单项选择题
Your computer is part of a workgroup. You share files with other users on the network. You configure exceptions in Microsoft Windows Firewall to allow file sharing. Users report that they are unable to connect to your computer.
You need to ensure that other users are able to access only the shared files.
What should you do? ()
A.Restart the Workstation service on your computer.
B.Change all of your TCP port exceptions to UDP port exceptions.
C.Ensure parental controls are not configured to block file sharing.
D.Clear the Block all incoming connections check box in Windows Firewall.
相关考题
-
单项选择题
You need to remove any Microsoft Windows Internet Explorer 7 add-ons in Microsoft Windows Vista computers that do not have prior approval from the following authorities: Microsoft System manufacturer Service provider What should you do? ()
A.Remove any add-ons that are not found in the list of downloaded ActiveX controls.
B.Remove any add-ons that are not found in the list of add-ons used by Windows Internet Explorer 7.
C.Remove any add-ons that are not found in the list of add-ons that run without requiring permission.
D.Remove any add-ons that are not found in the list of add-ons that are at present loaded in Windows Internet Explorer 7. -
单项选择题
You share your computer with other users. You install a new Microsoft Windows Internet Explorer add-on to view videos on the computer. You discover that this add-on conflicts with existing add-ons that other users frequently require. You need to ensure that you are able to view videos without affecting other users. What should you do?()
A.Uninstall the new Windows Internet Explorer add-on.
B.Log on as an administrator and disable the new Windows Internet Explorer add-on.
C.Direct other users to log on and disable the new Windows Internet Explorer add-on.
D.Select the Turn off Automatic Website Checking option for the Phishing filter. -
单项选择题
You need to reduce the level of access that a malicious Web site might have to your computer. What should you do? ()
A.Start a Windows Defender scan.
B.Enable Microsoft Windows Internet Explorer Phishing Filter.
C.Enable Microsoft Windows Internet Explorer Pop-up Blocker.
D.Confirm that Microsoft Windows Internet Explorer Protected Mode is enabled on the Internet security zone.
