[Free] 2019(Nov) EnsurePass Microsoft MD-100 Dumps with VCE and PDF 21-30

Get Full Version of the Exam
http://www.EnsurePass.com/MD-100.html

Question No.21

You have a computer named Computer1 that runs Windows 10.

On Computer1, you create the local users shown in the following table.

image

Which three user profiles will persist after each user signs out? Each correct answer presents part of the solution.

NOTE: Each correct selection is worth one point.

  1. User1

  2. User2

  3. User3

  4. User4

  5. User5

Correct Answer: ADE

Question No.22

You have 20 computers that run Windows 10.

You configure all the computers to forward all the events from all the logs to a computer named Computer1 that runs Windows 10.

When you sign in to Computer1, you cannot see any security events from other computers. You can see all the other forwarded events from the other computers.

You need to ensure that the security events are forwarded to Computer1. What should you do?

  1. On each computer, run wecutil ac /q .

  2. On each computer, add the NETWORK SERVICE account to the Event Log Readers group.

  3. On each computer, run winrm qc -q.

  4. On Computer1, add the account of Computer1 to the Event Log Readers group.

Correct Answer: D

Explanation:

https://docs.microsoft.com/en-us/windows/security/threat-protection/use-windows-event- forwarding-to-assistin-intrusion-detection

Question No.23

HOTSPOT

You have a computer that runs Windows 10. The computer is in a workgroup. The computer is used to provide visitors with access to the Internet.

You need to configure the computer to meet the following requirements:

image

Always sign in automatically as User1.

image

Start an application named App1.exe at sign-in.

What should you use to meet each requirement? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

image

Correct Answer:

image

Question No.24

HOTSPOT

You are a network administrator at your company.

A user attempts to start a computer and receives the following error message: quot;Bootmgr is missing.quot;

You need to resolve the issue.

You start the computer in the recovery mode.

Which command should you run next? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

image

Correct Answer:

image

Question No.25

HOTSPOT

You have a computer that runs Windows 10 and contains the folders shown in the following table.

image

You create the groups shown in the following table.

image

On FolderA, you remove permission inheritance. To each folder, you assign the NTFS permissions shown in the following table.

image

For each of the following statements, select Yes if the statement is true. Otherwise, select No. NOTE: Each correct selection is worth one point.

image

Correct Answer:

image

Question No.26

You have several computers that run Windows 10. The computers are in a workgroup and have BitLocker Drive Encryption (BitLocker) enabled.

You join the computers to Microsoft Azure Active Directory (Azure AD).

You need to ensure that you can recover the BitLocker recovery key for the computers from Azure AD.

What should you do first?

  1. Disable BitLocker.

  2. Add a BitLocker key protector.

  3. Suspend BitLocker.

  4. Disable the TMP chip.

Correct Answer: B

Explanation:

https://docs.microsoft.com/en-us/windows/security/information-protection/bitlocker/prepare-your- organization-for-bitlocker-planning-and-policies#bitlocker-key-protectors

Question No.27

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.

A user named User2 has a computer named Computer2 that runs Windows 10. User2 joins Computer2 to contoso.com by using user2@contoso.com.

Computer1 contains a folder named Folder1. Folder1 is in drive C and is shared as Share1. Share1 has the permission shown in the following table.

image

A user named User2 has a computer named Computer2 that runs Windows 10. User2 joins

Computer2 to contoso.com by using user2@contoso.com.

User2 attempts to access Share1 and receives the following error message: quot;The username or password is incorrect.quot;

You need to ensure that User2 can connect to Share1.

Solution: You create a local user account on Computer1 and instruct User2 to use the local account to connect to Share1.

Does this meet the goal?

  1. Yes

  2. No

Correct Answer: B

Question No.28

You have a computer named Computer1 that runs Windows 10. Computer1 contains a folder named Folder1.

You need to log any users who take ownership of the files in Folder1.

Which two actions should you perform? Each correct answer presents part of the solution. NOTE: Each correct selection is worth one point.

  1. Modify the folder attributes of Folder1.

  2. Modify the Advanced Security Settings for Folder1.

  3. From a Group Policy object (GPO), configure the Audit Sensitive Privilege Use setting.

  4. From a Group Policy object (GPO), configure the Audit File System setting.

  5. Install the Remote Server Administration Tools (RSAT).

Correct Answer: BD

Explanation:

https://www.netwrix.com/how_to_detect_who_changed_file_or_folder_owner.html

Question No.29

HOTSPOT

You have a Microsoft Azure Active Directory (Azure AD) tenant named contoso.com that contain the users shown in the following table.

image

You have a computer named Computer1 that runs Windows 10.

image

User1 joins Computer1 to Azure AD by using user1@contoso.com.

For each of the following statements, select Yes if the statement is true. Otherwise, select No. NOTE: Each correct selection is worth one point.

image

Correct Answer:

image

Question No.30

Your network contains an Active Directory domain. The domain contains 10 computers that run Windows 10.

Users in the finance department use the computers.

You have a computer named Computer1 that runs Windows 10.

From Computer1, you plan to run a script that executes Windows PowerShell commands on the finance department computers.

You need to ensure that you can run the PowerShell commands on the finance department from

Computer1.

What should you do on the finance department computers?

  1. From the local Group Policy, enable the Allow Remote Shell Access setting.

  2. From the local Group Policy, enable the Turn on Script Execution setting.

  3. From the Windows PowerShell, run the Enable-MMAgent cmdlet.

  4. From the Windows PowerShell, run the Enable-PSRemoting cmdlet.

Correct Answer: D

Explanation:

https://docs.microsoft.com/en-us/powershell/module/microsoft.powershell.core/enable- psremoting?view=powershell-6

Get Full Version of the Exam
MD-100 Dumps
MD-100 VCE and PDF

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.