13.8.5 Client Pro Practice Questions

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

With a Windows firewall, which option best describes the role of the access control list? Permits or denies network traffic through a firewall. Protects the system from network attacks. Is used to lock down a device after a threat has been detected. Controls the balloon notifications you see.

Permits or denies network traffic through a firewall. EXPLANATION An access control list (ACL) a set of rules that permits or denies network traffic through a firewall. Device Guard can be used to lock down a device after a threat has been detected on the device. Notification settings in Windows Firewall control the balloon notifications you see when a program is blocked by the firewall. Windows Firewall protects the system from network attacks. REFERENCES TestOut Client Pro - 13.8 Windows Defender Firewall

You need to change how Windows provides notifications when the firewall blocks a new program. Click the links that you would choose to make this change. (Select two.)

"Change notifications settings" " Turn Windows Defender Firewall on or off" EXPLANATION To change how Windows provides notifications when the firewall blocks a new program, you can: - Use the Change Notification Settings link. - Use the Turn Windows Firewall on or off link. Both links take you to the same page in Windows Firewall, where you can enable the Notify me when Windows Firewall blocks a new program option. Use the Advanced settings link in Windows Firewall to launch the Windows Firewall with Advanced Security MMC snap-in. Use the Allow a program or feature through Windows Firewall to enable firewall exceptions. REFERENCES TestOut Client Pro - 13.8 Windows Defender Firewall

You use a Windows desktop system. You need to configure Windows Firewall to allow traffic for a newly installed application that dynamically opens multiple ports on an as-needed basis. What should you do? Add a port exception for each necessary port. Configure ICMP exceptions. Add an exception for the application. Disable Windows Firewall only on the interface that the application uses.

Add an exception for the application. EXPLANATION When you add an exception for an application, any ports required by the application are allowed through the firewall automatically. When the application runs, the ports are allowed; when the application stops, the ports are closed (after a period of inactivity). Configuring ICMP exceptions will not solve this problem. Disabling the Firewall on any interface is a poor security practice. You must use Windows Firewall with Advanced Security to create a port exception. REFERENCES TestOut Client Pro - 13.8 Windows Defender Firewall

You have installed a new Windows system, and you have not changed the default configuration of the Windows Firewall. How will the Windows Firewall handle inbound responses to requests sent from the local system? All such traffic is blocked unless the external source is one of the default exceptions. All such traffic is allowed by default. All such traffic is blocked by default. All such traffic is allowed by default, but triggers a notification to the system administrator.

All such traffic is allowed by default. EXPLANATION By default, Windows Firewall is turned on and configured to allow all outbound traffic and inbound responses to requests sent from the local system. REFERENCES TestOut Client Pro - 13.8 Windows Defender Firewall

ou have installed a new Windows 10 system, and you have not changed the default configuration of the Windows Firewall. How will the Windows Firewall handle inbound traffic that was initiated from an external server that a hacker is using to spread a worm? All such traffic is allowed by default. All such traffic is allowed by default, but triggers a notification to the system administrator. All such traffic is blocked by default. All such traffic is blocked unless the external source is one of the default exceptions.

All such traffic is blocked by default. EXPLANATION Windows Firewall is turned on by default and is configured to automatically block all inbound traffic initiated from external sources, whether it's malicious or friendly. REFERENCES TestOut Client Pro - 13.8 Windows Defender Firewall

Windows provides several interfaces that can be used to configure the Windows Defender Firewall. Drag the Windows Firewall interface on the left to its appropriate description on the right. (Each tool may be used once, more than once, or not at all.) Drag Allowed apps Windows Defender Firewall with Advanced Security Firewall & Network Protection Drop Allows you to create rules based on ports. Lets you add, change, or remove ports that are allowed through the firewall. Allows you to turn a firewall on or off for a specific profile or network. Allows you to create rules based on authentication. The main interface and starting point for the other two interfaces.

Allows you to create rules based on ports. Windows Defender Firewall with Advanced Security Lets you add, change, or remove ports that are allowed through the firewall. Allowed apps Allows you to turn a firewall on or off for a specific profile or network. Firewall & Network Protection Allows you to create rules based on authentication. Windows Defender Firewall with Advanced Security The main interface and starting point for the other two interfaces Firewall & Network Protection EXPLANATION Windows provides several interfaces that can be used to configure the Windows Defender Firewall: - Firewall & Network Protection ~ This is the main interface and starting point for the other two interfaces. From here, you can turn a firewall on or off for a specific profile or network. ~ From this interface, you can access the Allowed apps and Windows Defender Firewall with Advanced Security. - Allowed apps ~ Lets you add, change, or remove the apps and ports that are allowed through the firewall. - Windows Defender Firewall with Advanced Security ~ Allows much more complex rules to be created. For example, you can create rules based on the following: ^ Protocols ^ Ports ^ Addresses ^ Authentication REFERENCES TestOut Client Pro - 13.8 Windows Defender Firewall

You have a Windows system that has both wired and wireless network connections. The wired connection is on the internal private network, but the wireless connection is used for public connections. You need to allow help desk users to use Remote Assistance to help you while working on the wired network, but you want to block any such access from the wireless network. How can you configure Windows Firewall to allow and deny access as described? Create a rule that specifically blocks Remote Assistance on the public profile. For the Remote Assistance exception, identify the help desk users that are allowed for the exception. Enable the Remote Assistance exception only on the private profile. For the Remote Assistance exception, configure the scope to identify the IP addresses of the help desk computers.

Enable the Remote Assistance exception only on the private profile. EXPLANATION To meet the scenario requirements, you must allow Remote Assistance on the private profile, but block it on the public profile. When you configure allowed programs and features in Windows Firewall, you can allow the program for private network profiles, public network profiles, or both. Creating a rule to block Remote Assistance on the public interface is unnecessary because all externally initiated traffic is blocked by default, and this will not allow Remote Assistance through the private interface. Allowing specific users or computers to use the exception does not restrict traffic on a specific interface and would require using Windows Firewall with Advanced Security. REFERENCES TestOut Client Pro - 13.8 Windows Defender Firewall

Which statements are true regarding firewalls? (Select two.) Network firewalls are typically implemented using hardware and positioned at the network's perimeter. Host-based firewalls are typically implemented using software and positioned at the network's perimeter. Host-based firewalls are typically implemented using hardware and positioned at the network's perimeter. Host-based firewalls are implemented using software and reside on the individual hosts within the network. Network firewalls are implemented using software and reside on the individual hosts within the network.

Host-based firewalls are implemented using software and reside on the individual hosts within the network. Network firewalls are typically implemented using hardware and positioned at the network's perimeter. EXPLANATION Network firewalls are typically implemented using hardware and positioned at the network's perimeter. Host-based firewalls are implemented using software and reside on the individual hosts within the network. REFERENCES TestOut Client Pro - 13.8 Windows Defender Firewall

When should you disable the Windows firewall? When your computer has joined a domain network. When Network Location Awareness (NLA) is enabled. When you need to user Windows Remote Management. Only if the computer is protected by a different firewall program.

Only if the computer is protected by a different firewall program. EXPLANATION Disabling the firewall leaves the computer open to attack. Disable the Windows Firewall only if the computer is protected by a different firewall program. REFERENCES TestOut Client Pro - 13.8 Windows Defender Firewall

Which of the following predefined exceptions in Windows Firewall allows users to view and control remote desktops? Remote Assistance Routing and Remote Access Windows Remote Management Remote Desktop

Remote Assistance EXPLANATION Remote Assistance allows users to view and control remote desktops. Routing and Remote Access is a network service that provides dial-up, VPN, IP routing, and NAT services. Windows Remote Management allows remote management of the computer by the WS-Management Protocol. Remote Desktop allows a remote user to log on and access the desktop of a computer, providing access to all programs and files on the computer. The remote system has to have the necessary exception added to its host-based firewall to allow the incoming connection on TCP port 3389. REFERENCES TestOut Client Pro - 13.8 Windows Defender Firewall


संबंधित स्टडी सेट्स

Delf ado B1 Dossier 10 La protection des animaux Η προστασία των ζώων

View Set

310 Elsevier Adaptive Quizzing Endocrine Alterations

View Set

GS BUSA 439 CH 8 Diversification and the Multibusiness Company

View Set

Aug. 21 Organization of Blood and Blood forming organs

View Set

Tax Chapter 8 Examples and Solutions

View Set