单项选择题

You share your computer with other users. 
You install a new Microsoft Windows Internet Explorer add-on to view videos on the computer. You discover that this add-on conflicts with existing add-ons that other users frequently require. You need to ensure that you are able to view videos without affecting other users. 
What should you do?()

A.Uninstall the new Windows Internet Explorer add-on.
B.Log on as an administrator and disable the new Windows Internet Explorer add-on.
C.Direct other users to log on and disable the new Windows Internet Explorer add-on.
D.Select the Turn off Automatic Website Checking option for the Phishing filter.


您可能感兴趣的试卷

你可能感兴趣的试题

1.单项选择题

You need to reduce the level of access that a malicious Web site might have to your computer. 
What should you do? ()

A.Start a Windows Defender scan.
B.Enable Microsoft Windows Internet Explorer Phishing Filter.
C.Enable Microsoft Windows Internet Explorer Pop-up Blocker.
D.Confirm that Microsoft Windows Internet Explorer Protected Mode is enabled on the Internet security zone.

2.多项选择题

The pop-up blocker is enabled on your computer. A Web site that you visit regularly uses pop-ups. 
You need to view the pop-ups from this Web site while maintaining the highest level of security for all other Web sites. 
What are two possible ways to achieve this goal?()

A.Disable the pop-up blocker.
B.Add the URL of the Web site to the list of trusted sites.
C.Add the URL of the Web site to the list of allowed sites.
D.Enable the Automatic Website Checking option on the Phishing filter.
E.Visit the Web site and select the Always allow pop-ups from this site option.

3.单项选择题

You need to receive alerts when unanalyzed software is detected on your computer. You must achieve this goal without sending information to Microsoft. 
What should you do?()

A.Confirm that Windows Defender is not subscribed to the Microsoft Spynet online community. Select the Use heuristics to detect potentially harmful or unwanted behavior by software that hasnt been analyzed for risks checkbox in Windows Defender.
B.Configure Windows Defender with a basic membership to the Spynet online community. 
C.Configure Windows Defender with an advanced membership to the Spynet online community. 
D.Configure the Software Explorer option in Windows Defender to display software for all users.

5.单项选择题

You run a Windows Defender scan on your computer. 
You notice a valid program listed in Quarantined Items. 
You need to use this program on your computer. 
What should you do?()

A.Reinstall the application to another location.
B.Restore the program from the Quarantined Items list.
C.Remove the program from the Quarantined Items list.
D.Repair the program from the Programs option in Control Panel.

6.单项选择题

You recently installed an application on your computer. The application is configured to automatically start. This application might cause your computer to run slower. 
You need to prevent the application from auto starting without uninstalling the application. 
What should you do?()

A.Use the Microsoft Windows Task Manager application to end the task for the application.
B.Use the Control Panel application to uninstall the application. Reboot the computer.
C.Use the Software Explorer application to disable the application. Reboot the computer.
D.Use the Services application to disable the Application Experience service, and then launch the application.

7.单项选择题

You run Windows Defender on your computer and receive the following warning message:
 "Windows Defender Definitions havent been updated." 
You need to ensure that Windows Defender definition files are updated. 
What should you do?()

A.Restart the Windows Defender service.
B.Repair the Microsoft Location Finder program.
C.Download and install the appropriate files from Microsoft Windows Update.
D.Download and install the latest Windows Defender application from the Microsoft Web site.

8.单项选择题

You need to identify if malware is causing performance issues on your computer. 
What should you do? ()

A.Start a Windows Defender scan.
B.Run chkdsk on each drive.
C.View the Microsoft Windows Experience Index of the system.
D.View the System Stability Chart on the Reliability Monitor taskpad.

9.单项选择题

You use two user accounts for your computer: standard user and administrator. You log on to your computer as standard user but are unable to make advanced configuration changes. You need to make advanced configuration changes while you are logged on as a standard user. 
What should you do? ()

A.Enable the User Account Control: Only elevate executables that are signed and validated option.
B.Disable the User Account Control: Only elevate executables that are signed and validated option.
C.Configure the User Account Control: Behavior of the elevation prompt for standard users setting to the Prompt for credentials option.
D.Configure the User Account Control: Behavior of the elevation prompt for administrators in Admin Approval Mode setting to the Prompt for consent option.

10.单项选择题

You need to configure the local security policy setting to request a user name and password when you make changes to the computer system. 
What should you do?()

A.Enable the Password must meet complexity requirements setting.
B.Enable the User Account Control: Detect application installations and prompt for elevation setting.
C.Configure the Interactive logon: Prompt user to change password before expiration setting to a value between 1 and 999.
D.Configure the User Account Control: Behavior of the elevation prompt for administrators in Admin Approval mode setting to the Prompt for credentials option.

最新试题

You configure parental controls on your computer for your child's user account. Your child logs on with a different account and is able to access inappropriate Web sites. You need to ensure that your child cannot access inapproriate Web sites.What should you do?()

题型:单项选择题

Your computer runs Microsoft Windows XP Professional. You share your computer with two other co-workers. You purchase a new computer. You install Microsoft Windows Vista on the new computer. You need to migrate the following content from the old computer to the new computer:All system and program settingsAll users settingsOnly the content in the C:\Appdata folderWhich tool should you use?()

题型:单项选择题

Your wireless network is not listed in the Connect to a network window of your computer. You need to connect to your wireless network.Which two actions should you perform?()

题型:多项选择题

Your portable computer has two 512-MB memory modules installed in the only two memory slots available.You need to improve the speed of your computer. What should you do?()

题型:单项选择题

You run a Windows Defender scan on your computer system. The scan identifies one of your applications as having potentially unwanted behavior. You need to continue to use the application. You also need to stop Windows Defender from alerting you about this application.Which Windows Defender option should you use?()

题型:单项选择题

You need to use the Event Viewer window to review the event logs for only critical and error events. You also need the maximum amount of detail for each of these events. What should you do?()

题型:单项选择题

Your computer runs Microsoft Windows Vista Home Basic edition. When you attempt to upgrade your computer to Microsoft Windows Vista Ultimate edition by booting from the DVD- ROM you receive the following warning message:“The partition you selected might contain tiles from a previous Microsoft Windows installation.If it does, these files and folders will be moved to a folder named Microsoft Windows.old. You will be able to access the information in Microsoft Windows.old, but you will not be able to use your previous version of Microsoft Windows.”You need to complete the upgrade. What should you do?()

题型:单项选择题

You have a desktop computer and a portable computer. Both the computers are configured to allow remote desktop connections. You connect to the desktop computer from the portable computer. You need to save files from within the remote session to the C: drive of the portable computer.What should you do?()

题型:单项选择题

Your computer uses both wired and wireless network connections. The networks are not connected to each other.You disallow incoming connections in Microsoft Windows Firewall. You create a shared folder. Users on the wireless network cannot access the shared folder. You need to allow access to the shared folder from the wireless network. You also need to maintain the security of the wired network.What should you do?()

题型:单项选择题

You install Microsoft Windows Vista on a new computer. The computer has the following hardware configuration:2.4-GHz processor2 GB of RAM512-MB video adapter250-GB hard disk.You are unable to view the following features of Windows Vista:ThumbnailsPreviews on foldersTransparent glass.You need to be able to view the advanced visual features of Windows Vista. What should you do?()

题型:单项选择题