Question 41
A technician needs to allow RDP access for a user. Port forwarding is already set up for port 3389. The technician will have to change the listening port for the new access. Which of the following OS tools should the technician use on the PC to change the listening port for RDP?
Question 42
A department in an organization set up a proxy server to manage its Internet stage. A technician is configuring the Windows workstations to use the new proxy server.
Which of the following Control Panel utilities should the technician use to configure the setting?
Which of the following Control Panel utilities should the technician use to configure the setting?
Question 43
A technician is setting up a kiosk. The technician needs to ensure the kiosk is secure and users will have
access to only the application needed for customer interaction. The technician must also ensure that
whenever the computer is rebooted or powered on it logs on automatically without a password.
Which of the following account types would the technician MOST likely set up on this kiosk machine?
access to only the application needed for customer interaction. The technician must also ensure that
whenever the computer is rebooted or powered on it logs on automatically without a password.
Which of the following account types would the technician MOST likely set up on this kiosk machine?
Question 44
A SOHO user is working on a laptop, but the wireless connection indicator is showing a limited connection.
Each time the user tries to access a website, the browser redirects to an unfamiliar authentication page. Which of the following should the user check to troubleshoot the cause of the issue?
Each time the user tries to access a website, the browser redirects to an unfamiliar authentication page. Which of the following should the user check to troubleshoot the cause of the issue?
Question 45
A technician receives a security alert stating a vendor has left a Keylogger on certain systems that shipped configured from the factory. The technician needs to research the system model numbers to determine if any production computers are affected. II the technician finds vulnerable systems, which of the following is the BEST method to remove the Keylogger?