testout labs Exam 2026 Questions and
Answers
2.2.6
Configure Microsoft Defender
You recognize that the threat of malware is increasing. As such, you would like to
use Windows Virus & Threat Protection to protect your computer from malware.
In this lab, your task is to enable and configure Windows Virus & Threat Protection
as follows:
1. Add a file exclusion for D:\Graphics\cat.jpg.
2. Add a process exclusion for welcome.scr.
3. Locate the current threat definition version number.
4. Answer Question 1.
5. Check for updates.
6. Answer Question 2.
Perform a quick scan - Correct Answer -Complete this lab as follows:
©COPYRIGHT 2025, ALL RIGHTS RESERVED 1
,1. Access the Virus & threat protection options.
a. Right-click Start; then select Settings.
b. Select Update & Security.
c. From the left pane, select Windows Security.
d. Select Virus & threat protection.
2. Add a file exclusion for D:\Graphics\cat.jpg.
a. Under Virus & threat protection settings, select Manage settings.
b. Scroll down to Exclusions and then select Add or remove exclusions.
c. Select Add an exclusion; then select File.
d. From the left pane, browse to and select Data (D:) > Graphics > cat.jpg, and then
select Open.
3. Add a process exclusion for welcome.scr.
a. From the Exclusions dialog, select Add an exclusion; then select Process.
b. In the Enter process name field, type welcome.scr; then select Add.
4. Check for protection updates.
©COPYRIGHT 2025, ALL RIGHTS RESERVED 2
,a. In the top left, select the back arrow twice to return to the Virus & threat
protection page.
b. Scroll down to Virus & threat protection updates and then select Check for
updates to access the Protection updates page.
c. In the top right, select Answer Questions.
d. Answer Question 1.
e. Select Check for updates.
f. Answer Question 2.
5. Perform a quick virus scan.
a. In the top left of the Windows Security dialog, select the back arrow to return to
the Virus & threat protection page.
b. Select Quick scan.
c. Wait for the scan to complete.
6. From the Lab Questions dialog, select Score Lab.
2.3.11
Identify Social Engineering
©COPYRIGHT 2025, ALL RIGHTS RESERVED 3
, You work as the IT security administrator for a small corporate network in the
United States of America. The name of your site is www.corpnet.xyz. The
company president has received several questionable emails that he is concerned
may be malicious attacks on the company.
He has asked you to determine whether the emails are hazardous and to handle
them accordingly.
In this lab, your task is to:
· Read each email and determine whether it is legitimate.
· Delete any emails that are attempts at social engineering.
· Keep emails that are safe. - Correct Answer -Complete this lab as follows:
From the Inbox of the WebEmail interface, highlight an email.
Read and explore the email and determine whether it is a legitimate email. This
includes using your mouse to hover over suspicious attachments and links.
Take the appropriate action for each email:If the email is an attempt at social
engineering, from the menu bar, select Delete.If the email safe, do nothing.
Repeat steps 1 through 3 for each email. The following table list the actions you
should take for each email.EmailDiagnosisActionExplanation for ActionMicrosoft
Windows Update CenterNew Service PackPhishingDeleteThis email has various
©COPYRIGHT 2025, ALL RIGHTS RESERVED 4
Answers
2.2.6
Configure Microsoft Defender
You recognize that the threat of malware is increasing. As such, you would like to
use Windows Virus & Threat Protection to protect your computer from malware.
In this lab, your task is to enable and configure Windows Virus & Threat Protection
as follows:
1. Add a file exclusion for D:\Graphics\cat.jpg.
2. Add a process exclusion for welcome.scr.
3. Locate the current threat definition version number.
4. Answer Question 1.
5. Check for updates.
6. Answer Question 2.
Perform a quick scan - Correct Answer -Complete this lab as follows:
©COPYRIGHT 2025, ALL RIGHTS RESERVED 1
,1. Access the Virus & threat protection options.
a. Right-click Start; then select Settings.
b. Select Update & Security.
c. From the left pane, select Windows Security.
d. Select Virus & threat protection.
2. Add a file exclusion for D:\Graphics\cat.jpg.
a. Under Virus & threat protection settings, select Manage settings.
b. Scroll down to Exclusions and then select Add or remove exclusions.
c. Select Add an exclusion; then select File.
d. From the left pane, browse to and select Data (D:) > Graphics > cat.jpg, and then
select Open.
3. Add a process exclusion for welcome.scr.
a. From the Exclusions dialog, select Add an exclusion; then select Process.
b. In the Enter process name field, type welcome.scr; then select Add.
4. Check for protection updates.
©COPYRIGHT 2025, ALL RIGHTS RESERVED 2
,a. In the top left, select the back arrow twice to return to the Virus & threat
protection page.
b. Scroll down to Virus & threat protection updates and then select Check for
updates to access the Protection updates page.
c. In the top right, select Answer Questions.
d. Answer Question 1.
e. Select Check for updates.
f. Answer Question 2.
5. Perform a quick virus scan.
a. In the top left of the Windows Security dialog, select the back arrow to return to
the Virus & threat protection page.
b. Select Quick scan.
c. Wait for the scan to complete.
6. From the Lab Questions dialog, select Score Lab.
2.3.11
Identify Social Engineering
©COPYRIGHT 2025, ALL RIGHTS RESERVED 3
, You work as the IT security administrator for a small corporate network in the
United States of America. The name of your site is www.corpnet.xyz. The
company president has received several questionable emails that he is concerned
may be malicious attacks on the company.
He has asked you to determine whether the emails are hazardous and to handle
them accordingly.
In this lab, your task is to:
· Read each email and determine whether it is legitimate.
· Delete any emails that are attempts at social engineering.
· Keep emails that are safe. - Correct Answer -Complete this lab as follows:
From the Inbox of the WebEmail interface, highlight an email.
Read and explore the email and determine whether it is a legitimate email. This
includes using your mouse to hover over suspicious attachments and links.
Take the appropriate action for each email:If the email is an attempt at social
engineering, from the menu bar, select Delete.If the email safe, do nothing.
Repeat steps 1 through 3 for each email. The following table list the actions you
should take for each email.EmailDiagnosisActionExplanation for ActionMicrosoft
Windows Update CenterNew Service PackPhishingDeleteThis email has various
©COPYRIGHT 2025, ALL RIGHTS RESERVED 4