Home > Articles > Microsoft > MCTS

  • Print
  • + Share This
This chapter is from the book

Review Questions

  1. Which of the following does spyware not do?

    circle.jpg

    A.

    Monitors keystrokes in an attempt to retrieve passwords and other private information

    circle.jpg

    B.

    Changes the default home page to another site

    circle.jpg

    C.

    Causes pop-up windows to appear frequently

    circle.jpg

    D.

    Changes the polarity of your monitor, causing physical damage

    circle.jpg

    E.

    Slows down your machine

  2. You work as a desktop technician at Acme.com. You have configured Windows Defender on all Microsoft Windows 7 machines on your domain. One user has an accounting application (which comes from a reputable company) that interacts with Microsoft Excel. When the application runs, an alert window opens up with a medium-level warning stating that the software might be spyware. You are sure that the application is not spyware. What do you need to do to stop these warnings from appearing? (Select the best answer.)

    circle.jpg

    A.

    Open Windows Defender. Click Tools, click Options, and configure Windows Defender to ignore Medium alert items.

    circle.jpg

    B.

    Configure Parental Controls to allow this application to run.

    circle.jpg

    C.

    Open Windows Defender. Click Tools and click Options. Then under the Advanced options, click Add in the Do not scan these files or locations option. Then browse to the application executable. Click OK.

    circle.jpg

    D.

    When the warning appears again, click Always Allow.

  3. When running Windows Defender, you are constantly alerted about specific software. What can you do so that you stop getting alerts for that software?

    circle.jpg

    A.

    Run Windows full scan

    circle.jpg

    B.

    Run Windows quick scan

    circle.jpg

    C.

    Add the application to the allowed list

    circle.jpg

    D.

    Add the item to the quarantine list

  4. You work as part of the IT support staff at Acme.com. You have a payroll application (PAY.EXE) that requires you to send data to the check printing company using TCP port 8787. What do you need to do to make this application able to function?

    circle.jpg

    A.

    Open Windows Firewall and ensure that it is enabled. Add PAY.EXE to the exceptions list on the exceptions tab.

    circle.jpg

    B.

    Open Windows Firewall and ensure that it is enabled. Add port 8787 to the exceptions list on the exceptions tab.

    circle.jpg

    C.

    Open Windows Defender. Add PAY.EXE to the exceptions tab.

    circle.jpg

    D.

    Open Windows Defender. In Software Explorer, click the disable button for PAY.EXE.

  5. Your corporation has several FTP servers. You need to make sure that a Windows 7 computer can only connect to the FTP servers when connected to the private network. What should you do?

    circle.jpg

    A.

    Change the application control policies from the local policy

    circle.jpg

    B.

    Change the Advanced Sharing setting from the Network and Sharing Center Policy

    circle.jpg

    C.

    Change the Allowed Programs and Features list from the Windows Firewall Policy

    circle.jpg

    D.

    Create a new rule from the Windows Firewall with Advanced Security Policy

  6. You create a shared folder called Docs on your computer running Windows 7. However, remote users cannot access the shared folder. What do you need to do to allow users to access the shared folder while keeping the system as secure as possible?

    circle.jpg

    A.

    Disable Windows Defender

    circle.jpg

    B.

    Enable the File and Printer Sharing exception in the firewall setting

    circle.jpg

    C.

    Turn off the Windows Firewall

    circle.jpg

    D.

    Enable all incoming connections in the Windows Firewall

  7. What should you do to prevent all inbound traffic to your computer running Windows 7 without the end user being notified?

    circle.jpg

    A.

    Set the network location to Public

    circle.jpg

    B.

    Set the network location to Private

    circle.jpg

    C.

    Set the network location to domain

    circle.jpg

    D.

    Enable the Windows Firewall and select the Block all incoming connections checkbox

  8. What do you call a firewall that monitors the state of active connections and uses the information gained to determine which network packets are allowed through the firewall?

    circle.jpg

    A.

    Packet filter

    circle.jpg

    B.

    Stateful

    circle.jpg

    C.

    Stateless

    circle.jpg

    D.

    Packet analyzer

  9. Which of the following statements is true?

    circle.jpg

    A.

    Windows Firewall is off by default.

    circle.jpg

    B.

    Windows Firewall is on by default.

    circle.jpg

    C.

    Windows Firewall is on by default if you install Windows Defender.

    circle.jpg

    D.

    Windows Firewall is only on if auditing is turned on.

  10. What protocol enables you to create a standard platform to develop secure networks and electronic tunnels between two machines?

    circle.jpg

    A.

    Windows Firewall with Advanced Security

    circle.jpg

    B.

    Windows Defender

    circle.jpg

    C.

    Windows auditing

    circle.jpg

    D.

    Windows Tunnel Maker

  • + Share This
  • 🔖 Save To Your Account