MD-100 Practice Test

Click here to download 150 questions and answers

1. Your company has an isolated network used for testing. The network contains 20 computers that run Windows 10. The computers are in a workgroup. During testing, the computers must remain in the workgroup. You discover that none of the computers are activated. You need to recommend a solution to activate the computers without connecting the network to the Internet. What should you include in the recommendation?


2. You plan to deploy Windows 10 to 100 secure computers. You need to select a version of Windows 10 that meets the following requirements:
✑ Uses Microsoft Edge as the default browser
✑ Minimizes the attack surface on the computer
✑ Supports joining Microsoft Azure Active Directory (Azure AD)
✑ Only allows the installation of applications from the Microsoft Store

What is the best version to achieve the goal? More than one answer choice may achieve the goal. Select the BEST answer.


3. Your company uses Microsoft Deployment Toolkit (MDT) to deploy Windows 10 to new computers. The company purchases 1,000 new computers. You need to ensure that the Hyper-V feature is enabled on the computers during the deployment. What are two possible ways to achieve the goal? Each correct answer presents part of the solution.
NOTE: Each correct selection is worth one point.


4. Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution. After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen. You have a computer named Computer1 that runs Windows 10. A service named Application1 is configured as shown in the exhibit.

Screen Shot 2020 07 29 at 1.04.09 AM

You discover that a user used the Service1 account to sign in to Computer1 and deleted some files. You need to ensure that the identity used by Application1 cannot be used by a user to sign in to sign in to the desktop on Computer1. The solution must use the principle of least privilege. Solution: On Computer1, you assign Service1 the deny log on locally user right. Does this meet the goal?


Question 1 of 4