While accessing the Internet in an external environment (i.e. while traveling), a Windows 7 firewall hould be set to which of the following?()A、Block incoming and outgoing connectionsB、Turned off or disabledC、Block outgoing connectionsD、Block incoming connections

While accessing the Internet in an external environment (i.e. while traveling), a Windows 7 firewall hould be set to which of the following?()

  • A、Block incoming and outgoing connections
  • B、Turned off or disabled
  • C、Block outgoing connections
  • D、Block incoming connections

相关考题:

The Internet has changed the way people work.They can __1__ from place to place while getting in touch __2__ their office all the time via the Internet.A recent __3__ in the America magazine, Newsweek, said more than 89 million Americana now use the Internet at work.One can __4__ imagine how business could be done without the Internet.The Internet is becoming more __4__ than any one had thought possible.And its importance is __5__ to increase more in the future.1).A.travelB.withC.reportD.expectedE.important2).A.travelB.withC.reportD.expectedE.important3).A.travelB.withC.reportD.expectedE.important4).A.travelB.withC.reportD.expectedE.important5).A.travelB.withC.reportD.expectedE.important

The computer system broke out suddenly while he was searching for ination on the Internet.() 此题为判断题(对,错)。

By using(26), a 600M -byte music CD can be compressed to 50M bytes or less. It can be streamed(downloaded in chunks) so that you can begin listening to the opening bars while the(27)of the file arrives in the background. And, most important, the music files of this kind retain good listening(28) that earlier(29) schemes lacked. That(30) of features makes accessing and distributing music on the web practical for the first time.A.JPGB.MP3C.MP4D.VOD

Personal firewall is a technology that helps(66)intruders from accessing data on your PC via the Internet or another network, by keeping(67)data from entering or exiting your system.Hackers do not just target national security organizations for(68): They want your tax returns, network passwords, or bank account numbers. And you do not want the FBI kicking in your door because someone hijacked your PC to(69)in the latest denial-of-service attack on the Internet. Now that "always-on" broadband connections such as cable modems and digital subscriber line are becoming more popular, home users are at risk. Fortunately, you can protect your data. Firewalls can block(70)attacks and protect your PC from outside threats.A.allowB.preventC.inviteD.get

You have a computer that runs Windows Vista.You connect to your company’s network by using a virtual private network (VPN) connection. You notice that when you establish the VPN connection, you are unable to access Internet Web sites. When you disconnect the VPN connection, you can access Internet Web sites.You need to access Internet Web sites while you are connected to the VPN connection.What should you do?()A.AB.BC.CD.D

A host on the LAN is accessing an FTP server across the Internet. Which of the following addresses could appear as a source address for the packets forwarded by the router to the destination server()。 A.10.10.0.1B.10.10.0.2C.199.99.9.33D.199.99.9.57E.200.2.2.17F.200.2.2.18

The computer system()suddenly while he was searching for information on the Internet.Abroke downBbroke outCbroke upDbroke in

while(a)等价于() A、while(a=0)B、while(a==0)C、while(!a)D、while(a!=0)

You are designing an integration test plan for a Windows Azure .NET 3.5 application.   You need to recommend a testing environment that allows developers to debug the application while accessing data in the cloud.  What should you recommend?()A、 Run the application on Windows Azure.  Use the development storage account.B、 Run the application on Windows Azure.  Use a Windows Azure Storage account.C、 Run the application in the development fabric.  Use the development storage account.D、 Run the application in the development fabric.  Use a Windows Azure Storage account

A host on the LAN is accessing an FTP server across the Internet. Which of the following addresses could appear as a source address for the packets forwarded by the router to the destination server()。A、10.10.0.1B、10.10.0.2C、199.99.9.33D、199.99.9.57E、200.2.2.17F、200.2.2.18

A technician at a company providing online, real-time media streaming to the Internet needs a network technology that will reduce bandwidth while delivering high throughput. Which of the following can the technician implement to fit these requirements?()A、SubnettingB、UnicastC、BroadcastD、Multicast

A user is reporting that they are getting pop-ups while they are not actively browsing the Internet.Which of the following would BEST resolve this issue?()A、AntivirusB、FirewallC、Anti-spywareD、Pop-upblocker

A junior level Database Administrator erroneously deleted the database alert log while users were accessing the database. Which action should you take to recover the alert log?()  A、 Do nothing.B、 Restart the database.C、 Perform recovery on the database.D、 Restore the alert log from the last backup.

You are the network administrator for your company. All servers run Windows Server 2003.  Twenty company employees connect to a terminal server named Server2 to run applications and to gain access to the Internet.The 20 employees report that they receive security messages while browsing Internet Web sites.  The employees report that they cannot modify the Internet Explorer security settings on their client computers while connected to Server2.You need to allow these 20 employees to modify the Internet Explorer security settings on their client computers while connected to Server2. What should you do?()A、Log on to Server2 as Administrator and add http:// to the list of trusted sites in Internet Explorer.B、Instruct the 20 employees to add http:// to the list of trusted sites in Internet Explorer on their client computers.C、Instruct the 20 employees to change the Internet Explorer privacy settings on their client computers to Low.D、Uninstall Internet Explorer Enhanced Security Configuration on Server2.

You want to connect to your company network from your Windows 2000 Professional computer at home. You have an ISDN line that is used for internet connectivity. You create a VPN connection and are able to connect successfully to the company network. While connected to the company network, you are unable to access the Internet.   What must you do so that you can access the Internet?()A、Configure the ISDN connection to use SLIP instead of PPP.B、Select the Enable Internet Connection Sharing for this connection check box in the ISDN connection properties.C、Clear the Use default gateway on remote network check box.D、Install and configure the SAP Agent service.

You are the network administrator for Company.You need to connect to Company’s network from your Windows 2000 Professional computer at home.You have a DSL line that is used for Internet connectivity. You create an L2TP virtual private network(VPN) connection and are able to connect successfully to Company’s network. While connected toCompany’s network, you are unable to access the Internet.You want to be able to access the Internet while connected to Company’s network.How should you configure the connection properties?()A、Configure the DSL connection to use PPTP instead of L2TP. B、Enable Internet Connection Sharing for the DSL connection properties. C、CLEAR THE Use default gateway on remote network check box. D、Clear the Require data encryption check box.

单选题A junior level Database Administrator erroneously deleted the database alert log while users were accessing the database. Which action should you take to recover the alert log?()A Do nothing.B Restart the database.C Perform recovery on the database.D Restore the alert log from the last backup.

多选题Which of the following are valid modes of accessing the data plane()ASerial connectionBSecure ShellCRADIUSDSimple Network Management ProtocolEHTTPFTelnet

多选题What are two methods of accessing a Juniper enterprise router?()ARSHBHTTPSCconsoleDJ-Config

单选题An administrator wants to prevent users from plugging in their personal laptops and accessing the Internet without a member of the IT staff configuring the machine first. Which of the following would MOST likely be installed?()AMultilayer switchBCSUCProxy serverDIDS

单选题A user is reporting that they are getting pop-ups while they are not actively browsing the Internet.Which of the following would BEST resolve this issue?()AAntivirusBFirewallCAnti-spywareDPop-upblocker

单选题You work as an administrator at ABC.com. The ABC.com network consists of a single domain named ABC.com. All servers in the ABC.com domain, including domain controllers, have Windows  Server 2012 R2 installed.ABC.com has a server, named ABC-SR07, which has four network adapters. ABC.com has two local area networks (LANs). Two of ABC-SR07’s network adapters are connected to the one LAN,while the other two are connected to the other LAN.You are required to configure one of the network adapter pairs into a network adapter team. Which of the following actions should you take?()AYou should consider accessing the Group Policy Management Console (GPMC) on ABC-SR07.BYou should consider accessing the TS Manager console on ABC-SR07.CYou should consider accessing the Server Manager console on ABC-SR07.DYou should consider accessing the Remote Desktop Gateway Manager console on ABC-SR07.

单选题The computer system()suddenly while he was searching for information on the Internet.Abroke downBbroke outCbroke upDbroke in

单选题You work as an administrator at ENSUREPASS.com. The ENSUREPASS.com network consists of  a single domain named ENSUREPASS.com. All servers on the ENSUREPASS.com network have  Windows Server 2012 installed.You have received instructions to install the Remote Desktop Services server role on a server, named ENSUREPASS-SR07. You want to achieve this remotely from a server, named ENSUREPASS-SR06.  Which of the following actions should you take?()AYou should consider accessing the Server Manager console on ENSUREPASS-SR07BYou should consider accessing the Server Manager console on ENSUREPASS-SR06CYou should consider accessing the TS Manager console on ENSUREPASS-SRDYou should consider accessing the TS Manager console on ENSUREPASS-SR06

单选题While considering security, which of the following is the BEST place for a public web server accessible via the Internet? ()A Internal networkB VLANC VPND DMZ

单选题A host on the LAN is accessing an FTP server across the Internet. Which of the following addresses could appear as a source address for the packets forwarded by the router to the destination server()。A10.10.0.1B10.10.0.2C199.99.9.33D199.99.9.57E200.2.2.17F200.2.2.18

单选题Which statement is true about accessing a Juniper enterprise router using a Web browser?()AJ-series routers are accessible by default.BM7i and M10i routers are accessible by default.CYou need to install a license before accessing a J-series router.DYou need to enable the HTTP service on M7i, M10i, and J-series routers before accessing them.