Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while
others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
Your network contains an Active Directory domain. The domain contains a computer named Computer1 that runs Windows 8.1.
Computer1 has apps that are compatible with Windows 10.
You need to perform a Windows 10 in-place upgrade on Computer1.
Solution: You add Windows 10 startup and install images to a Windows Deployment Services (WDS) server. You start Computer1 by using WDS and PXE, and then you initiate the Windows 10 installation.
Does this meet the goal?
A. Yes
B. No
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while
others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
You have a workgroup computer that runs Windows 10. The computer contains the local user accounts shown in the following table.
You need to configure the desktop background for User1 and User2 only.
Solution: You create a new local group to which you add User1 and User2. You create a local Group Policy Object (GPO) and configure the Desktop Wallpaper setting in the GPO. At a command prompt, you run the gpupdate.exe/Force
command.
Does this meet the goal?
A. Yes
B. No
You have a computer named Computer1 that runs Windows 10.
On Computer1, you turn on File History.
You need to protect a folder named D:\Folder1 by using File History.
What should you do?
A. From File Explorer, modify the Security settings of D:\Folder1
B. From File Explorer, add D:\Folder1 to the Documents library
C. From the Settings app, configure the Recovery settings
D. From File History in Control Panel, configure the Select drive settings
Your network contains an Active Directory domain named contoso.com. The domain contains named Computer1 that runs Windows 10. On Computer1, you create an NTFS folder and assign Full control permissions to Everyone.
You share the folder as Share1 and assign the permissions shown in the following table.
When accessing Share1, which two actions can be performed by User1 but not by User2? Each correct answer presents part of the solution. NOTE: Each correct selection is worth one point.
A. Delete a file created by another user.
B. Set the permissions for a file.
C. Rename a file created by another user.
D. Take ownership of file.
E. Copy a file created by another user to a subfolder.
Your network contains an Active Directory domain named contoso.com. The domain contains two computers named Computer1 and Computer2 that run Windows 10.
On Computer1, you need to run the Invoke-Command cmdlet to execute several PowerShell commands on Computer2.
What should you do first?
A. On Computer2, run the Enable-PSRemoting cmdlet
B. From Active Directory, configure the Trusted for Delegation setting for the computer account of Computer2
C. On Computer1, run the New-PSSession cmdlet
D. On Computer2, add Computer1 to the Remote Management Users group
A user named User1 has a computer named Computer1 that runs Windows 10.
User1 connects to a Microsoft Azure virtual machine named VM1 by using Remote Desktop.
User1 creates a VPN connection to a partner organization.
When the VPN connection is established, User1 cannot connect to VM1. When User1 disconnects from the VPN, the user can connect to VM1.
You need to ensure that User1 can connect to VM1 while connected to the VPN.
What should you do?
A. From the proxy settings, add the IP address of VM1 to the bypass list to bypass the proxy.
B. From the properties of VPN1, clear the Use default gateway on remote network check box.
C. From the properties of the Remote Desktop connection to VM1, specify a Remote Desktop Gateway (RD Gateway).
D. From the properties of VPN1, configure a static default gateway address.
You deploy Windows 10 to several computers. The computers will be used by users who frequently present their desktop to other users.
You need to prevent applications from generating toast notifications in the notification area.
Which settings should you configure from the Settings app?
A. Shared experiences
B. Privacy
C. Focus assist
D. Tablet mode
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while
others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
You have a computer named Computer1 that runs Windows 10. The computer contains a folder. The folder contains sensitive data.
You need to log which user reads the contents of the folder and modifies and deletes files in the folder.
Solution: From the properties of the folder, you configure the Auditing settings and from the Audit Policy in the local Group Policy, you configure Audit directory service access.
Does this meet the goal?
A. Yes
B. No
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while
others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
You have two computers named Computer1 and Computer2 that run Windows 10.
You have an Azure Active Directory (Azure AD) user account named [email protected] that is in the local Administrators group on each computer.
You sign in to Computer1 by using [email protected].
You need to ensure that you can use Event Viewer on Computer1 to connect to the event logs on Computer2.
Solution: On Computer2, you enable the Remote Event Log Management inbound rule from Windows Defender Firewall.
Does this meet the goal?
A. Yes
B. No
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while
others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
You have two computers named Computer1 and Computer2 that run Windows 10.
You have an Azure Active Directory (Azure AD) user account named [email protected] that is in the local Administrators group on each computer.
You sign in to Computer1 by using [email protected].
You need to ensure that you can use Event Viewer on Computer1 to connect to the event logs on Computer2.
Solution: On Computer2, you run the Enable-PSRemoting cmdlet.
Does this meet the goal?
A. Yes
B. No
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only Microsoft exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your MD-100 exam preparations and Microsoft certification application, do not hesitate to visit our Vcedump.com to find your solutions here.