Skip Navigation Links

Microsoft - MD-100: Windows 10

Sample Questions

Question: 63
Measured Skill: Maintain Windows (25-30%)

A Windows 10 Enterprise client computer has two hard disk drives: a system drive and a data drive.

You are preparing to back up the computer prior to installing a developing software product. You have the following requirements:
  • The system disk that is part of the backup must be mountable from within Windows.
  • The system disk that is part of the backup must be bootable.
  • The backup must be able to restore in the event of a hard disk failure.
  • The backup must contain data from both hard disk drives.
You need to select a backup method.

Which method should you use?

ASystem image
B Storage pool
C File History
D System repair disk

Correct answer: A


A system image is an exact copy of the system with all drivers, programs, folders, and files. The image will help you recover your computer if you have major problems. System imaging allows a bare-metal restore of the computer.

A system image backup is created by using Backup and Restore (Windows 7):

Question: 64
Measured Skill: Configure connectivity (15-20%)

You provide IT support for a small business team. A member of the team needs the ability to use Remote Desktop and VPN to access a desktop computer from a laptop when traveling. This desktop computer is running Windows 10 Enterprise, while the laptop is running Windows 8.

You need to set up a secure Remote Desktop connection on the desktop computer.

Which two actions should you perform?

(Each correct answer presents part of the solution. NOTE: Each correct selection is worth one point.)

AMake the user account a standard user.
B Allow remote connections.
C Require Network Level Authentication.
D Disable Remote Assistance connections.

Correct answer: B, C


You can use Remote Desktop to connect to and control your PC from a remote device by using a Microsoft Remote Desktop client (available for Windows, iOS, macOS and Android). When you allow remote connections to your PC, you can use another device to connect to your PC and have access to all of your apps, files, and network resources as if you were sitting at your desk.

To connect to a remote PC, that computer must be turned on, it must have a network connection, Remote Desktop must be enabled, you must have network access to the remote computer (this could be through the Internet), and you must have permission to connect. For permission to connect, you must be on the list of users. Before you start a connection, it's a good idea to look up the name of the computer you're connecting to and to make sure Remote Desktop connections are allowed through its firewall.

If you want to restrict who can access your PC, choose to allow access only with Network Level Authentication (NLA). When you enable this option, users have to authenticate themselves to the network before they can connect to your PC. Allowing connections only from computers running Remote Desktop with NLA is a more secure authentication method that can help protect your computer from malicious users and software.

Question: 65
Measured Skill: Manage devices and data (35-40%)

A company has an Active Directory Domain Services (AD DS) domain with Windows 10 Enterprise client computers.

You need to configure 20 portable computers so that they sleep after 20 minutes when running on battery power. You must accomplish this goal by using the least amount of administrative effort.

Which two actions should you perform?

(Each correct answer presents part of the complete solution. NOTE: Each correct selection is worth one point.)

ACreate a Group Policy object (GPO) that configures the Sleep Management settings.
B Edit the local Group Policy to configure the Power Management settings.
C Edit the local Group Policy to configure the Shut Down options.
D Link the Group Policy object (GPO) to the organizational unit containing the portable computers.
E Create a Group Policy object (GPO) that configures the Power Management settings.

Correct answer: A, D


Since we must accomplish this goal by using the least amount of administrative effort, we should create a Group Policy object in the domain.

You can configure different system sleep timeouts for plugged in and battery mode:

Question: 66
Measured Skill: Manage devices and data (35-40%)

You have a Windows 10 Enterprise computer. The computer has 500 gigabytes (GB) of free disk space.

You receive a request to extract several files from a 200-GB virtual hard disk (VHD) file. You copy the file to your computer.

You need to access data from the VHD file.

What should you do?

AFrom PowerShell, run the Get-Volume cmdlet.
B From Windows Explorer, right-click the VHD file and mount the disk.
C From Disk Management, select Create VHD and point to the VHD file.
D From Disk Management, rescan the disks.

Correct answer: B


You can mount a virtual hard disk file to your file system by double-clicking the file within File Explorer or by choosing "Mount" from the context menu. If you prefer PowerShell, you can use the Mount-VHD cmdlet.

Question: 67
Measured Skill: Manage devices and data (35-40%)

Your network contains an Active Directory domain. The domain contains Windows 10 Enterprise client computers.

Users frequently use USB drives to store sensitive files that are used on multiple computers.

Your corporate security policy states that all removable storage devices such as USB data drives, must be encrypted.

You need to ensure that if a user forgets the password for a USB disk that is encrypted by using BitLocker To Go, the user can resolve the issue themselves.

What should you do?

AInstruct the user to open BitLocker Drive Encryption, select Back up recovery key, and then select Save to a file.
B From an elevated command prompt, run Manage-BDE -ForceRecovery.
C For each computer, create a USB startup key.
D Implement the BitLocker Network Unlock feature.

Correct answer: A


If you don't know your BitLocker key but you have your BitLocker recovery key, you can use that recovery key to unlock your drive. The BitLocker recovery key is a 32-digit.

The user can back up the recovery key himself using the "Manage BitLocker" option from the conext menu of the encrypted drive.

Tags: exam, examcollection, exam simulation, exam questions, questions & answers, training course, study guide, vce, braindumps, practice test

© Copyright 2014 - 2019 by