单项选择题

You install a third-party application on your computer. The application uses port 80 to negotiate a listening port. After establishing the listening port, the application uses dynamic ports above 6000. 
You need to configure Microsoft Windows Firewall to allow traffic for the application. 
What should you do? ()

A.Add a port exception for port 80.
B.Disable the Core Networking exception.
C.Restore the Windows Firewall defaults.
D.Add a program exception for the new application.


您可能感兴趣的试卷

你可能感兴趣的试题

1.单项选择题

Your computer has Microsoft Windows Firewall enabled. 
Your child plays an online game that uses connectionless traffic over port 5678 for inbound and outbound traffic. 
You need to prevent your child from playing this game.
 What should you do? ()

A.Enable the User Account Control feature.
B.Configure the user account of your child as a standard user.
C.Create an outbound rule in Windows Firewall to block UDP port 5678.
D.Create an outbound rule in Windows Firewall to block TCP port 5678.

2.单项选择题

Your computer is part of a workgroup. You share files with other users on the network. You configure exceptions in Microsoft Windows Firewall to allow file sharing. Users report that they are unable to connect to your computer. 
You need to ensure that other users are able to access only the shared files.
 What should you do? ()

A.Restart the Workstation service on your computer.
B.Change all of your TCP port exceptions to UDP port exceptions.
C.Ensure parental controls are not configured to block file sharing.
D.Clear the Block all incoming connections check box in Windows Firewall.

3.单项选择题

You need to remove any Microsoft Windows Internet Explorer 7 add-ons in Microsoft Windows Vista computers that do not have prior approval from the following authorities:
Microsoft 
System manufacturer 
Service provider
What should you do? ()

A.Remove any add-ons that are not found in the list of downloaded ActiveX controls.
B.Remove any add-ons that are not found in the list of add-ons used by Windows Internet Explorer 7.
C.Remove any add-ons that are not found in the list of add-ons that run without requiring permission.
D.Remove any add-ons that are not found in the list of add-ons that are at present loaded in Windows Internet Explorer 7.

4.单项选择题

You share your computer with other users. 
You install a new Microsoft Windows Internet Explorer add-on to view videos on the computer. You discover that this add-on conflicts with existing add-ons that other users frequently require. You need to ensure that you are able to view videos without affecting other users. 
What should you do?()

A.Uninstall the new Windows Internet Explorer add-on.
B.Log on as an administrator and disable the new Windows Internet Explorer add-on.
C.Direct other users to log on and disable the new Windows Internet Explorer add-on.
D.Select the Turn off Automatic Website Checking option for the Phishing filter.

5.单项选择题

You need to reduce the level of access that a malicious Web site might have to your computer. 
What should you do? ()

A.Start a Windows Defender scan.
B.Enable Microsoft Windows Internet Explorer Phishing Filter.
C.Enable Microsoft Windows Internet Explorer Pop-up Blocker.
D.Confirm that Microsoft Windows Internet Explorer Protected Mode is enabled on the Internet security zone.

6.多项选择题

The pop-up blocker is enabled on your computer. A Web site that you visit regularly uses pop-ups. 
You need to view the pop-ups from this Web site while maintaining the highest level of security for all other Web sites. 
What are two possible ways to achieve this goal?()

A.Disable the pop-up blocker.
B.Add the URL of the Web site to the list of trusted sites.
C.Add the URL of the Web site to the list of allowed sites.
D.Enable the Automatic Website Checking option on the Phishing filter.
E.Visit the Web site and select the Always allow pop-ups from this site option.

7.单项选择题

You need to receive alerts when unanalyzed software is detected on your computer. You must achieve this goal without sending information to Microsoft. 
What should you do?()

A.Confirm that Windows Defender is not subscribed to the Microsoft Spynet online community. Select the Use heuristics to detect potentially harmful or unwanted behavior by software that hasnt been analyzed for risks checkbox in Windows Defender.
B.Configure Windows Defender with a basic membership to the Spynet online community. 
C.Configure Windows Defender with an advanced membership to the Spynet online community. 
D.Configure the Software Explorer option in Windows Defender to display software for all users.

9.单项选择题

You run a Windows Defender scan on your computer. 
You notice a valid program listed in Quarantined Items. 
You need to use this program on your computer. 
What should you do?()

A.Reinstall the application to another location.
B.Restore the program from the Quarantined Items list.
C.Remove the program from the Quarantined Items list.
D.Repair the program from the Programs option in Control Panel.

10.单项选择题

You recently installed an application on your computer. The application is configured to automatically start. This application might cause your computer to run slower. 
You need to prevent the application from auto starting without uninstalling the application. 
What should you do?()

A.Use the Microsoft Windows Task Manager application to end the task for the application.
B.Use the Control Panel application to uninstall the application. Reboot the computer.
C.Use the Software Explorer application to disable the application. Reboot the computer.
D.Use the Services application to disable the Application Experience service, and then launch the application.

最新试题

You configure Microsoft Internet Explorer 7 with a Really Simple Syndication (RSS) subscription to MSN Entertainment on your computer. Your RSS subscription Web page fails to show the information that the RSS feed Web page displays from MSN Entertainment. You need to ensure that Internet Explorer displays the current content from the RSS feed.What should you do?()

题型:单项选择题

Your computer connects to both an ad hoc wireless network and a wired network. You need to allow other wireless clients to access the wired network. What should you do?()

题型:单项选择题

You configure parental controls on your computer for your child's user account. Your child logs on with a different account and is able to access inappropriate Web sites. You need to ensure that your child cannot access inapproriate Web sites.What should you do?()

题型:单项选择题

You install a TV tuner card on your computer. You need to record two different TV shows that runon two different channels at the same time.What should you do?()

题型:单项选择题

Your portable computer has two 512-MB memory modules installed in the only two memory slots available.You need to improve the speed of your computer. What should you do?()

题型:单项选择题

You implement Parental Controls game restrictions for your child on your computer. You select the TEEN rating game restriction. Your child is still able to run some inappropriate games. You need to prevent access to all inappropriate games. What should you do?()

题型:单项选择题

You share your portable computer with a co-worker. You use separate user accounts to log on. A wireless netework is available to you and your co-worker. You need to prevent your co-worker from modifying your wireless network profile.What should you do?()

题型:单项选择题

You run a Windows Defender scan on your computer system. The scan identifies one of your applications as having potentially unwanted behavior. You need to continue to use the application. You also need to stop Windows Defender from alerting you about this application.Which Windows Defender option should you use?()

题型:单项选择题

You administer your companys network. All client computers run Microsoft Windows Vista. A standard user reports that they are unable to install an application. You need to install the application. What should you do?()

题型:单项选择题

You need to receive alerts when unanalyzed software is detected on your computer. You must achieve this goal without sending information to Microsoft.What should you do?()

题型:单项选择题