Questions for the 100-140 were updated on : Dec 01 ,2025
You are working from home over a weekend to resolve a backlog of employee help desk tickets. A
user issue requires you to access their Windows 11 computer in the home office to check its settings.
You have verified that the machine is available, but the user is not present.
Which remote access application is best suited for this task?
C
Which type of virtualization allows a user to run one or multiple operating systems that are stored
remotely on a central server in a data center?
D
Explanation:
Desktop virtualization (also known as Virtual Desktop Infrastructure, or VDI) enables users to run one
or more operating systems that reside on a centralized server in a data center, delivering the desktop
environment over the network.
HOTSPOT
You consider using AI to find solutions to common Help Desk issues at your company.
For each statement about AI, select True or False.
Note: You will receive partial credit for each correct selection.
None
Explanation:
DRAG DROP
Match each Windows tool from the list on the left to its appropriate usage scenario on the right.
Note: You will receive partial credit for each correct selection.
None
Explanation:
A user needs to reset their password based on feedback after a security concern.
You want to provide an example of a strong password to the user based on the following company
guidelines shown:
Must have 8 to 15 characters
Must contain lowercase letters
Must contain at least 2 numbers
Must begin and end with a letter
Only special characters that can be used dash (-), underscore (_), hashtag (#), and at sign (@)
Which password could you use as an example?
D
Explanation:
mkn546#f is 8 characters long (within 8–15), begins with “m” and ends with “f” (letters), includes
only lowercase letters, contains three numbers (5, 4, 6), and uses only the allowed special character
“#.”
A customer support representative receives an email from a client that contains their full name,
address, and credit card details and a request to update their billing information.
Which action should the representative take?
D
Explanation:
Payment card data and other sensitive personal information must be protected according to security
policies and compliance requirements (e.g., PCI DSS). Storing the data in approved encrypted storage
ensures it remains secure and accessible only by authorized personnel.
Which three pieces of information would be considered Personally Identifiable Information (PII)?
(Choose three.)
Note: You will receive partial credit for each correct selection.
B, C
Explanation:
Fingerprint is a unique biometric identifier and qualifies as PII.
Email Address directly identifies or contacts an individual.
Date of Birth is a personal datum that, when combined with other data, identifies someone.
You receive an email from a user with the display name of the President of your company. The email
requests that you do them a favor and purchase gift cards and send the gift cards to an email address
provided.
What should you do?
C
Explanation:
This scenario is a classic example of email spoofing and a social engineering attack. You should
contact the IT department immediately using internal communication methods to verify the
legitimacy of the request. Never respond or take action based on suspicious emails.
You receive an email request for personal information.
You need to make sure you are working with the right individual to avoid a social engineering
attempt.
Which step should you take?
C
Explanation:
The safest and most professional approach is to use company-approved methods to verify identity,
such as callback procedures, employee ID verification, or multi-factor authentication. This helps
prevent falling victim to phishing or social engineering.
What is the primary purpose of implementing a Mobile Device Management (MDM) solution in an
enterprise environment?
A
Explanation:
MDM solutions let IT enforce security policies — such as requiring device encryption, up-to-date OS
versions, PIN/passcode rules, and approved apps — before allowing mobile devices to connect to
corporate networks or access company data.
A user who has been on vacation for the past 30 days calls the help desk and reaches you. The user
reports the following:
Before I left for vacation, I changed my password and made sure it worked. My password is not due
to be reset for another 60 days, but I can't log in to the network.
While the user was gone, the company established a requirement for Multi-Factor Authentication
(MFA).
Which two actions could you take to resolve the problem? (Choose two.)
Note: Each correct answer presents a complete solution.
A, C
Explanation:
Installing the company’s authenticator app enrolls the user in MFA as now required.
Adding a phone number enables SMS-based second-factor validation.
HOTSPOT
Your company allows users to use their personal devices while in company meetings. However, the
computers must meet the following power management requirements:
The display must always turn black if the computer has no activity for 15 minutes.
The computer must always go into low-power mode if it has no activity for 30 minutes.
The computer must never hibernate.
You need to configure power management for a user's laptop to meet the requirements.
Select the correct options in the Power & Sleep settings window show in the answer area.
None
Explanation:
HOTSPOT
A customer copied the APK file for an app from their Windows laptop to the Documents folder on
their Android phone. The customer needs help installing the app on the phone.
You need to configure the phone to allow installation of unknown apps.
Which option should you choose?
Select the correct option in the answer area.
None
Explanation:
A user needs assistance configuring Microsoft Teams so that it will start automatically.
Which category in Teams should the user select to set the application to auto-start?
A
Explanation:
The auto-start option for Teams is found under Settings > General, where you can toggle “Auto-start
application” to have Teams launch when you sign in.
HOTSPOT
A user has low storage on an iPhone.
You need to tell the user how to increase available storage.
For each action, select Yes if it helps the user increase available storage, or No if it does not.
Note: You will receive partial credit for each correct selection.
None
Explanation: