<<

Vendor:

Exam Code:MD-100

Exam Name:

Version:Demo

QUESTION 1

You need to identify the total number of events that have Event ID 63 in the Application event log. You must type the number of identified events into C:\Folder1\FileA.txt.

To complete this task, sign in to the required computer or computers and perform the required action.

Correct Answer: See below.

1.

Open .

2.

Click the log that you want to filter, then click Filter Current Log from the Action pane or right-click menu. This will open the Filter Current Log dialog box.

3.

You can specify a time period if you know approximately when the relevant events occurred. You can specify the event level, choosing between Critical, Warning, Verbose, Error and Information. If you select none of these, all event levels will be returned. You can\\'t modify which event log is being checked as filters apply only to a single log.

4.

You can choose the event sources which have generated the log entries, and search for key words, users, or computers. You can also search using specific event IDs.

Reference: https://www.manageengine.com/products/active-directory-audit/kb/how-to/how-to-search-the-event- viewer.html

QUESTION 2

You need to recommend a solution to configure the employee VPN connections. What should you include in the recommendation?

A. Remote Access Management Console

B. Management Console (GPMC)

C. Connection Manager Administration Kit (CMAK)

D. Microsoft Intune

Correct Answer: D

References: https://docs.microsoft.com/en-us/windows-server/remote/remote-access/vpn/always-on-vpn/deploy/vpn- deploy-client-vpn-connections#bkmk_ProfileXML Testlet 2

QUESTION 3

Your company has a wireless access point that uses WPA2-Enterprise. You need to configure a computer to connect to the wireless access point. What should you do first?

A. Create a provisioning package in Windows Configuration Designer.

B. Request a passphrase.

C. Request and install a certificate.

D. Create a Connection Manager Administration Kit (CMAK) package.

Correct Answer: B

References: https://support.microsoft.com/en-za/help/17137/windows-setting-up-wireless-network

QUESTION 4

Your network contains an domain. The domain contains a user named User1. User1 creates a .

User1 needs to sign in to cloud resources by using the Microsoft account without being prompted for credentials. Which should User1 configure?

A. User Accounts in

B. Email and app accounts in the Settings app

C. Users in Computer Management

D. Users in Active Directory Users and Computers

Correct Answer: B

Open the Setting app, select Accounts then select Email and accounts. Here you can add accounts for the cloud resources and configure the login credentials for the accounts. If you configure the accounts with the login credentials of the Microsoft account, you won\\'t be prompted for credentials when you open the apps.

References: https://support.microsoft.com/en-za/help/4028195/microsoft-account-how-to-sign-in

QUESTION 5

You have several computers that run Windows 10. The computers are in a workgroup and have BitLocker Drive Encryption (BitLocker) enabled.

You join the computers to Microsoft Azure Active Directory (Azure AD).

You need to ensure that you can recover the BitLocker recovery key for the computers from Azure AD.

What should you do first?

A. Disable BitLocker. B. Add a BitLocker key protector.

C. Suspend BitLocker.

D. Disable the TMP chip.

Correct Answer: B

References: https://docs.microsoft.com/en-us/windows/security/information-protection//prepare-your- organization-for- bitlocker-planning-and-policies#bitlocker-key-protectors

QUESTION 6

HOTSPOT

Your network contains an Active Directory domain. The domain contains the users shown in the following table.

The Authenticated Users group has the Add workstations to domain user right in the Default Domain Controllers Policy.

The Device Managers and Help Desk groups are granted the Create Computer objects permission for the Computers container of the domain.

You have 15 workgroup computers that run Windows 10. Each computer contains a local user account named LocalAdmin1 that is a member of the following groups:

1.

Administrators

2.

Device Owners

3.

Authenticated Users

For each of the following statements, select Yes if the statement is true. Otherwise, select No. NOTE: Each correct selection is worth one point.

Hot Area:

Correct Answer:

Box 1: No

User1 is a member of the Authenticated Users group which has the Add workstations to domain user right. However, with the Add workstations to domain user right, you are restricted to joining a maximum of 10 computers to the domain.

Box 2: No

User2 is a member of the Authenticated Users group which has the Add workstations to domain user right. User2 is also a member of the Device Managers group which is granted the Create Computer objects permission for the Computers container of the domain. The Create Computer objects permission overrides the 10-computer limit imposed by the Add workstations to domain user right so User2 can join more than 10 computers to the domain.

Box 3. Yes

User3 is a member of the Authenticated Users group which has the Add workstations to domain user right. User3 is also a member of the Help Desk group which is granted the Create Computer objects permission for the Computers container of the domain. The Create Computer objects permission overrides the 10-computer limit imposed by the Add workstations to domain user right so User3 can join all the computers to the domain.

QUESTION 7

You have a computer named Computer1 that runs Windows 10.

You need to configure User Account Control (UAC) to prompt administrators for their credentials.

Which settings should you modify?

A. Administrators Properties in Local Users and Groups

B. User Account Control Settings in Control Panel

C. Security Options in Local Group Policy Editor

D. User Rights Assignment in Local Group Policy Editor

Correct Answer: C

References: https://docs.microsoft.com/en-us/windows/security/identity-protection/user-account-control/user-account- control- security-policy-settings

QUESTION 8

You have a computer that runs .1.

When you attempt to perform an in-place upgrade to Windows 10, the computer fails to start after the first restart.

You need to view the setup logs on the computer.

Which folder contains the logs?

A. \$Windows.~BT\Sources\Panther\

B. \Windows\Logs

C. \Windows\Temp

D. \$Windows.~BT\Inf

Correct Answer: A

References: https://docs.microsoft.com/en-us/windows-hardware/manufacture/desktop/windows-setup-log-files-and- event-logs

QUESTION 9

You need to meet the technical requirement for the IT department users. What should you do first?

A. Issue computer certificates B. Distribute USB keys to the IT department users.

C. Enable screen saver and configure a timeout.

D. Turn on Bluetooth.

Correct Answer: D

References: https://support.microsoft.com/en-za/help/4028111/windows-lock-your-windows-10-pc-automatically-when- you-step-away-from

QUESTION 10

You have a computer named Computer1 that runs Windows 10. Computer1 is in a workgroup. Computer1 contains the folders shown in the following table.

On Computer1, you create the users shown in the following table.

User1 encrypts a file named File1.txt that is in a folder named C:\Folder1.

What is the effect of the configuration? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Hot Area: Correct Answer:

References: https://support.microsoft.com/en-za/help/310316/how-permissions-are-handled-when-you-copy-and-move- files-and-folders

QUESTION 11

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.

You deploy Windows 10 to a computer named Computer1.

Computer1 contains a folder named C:\Folder1. Folder1 contains multiple documents.

You need to ensure that you can recover the files in Folder1 by using the Previous Versions tab. Solution: You enable File History and add Folder1 in the Documents library.

Does this meet the goal?

A. Yes

B. No

Correct Answer: A

Reference: https://support.microsoft.com/en-za/help/17128/windows-8-file-history

QUESTION 12

You have a computer named Computer1 that runs Windows 10.

You need to enable boot logging on Computer1.

What should you do?

A. At a command prompt, run the bcdboot.exe command and specify the /v parameter.

B. From the Settings app, configure the Start settings.

C. From System Properties in Control Panel, configure the Startup and Recovery settings.

D. From System Configuration configure the Boot settings.

Correct Answer: D

Reference: https://www.windowscentral.com/how-enable-boot-log-windows-10 To Read the Whole Q&As, please purchase the Complete Version from Our website.

Try our product !

100% Guaranteed Success

100% Money Back Guarantee

365 Days Free Update

Instant Download After Purchase

24x7 Customer Support

Average 99.9% Success Rate

More than 800,000 Satisfied Customers Worldwide

Multi-Platform capabilities - Windows, Mac, Android, iPhone, iPod, iPad, Kindle

Need Help Please provide as much detail as possible so we can best assist you. To update a previously submitted ticket:

Any charges made through this site will appear as Global Simulators Limited. All trademarks are the property of their respective owners.

Powered by TCPDF (www.tcpdf.org)