单项选择题X 纠错
A.Add a port exception for port 80.
B.Disable the Core Networking exception.
C.Restore the Windows Firewall defaults.
D.Add a program exception for the new application.
你可能喜欢
单项选择题
A.Enable the User Account Control feature.
B.Configure the user account of your child as a standard user.
C.Create an outbound rule in Windows Firewall to block UDP port 5678.
D.Create an outbound rule in Windows Firewall to block TCP port 5678.
单项选择题
A.Restart the Workstation service on your computer.
B.Change all of your TCP port exceptions to UDP port exceptions.
C.Ensure parental controls are not configured to block file sharing.
D.Clear the Block all incoming connections check box in Windows Firewall.
单项选择题
A.Remove any add-ons that are not found in the list of downloaded ActiveX controls.
B.Remove any add-ons that are not found in the list of add-ons used by Windows Internet Explorer 7.
C.Remove any add-ons that are not found in the list of add-ons that run without requiring permission.
D.Remove any add-ons that are not found in the list of add-ons that are at present loaded in Windows Internet Explorer 7.
单项选择题
A.Uninstall the new Windows Internet Explorer add-on.
B.Log on as an administrator and disable the new Windows Internet Explorer add-on.
C.Direct other users to log on and disable the new Windows Internet Explorer add-on.
D.Select the Turn off Automatic Website Checking option for the Phishing filter.
单项选择题
A.Start a Windows Defender scan.
B.Enable Microsoft Windows Internet Explorer Phishing Filter.
C.Enable Microsoft Windows Internet Explorer Pop-up Blocker.
D.Confirm that Microsoft Windows Internet Explorer Protected Mode is enabled on the Internet security zone.
多项选择题
A.Disable the pop-up blocker.
B.Add the URL of the Web site to the list of trusted sites.
C.Add the URL of the Web site to the list of allowed sites.
D.Enable the Automatic Website Checking option on the Phishing filter.
E.Visit the Web site and select the Always allow pop-ups from this site option.
单项选择题
A.Confirm that Windows Defender is not subscribed to the Microsoft Spynet online community. Select the Use heuristics to detect potentially harmful or unwanted behavior by software that hasnt been analyzed for risks checkbox in Windows Defender.
B.Configure Windows Defender with a basic membership to the Spynet online community.
C.Configure Windows Defender with an advanced membership to the Spynet online community.
D.Configure the Software Explorer option in Windows Defender to display software for all users.
单项选择题
A.Ignore
B.Remove
C.Quarantine
D.Always Allow
单项选择题
A.Reinstall the application to another location.
B.Restore the program from the Quarantined Items list.
C.Remove the program from the Quarantined Items list.
D.Repair the program from the Programs option in Control Panel.
单项选择题
A.Use the Microsoft Windows Task Manager application to end the task for the application.
B.Use the Control Panel application to uninstall the application. Reboot the computer.
C.Use the Software Explorer application to disable the application. Reboot the computer.
D.Use the Services application to disable the Application Experience service, and then launch the application.