Microsoft Specialist Exam MD-100: Windows 10 Pre-Assessment Quiz
In the context of the methods for purchasing Windows 10 licenses, which of the following is true of volume licensing? a. It is a type of license that is tied to a computer and cannot be reused if a new computer is purchased. b. It is the license included in a new computer with preinstalled Windows 10. c. It is purchased by organizations to obtain software directly from Microsoft. d. It is a type of licensing enabled by signing in to Microsoft Azure AD.
It is purchased by organizations to obtain software directly from Microsoft.
How can you install an MSIX app if it is not available on the Microsoft Store? a. By enabling sideloading in Windows 10 settings b. By using the system.exe file included in the app c. By packaging the app as an MSI file d. By installing the app by a single click
a. By enabling sideloading in Windows 10 settings
Ravi is attempting to repair a Windows 10 PC using WinRE. He tried fixing the issue using Startup Repair, but it did not work. He decides to proceed using bcdedit.exe. Which of the following options in WinRE should Ravi select to use this tool? a. Command Prompt b. System Restore c. UEFI Firmware Settings d. System Image Recovery
a. Command Prompt
Your computer is running out of storage, and you decide to remove files that are no longer necessary. Which of the following administrative tools will help you identify such files? a. Disk Cleanup b. Defragment and Optimize Drives c. Computer Management d. Recovery Drive
a. Disk Cleanup
From which of the following groups does a standard user account inherit its privileges from? a. The local Users group b. The Device Owners group c. The Power Users group d. The Administrators group
a. The local Users group
Where are the configuration changes made to an application stored on Windows 10? a. The registry b. The Windows API c. The Documents folder d. The Microsoft Store
a. The registry
Samantha uses facial recognition to sign in to her Windows 10 laptop. She uses the same Microsoft account on different devices. She changes the password for her Microsoft account on her laptop. She can sign in to another device without having to enter the password manually. Identify the advanced authentication method used in this scenario. a. Windows Hello for Business b. Windows Hello biometric authentication c. Picture password d. Username and password
a. Windows Hello for Business
Which wireless standard has a maximum data throughput of 54 MBps? a. IEEE 802.11b b. IEEE 802.11a c. IEEE 802.11ac d. IEEE 802.11ax
b. IEEE 802.11a
Darwish configures File History on his computer. The backup files and folders are stored on an external hard drive. He opens a file from the Documents folder, makes a few changes, and saves it. Where will the modified file be backed up on the external drive? a. In a subfolder called Backup within the Documents folder b. In the same backup folder as the previous version c. In the same folder, rewriting the older file d. In a new folder at the root of the external hard drive
b. In the same backup folder as the previous version
You prepare a source system for imaging by installing the necessary applications and configuring the operating system settings. Next, you run the Sysprep utility. What will this utility do? a. It will apply the image to the destination workstation. b. It will remove system-specific data from the source workstation. c. It will capture the image from the source workstation. d. It will connect to the distribution share or external storage.
b. It will remove system-specific data from the source workstation.
Ria and Olivia own and run a startup, a marketing agency. Olivia is working on the creatives for an upcoming ad campaign for a client. On the day of the campaign launch, Olivia has a family emergency that requires her to travel to a remote location. She sends Ria a text message, but she forgets to send the final creatives or leave her laptop password so that Ria can access the files. Ria tries reaching Olivia but cannot contact her. If Olivia's laptop is unencrypted and accessible, what is Ria's best option to extract the files that she needs for the ad campaign? a. Reset the Windows 10 laptop using the Keep My Files option b. Start Olivia's laptop by booting it from a USB drive and run Linux with an NTFS driver c. Connect Olivia's laptop to the same network as her laptop is connected to and access these files over the network d. Reinstall the operating system on the partition that does not contain the ad campaign files
b. Start Olivia's laptop by booting it from a USB drive and run Linux with an NTFS driver
Rizwan, Tina, and George are using the same Windows 10 computer in shifts. They need to be able to share files with each other and work on common files, although not simultaneously. What is the easiest method of enabling this? a. Turning on sharing for the folder so that anyone in the organization can access the folder b. Setting up a file server and allowing them to access the files from there c. Placing the common files in the Public folder and asking them to use that folder d. Asking them to use the Share tab in File Explorer and sharing files with each other
c. Placing the common files in the Public folder and asking them to use that folder
A hacker finds a flaw in Windows that compromises a popular browser. Instead of reporting the flaw directly to Microsoft, the hacker posts a detailed blog about the flaw. A malware developer creates malware that can exploit this flaw. Rihanna receives a notice from Microsoft that asks all Windows users to stop using this browser until a security fix is issued. After a few days, Microsoft issues a security fix. In which of the following instances is Rihanna's computer least likely to be infected by malware? a. Rihanna disables Windows Defender Antivirus on her computer until the fix is announced. b. Rihanna disables automatic Windows Updates on her computer. c. Rihanna installs the update immediately after it is issued by Microsoft. d. Rihanna continues using the browser until a fix is issued.
c. Rihanna installs the update immediately after it is issued by Microsoft.
Mei is using an SSL VPN on her Windows 10 computer to access a remote access server. Which of the following ports is used by the SSL VPN on Mei's computer? a. UDP port 500 b. TCP port 1723 c. TCP port 443 d. UDP port 4500
c. TCP port 443
Anita, a network administrator, is troubleshooting a connectivity issue on a colleague's computer. The computer was receiving lookup responses that the services it was trying to connect to were not available. The computer was trying to send requests to the corporate DNS server. However, other employees in the organization were able to access the services. Which of the following issues could have likely caused the connectivity issue? a. The default gateway that the computer was accessing was incorrect. b. The computer was facing network connectivity issues and could not reach the corporate DNS server. c. The computer had multiple DNS server configurations, including that of the ISP. d. The IP address being used was IPv6 instead of IPv4
c. The computer had multiple DNS server configurations, including that of the ISP.
A user is facing an issue with a particular application on their system. From the description of the issue, you realize that the issue can be resolved using the Registry Editor. Which of the following is true of using Registry Editor in this scenario? a. The user will be able to see the actions that you are performing on their system. b. You will be signed in using your user account and the user at the console will be disconnected. c. You can connect remotely while the user is signed in and working on their system. d. The user will be prompted to accept the connection.
c. You can connect remotely while the user is signed in and working on their system.
Ashwin signs into his Windows 10 laptop using his user account. The OneDrive client is installed with the OS. However, he is unable to use the OneDrive node in File Explorer to save files to OneDrive. Which of the following, if true, would resolve this issue? a. Ashwin can use the web interface to access OneDrive. b. Ashwin has an external storage device that offers more storage than OneDrive. c. Ashwin's laptop does not have the latest Windows 10 update. d. Ashwin can sign in to his laptop using his Microsoft account.
d. Ashwin can sign in to his laptop using his Microsoft account.
All the computers in the laboratory of a local university are connected to a domain. A domain policy configures the computer to display a specific wallpaper on the desktop when the computers are booted. One of the students with administrative access applies a GPO that allows the students to change the wallpaper to their liking. However, they are not able to do so. What do you think is the issue here? a. More than one Group Policy was applied to the computers. b. The settings in the computer and user policies are the same. c. The students have signed in using local accounts instead of domain accounts. d. Domain policies take precedence over local policy settings.
d. Domain policies take precedence over local policy settings.
Shirley builds a desktop computer with various components sourced from vendors. She has a 64-bit 2.4 GHz processor, 2 GB RAM, 256 GB SSD, and a DirectX 9 graphical processor. Shirley installs the 64-bit Windows 10 Home edition on this computer and notices that the performance of the computer is sluggish. If Shirley wants a satisfactory user experience, which of the following changes should she make? a. Replace the processor with a 32-bit processor b. Replace the SSD with a hard disk drive c. Remove the video card driver d. Increase the RAM to 8 GB
d. Increase the RAM to 8 GB
Chao, an accountant, uses Windows 10 on his work laptop. He installs the latest version of Microsoft Edge in February 2020 on his laptop. Which of the following is true of this scenario? a. Chao most likely installed a version 45 or an earlier edition of the Edge browser. b. The laptop is running Windows 10 version 2004 or later. c. Chao will be able to run legacy applications that use ActiveX on the new browser. d. The new browser is based on the open source Chromium browser.
d. The new browser is based on the open source Chromium browser.