A remote Windows XP user believes unauthorized software has been installed on their laptop. The technician must direct the user to which of the following locations to remove the application?
A. Action Center B. Add/remove Programs C. Windows Firewall D. Computer Management
While configuring a new email application that uses POP3 for a customer, the technician determines the firewall is blocking the traffic. Which of the following ports should be opened to allow POP3 mail traffic through the firewall?
A technician is about to put a computer back into service that has not been turned on for many months. It was healthy when taken out of service and boots quickly without any problems. Which of the following actions would be a best practice to begin computer maintenance? (Select TWO).
A. Run a full antivirus scan. B. Defragment the hard disk. C. Run antivirus updates. D. Run Windows updates. E. Configure the firewall to access the Internet.
Correct Answer: CD
Explanation: You have to update the system. Run antivirus updates because antivirus changes frequently as new viruses are discovered. Run Windows updates to keep the system updated and ready to use.
A customer needs to setup their laptop for use with a proxy server to browse the web at work. Which of the following areas would a technician need to visit to configure this on a Windows 7 system?
A. System Protection B. Security Center C. Windows Firewall D. Internet Options
Windows 7 has notified a user that it has blocked access to the following address in Internet Explorer: ftp:// ftp.microsoft.com:21. Which of the following Windows features should the technician check to ensure that there is not an explicit rule disallowing access to this location?
A. Windows Bitlocker B. Windows BranchCache C. Windows User Account Control D. Windows Firewall
A user is reporting that they are clicking on search results and being redirected to the wrong sites. Which of the following should a technician check FIRST?
A. Temporary Internet Files B. Proxy Settings C. Cookies D. Windows Firewall
Emily, an end-user, reports to Peter, a helpdesk technician, that her computer has been redirecting her browser to unknown websites when clicking on search results. Peter runs a malware scan and finds that her computer is infected with malware. Peter uses the anti- malware program to remove the infection but Emily reports that the problem resurfaced the next day. Peter runs the malware scan again and finds the same malware is still infecting Emily’s computer. Peter runs several passes of the malware scan to remove the infection but it keeps recurring. Which of the following would MOST likely aid in removing the infection?
A. Enable Windows User Access Control to ensure the user has proper rights to remove the infected files. B. Disable Windows firewall as it may be conflicting with the malware scan. C. Run the malware scan in Windows safe mode. D. Change the desktops IP address to a different subnet.
At the airport the company sales employees work on their laptops to submit financial proposals. Which of the following would mitigate shoulder surfing?
A. Firewalls B. The use of VPNs C. Privacy filters D. RSA key fobs