100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
testout labs study guide 2023 with complete solution $14.99   Add to cart

Exam (elaborations)

testout labs study guide 2023 with complete solution

 2 views  0 purchase
  • Course
  • Institution

testout labs study guide 2023 with complete solution 2.2.6 Configure Microsoft Defender You recognize that the threat of malware is increasing. As such, you would like to use Windows Virus & Threat Protection to protect your computer from malware. In this lab, your task is to enable and confi...

[Show more]

Preview 4 out of 60  pages

  • June 30, 2023
  • 60
  • 2022/2023
  • Exam (elaborations)
  • Questions & answers
avatar-seller
testout labs study guide 2023 with complete solution
2.2.6
Configure Microsoft Defender
You recognize that the threat of malware is increasing. As such, you would like to
use Windows Virus & Threat Protection to protect your computer from malware.
In this lab, your task is to enable and configure Windows Virus & Threat
Protection as follows:
1. Add a file exclusion for D:\Graphics\cat.jpg.
2. Add a process exclusion for welcome.scr.
3. Locate the current threat definition version number.
4. Answer Question 1.
5. Check for updates.
6. Answer Question 2.
Perform a quick scan
Complete this lab as follows:
1. Access the Virus & threat protection options.
a. Right-click Start; then select Settings.
b. Select Update & Security.
c. From the left pane, select Windows Security.
d. Select Virus & threat protection.
2. Add a file exclusion for D:\Graphics\cat.jpg.
a. Under Virus & threat protection settings, select Manage settings.
b. Scroll down to Exclusions and then select Add or remove exclusions.
c. Select Add an exclusion; then select File.
d. From the left pane, browse to and select Data (D:) > Graphics > cat.jpg, and then
select Open.
3. Add a process exclusion for welcome.scr.
a. From the Exclusions dialog, select Add an exclusion; then select Process.
b. In the Enter process name field, type welcome.scr; then select Add.
4. Check for protection updates.
a. In the top left, select the back arrow twice to return to the Virus & threat protection
page.
b. Scroll down to Virus & threat protection updates and then select Check for updates to
access the Protection updates page.
c. In the top right, select Answer Questions.
d. Answer Question 1.
e. Select Check for updates.
f. Answer Question 2.
5. Perform a quick virus scan.
a. In the top left of the Windows Security dialog, select the back arrow to return to the
Virus & threat protection page.
b. Select Quick scan.
c. Wait for the scan to complete.
6. From the Lab Questions dialog, select Score Lab.

,2.3.11
Identify Social Engineering
You work as the IT security administrator for a small corporate network in the
United States of America. The name of your site is www.corpnet.xyz. The
company president has received several questionable emails that he is
concerned may be malicious attacks on the company.
He has asked you to determine whether the emails are hazardous and to handle
them accordingly.
In this lab, your task is to:
· Read each email and determine whether it is legitimate.
· Delete any emails that are attempts at social engineering.
· Keep emails that are safe.
Complete this lab as follows:
From the Inbox of the WebEmail interface, highlight an email.
Read and explore the email and determine whether it is a legitimate email. This includes
using your mouse to hover over suspicious attachments and links.
Take the appropriate action for each email:If the email is an attempt at social
engineering, from the menu bar, select Delete.If the email safe, do nothing.
Repeat steps 1 through 3 for each email. The following table list the actions you should
take for each email.EmailDiagnosisActionExplanation for ActionMicrosoft Windows
Update CenterNew Service PackPhishingDeleteThis email has various spelling errors.
The link does not direct you to a Microsoft website.Joe DavisRe: Lunch Today?
Malicious AttachmentDeleteThis email appears to be from a colleague; however, why
would he fail to respond to your lunch question and send you a random attachment in
return?Executive RecruitingExecutive JobsWhalingDeleteWhaling uses tailored
information to attack executives. Clicking the link could install malware that would
capture sensitive company information. The link is pointing to a site in Germany (.de). It
is suspicious that this organization would recruite executives from the USA.Human
ResourcesEthics VideoSafeKeepWhile this email has an embedded link, it is digitally
signed, as indicated by the green shield and checkmark. Therefore, you know it actually
comes from your Human Resources department. When you hover over the link, you see
that it is a secure link to the corporate web server.Online Banking DepartmentPayment
PendingPhishingDeleteThis is a carefully crafted attempt to get your bank account
information. Hover over the link and notice that it does not direct you to your credit union
website, but to an unknown IP address. It is also very unlikely that a bank would delete
your account for not verifying your information.Grandma JacklinFW: FW: FW: Virus
Attack WarningHoaxDeleteAny email that asks you to forward it to everyone you know
is probably a hoax. This email also contains very bad grammar.Emily SmithWeb Site
UpdateSpear PhishingDeleteWhile this email appears to come from a colleague, notice
that the link points to an executable file from a Russian domain name (.ru). A report file
is more likely to have an extension of .pdf. .docx, .xlsx, or .txt. This probably is not a
message a real colleague would send. This file will likely infect the computer with
malware.Sara GoodwinWow!!Malicious AttachmentDeleteEmails with attachments from
unknown people who address you as "Dear Friend" are probably not safe.Grandma
JacklinFree Airline TicketsHoaxDeleteAny email that asks you to forward it to everyone
you know is probably a hoax, even if the contents promise you a prize. In addition, there

,is no way to know how many people the email has been forwarded to. Likewise, it is
very unlikely that an airline would give away that many free tickets.Human
ResourcesIMPORTANT NOTICE-Action RequiredSafeKeepWhile this email appears
very urgent, it doesn't ask you to click on anything or run any attachments. It does
inform you that you need to go a website that you should already know and make sure
your courses are complete.Activities CommitteePumpkin ContestSafeKeepThis email
doesn't ask you to click on anything or run any attachments.Robert
WilliamsPresentationSafeKeepThis email doesn't ask you to click on anything or run
any attachments.
3.1.3
Implement Physical Security
Based on a review of physical security at your office, you have recommended
several improvements. Your plan includes installing smart card readers, IP
cameras, signs, and an access log book.
In this lab, your task is to:
Implement your physical security plan by dragging the correct items from the
shelf onto the various locations in the building. As you drag the items from the
shelf, the possible drop locations are highlighted. To implement your plan, you
must:
Install two IP security cameras in the appropriate location to record which
employees access the key infrastructure. The security cameras should operate
over the TCP/IP network.
Install the smart card key readers in the appropriate location to control access to
key infrastructure. The key card readers should be contactless and record more
information than the card's ID.
Install a Restricted Access sign on the networking closet door to control access
to the infrastructure.
Install the visitor log on the lobby desk.
Complete this lab as follows:
Install the IP security cameras:From the Shelf, expand CCTV Cameras.Drag the IP
Security Camera from the shelf to the highlighted circle inside the networking
closet.Drag the IP Security Camera from the shelf to the highlighted circle just outside
the networking closet.
Install the smart card key readers:From the Shelf, expand Door Locks.Drag a smart
card reader from the shelf to the highlighted location outside the building's front
door.Drag a smart card reader from the shelf to the highlighted location outside the
networking closet's door.
Install the Restricted Access sign:From the Shelf, expand Restricted Access Signs.Drag
the Restricted Access sign from the shelf to the networking closet door.
Install the visitor log:From the Shelf, expand Visitor Logs.Drag the visitor log from the
shelf to the lobby desk.
4.2.5
Configure Automatic Updates
You need to customize how Windows Update checks for and installs updates on
the ITAdmin desktop system.
In this lab, your task is to:

, Configure Windows Update to:Install updates for other Microsoft products when
Windows is updated.Allow the installation of feature updates to be deferred 60
days.Allow quality updates to be deferred 30 days.
Configure Windows to automatically download manufacturers' apps and custom
icons for devices.
Complete this lab as follows:
Configure the Windows Update settings.Right-click Start and then select Settings.Select
Update & Security.From the right pane, select Advanced options.Under Update Options,
turn on Receive updates for other Microsoft products when you update Windows by
sliding the switch to On.Under Choose when updates are installed, configure each
option as follows:A feature update includes new capabilities and improvements. It can
be deferred for 60 days.A quality update includes security improvements. It can be
deferred for this many days: 30Close the Settings window.
Configure Windows to automatically download the manufacture's apps and custom
icons.In the search field on the Windows taskbar, type Control.From Best match, select
Control Panel.Select System and Security.Select System.From the left pane, select
Advanced system settings.Select the Hardware tab.Select Device Installation
Settings.Select Yes and then select Save Changes.Select OK.
4.2.7
Configure Microsoft Defender Firewall
You have a new laptop that is running Windows 10. You notice a security
message that indicates that Windows Firewall has been disabled. The laptop is
currently connected to your organization's network, and the Domain network
profile settings are in effect. You plan to travel this week, and you willconnect the
laptop to various airport Wi-Fi hotspots. You need to enable Windows Firewall for
any public network.
In this lab, your task is to configure Windows Firewall as follows:
Turn on Windows Firewall for the Public network profile only.
In addition to the programs and ports currently allowed, allow the following
service and programs through the firewall for the Public network profile only:A
service named Key Management ServiceAn application named Arch98An
application named Apconf
Complete this lab as follows:
Access the Windows Firewall settings.Right-click Start and then select Settings.Select
Network & Internet.From the right pane, scroll down and select Windows Firewall.
From the Firewall & network protection dialog, under Public network, select Turn on.
Allow applications to communicate through the firewall for the Public network
only.Select Allow an app through firewall.Select Change settings.For Key Management
Service, clear Domain and Private, and then select Public.Select Allow another app to
configure an exception for an application not currently allowed through the
firewall.Select the application from the list and then select Add.For the newly added
application, clear Domain and Private, and then select Public.Repeat steps 3d - 3f for
the remaining application.
Select OK.
4.3.5
Configure NTFS Permissions

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller LECTMAGGY. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $14.99. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

74735 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$14.99
  • (0)
  Add to cart