MD-100 Dumps

MD-100 Free Practice Test

Microsoft MD-100: Windows 10

QUESTION 1

- (Exam Topic 4)
Your network contains the segments shown in the following table.
MD-100 dumps exhibit
You have computers that run Windows 10 and are configured as shown in the following table.
MD-100 dumps exhibit
Windows Defender Firewall has the File and Printer Sharing allowed apps rule shown in the following table.
MD-100 dumps exhibit
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
NOTE: Each correct selection is worth one point.
MD-100 dumps exhibit
Solution:
MD-100 dumps exhibit

Does this meet the goal?

Correct Answer: A

QUESTION 2

- (Exam Topic 4)
Your network contains an Active Directory domain. The domain contains a computer named Computer1 that runs Windows 10. Computer1 contains a folder named Folder1.
You plan to share Folder1. Everyone will have Read share permissions, and administrators will have Full control share permission.
You need to prevent the share from appearing when users browse the network. What should you do?

Correct Answer: D
Appending a dollar sign to share name prevents a share from appearing when users browse the network.

QUESTION 3

- (Exam Topic 4)
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
You have two computers named Computer1 and Computer2 that run Windows 10.
You have an Azure Active Directory (Azure AD) user account named admin@contoso.com that is in the local Administrators group on each computer.
You sign in to Computer1 by using admin@contoso.com.
You need to ensure that you can use Event Viewer on Computer1 to connect to the event logs on Computer2. Solution: On Computer2, you create a Windows Defender Firewall rule that allows eventwr.exe.
Does this meet the goal?

Correct Answer: B
Reference:
https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/cc76643

QUESTION 4

- (Exam Topic 4)
You are preparing to deploy Windows 10.
You download and install the Windows Assessment and Deployment Kit (Windows ADK). You need to create a bootable WinPE USB drive.
What should you do first?

Correct Answer: D
WinPE used to be included in the Windows ADK. However, it is now provided as an add-on so the first step is to download and install the add-on.
References:
https://docs.microsoft.com/en-us/windows-hardware/manufacture/desktop/winpe-create-usb-bootable-drive https://docs.microsoft.com/en-us/windows-hardware/get-started/adk-install

QUESTION 5

- (Exam Topic 4)
You enable Windows PowerShell remoting on a computer that runs Windows 10. You need to limit which PowerShell cmdlets can be used in a remote session.
Which three actions should you perform in sequence? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.
MD-100 dumps exhibit
Solution:
* 1. New
* 2. Regster
* 3. Enter Read more:
https://devblogs.microsoft.com/scripting/build-constrained-powershell-endpoint-using-configuration-file/

Does this meet the goal?

Correct Answer: A