Exams > Microsoft > MD-100: Windows 10
MD-100: Windows 10
Page 15 out of 37 pages Questions 141-150 out of 368 questions
Question#141

SIMULATION -
Please wait while the virtual machine loads. Once loaded, you may proceed to the lab section. This may take a few minutes, and the wait time will not be deducted from your overall test time.
When the Next button is available, click it to access the lab section. In this section, you will perform a set of tasks in a live environment. While most functionality will be available to you as it would be in a live environment, some functionality (e.g., copy and paste, ability to navigate to external websites) will not be possible by design.
Scoring is based on the outcome of performing the tasks stated in the lab. In other words, it doesn't matter how you accomplish the task, if you successfully perform it, you will earn credit for that task.
Labs are not timed separately, and this exam may more than one lab that you must complete. You can use as much time as you would like to complete each lab.
But, you should manage your time appropriately to ensure that you are able to complete the lab(s) and all other sections of the exam in the time provided.
Please note that once you submit your work by clicking the Next button within a lab, you will NOT be able to return to the lab.

Username and password -

Use the following login credentials as needed:
To enter your password, place your cursor in the Enter password box and click on the password below.

Username: Contoso/Administrator -
Password: Passw0rd!
The following information is for technical support purposes only:

Lab Instance: 11145882 -


You have already prepared Client1 for remote management.
You need to forward all events from the Application event log on Client1 to DC1.
To complete this task, sign in to the required computer or computers.

Discover Answer Hide Answer

Answer: See explanation below.
Configuring the event source computer
1. Run the following command from an elevated privilege command prompt on the Windows Server domain controller to configure Windows Remote Management: winrm qc -q
2. Start group policy by running the following command:
%SYSTEMROOT%\System32\gpedit.msc
3. Under the Computer Configuration node, expand the Administrative Templates node, then expand the Windows Components node, then select the Event
Forwarding node.
4. Right-click the SubscriptionManager setting, and select Properties. Enable the SubscriptionManager setting, and click the Show button to add a server address to the setting. Add at least one setting that specifies the event collector computer. The SubscriptionManager Properties window contains an Explain tab that describes the syntax for the setting.
5. After the SubscriptionManager setting has been added, run the following command to ensure the policy is applied: gpupdate /force
Configuring the event collector computer
1. Run the following command from an elevated privilege command prompt on the Windows Server domain controller to configure Windows Remote Management: winrm qc -q
2. Run the following command to configure the Event Collector service: wecutil qc /q
3. Create a source initiated subscription. This can either be done programmatically, by using the Event Viewer, or by using Wecutil.exe. If you use Wecutil.exe, you must create an event subscription XML file and use the following command: wecutil cs configurationFile.xml
Reference:
https://docs.microsoft.com/en-us/windows/win32/wec/setting-up-a-source-initiated-subscription#forwarding-the-security-log

Question#142

Your company has a wireless access point that uses WPA2-Enterprise.
You need to configure a computer to connect to the wireless access point.
What should you do first?

  • A. Create a provisioning package in Windows Configuration Designer.
  • B. Request a passphrase.
  • C. Request and install a certificate.
  • D. Create a Connection Manager Administration Kit (CMAK) package.
Discover Answer Hide Answer

Answer: B
Reference:
https://support.microsoft.com/en-za/help/17137/windows-setting-up-wireless-network

Question#143

A user named User1 has a computer named Computer1 that runs Windows 10.
User1 connects to a Microsoft Azure virtual machine named VM1 by using Remote Desktop.
User1 creates a VPN connection named VPN1 to connect to a partner organization.
When the VPN1 connection is established, User1 cannot connect to VM1. When User1 disconnects from VPN1, the user can connect to VM1.
You need to ensure that User1 can connect to VM1 while connected to VPN1.
What should you do?

  • A. From the proxy settings, add the IP address of VM1 to the bypass list to bypass the proxy.
  • B. From the properties of VPN1, clear the Use default gateway on remote network check box.
  • C. From the properties of the Remote Desktop connection to VM1, specify a Remote Desktop Gateway (RD Gateway).
  • D. From the properties of VPN1, configure a static default gateway address.
Discover Answer Hide Answer

Answer: B
Reference:
https://www.stevejenkins.com/blog/2010/01/using-the-local-default-gateway-with-a-windows-vpn-connection/

Question#144

Your network contains an Active Directory domain. The domain contains a user named Admin1. All computers run Windows 10.
You enable Windows PowerShell remoting on the computers.
You need to ensure that Admin1 can establish remote PowerShell connections to the computers. The solution must use the principle of least privilege.
To which group should you add Admin1?

  • A. Access Control Assistance Operators
  • B. Power Users
  • C. Remote Desktop Users
  • D. Remote Management Users
Discover Answer Hide Answer

Answer: D
Reference:
https://4sysops.com/wiki/enable-powershell-remoting/

Question#145

You have 200 computers that run Windows 10 and are joined to an Active Directory domain.
You need to enable Windows Remote Management (WinRM) on all the computers by using Group Policy.
Which three actions should you perform? Each correct answer presents part of the solution.
NOTE: Each correct selection is worth one point.

  • A. Set the Startup Type of the Windows Remote Management (WS-Management) service to Automatic.
  • B. Enable the Windows Defender Firewall: Allow inbound Remote Desktop exceptions setting.
  • C. Enable the Allow remote server management through WinRM setting.
  • D. Enable the Windows Defender Firewall: Allow inbound remote administration exception setting.
  • E. Enable the Allow Remote Shell access setting.
  • F. Set the Startup Type of the Remote Registry service to Automatic.
Discover Answer Hide Answer

Answer: ACD
Reference:
http://www.mustbegeek.com/how-to-enable-winrm-via-group-policy/

Question#146

Your network contains an Active Directory domain. The domain contains the objects shown in the following table.

The domain is configured to store BitLocker Drive Encryption (BitLocker) recovery passwords.
User1 encrypts an external disk on Computer1 by using BitLocker to Go.
User2 moves the external disk to Computer2 and unlocks the disk.
You need to view the BitLocker recovery password.
Which objects are used to store the recovery password?

  • A. Computer1 and Computer2 only
  • B. User1 only
  • C. Computer1 only
  • D. User1 and Computer1 only
  • E. User1 and User2 only
Discover Answer Hide Answer

Answer: C
Reference:
https://docs.microsoft.com/en-us/windows/security/information-protection/bitlocker/bitlocker-and-adds-faq

Question#147

A user has a computer that runs Windows 10.
When the user connects the computer to the corporate network, the user cannot access the internal corporate servers. The user can access servers on the
Internet.
You run the ipconfig command and receive the following output.

You send a ping request and successfully ping the default gateway, the DNS servers, and the DHCP server.
Which configuration on the computer causes the issue?

  • A. the DNS servers
  • B. the IPv4 address
  • C. the subnet mask
  • D. the default gateway address
Discover Answer Hide Answer

Answer: A

Question#148

You have a computer named Computer1 that runs Windows 10. Computer1 is joined to an Active Directory domain named adatum.com. The domain contains two groups named Group1 and Group2.
Computer1 contains a folder named C:\Folder1 that has the file permissions shown in the following table.

You need to share C:\Folder1. The solution must ensure that the members of Group2 can access all the files in the share.
What should you do?

  • A. From File Explorer, use Network File and Folder Sharing. Assign the Read permission to Group2.
  • B. From File Explorer, use Advanced Sharing. Assign the Read share permission to Group2.
  • C. From Control Panel, use Advanced sharing settings. Configure file and printer sharing for the network profile of the domain.
  • D. At a command prompt, run the net share Share=C:\Folder1 /grant:adatum\group2,read command.
Discover Answer Hide Answer

Answer: D
Reference:
https://techgenix.com/net-share-command-30/

Question#149

You are troubleshooting the network connectivity of a computer that runs Windows 10. The computer is connected physically to the network but rejects network traffic from an external source.
You need to reinstall the TCP/IP stack on the computer.
What should you run?

  • A. the netsh int ip reset command
  • B. the Reset-NetAdapterAdvancedProperty cmdlet
  • C. the netcfg -d command
  • D. the Debug-NetworkController cmdlet
Discover Answer Hide Answer

Answer: A
Reference:
https://howtofix.guide/reset-tcp-ip/

Question#150

HOTSPOT -
You have a computer that runs Windows 10.
From the Settings app, you view the connection properties shown in the following exhibit.

Use the drop-down menus to select the answer choice that completes each statement based on the information presented in the graphic.
NOTE: Each correct selection is worth one point.
Hot Area:

Discover Answer Hide Answer

Answer:

chevron rightPrevious Nextchevron right