Home > Articles > Microsoft > MCTS

  • Print
  • + Share This
  • 💬 Discuss
This chapter is from the book

Review Question Answers

  1. Answer D is correct. Spyware cannot physically damage a computer. It can, however, capture information as you type, change the default home page, generate pop-up windows, and slow your machine. Therefore, Answers A, B, C, and E are incorrect.
  2. Answer D is correct. When you know that a program is not spyware, click Always allow so that Windows stops assuming the software is spyware. Answer A is incorrect because you don't want to ignore other programs that might be harmful. Answer B is incorrect because Parental Controls do not function on domains. Answer C is incorrect because Answer D is much easier to implement.
  3. Answer C is correct. To stop an alert from being generated by a specific application, you need to add it to the allowed list. Answers A and B are incorrect because these choices do not cause an alert to stop for an application. Answer D is incorrect because if it is quarantined, the application is not able to run until it is removed from the quarantine folder and placed back to its original place.
  4. Answer A is correct. Because you want the PAY.EXE to communicate through the firewall, you can use an exception where you can specify that PAY.EXE can communicate out port 8787. Answer B is incorrect because you want to specify that only PAY.EXE can communicate through port 8787, not any other programs. Answer C is incorrect because you want to add an exception to Windows Firewall, not to Windows Defender, which is used to protect against spyware. Answer D is incorrect because the Software Explorer was a component that was included with Windows Defender included with Windows Vista. Since then, Software Explorer has been discontinued with the version of Windows Defender that is included with Windows 7.
  5. Answer D is correct. For more control on what the firewall allows and blocks, you use the Windows Firewall with Advanced Security Policy. Answers A and B are incorrect because you need to configure your firewall. Answer C is incorrect because FTP is not included in the list for programs included under the Windows Firewall with Advanced Security Policy.
  6. Answer B is correct. When you use shared folders, you need to open the firewall to allow communication to the shared folders. Answer A is incorrect because Windows Defender protects against spyware. Answer C is incorrect because you do not want to turn off the firewall because it is not able to protect your system. Answer D is incorrect because allowing all incoming connections opens your computer to security breaches.
  7. Answer D is correct. Enabling the Windows Firewall and selecting the Block all incoming connections checkbox prevents all inbound traffic for the specific network location. If you don't select the Notify me when Windows Firewall blocks a new program, you do not any notifications. Answers A, B, and C are incorrect because you need to select Block all incoming connections no matter which network location you choose.
  8. Answer B is correct. A stateful firewall monitors the state of active connections and uses the information gained to determine which network packets are allowed through the firewall. Answer A is incorrect because a packet filter protects the computer by using an access control list (ACL), which specifies which packets are allowed through the firewall based on IP address and protocol (specifically the port number). Answer C is incorrect because a packet filter is a stateless firewall. Answer D is incorrect because a packet analyzer or protocol analyzer is used to capture and analyze individual packets.
  9. Answer B is correct. Windows Firewall is turned on by default. Therefore, when trying to use applications that communicate on the network, they could be blocked. Because Windows Firewall is on by default, Answer A is incorrect. Answers C and D are incorrect because Windows Defender and auditing do not affect whether Windows Firewall is on or off.
  10. Answer A is incorrect. IPsec, short for IP Security, is used to encrypt traffic between two end points. To configure both the firewall and IPsec, you use the Windows Firewall with Advanced Security. Answer B is incorrect because the Windows Defender protects against spyware. Answer C is incorrect because Windows auditing is used to check what activities are happening to the system or object. Answer D is incorrect because there is no Windows Tunnel Maker program.
  • + Share This
  • 🔖 Save To Your Account

Discussions

comments powered by Disqus