You need to record when an incoming connection is allowed through Windows firewall
You have a computer that runs Windows 7. You need to record when an incoming connection is allowed through Windows firewall. What should you do?
Which type of connection should you configure?
Your company has a server that runs Windows Server 2008 R2. The server is configured as a remote access server. The external firewall has TCP port 80 and TCP port 443 open for remote access connections. You have a home computer that runs Windows 7. You need to establish secure remote access connection from the home computer to the remote access server. Which type of connection should you configure?
You need to verify that an offline copy of the folder has been created on the computer
You have a computer that runs Windows 7. You mark a folder as Always available offline. You need to verify that an offline copy of the folder has been created on the computer. What should you do?
You need to identify whether you are working on an offline version of a file
You have a portable computer that runs Windows 7. The computer is configured to keep an offline version of files located in a network share. You need to identify whether you are working on an offline version of a file. What should you do?
You need to ensure that you can copy files between the computers during the Remote Desktop session
You have two computers named Computer1 and Computer2 that run Windows 7. You connect from Computer1 to Computer2 by using Remote Desktop. You discover that you cannot copy any files between the computers during the Remote Desktop session. You need to ensure that you can copy files between the computers during the Remote Desktop session.
What should you do?
You need to access Server2 from Computer1
Your corporate network contains a Remote Desktop Gateway (RD Gateway) server named Server1 and a Remote Desktop Session Host (RD Session Host) server named Server2. You have a computer named Computer1 that runs Windows 7. You use Computer1 from home. You need to access Server2 from Computer1. What should you do?
Which command should you run?
You have a computer that runs Windows 7. The Encrypting File System (EFS) key is compromised. You need to create a new EFS key. Which command should you run?
Which firewall rule should you enable on the client computers?
Your network has a main office and a branch office. The branch office has five client computers that run Windows 7 and a server that runs Windows Server 2008 R2. The branch office server is enabled for BranchCache. You need to configure Windows Firewall on each client computer so that cached content can be retrieved from the branch office server. Which firewall rule should you enable on the client computers?
You need to ensure that you can access all encrypted files on the computer
You are the administrator of a computer named Computer1 that runs Windows 7. Several users share Computer1. The users plan to encrypt files on the computer. You need to ensure that you can access all encrypted files on the computer. What should you do first?
You need to configure Computer1 so that only Administrators are authorized to shut down the computer
You have a computer named Computer1 that runs Windows 7. Computer1 has a shared printer. You need to configure Computer1 so that only Administrators are authorized to shut down the computer. What should you do?