Download Windows 10.DrunkMonk.MD-100.2021-08-24.6e.274q.vcex


Download Exam

File Info

Exam Windows 10
Number MD-100
File Name Windows 10.DrunkMonk.MD-100.2021-08-24.6e.274q.vcex
Size 20.5 Mb
Posted August 24, 2021
Downloads 87



How to open VCEX & EXAM Files?

Files with VCEX & EXAM extensions can be opened by ProfExam Simulator.

Purchase
Coupon: EXAMFILESCOM

Coupon: EXAMFILESCOM
With discount: 20%


 
 



Demo Questions

Question 1
Your company has an isolated network used for testing. The network contains 20 computers that run Windows 10. The computers are in a workgroup. During testing, the computers must remain in the workgroup. 
You discover that none of the computers are activated. 
You need to recommend a solution to activate the computers without connecting the network to the Internet. 
What should you include in the recommendation?

  • A: Volume Activation Management Tool (VAMT)
  • B: Key Management Service (KMS)
  • C: Active Directory-based activation
  • D: the Get-WindowsDeveloperLicense cmdlet



Question 2
You plan to deploy Windows 10 to 100 secure computers. 
You need to select a version of Windows 10 that meets the following requirements:
Uses Microsoft Edge as the default browser 
Minimizes the attack surface on the computer 
Supports joining Microsoft Azure Active Directory (Azure AD) 
Only allows the installation of applications from the Microsoft Store 
What is the best version to achieve the goal? More than one answer choice may achieve the goal.  
Select the BEST answer.

  • A: Windows 10 Pro in S mode
  • B: Windows 10 Home in S mode
  • C: Windows 10 Pro
  • D: Windows 10 Enterprise



Question 3
You have a computer named Computer1 that runs Windows 8.1. Computer1 has a local user named User1 who has a customized profile. 
On Computer1, you perform a clean installation of Windows 10 without formatting the drives. 
You need to migrate the settings of User1 from Windows 8.1 to Windows 10. 
Which two actions should you perform?  
To answer, drag the appropriate actions to the correct targets.  
Each action may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content. 
NOTE: Each correct selection is worth one point.




Question 4
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution. After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen. 
You have a computer named Computer1 that runs Windows 10. 
A service named Application1 is configured as shown in the exhibit:

    

You discover that a user used the Service1 account to sign in to Computer1 and deleted some files. You need to ensure that the identity used by Application1 cannot be used by a user to sign in to sign in to the desktop on Computer1.  
The solution must use the principle of least privilege.  
Solution: On Computer1, you configure Application1 to sign in as the LocalSystem account and select the Allow service to interact with desktop check box. You delete the Service1 account. 
Does this meet the goal?

  • A: Yes 
  • B: No



Question 5
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution. After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen. 
You have a computer named Computer1 that runs Windows 10. 
A service named Application1 is configured as shown in the exhibit:

    

You discover that a user used the Service1 account to sign in to Computer1 and deleted some files. You need to ensure that the identity used by Application1 cannot be used by a user to sign in to sign in to the desktop on Computer1.  
The solution must use the principle of least privilege.  
Solution: On Computer1, you assign Service1 the deny log on as a service user right.
Does this meet the goal?

  • A: Yes
  • B: No 



Question 6
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution. After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen. 
You have a computer named Computer1 that runs Windows 10. 
A service named Application1 is configured as shown in the exhibit:

    

You discover that a user used the Service1 account to sign in to Computer1 and deleted some files. You need to ensure that the identity used by Application1 cannot be used by a user to sign in to sign in to the desktop on Computer1.  
The solution must use the principle of least privilege.  
Solution: On Computer1, you assign Service1 the deny log on as a service user right.
Does this meet the goal?

  • A: Yes
  • B: No 



Question 7
You have a Microsoft Azure Active Directory (Azure AD) tenant. Some users sign in to their computer by using Windows Hello for Business.  
A user named User1 purchases a new computer and joins the computer to Azure AD. User1 attempts to configure the sign-in options and receives the error message shown in the exhibit 

    

You open Device Manager and confirm that all the hardware works correctly. You need to ensure that User1 can use Windows Hello for Business facial recognition to sign in to the computer. 
What should you do first?

  • A: Purchase an infrared (IR) camera.
  • B: Upgrade the computer to Windows 10 Enterprise.
  • C: Enable UEFI Secure Boot. 
  • D: Install a virtual TPM driver.



Question 8
Your company uses Microsoft Deployment Toolkit (MDT) to deploy Windows 10 to new computers. 
The company purchases 1,000 new computers. 
You need to ensure that the Hyper-V feature is enabled on the computers during the deployment.  
What are two possible ways to achieve the goal?  
Each correct answer presents part of the solution. 
NOTE: Each correct selection is worth one point.

  • A: Add a task sequence step that adds a provisioning package.
  • B: In a Group Policy object (GPO), from Computer Configuration, configure Application Control Policies.
  • C: Add a custom command to the Unattend.xml file.
  • D: Add a configuration setting to Windows Deployment Services (WDS).
  • E: Add a task sequence step that runs dism.exe.



Question 9
Your network contains an Active Directory domain that is synced to a Microsoft Azure Active Directory (Azure AD) tenant. 
Your company purchases a Microsoft 365 subscription. 
You need to migrate the Documents folder of users to Microsoft OneDrive for Business. 
What should you configure?

  • A: One Drive Group Policy settings
  • B: roaming user profiles
  • C: Enterprise State Roaming
  • D: Folder Redirection Group Policy settings



Question 10
Your network contains an Active Directory domain. The domain contains a user named User1. 
User1 creates a Microsoft account. 
User1 needs to sign in to cloud resources by using the Microsoft account without being prompted for credentials. 
Which settings should User1 configure?

  • A: User Accounts in Control Panel
  • B: Email & app accounts in the Settings app
  • C: Users in Computer Management
  • D: Users in Active Directory Users and Computers








ProfExam
PROFEXAM WITH A 20% DISCOUNT

You can buy ProfExam with a 20% discount..

Get Now!


HOW TO OPEN VCEX AND EXAM FILES

Use ProfExam Simulator to open VCEX and EXAM files
ProfExam Screen



HOW TO OPEN VCE FILES

Use VCE Exam Simulator to open VCE files
Avanaset