Questions with 100% Correct Answers Verified Latest
Updated 2025 121 Pages Top Ranked Guaranteed
Success A+….
2.2.6
Configure Microsoft Defender
You recognize that the threat of malware is increasing. As such, you would like to use
Windows Virus & Threat Protection to protect your computer from malware.
In this lab, your task is to enable and configure Windows Virus & Threat Protection as
follows:
1. Add a file exclusion for D:\Graphics\cat.jpg.
2. Add a process exclusion for welcome.scr.
3. Locate the current threat definition version number.
4. Answer Question 1.
5. Check for updates.
6. Answer Question 2.
Perform a quick scan - Correct answer Complete this lab as follows:
1. Access the Virus & threat protection options.
a. Right-click Start; then select Settings.
b. Select Update & Security.
c. From the left pane, select Windows Security.
d. Select Virus & threat protection.
2. Add a file exclusion for D:\Graphics\cat.jpg.
,a. Under Virus & threat protection settings, select Manage settings.
,b. Scroll down to Exclusions and then select Add or remove exclusions.
c. Select Add an exclusion; then select File.
d. From the left pane, browse to and select Data (D:) > Graphics > cat.jpg, and then
select Open.
3. Add a process exclusion for welcome.scr.
a. From the Exclusions dialog, select Add an exclusion; then select Process.
b. In the Enter process name field, type welcome.scr; then select Add.
4. Check for protection updates.
a. In the top left, select the back arrow twice to return to the Virus & threat protection
page.
b. Scroll down to Virus & threat protection updates and then select Check for updates to
access the Protection updates page.
c. In the top right, select Answer Questions.
d. Answer Question 1.
e. Select Check for updates.
f. Answer Question 2.
5. Perform a quick virus scan.
a. In the top left of the Windows Security dialog, select the back arrow to return to the
Virus & threat protection page.
b. Select Quick scan.
c. Wait for the scan to complete.
, 6. From the Lab Questions dialog, select Score Lab.
2.3.11
Identify Social Engineering
You work as the IT security administrator for a small corporate network in the United
States of America. The name of your site is www.corpnet.xyz. The company president
has received several questionable emails that he is concerned may be malicious
attacks on the company.
He has asked you to determine whether the emails are hazardous and to handle them
accordingly.
In this lab, your task is to:
· Read each email and determine whether it is legitimate.
· Delete any emails that are attempts at social engineering.
· Keep emails that are safe. - Correct answer Complete this lab as follows:
From the Inbox of the WebEmail interface, highlight an email.
Read and explore the email and determine whether it is a legitimate email. This includes
using your mouse to hover over suspicious attachments and links.
Take the appropriate action for each email:If the email is an attempt at social
engineering, from the menu bar, select Delete.If the email safe, do nothing.
Repeat steps 1 through 3 for each email. The following table list the actions you should
take for each email.EmailDiagnosisActionExplanation for ActionMicrosoft Windows