시험덤프
매달, 우리는 1000명 이상의 사람들이 시험 준비를 잘하고 시험을 잘 통과할 수 있도록 도와줍니다.
  / MD-100 덤프  / MD-100 문제 연습

Microsoft MD-100 시험

Windows 10 온라인 연습

최종 업데이트 시간: 2024년11월11일

당신은 온라인 연습 문제를 통해 Microsoft MD-100 시험지식에 대해 자신이 어떻게 알고 있는지 파악한 후 시험 참가 신청 여부를 결정할 수 있다.

시험을 100% 합격하고 시험 준비 시간을 35% 절약하기를 바라며 MD-100 덤프 (최신 실제 시험 문제)를 사용 선택하여 현재 최신 103개의 시험 문제와 답을 포함하십시오.

 / 4

Question No : 1


STION NO: 141
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
Your network contains an Active Directory domain named contoso.com.
The domain contains the users shown in the following table.



You have a computer named Computer1 that runs Windows 10 and is in a workgroup.
A local standard user on Computer1 named User1 joins the computer to the domain and uses the credentials of User2 when prompted.
You need to ensure that you can rename Computer1 as Computer33.
Solution: You use the credentials of User4 on Computer1.
Does this meet the goal?

정답:
Explanation:
Renaming a domain-joined computer will also rename the computer account in the domain.
To do this, you need domain administrator privileges.
User4 is a server operator, not an administrator. Members of the Server Operators group can sign in to a server interactively, create and delete network shared resources, start and stop services, back up and restore files, format the hard disk drive of the computer, and shut down the computer.
Use User3's credentials instead.
References: https://docs.microsoft.com/en-us/windows/security/identity-protection/access-control/active-directory-security-groups#bkmk-domainadmins

Question No : 2


You have a workgroup computer named Computer1 that runs Windows 10.
Computer1 has the user accounts shown in the following table.



User3, User4, and Administrator sign in and sign out on Computer1. User1 and User2 have never signed in to Computer1.
You are troubleshooting policy issues on Computer1. You sign in to Computer1 as Administrator.
You add the Resultant Set of Policy (RsoP) snap-in to an MMC console.
Which users will be able to sign in on Computer1?

정답:
Explanation:
The Interactive logon: Number of previous logons to cache (in case domain controller is not available) policy setting determines whether a user can log on to a Windows domain by using cached account information. Logon information for domain accounts can be cached locally so that, if a domain controller cannot be contacted on subsequent logons, a user can still log on.
References: https://docs.microsoft.com/en-us/windows/security/threat-protection/security-policy-settings/interactive-logon-number-of-previous-logons-to-cache-in-case-domain-controller-is-not-available

Question No : 3


Your company deploys Windows 10 Enterprise to all computers. All the computers are joined to Microsoft Azure Active Directory (Azure AD).
The company purchases a new computer for a new user and creates an Azure AD account for the user.
The user signs in to the computer by using the Azure AD account.
The user discovers the activation error shown in the following exhibit.



You need to activate Windows 10 Enterprise on the computer.
What should you do?

정답:
Explanation:
Reference: https://docs.microsoft.com/en-us/windows/deployment/windows-10-subscription-activation

Question No : 4


Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
You have two computers named Computer1 and Computer2 that run Windows 10.
You have an Azure Active Directory (Azure AD) user account named [email protected] that is in the local Administrators group on each computer.
You sign in to Computer1 by using [email protected].
You need to ensure that you can use Event Viewer on Computer1 to connect to the event logs on Computer2.
Solution: On Computer2, you run the Enable-PSRemoting cmdlet.
Does this meet the goal?

정답:
Explanation:
The Enable-PSRemoting cmdlet configures the computer to receive PowerShell remote commands that are sent by using the WS-Management technology.
References: https://docs.microsoft.com/en-us/powershell/module/microsoft.powershell.core/enable-psremoting?view=powershell-7

Question No : 5


Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
You have a computer that runs Windows 10. The computer contains a folder. The folder contains sensitive data.
You need to log which user reads the contents of the folder and modifies and deletes files in the folder.
Solution: From the properties of the folder, you configure the Auditing settings and from the Audit Policy in the local Group Policy, you configure Audit privilege use.
Does this meet the goal?

정답:
Explanation:
Files and folders are objects and are audited through object access, not though privilege use.
Reference: https://www.netwrix.com/how_to_detect_who_changed_file_or_folder_owner.html

Question No : 6


Note: This question is part of a series of questions that present the same scenario.
Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
You have a workgroup computer that runs Windows 10.
The computer contains the local user accounts shown in the following table.



You need to configure the desktop background for User1 and User2 only.
Solution: From the local computer policy, you configure the Filter Options settings for the user policy. At a command prompt, you run the gpupdate.exe/Target:user command.
Does this meet the goal?

정답:

Question No : 7


Note: This question is part of series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals Some question sets might have more than one correct solution, while others might not have a correct solution.
After you answer a question In this section, you will NOT be able to return to It. As a result these question will not appear In the review screen.
You have two computers named Computer1 and Computer2 that run Windows 10.
You have an Azure Active Directory (Azure AD) user account named admin®contoso.com that is m the local Administrators group on each computer.
You sign m to Compute1 by using admin®contoso.com.
You need to ensure that you can use Event Viewer on Computer1 to connect to the event logs on Computer?.
Solution: On Computer2, you create a Windows Defender Firewall rule that allows eventwr.exe.
Does this meet the goal?

정답:

Question No : 8


Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
You manage devices that run Windows 10.
Ten sales users will travel to a location that has limited bandwidth that is expensive. The sales users will be at the location for three weeks.
You need to prevent all Windows updates from downloading for the duration of the trip. The solution must not prevent access to email and the Internet.
Solution: From Network & Internet in the Settings app, you set the network connections as metered connections.
Does this meet the goal?

정답:
Explanation:
References: https://www.makeuseof.com/tag/5-ways-temporarily-turn-off-windows-update-windows-10/

Question No : 9


You have a computer named Computer1 that runs Windows 10.
The relevant services on Computer1 are shown in the following table.



Which service will start after you restart Computer1?

정답:
Explanation:
Service1 cannot start because it is dependent on Service3 which is disabled.
Service2 will start because it is set to Automatic. Service2 starting will cause Service6 to start.
Service3 will not start because it is disabled.
Service4 will not start because it is disabled.
Service5 will start because it is set to Automatic and is not dependent on any other services.
Service6 will start because Service2 is dependent on Service6.

Question No : 10


You have a computer named Computer1 that runs Windows 10.
On Computer1, you turn on File History.
You need to protect a folder named D:\Folder1 by using File History.
What should you do?

정답:
Explanation:
To configure File History, click More options on the Backup screen. The Backup options screen allows you to set how often File History backs up your files and how long versions are saved.
References: https://www.groovypost.com/howto/configure-windows-10-file-history/

Question No : 11


CORRECT TEXT
Please wait while the virtual machine loads. Once loaded, you may proceed to the lab section. This may take a few minutes, and the wait time will not be deducted from your overall test time.
When the Next button is available, click it to access the lab section. In this section, you will perform a set of tasks in a live environment. While most functionality will be available to you as it would be in a live environment, some functionality (e.g., copy and paste, ability to navigate to external websites) will not be possible by design.
Scoring is based on the outcome of performing the tasks stated in the lab. In other words, it doesn’t matter how you accomplish the task, if you successfully perform it, you will earn credit for that task.
Labs are not timed separately, and this exam may more than one lab that you must complete. You can use as much time as you would like to complete each lab. But, you should manage your time appropriately to ensure that you are able to complete the lab(s) and all other sections of the exam in the time provided.
Please note that once you submit your work by clicking the Next button within a lab, you will NOT be able to return to the lab.

Username and password



Use the following login credentials as needed:
To enter your password, place your cursor in the Enter password box and click on the password below.
Username: Contoso/Administrator
Password: Passw0rd!
The following information is for technical support purposes only:
Lab Instance: 11145882






You need to ensure that all the current and future users in the Active Directory domain can establish Remote Desktop connections to Client1. The solution must use the principle of least privilege.
To complete this task, sign in to the required computer or computers.

정답: Step 1. Add Remote Desktop Users to the Remote Desktop Users Group.

Question No : 12


HOTSPOT
Your network contains an Active Directory domain.
The domain contains the users shown in the following table.



The Authenticated Users group has the Add workstations to domain user right in the Default Domain Controllers Policy.
The Device Managers and Help Desk groups are granted the Create Computer objects permission for the Computers container of the domain.
You have 15 workgroup computers that run Windows 10. Each computer contains a local user account named LocalAdmin1 that is a member of the following groups:
✑ Administrators
✑ Device Owners
✑ Authenticated Users
For each of the following statements, select Yes if the statement is true. Otherwise, select No. NOTE: Each correct selection is worth one point.



정답:


Explanation:
Box 1: No
User1 is a member of the Authenticated Users group which has the Add workstations to domain user right. However, with the Add workstations to domain user right, you are restricted to joining a maximum of 10 computers to the domain.
Box 2: No
User2 is a member of the Authenticated Users group which has the Add workstations to domain user right. User2 is also a member of the Device Managers group which is granted the Create Computer objects permission for the Computers container of the domain. The Create Computer objects permission overrides the 10-computer limit imposed by the Add workstations to domain user right so User2 can join more than 10 computers to the domain.
Box 3. Yes
User3 is a member of the Authenticated Users group which has the Add workstations to
domain user right. User3 is also a member of the Help Desk group which is granted the Create Computer objects permission for the Computers container of the domain. The Create Computer objects permission overrides the 10-computer limit imposed by the Add workstations to domain user right so User3 can join all the computers to the domain.

Question No : 13


You deploy Windows 10 to several computers. The computers will be used by users who frequently present their desktop to other users.
You need to prevent applications from generating toast notifications in the notification area.
Which settings should you configure from the Settings app?

정답:
Explanation:
Focus Assist will automatically hide incoming notifications, so they don’t pop up and distract you while you’re playing a game, giving a presentation, or using a full-screen application.

Question No : 14


CORRECT TEXT
Please wait while the virtual machine loads. Once loaded, you may proceed to the lab section. This may take a few minutes, and the wait time will not be deducted from your overall test time.
When the Next button is available, click it to access the lab section. In this section, you will perform a set of tasks in a live environment. While most functionality will be available to you as it would be in a live environment, some functionality (e.g., copy and paste, ability to navigate to external websites) will not be possible by design.
Scoring is based on the outcome of performing the tasks stated in the lab. In other words, it doesn’t matter how you accomplish the task, if you successfully perform it, you will earn credit for that task.
Labs are not timed separately, and this exam may more than one lab that you must complete. You can use as much time as you would like to complete each lab. But, you should manage your time appropriately to ensure that you are able to complete the lab(s) and all other sections of the exam in the time provided.
Please note that once you submit your work by clicking the Next button within a lab, you will NOT be able to return to the lab.

Username and password



Use the following login credentials as needed:
To enter your password, place your cursor in the Enter password box and click on the password below.
Username: Contoso/Administrator
Password: Passw0rd!
The following information is for technical support purposes only:
Lab Instance: 10921597



You need to identify the total number of events that have Event ID 63 in the Application event log. You must type the number of identified events into C:\Folder1\File

정답:

Question No : 15


Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
You have a computer named Computer1 that runs Windows 10. The computer contains a folder. The folder contains sensitive data.
You need to log which user reads the contents of the folder and modifies and deletes files in the folder.
Solution: From the properties of the folder, you configure the Auditing settings and from Audit Policy in the local Group Policy, you configure Audit object access.
Does this meet the goal?

정답:
Explanation:
References: https://www.netwrix.com/how_to_detect_who_changed_file_or_folder_owner.html

 / 4