-e1b3963c-7c6c-4694-9f2f-fb8005d9ef12
References:
https://docs.microsoft.com/en-us/onedrive/redirect-known-folders?redirectSourcePath=%252fen-us%252farticle%252fredirect-windows-known-folders-to-onedrive-e1b3963c-7c6c-4694-9f2f-fb8005d9ef12
Question 10
You need to sign in as LocalAdmin on Computer11. 
What should you do first?
  1. From the LAPS UI tool, view the administrator account password for the computer object of Computer11.
  2. From Local Security Policy, edit the policy password settings on Computer11.
  3. From the LAPS UI tool, reset the administrator account password for the computer object of Computer11.
  4. From Microsoft Intune, edit the policy password settings on Computer11.
Correct answer: A
Explanation:
References:https://technet.microsoft.com/en-us/mt227395.aspx
References:
https://technet.microsoft.com/en-us/mt227395.aspx
HOW TO OPEN VCE FILES

Use VCE Exam Simulator to open VCE files
Avanaset

HOW TO OPEN VCEX AND EXAM FILES

Use ProfExam Simulator to open VCEX and EXAM files
ProfExam Screen

ProfExam
ProfExam at a 20% markdown

You have the opportunity to purchase ProfExam at a 20% reduced price

Get Now!