CompTIA A+ Core 2 Question F-59

While configuring a new email application that uses POP3 for a customer, the technician determines the firewall is blocking the traffic. Which of the following ports should be opened to allow POP3 mail traffic through the firewall?

A. 53
B. 110
C. 443
D. 3389

Correct Answer: B

Explanation:
http://www.speedguide.net/port.php?port=110

CompTIA A+ Core 2 Question F-18

A technician is about to put a computer back into service that has not been turned on for many months. It was healthy when taken out of service and boots quickly without any problems. Which of the following actions would be a best practice to begin computer maintenance? (Select TWO).

A. Run a full antivirus scan.
B. Defragment the hard disk.
C. Run antivirus updates.
D. Run Windows updates.
E. Configure the firewall to access the Internet.

Correct Answer: CD

Explanation:
You have to update the system. Run antivirus updates because antivirus changes frequently as new viruses are discovered. Run Windows updates to keep the system updated and ready to use.

CompTIA A+ Core 2 Question E-71

A customer needs to setup their laptop for use with a proxy server to browse the web at work. Which of the following areas would a technician need to visit to configure this on a Windows 7 system?

A. System Protection
B. Security Center
C. Windows Firewall
D. Internet Options

CompTIA A+ Core 2 Question D-61

Emily, an end-user, reports to Peter, a helpdesk technician, that her computer has been redirecting her browser to unknown websites when clicking on search results. Peter runs a malware scan and finds that her computer is infected with malware. Peter uses the anti- malware program to remove the infection but Emily reports that the problem resurfaced the next day. Peter runs the malware scan again and finds the same malware is still infecting Emily’s computer. Peter runs several passes of the malware scan to remove the infection but it keeps recurring. Which of the following would MOST likely aid in removing the infection?

A. Enable Windows User Access Control to ensure the user has proper rights to remove the infected files.
B. Disable Windows firewall as it may be conflicting with the malware scan.
C. Run the malware scan in Windows safe mode.
D. Change the desktops IP address to a different subnet.

Correct Answer: C