多项选择题

Your computer has a wired network adapter and a wireless network adapter. You use the wireless network adapter only when traveling. 
You need to configure the network adapter profile settings to ensure that other systems are allowed to discover your computer only when you are at home. 
What are two possible ways to achieve this goal?()

A.When you configure access to the wired network at home, set the wired network adapter location type to Private.
B.When you configure access to the wired network at home, set the wired network adapter location type to Public.
C.When you configure access to the public wireless access points, set the wireless network adapter location type to Private.
D.When you configure access to the public wireless access points, set the wireless network adapter location type to Public.


您可能感兴趣的试卷

你可能感兴趣的试题

1.多项选择题

Remote users are unable to connect to a shared folder on your computer. You need to allow access to the shared folder. 
What are the two possible ways to achieve this goal?()

A.Restore the Microsoft Windows Firewall defaults.
B.Validate the permissions on the shared folder by using Microsoft Windows Explorer.
C.Enable the File and Printer Sharing exception in Windows Firewall.
D.Enable the Internet Connection Sharing exception in Windows Firewall.

2.单项选择题

You need to configure Microsoft Windows Firewall to allow technicians to remotely control your computer. 
Which exception should you enable? ()

A.Remote Registry Service
B.Remote Assistance
C.Remote Administration
D.Remote Service Management

4.单项选择题

Your computer has Microsoft Windows Firewall enabled. 
Your child plays an online game that uses connectionless traffic over port 5678 for inbound and outbound traffic. 
You need to prevent your child from playing this game.
 What should you do? ()

A.Enable the User Account Control feature.
B.Configure the user account of your child as a standard user.
C.Create an outbound rule in Windows Firewall to block UDP port 5678.
D.Create an outbound rule in Windows Firewall to block TCP port 5678.

5.单项选择题

Your computer is part of a workgroup. You share files with other users on the network. You configure exceptions in Microsoft Windows Firewall to allow file sharing. Users report that they are unable to connect to your computer. 
You need to ensure that other users are able to access only the shared files.
 What should you do? ()

A.Restart the Workstation service on your computer.
B.Change all of your TCP port exceptions to UDP port exceptions.
C.Ensure parental controls are not configured to block file sharing.
D.Clear the Block all incoming connections check box in Windows Firewall.

6.单项选择题

You need to remove any Microsoft Windows Internet Explorer 7 add-ons in Microsoft Windows Vista computers that do not have prior approval from the following authorities:
Microsoft 
System manufacturer 
Service provider
What should you do? ()

A.Remove any add-ons that are not found in the list of downloaded ActiveX controls.
B.Remove any add-ons that are not found in the list of add-ons used by Windows Internet Explorer 7.
C.Remove any add-ons that are not found in the list of add-ons that run without requiring permission.
D.Remove any add-ons that are not found in the list of add-ons that are at present loaded in Windows Internet Explorer 7.

7.单项选择题

You share your computer with other users. 
You install a new Microsoft Windows Internet Explorer add-on to view videos on the computer. You discover that this add-on conflicts with existing add-ons that other users frequently require. You need to ensure that you are able to view videos without affecting other users. 
What should you do?()

A.Uninstall the new Windows Internet Explorer add-on.
B.Log on as an administrator and disable the new Windows Internet Explorer add-on.
C.Direct other users to log on and disable the new Windows Internet Explorer add-on.
D.Select the Turn off Automatic Website Checking option for the Phishing filter.

8.单项选择题

You need to reduce the level of access that a malicious Web site might have to your computer. 
What should you do? ()

A.Start a Windows Defender scan.
B.Enable Microsoft Windows Internet Explorer Phishing Filter.
C.Enable Microsoft Windows Internet Explorer Pop-up Blocker.
D.Confirm that Microsoft Windows Internet Explorer Protected Mode is enabled on the Internet security zone.

9.多项选择题

The pop-up blocker is enabled on your computer. A Web site that you visit regularly uses pop-ups. 
You need to view the pop-ups from this Web site while maintaining the highest level of security for all other Web sites. 
What are two possible ways to achieve this goal?()

A.Disable the pop-up blocker.
B.Add the URL of the Web site to the list of trusted sites.
C.Add the URL of the Web site to the list of allowed sites.
D.Enable the Automatic Website Checking option on the Phishing filter.
E.Visit the Web site and select the Always allow pop-ups from this site option.

10.单项选择题

You need to receive alerts when unanalyzed software is detected on your computer. You must achieve this goal without sending information to Microsoft. 
What should you do?()

A.Confirm that Windows Defender is not subscribed to the Microsoft Spynet online community. Select the Use heuristics to detect potentially harmful or unwanted behavior by software that hasnt been analyzed for risks checkbox in Windows Defender.
B.Configure Windows Defender with a basic membership to the Spynet online community. 
C.Configure Windows Defender with an advanced membership to the Spynet online community. 
D.Configure the Software Explorer option in Windows Defender to display software for all users.

最新试题

You need to receive alerts when unanalyzed software is detected on your computer. You must achieve this goal without sending information to Microsoft.What should you do?()

题型:单项选择题

You install a TV tuner card on your computer. You need to record two different TV shows that runon two different channels at the same time.What should you do?()

题型:单项选择题

Your computer runs Microsoft Windows XP Professional. You share your computer with two other co-workers. You purchase a new computer. You install Microsoft Windows Vista on the new computer. You need to migrate the following content from the old computer to the new computer:All system and program settingsAll users settingsOnly the content in the C:\Appdata folderWhich tool should you use?()

题型:单项选择题

You configure parental controls on your computer for your child's user account. Your child logs on with a different account and is able to access inappropriate Web sites. You need to ensure that your child cannot access inapproriate Web sites.What should you do?()

题型:单项选择题

A co-worker is unable to invite you to a Microsoft Windows Meeting Space meeting. You need to receive an invite to the meeting. What should you do?()

题型:单项选择题

Your computer has a wired network adapter and a wireless network adapter. You use the wireless network adapter only whe nyou are traveling. You need to configure the network adapter profile settings to ensure that the computer discovers other network devices only when you are at home.Which two actions should you perform?()

题型:多项选择题

You share your computer with ohter users. You install a new Microsoft Windows Internet Explorer add-on to view videos on the computer. You discover that this add-on conflicts with existing add-ons that other users frequently require. You need to ensure that you are able to view videos without affecting other users. What should you do?()

题型:单项选择题

You implement Parental Controls game restrictions for your child on your computer. You select the TEEN rating game restriction. Your child is still able to run some inappropriate games. You need to prevent access to all inappropriate games. What should you do?()

题型:单项选择题

You have a desktop computer and a portable computer. Both the computers are configured to allow remote desktop connections. You connect to the desktop computer from the portable computer. You need to save files from within the remote session to the C: drive of the portable computer.What should you do?()

题型:单项选择题

You need to use the Event Viewer window to review the event logs for only critical and error events. You also need the maximum amount of detail for each of these events. What should you do?()

题型:单项选择题