If a system administrator would like to use the netsh command to configure a firewall remotely, what must be done before the firewall can be configured?

A. Windows Firewall Remote Management group rules must be enabled on the local computer
B. Windows Firewall Remote Management group rules must be enabled on the remote computer
C. Windows Firewall Remote Management group rules must be disabled on the local computer
D. Windows Firewall Remote Management group rules must be disabled on the remote computer


Answer: B

Computer Science & Information Technology

You might also like to view...

Tables are added to the query design workspace using the ________ dialog box

A) Show Table B) Add Tables C) Data Selection D) Quick Info

Computer Science & Information Technology

Which of the following best describes a black hat hacker?

a. A person that usually follows the law but in some cases performs illegal activities b. Someone who is hacking into computer systems with the permission of the owner of the systems c. Someone who hacks into systems to cause harm and/or for monetary gain d. Someone who is hired by a company to hack into systems

Computer Science & Information Technology

In a program, KISS means keep the code simple.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

The _____ login option is used to restart the system.

A. log in B. restart C. cancel D. shut down

Computer Science & Information Technology