Www.nku.edu



Name: ___________________________________Lab#14: Windows Security and Privacy – Part 2 CIT271This lab covers Windows 10 Inside Out Chapter 18 pages 683-698.Log onto your Windows 10 computer with your administrator account.A) What does Windows Defender Antivirus’ scanning engine compare files against? (See page 683.)B) What heuristic analysis of behavior does Windows Defender Antivirus use? (See pages 683-4.)C) What is real-time scanning? (See page 684.)Answer #A:In the search box enter and open Windows Security. Open “Virus & threat protection”. (See Figure 18-8 on page 684.) A) When was the last scan?B) How many threats were found?Answer #B:A) What is a Quick scan? (See page 685.)Run a Quick scan. B) How many threats did the Quick Scan find?C) How long did the Quick scan take?Answer #C:Click on “Threat history”. (See page 686.)A) What is a quarantined threat? B) How many quarantined threats are there? Answer #D:A) What is ransomware? (See page 686.)In the “Virus & Threat Protection” page of Windows Security, click on “Manage Ransomware Protection”.B) How does turning “Controlled folder access” On protect against ransomware?Answer #E:A) What is SmartScreen? (See page 686.)In Windows Security, click on “App & browser control”. (See page 687.)B) What is SmartScreen set to do when it encounters unrecognized apps or files form the web?Answer #F:A) What is the first line of defense in securing your computer against outside attackers? (See page 687.)B) Even if you are protected by a corporate firewall, why does it make sense to run a software-based firewall on your computer? (See page 688.)Answer #G:A) What is the default action for incoming traffic for Windows Firewall? Be thorough in answering this question. (See page 688.) B) What is the default action for outgoing traffic? (See page 688.)Answer #H:In Windows Security, click on “Firewall and network protection”. (See Figure 18-10 on page 689.)A) What is the “Private Network” type? (See page 688.)Click on “Private network”. (See figure on page 690.)B) When might you check the “Block all incoming connections” box? (See page 690.)Answer #I:In the “Firewall & Network Protection” page of Window Security, click on “Allow an app through firewall”. (See page 691 and Figure 18-11.). Is Remote Desktop allowed through the firewall? Answer #J:We want to allow Remote Desktop on the private network.What do you have to click on first? (See page 691.)Answer #K:Each app that you allow through the firewall increases your security risk. What do the authors recommend to control this risk? (See page 692.)Answer #L:Restore the default setting for Windows Firewall. What does the pop-up warn you? (See page 694.)Answer #M:How does BitLocker protect your hard disk? (See page 684.)Answer #N:Open File Explorer and open Documents.Click on the Home tab and choose New Folder.Create a new folder name “Secret”.Open Word Pad. Enter some text and save it in the folder “Secret” naming the document “codes”.Use the Encrypting File Systems (EFS) to encrypt the “Secret” folder. (See page 697.)Where will the encryption changes be applied by the default selection? Answer O:What does the EFS protect you against? (See pages 696-7.) Answer #P:Try to open the file “codes”. A) Were you successful? (See page 696-.)B) Why? Answer #Q:Right click on the Windows key and chose “Shut down or sign out”.Select “Shut down”. ................
................

In order to avoid copyright disputes, this page is only a partial summary.

Google Online Preview   Download