A user is trying to access an application on their home machine from work. The user sets up port forwarding on their router but is still unable to connect to the application. Which of the following should be the users NEXT step in resolving this issue?
A. Configure Wake-on-LAN for the NIC on the Work PC. B. Configure a firewall exception on the Home PC. C. Switch the Work PC network from “Work” to “Home”. D. Disable the Windows firewall on the Home PC.
A technician is trying to troubleshoot an issue on a Windows 7 computer remotely, but is unable to PING the computer. The technician verified that the computer is turned on, has network connectivity, and can get to the Internet. Which of the following is MOST likely the issue?
A. The technician does not have permissions B. Local security policy settings is incorrect C. Wake-on-LAN is disabled D. Windows firewall is enabled
A technician is trying to prevent a local application from reaching the web due to security concerns. Which of the following solutions could BEST prevent the application from reaching the web? (Select TWO).
A. Configure the workstation for a static IP B. Disable all wireless network connections C. Remove shortcuts to the application D. Block the application in Windows Firewall E. Change network location to Work F. Reroute the web address in HOSTS file
Correct Answer: DF
Explanation: Use Windows firewall to restrict an application from reaching the web. Alternatively you can also reroute the web address in the HOST file.
A technician recently created an email account for a new user, Peter. On the second day, Peter reports his email account is full of spam even though he has not given out his address. Which of the following should the technician do to resolve the issue?
A. Turn on windows firewall B. Click the unsubscribe link in the spam C. Run an anti-spyware scan D. Install privacy filter
Peter, an end user, has reported that his computer is extremely slow for several minutes after logging in. He has noticed that many unnecessary programs automatically start when he logs into his computer. Which of the following tools could the technician use to prevent the unnecessary programs from starting automatically when Peter logs into his computer?
A. Performance Monitor B. Task Scheduler C. MSCONFIG D. Windows Firewall