Microsoft Microsoft Certifications MD-100 Questions & Answers
Question 31:
You have a Windows 11 Pro device.
You need to perform a scan in Microsoft Defender to check for rootkits.
Which type of scan should you use?
A. full
B. offline
C. custom
D. quick
Correct Answer: B
What if I think I have a rootkit on my device?
Microsoft security software includes many technologies designed specifically to remove rootkits. If you think you have a rootkit, you might need an extra tool that helps you boot to a known trusted environment.
Microsoft Defender Offline can be launched from the Windows Security app and has the latest antimalware updates from Microsoft. It's designed to be used on devices that aren't working correctly because of a possible malware infection.
You have a computer named Computer1 that runs Windows 11 and hosts two Hyper-V virtual machines named VM1 and VM2.
You need to ensure that VM1 can connect to the network shares on VM2. The solution must prevent Computer1 from establishing network connections to VM1 or VM2.
Which type of virtual switch should you use?
A. external
B. private
C. internal
Correct Answer: B
Private - Only allows communication between virtual machines on the same Hyper-V server. A private network is isolated from all external network traffic on the Hyper-V server. This type of network is useful when you must create an isolated
networking environment, like an isolated test domain.
Incorrect:
External - Gives virtual machines access to a physical network to communicate with servers and clients on an external network. Allows virtual machines on the same Hyper-V server to communicate with each other.
Internal - Allows communication between virtual machines on the same Hyper-V server, and between the virtual machines and the management host operating system. Reference: https://docs.microsoft.com/en-us/windows-server/virtualization/hyper-v/get-started/create-a-virtual-switch-for-hyper-v-virtual-machines
Question 33:
You have computers that run Windows 11 as shown in the following table.
You ping 192.168.10.15 from Computer1 and discover that the request timed out.
You need to ensure that you can successfully ping 192.168.10.15 from Computer1.
Solution: On Computer2, you share a folder.
Does this meet the goal?
A. Yes
B. No
Correct Answer: B
Instead Solution: On Computer2, you allow incoming ICMPv6 traffic in Windows Defender Firewall.
Note: Create an Inbound ICMP Rule
To allow inbound Internet Control Message Protocol (ICMP) network traffic, use the Windows Defender Firewall with Advanced Security node in the Group Policy Management MMC snap-in to create firewall rules. This type of rule allows
ICMP requests and responses to be sent and received by computers on the network.
Note: To create an inbound ICMP rule (see step 6 below).
Open the Group Policy Management Console to Windows Defender Firewall with Advanced Security.
In the navigation pane, click Inbound Rules.
Click Action, and then click New rule.
On the Rule Type page of the New Inbound Rule Wizard, click Custom, and then click Next.
On the Program page, click All programs, and then click Next.
On the Protocol and Ports page, select ICMPv4 or ICMPv6 from the Protocol type list. If you use both IPv4 and IPv6 on your network, you must create a separate ICMP rule for each.
Your network contains an Active Directory domain. The domain contains computers that run Windows 10.
All users use Roaming User Profiles.
You have a user named Public1 that is used to sign-in to a public computer.
You need to prevent changes to the user settings of Public1 from being saved to the user profile.
What should you do?
A. Rename Ntuser.dat to Ntuser.v6.
B. Rename the Roaming User Profile folder to Public 1.v1.
C. Rename the Roaming User Profile folder to Public1.man.
D. Rename Ntuser.dat to Ntuser.man.
Correct Answer: D
User profiles become mandatory profiles when the administrator renames the NTuser.dat file (the registry hive) of each user's profile in the file system of the profile server from NTuser.dat to NTuser.man. The .man extension causes the user profile to be a read-only profile.
You have the computers shown in the following table.
You plan to install Windows 11 and enable BitLocker Drive Encryption (BitLocker). On which computer should you install Windows 11 and enable BitLocker?
A. Computer1
B. Computer2
C. Computer3
D. Computer4
Correct Answer: C
System Requirements for BitLocker include:
*
BitLocker provides the maximum protection when used with a Trusted Platform Module (TPM) version 1.2 or later versions.
*
TPM 2.0 is not supported in Legacy and Compatibility Support Module (CSM) modes of the BIOS. Devices with TPM 2.0 must have their BIOS mode configured as native UEFI only. (not Computer4)
*
The system drive contains the files that are needed to load Windows after the firmware has prepared the system hardware. BitLocker is not enabled on this drive. For BitLocker to work, the system drive must not be encrypted, must differ from the operating system drive, and must be formatted with the FAT32 file system on computers that use UEFI-based firmware or with the NTFS file system on computers that use BIOS firmware. (not Computer2)
*
The system drive contains the files that are needed to load Windows after the firmware has prepared the system hardware. BitLocker is not enabled on this drive. For BitLocker to work, the system drive must not be encrypted, must differ from the operating system drive, and must be formatted with the FAT32 file system on computers that use UEFI-based firmware or with the NTFS file system on computers that use BIOS firmware. We recommend that system drive be approximately 350 MB in size. After BitLocker is turned on, it should have approximately 250 MB of free space. (Not Computer1)
You have a computer named Computer1 that runs Windows 7. Computer1 has a local user named User1 who has a customized profile.
On Computer1, you perform a clean installation of Windows 10 without formatting the drives.
You need to migrate the settings of User1 from Windows7 to Windows 10.
Which two actions should you perform? To answer, drag the appropriate actions to the correct targets. Each action may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.
NOTE: Each correct selection is worth one point.
Select and Place:
Correct Answer:
Question 37:
HOTSPOT
You need to reduce the amount of time it takes to restart Application1 when the application crashes.
What should you include in the solution? To answer, select the appropriate options in the answer area.
You need to implement a solution to configure the contractors’ computers.
What should you do? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
Hot Area:
Correct Answer:
The requirement states: Automate the configuration of the contractors’ computers. The solution must provide a configuration file that the contractors can open from a Microsoft SharePoint site to apply the required configurations.
The ‘configuration file’ in this case is known as a ‘provisioning package’.
A provisioning package (.ppkg) is a container for a collection of configuration settings. With Windows 10, you can create provisioning packages that let you quickly and efficiently configure a device without having to install a new image. The tool for creating provisioning packages is renamed Windows Configuration Designer, replacing the Windows Imaging and Configuration Designer (ICD) tool.
You need to meet the technical requirements for the HR department users.
Which permissions should you assign to the HR department users for the D:\Reports folder? To answer, select the appropriate permissions in the answer area.
You need to meet the technical requirement for Computer1.
What should you do? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
Hot Area:
Correct Answer:
The requirement states: Kiosk (assigned access) must be configured on Computer1.
Kiosk (assigned access) is a feature on Windows 10 that allows you to create a lockdown environment that lets users interact with only one app when they sign into a specified account. With Kiosk (assigned access), users won't be able to get
to the desktop, Start menu, or any other app, including the Settings app.
Box 1: User 11
Kiosk (assigned access) must be configured by a user who is a member of the Local Administrators group on the Computer.
Box 2: User 12.
Kiosk (assigned access) must be configured for a user account that is a member of the Users group.
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only Microsoft exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your MD-100 exam preparations and Microsoft certification application, do not hesitate to visit our Vcedump.com to find your solutions here.