Testout lab 3.4
How can you determine that the security controls implemented are still enforced?.Which hardening tasks can be implemented using a GPO?.How do GPOs ensure the consistent application of controls?.O Configure Domain Servers GPO to remove unneeded services (such as File and Printer Sharing) Implement controls using a security template.Using the Security Configuration and Analysis snap-in.Using GPOs to perform specific hardening tasks.What is the difference between a hotfix and a patch? Why would you use one over the other?Ĩ.3.8 Configuring Windows Firewall Advanced Features 16:59Ĩ.3.9 Configuring Parental Controls 18:21.How do you reduce the attack surface of a device?.What is hardening? How does it benefit the security of an organization?.
TESTOUT LAB 3.4 PATCH
TESTOUT LAB 3.4 SOFTWARE
TESTOUT LAB 3.4 HOW TO
O Educate users on how to create and remember strong passwords Strategies to protect against password attacks:.O Tools to check for unencrypted or weakly encrypted passwords Methods that threat agents use to discover or crack passwords:.This section provides information about password attacks. In addition to implementing virus scanning software, what must you do to ensure that you are protected from the latest virus variations?Ĩ.1.4 Implementing Malware Protections 23:43.Why is it a good practice to show file extensions?.What does it mean for software to be quarantined?.Which types of malware can be spread through e-mail?.What is the difference between a virus and a worm?.9.2 Review security logs and violation reports, implement remediation.O Protect against spyware and unwanted software using Windows Defender 6.1 Harden Computer Systems Against Attack.Analyze startup programs to detect possible malware.Configure Windows Defender protections to secure a network from malware.Scan a system with anti-malware software to identify potential threats.Actions to take to prevent being infected with malware.O Stoned o Michelangelo o CHI/Chernobyl Virus o Melissa o I Love You o Code Red o Nimda o Klez
TESTOUT LAB 3.4 CRACKER
O Hacker o Cracker o Script kiddy o Phreaker Terms related to exploiting software and system vulnerabilities:.O Virus oWorm o Trojan horse o Zombie o Botnet o Rootkit o Logic bomb o Spyware o Adware o Ransomware o Scareware o Crimeware This section provides an overview of malware.