MD-100 Real Exam Dumps Questions and answers 41-50

Get Full Version of the Exam
http://www.EnsurePass.com/MD-100.html

Question No.41

Your company purchases 20 laptops that use a new hardware platform. In a test environment, you deploy Windows 10 to the new laptops.

Some laptops frequently generate stop errors. You need to identify the cause of the issue.

What should you use?

A.

Reliability Monitor

B.

Task Manager

C.

System Configuration

D.

Performance Monitor

Correct Answer: A

Explanation:

https://lifehacker.com/how-to-troubleshoot-windows-10-with-reliability-monitor-1745624446

Question No.42

A user has a computer that runs Windows 10.

When the user connects the computer to the corporate network, the user cannot access the internal corporate servers. The user can access servers on the Internet.

You run the ipconfig command and receive the following output.

image

You send a ping request and successfully ping the default gateway, the DNS servers, and the DHCP server.

Which configuration on the computer causes the issue?

A.

the DNS servers

B.

the IPv4 address

C.

the subnet mask

D.

the default gateway address

Correct Answer: A

Question No.43

You have a computer that runs Windows 10.

You discover that Windows updates are failing to install on the computer.

You need to generate a log file that contains detailed information about the failures. Which cmdlet should you run?

A.

Get-LogProperties

B.

Get-WindowsErrorReporting

C.

Get-WindowsUpdateLog

D.

Get-WinEvent

Correct Answer: C

Explanation:

https://docs.microsoft.com/en-us/powershell/module/windowsupdate/get- windowsupdatelog?view=win10-ps

Question No.44

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.

You have a computer named Computer1 that runs Windows 10.

A service named Application1 is configured as shown in the exhibit.

image

You discover that a user used the Service1 account to sign in to Computer1 and deleted some files.

You need to ensure that the identity used by Application1 cannot be used by a user to sign in to sign in to the desktop on Computer1. The solution must use the principle of least privilege.

Solution: On Computer1, you assign Service1 the deny log on locally user right. Does this meet the goal?

A.

Yes

B.

No

Correct Answer: B

Explanation:

https://docs.microsoft.com/en-us/windows/security/threat-protection/security-policy-settings/deny- log-on-locally

Question No.45

You have 200 computers that run Windows 10 and are joined to an Active Directory domain.

You need to enable Windows Remote Management (WinRM) on all the computers by using Group Policy.

Which three actions should you perform? Each correct answer presents part of the solution. NOTE: Each correct selection is worth one point.

A.

Set the Startup Type of the Windows Remote Management (WS-Management) service to Automatic .

B.

Enable the Windows Firewall: Allow inbound remote administration exception setting.

C.

Enable the Allow remote server management through WinRM setting.

D.

Enable the Windows Firewall: Allow inbound Remote Desktop exceptions setting.

E.

Enable the Allow Remote Shell access setting.

F.

Set the Startup Type of the Remote Registry service to Automatic .

Correct Answer: ACD

Explanation:

http://www.mustbegeek.com/how-to-enable-winrm-via-group-policy/

Question No.46

You have a computer named Computer1 that runs Windows 10. Computer1 belongs to a workgroup.

You run the following commands on Computer1. New-LocalUser -Name User1 -NoPassword

Add-LocalGroupMember User -Member User1 What is the effect of the configurations?

A.

User1 is prevented from signing in until the user is assigned additional user rights.

B.

User1 appears on the sign-in screen and can sign in without a password.

C.

User1 is prevented from signing in until an administrator manually sets a password for the user.

D.

User1 appears on the sign-in screen and must set a new password on the first sign-in attempts.

Correct Answer: B

Explanation:

https://docs.microsoft.com/en-us/powershell/module/microsoft.powershell.localaccounts/new- localuser?view=powershell-5.1

Question No.47

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.

A user named User1 has a computer named Computer1 that runs Windows 10. Computer1 is joined to an Azure Active Directory (Azure AD) tenant named contoso.com. User1 joins Computer1 to contoso.com by using user1@contoso.com.

Computer1 contains a folder named Folder1. Folder1 is in drive C and is shared as Share1. Share1 has the permission shown in the following table.

image

A user named User2 has a computer named Computer2 that runs Windows 10. User2 joins Computer2 to contoso.com by using user2@contoso.com.

User2 attempts to access Share1 and receives the following error message: quot;The username or password is incorrect.quot;

You need to ensure that User2 can connect to Share1.

Solution: In Azure AD, you create a group named Group1 that contains User1 and User2. You grant Group1 Modify access to Folder1.

Does this meet the goal?

A.

Yes

B.

No

Correct Answer: A

Explanation:

https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2008-R2-and- 2008/cc754178(v=ws.10)

Question No.48

Your company uses Microsoft Deployment Toolkit (MDT) to deploy Windows 10 to new computers.

The company purchases 1,000 new computers.

You need to ensure that the Hyper-V feature is enabled on the computers during the deployment.

What are two possible ways to achieve the goal? Each correct answer presents part of the solution.

NOTE: Each correct selection is worth one point.

A.

Add a task sequence step that adds a provisioning package.

B.

In a Group Policy object (GPO), from Computer Configuration, configure Application Control Policies.

C.

Add a custom command to the Unattend.xml file.

D.

Add a configuration setting to Windows Deployment Services (WDS).

E.

Add a task sequence step that runs dism.exe.

Correct Answer: AC

Explanation:

https://docs.microsoft.com/en-us/windows/deployment/deploy-windows-mdt/create-a-windows- 10-referenceimage

Question No.49

A user named User1 has a computer named Computer1 that runs Windows 10.

User1 connects to a Microsoft Azure virtual machine named VM1 by using Remote Desktop. User1 creates a VPN connection to a partner organization.

When the VPN connection is established, User1 cannot connect to VM1. When User1 disconnects from the VPN, the user can connect to VM1.

You need to ensure that User1 can connect to VM1 while connected to the VPN. What should you do?

A.

From the proxy settings, add the IP address of VM1 to the bypass list to bypass the proxy.

B.

From the properties of VPN1, clear the Use default gateway on remote network check box.

C.

From the properties of the Remote Desktop connection to VM1, specify a Remote Desktop Gateway (RD Gateway).

D.

From the properties of VPN1, configure a static default gateway address.

Correct Answer: B

Explanation:

https://www.stevejenkins.com/blog/2010/01/using-the-local-default-gateway-with-a-windows-vpn- connection/

Question No.50

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.

You have a computer named Computer1 that runs Windows 10. The computer contains a folder. The folder contains sensitive data.

You need to log which user reads the contents of the folder and modifies and deletes files in the folder.

Solution: From the properties of the folder, you configure the Auditing settings and from Audit

image

Policy in the local Group Policy, you configure Audit object access. Does this meet the goal?

A.

Yes

B.

No

Correct Answer: A

Explanation:

https://www.netwrix.com/how_to_detect_who_changed_file_or_folder_owner.html

Get Full Version of MD-100 Dumps

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.