You need to configure Microsoft Windows Firewall to allow technicians to remotely control your computer. Which exception should you enable? ()
A.Remote Registry Service B.Remote Assistance C.Remote Administration D.Remote Service Management
单项选择题You install a third-party application on your computer. The application uses port 80 to negotiate a listening port. After establishing the listening port, the application uses dynamic ports above 6000. You need to configure Microsoft Windows Firewall to allow traffic for the application. What should you do? ()
A.Add a port exception for port 80. B.Disable the Core Networking exception. C.Restore the Windows Firewall defaults. D.Add a program exception for the new application.
单项选择题Your computer has Microsoft Windows Firewall enabled. Your child plays an online game that uses connectionless traffic over port 5678 for inbound and outbound traffic. You need to prevent your child from playing this game. What should you do? ()
A.Enable the User Account Control feature. B.Configure the user account of your child as a standard user. C.Create an outbound rule in Windows Firewall to block UDP port 5678. D.Create an outbound rule in Windows Firewall to block TCP port 5678.
单项选择题Your computer is part of a workgroup. You share files with other users on the network. You configure exceptions in Microsoft Windows Firewall to allow file sharing. Users report that they are unable to connect to your computer. You need to ensure that other users are able to access only the shared files. What should you do? ()
A.Restart the Workstation service on your computer. B.Change all of your TCP port exceptions to UDP port exceptions. C.Ensure parental controls are not configured to block file sharing. D.Clear the Block all incoming connections check box in Windows Firewall.
单项选择题You need to remove any Microsoft Windows Internet Explorer 7 add-ons in Microsoft Windows Vista computers that do not have prior approval from the following authorities: Microsoft System manufacturer Service provider What should you do? ()
A.Remove any add-ons that are not found in the list of downloaded ActiveX controls. B.Remove any add-ons that are not found in the list of add-ons used by Windows Internet Explorer 7. C.Remove any add-ons that are not found in the list of add-ons that run without requiring permission. D.Remove any add-ons that are not found in the list of add-ons that are at present loaded in Windows Internet Explorer 7.
单项选择题You share your computer with other users. You install a new Microsoft Windows Internet Explorer add-on to view videos on the computer. You discover that this add-on conflicts with existing add-ons that other users frequently require. You need to ensure that you are able to view videos without affecting other users. What should you do?()
A.Uninstall the new Windows Internet Explorer add-on. B.Log on as an administrator and disable the new Windows Internet Explorer add-on. C.Direct other users to log on and disable the new Windows Internet Explorer add-on. D.Select the Turn off Automatic Website Checking option for the Phishing filter.