How should you configure Windows Firewall?
DRAG DROP
A company has a main office located in Miami, and branch offices in Boston, Los Angeles,
and Portland. The office networks are configured as described in the following table.
A management computer in the main office, named COMPUTER1, runs Windows 8 and
several third-party management applications.
You are configuring access to COMPUTER1. You have the following requirements:
Ensure that only users in the Boston office can connect to COMPUTER1 by using HTTP.
Ensure that only users in the Los Angeles office can connect to COMPUTER1 by using
HTTPS.
Ensure that only users in the Portland office can connect to COMPUTER1 by using FTP.
You need to configure access to COMPUTER1.
How should you configure Windows Firewall? (To answer, drag the appropriate elements to
the correct location or locations in the answer are Elements may be used once, more than
once, or not at all. You may need to drag the split bar between panes or scroll to view content.)
You need to ensure that you can add files to %programfiles%\app1 without receiving a prompt for elevated privi
You have a computer that runs Windows 7. You attempt to add files to %programfiles%\app1 and
receive a prompt to elevate your privileges. You need to ensure that you can add files to
%programfiles%\app1 without receiving a prompt for elevated privileges. The solution must prevent
harmful applications from making unwanted changed to the system. What should you do?
Which of the following Windows 7 utilities was used to create the output in the above figure?
Which two actions should you perform?
A company has client computers that run Windows 8. Finance department employees store
files in the C:\Finance directory. File History is on.
A Finance department employee attempts to restore a file to a previous version by using File
History. The file is not available to restore.
You need to establish why the file history is not available and ensure that it is available in the future.
Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)
what is the first requirement?
To establish a DirectAccess connection to the network, what is the first requirement?
Which file would you edit to force the PC to book Vista by default?
You have a dual boot PC running both Vista and Windows 7 on partitions on the computer. Which
file would you edit to force the PC to book Vista by default?
What are two possible ways to achieve this goal?
You administer Windows 8 client computers in you company network.
You deploy an application that requires a specific Windows update to be installed on the
computers.
You need to verify that the update is installed on specific computers.
What are two possible ways to achieve this goal? (Each correct answer presents a complete
solution. Choose two)
Which of the following steps will keep a Microsoft Word shortcut icon on the Taskbar after the next reboot?
Which of the following steps will keep a Microsoft Word shortcut icon on the Taskbar after the next
reboot?
you need to verify that the Windows Remote Management (WinRM) service started on Computer2
You have two computers named Computer1 and Computer2 that run Windows 7. Computer1 is used
to remotely manage Computer2. From Computer1, you need to verify that the Windows Remote
Management (WinRM) service started on Computer2.
What should you do?
You need to configure unencrypted read access to file.txt for User2 What should you do?
You administer windows 8 Pro computers in your company network.
A user named User1 encrypts a sensitive file named file.txt by using Encrypting file systems
(EFS) A user named User2 must be able to read file.txt.
You need to configure unencrypted read access to file.txt for User2
What should you do?