Download Testout Labs Exam Questions & Answers 85
Questions with 100% Verified Correct Answers Late and more Exams Information Technology in PDF only on Docsity! Testout Labs Exam Questions & Answers 85 Questions with 100% Verified Correct Answers Latest Updated 2024 121 Pages Top Ranked Guaranteed Success A+…. 2.2.6 Configure Microsoft Defender You recognize that the threat of malware is increasing. As such, you would like to use Windows Virus & Threat Protection to protect your computer from malware. In this lab, your task is to enable and configure Windows Virus & Threat Protection as follows: 1. Add a file exclusion for D:\Graphics\cat.jpg. 2. Add a process exclusion for welcome.scr. 3. Locate the current threat definition version number. 4. Answer Question 1. 5. Check for updates. 6. Answer Question 2. Perform a quick scan - Correct answer Complete this lab as follows: 1. Access the Virus & threat protection options. a. Right-click Start; then select Settings. b. Select Update & Security. c. From the left pane, select Windows Security. d. Select Virus & threat protection. 2. Add a file exclusion for D:\Graphics\cat.jpg. a. Under Virus & threat protection settings, select Manage settings. Testout Labs Exam Questions & Answers 85 Questions with 100% Verified Correct Answers Latest Updated 2024 121 Pages Top Ranked Guaranteed Success A+…. b. Scroll down to Exclusions and then select Add or remove exclusions. c. Select Add an exclusion; then select File. d. From the left pane, browse to and select Data (D:) > Graphics > cat.jpg, and then select Open. 3. Add a process exclusion for welcome.scr. a. From the Exclusions dialog, select Add an exclusion; then select Process. b. In the Enter process name field, type welcome.scr; then select Add. 4. Check for protection updates. a. In the top left, select the back arrow twice to return to the Virus & threat protection page. b. Scroll down to Virus & threat protection updates and then select Check for updates to access the Protection updates page. c. In the top right, select Answer Questions. d. Answer Question 1. e. Select Check for updates. f. Answer Question 2. 5. Perform a quick virus scan. a. In the top left of the Windows Security dialog, select the back arrow to return to the Virus & threat protection page. b. Select Quick scan. c. Wait for the scan to complete. Testout Labs Exam Questions & Answers 85 Questions with 100% Verified Correct Answers Latest Updated 2024 121 Pages Top Ranked Guaranteed Success A+…. message a real colleague would send. This file will likely infect the computer with malware.Sara GoodwinWow!!Malicious AttachmentDeleteEmails with attachments from unknown people who address you as "Dear Friend" are probably not safe.Grandma JacklinFree Airline TicketsHoaxDeleteAny email that asks you to forward it to everyone you know is probably a hoax, even if the contents promise you a prize. In addition, there is no way to know how many people the email has been forwarded to. Likewise, it is very unlikely that an airline would give away that many free tickets.Human ResourcesIMPORTANT NOTICE-Action RequiredSafeKeepWhile this email appears very urgent, it doesn't ask you to click on anything or run any attachments. It does inform you that you need to go a website that you should already know and make sure your courses are complete.Activities CommitteePumpkin ContestSafeKeepThis email doesn't ask you to click on anything or run any attachments.Robert WilliamsPresentationSafeKeepThis email doesn't ask you to click on anything or run any attachments. 3.1.3 Implement Physical Security Based on a review of physical security at your office, you have recommended several improvements. Your plan includes installing smart card readers, IP cameras, signs, and an access log book. In this lab, your task is to: Testout Labs Exam Questions & Answers 85 Questions with 100% Verified Correct Answers Latest Updated 2024 121 Pages Top Ranked Guaranteed Success A+…. Implement your physical security plan by dragging the correct items from the shelf onto the various locations in the building. As you drag the items from the shelf, the possible drop locations are highlighted. To implement your plan, you must: Install two IP security cameras in the appropriate location to record which employees access the key infrastructure. The security cameras should operate over the TCP/IP network. Install the smart card key readers in the appropriate location to control access to key infrastructure. The key card readers should be contactless and record more information than the card's ID. Install a Restricted Access sign on the networking closet door to control access to the infrastructure. Install the visitor log on the lobby desk. - Correct answer Complete this lab as follows: Install the IP security cameras:From the Shelf, expand CCTV Cameras.Drag the IP Security Camera from the shelf to the highlighted circle inside the networking closet.Drag the IP Security Camera from the shelf to the highlighted circle just outside the networking closet. Install the smart card key readers:From the Shelf, expand Door Locks.Drag a smart card reader from the shelf to the highlighted location outside the building's front door.Drag a smart card reader from the shelf to the highlighted location outside the networking closet's door. Testout Labs Exam Questions & Answers 85 Questions with 100% Verified Correct Answers Latest Updated 2024 121 Pages Top Ranked Guaranteed Success A+…. Install the Restricted Access sign:From the Shelf, expand Restricted Access Signs.Drag the Restricted Access sign from the shelf to the networking closet door. Install the visitor log:From the Shelf, expand Visitor Logs.Drag the visitor log from the shelf to the lobby desk. 4.2.5 Configure Automatic Updates You need to customize how Windows Update checks for and installs updates on the ITAdmin desktop system. In this lab, your task is to: Configure Windows Update to:Install updates for other Microsoft products when Windows is updated.Allow the installation of feature updates to be deferred 60 days.Allow quality updates to be deferred 30 days. Configure Windows to automatically download manufacturers' apps and custom icons for devices. - Correct answer Complete this lab as follows: Configure the Windows Update settings.Right-click Start and then select Settings.Select Update & Security.From the right pane, select Advanced options.Under Update Options, turn on Receive updates for other Microsoft products when you update Windows by sliding the switch to On.Under Choose when updates are installed, configure each option as follows:A feature update includes new capabilities and improvements. It can Testout Labs Exam Questions & Answers 85 Questions with 100% Verified Correct Answers Latest Updated 2024 121 Pages Top Ranked Guaranteed Success A+…. Disable permissions inheritance for E:\Marketing Data and E:\Research Data and convert the existing permissions to explicit permissions. For each of the above folders, remove the Users group from the access control list (ACL). Add the Marketing group to the Marketing Data folder ACL. Add the Research group to the Research Data folder ACL. Assign the groups Full Control to their respective folders. Do not change any other permissions assigned to other users or groups. - Correct answer Complete this lab as follows: Open the Data (E:) drive.From the Windows taskbar, select File Explorer.From the left pane, expand and select This PC > Data (E:). Disable inheritance and convert inherited permissions to explicit permissions.From the right pane, right-click the applicable folder and then select Properties.Select the Security tab.Select Advanced to modify inherited permissions.Select Disable inheritance to prevent inherited permissions.Select Convert inherited permissions into explicit permissions on this object. Remove the Users group from the access control list.In Permission entries, select Users.Select Remove to remove the group from the access control list.Select OK. Add a new group to the access control list and allow Full Control.Select Edit to add a group to the access control list.Select Add.Enter the name of the group you want to add and then select Check Names.Select OK.With the newly added group selected, under Testout Labs Exam Questions & Answers 85 Questions with 100% Verified Correct Answers Latest Updated 2024 121 Pages Top Ranked Guaranteed Success A+…. the Allow column, select Full control and then select OK.Select OK to close the properties dialog. Repeat steps 2 - 4 to modify the permissions for the additional folder. 4.3.6 Disable Inheritance Confidential personnel data is stored on the CorpFiles file server in a shared directory named Personnel. You need to configure NTFS permissions for this folder so that only managers are authorized to access it. In this lab, your task is to perform the following: Grant the Managers group the Full Control permission to the D:\Personnel folder. Remove all inherited permissions that are flowing to the D:\Personnel folder. - Correct answer Complete this lab as follows: Open the Data (E:) drive.From the Windows taskbar, select File Explorer.From the left pane, expand and select This PC > Data (D:). Configure NTFS permissions.From the right pane, right-click Personnel and select Properties.Select the Security tab.Select Edit.Select Add.Enter Managers as the group that will receive permission to the folder.Click OK.With the Managers group selected, select the appropriate Full control.Click OK. Prevent inherited permissions from parent.On the Security tab, select Advanced.Select Disable inheritance.Select Remove all inherited permissions from this object.Click OK to Testout Labs Exam Questions & Answers 85 Questions with 100% Verified Correct Answers Latest Updated 2024 121 Pages Top Ranked Guaranteed Success A+…. close the Advanced Security Settings for Personnel dialog.Click OK to close the Properties dialog. 5.1.7 Configure a Security Appliance You are an IT security administrator for a small corporate network. To increase security for the corporate network, you have installed the pfSense network security appliance in your network. Now you need to configure the device. In this lab, your task is to configure pfSense as follows: Sign in to pfSense using the following case-sensitive information:URL: 198.28.56.18Username: adminPassword: pfsense Configure the DNS servers as follows:Primary DNS server: 163.128.78.93 - Hostname: DNS1Secondary DNS server: 163.128.80.93 - Hostname: DNS2 Configure the WAN IPv4 information as follows:Enable the interface.Use a static IPv4 address of 65.86.24.136/8Add a new gateway using the following information:Type: Default gatewayName: WANGatewayIP address: 65.86.1.1 - Correct answer Complete this lab as follows: Access the pfSense management console.From the taskbar, select Google Chrome.Maximize the window for better viewing.In the address bar, type 198.28.56.18 and then press Enter.Sign in using the following case-sensitive information:Username: adminPassword: pfsenseSelect SIGN IN or press Enter. Testout Labs Exam Questions & Answers 85 Questions with 100% Verified Correct Answers Latest Updated 2024 121 Pages Top Ranked Guaranteed Success A+…. Anti-lockout to disable the webConfigurator anti-lockout rule.Scroll to the bottom and select Save. 5.1.10 Configure QoS You are the IT administrator for a small corporate network. Several employees have complained of slow internet bandwidth. You have discovered that the user stations on the guest Wi-Fi network are consuming much of your company's bandwidth. You have decided to use pfSense's Traffic Shaper wizard to create the various rules needed to better control the bandwidth usage and to fine-tune the priority for the type of traffic used on your guest Wi-Fi network. Your network has one LAN and one WAN. In this lab, your task is to: Access the pfSense management console:Username: adminPassword: P@ssw0rd (zero) Create a firewall alias using the following specifications:Name: HighBWDescription: High bandwidth usersAssign the IP addresses of the high-bandwidth users to the alias:Vera's IP address: 172.14.1.25Paul's IP address: 172.14.1.100 The Shaper must be configured for the GuestWi-Fi interface using:An upload bandwidth of 5 MbitsA download bandwidth of 45 Mbits Testout Labs Exam Questions & Answers 85 Questions with 100% Verified Correct Answers Latest Updated 2024 121 Pages Top Ranked Guaranteed Success A+…. Allow your voice over IP traffic to have priority with:An upload bandwidth of 15 MbitsA download bandwidth of 20 Mbits To limit the user stations most likely to hog bandwidth, use the alias created earlier to penalize the offending stations to 2% of the bandwidth. Give a higher priority to the following services and protocols:MSRDPVNCPPTPIPSEC Change the port number used on the floating rule created for MSRDP as follows:Interface: GuestWi-FiDestination Port Range: 3391 Answer the question. - Correct answer Complete this lab as follows: Sign into the pfSense management console.In the Username field, enter admin.In the Password field, enter P@ssw0rd (zero).Select SIGN IN or press Enter. Create a high bandwidth usage alias.From the pfSense menu bar, select Firewall > Aliases.Select Add.Configure the Properties as follows:Name: HighBWDescription: High bandwidth usersType: Host(s)Add the IP addresses of the offending computers to the host(s) configuration as follows:Under Host(s), in the IP or FQDN field, enter 172.14.1.25.Select Add Host.In the new IP or FQDN field, enter 172.14.1.100.Select Save.Select Apply Changes. Start the Traffic Shaper wizard for dedicated links.From the pfSense menu bar, select Firewall > Traffic Shaper.Under the Firewall bread crumb, select Wizards.Select traffic_shaper_wizard_dedicated.xml.Under Traffic shaper Wizard, in the Enter number of WAN type connections field, enter 1 and then select Next. Testout Labs Exam Questions & Answers 85 Questions with 100% Verified Correct Answers Latest Updated 2024 121 Pages Top Ranked Guaranteed Success A+…. Configure the Traffic Shaper.Make sure you are on Step 1 of 8.Using the drop-down menu for the upper Local interface, select GuestWi-Fi.Using the drop-down menu for lower Local interface, make sure PRIQ is selected.For the upper Upload field, enter 5.Using the drop-down menu for the lower Upload field, select Mbit/s.For the top Download field, enter 45.Using the drop-down menu for the lower Download field, select Mbit/s.Select Next. Prioritize voice over IP traffic.Make sure you are on Step 2 of 8.Under Voice over IP, select Enable to prioritize the voice over IP traffic.Under Connection #1 parameters, in the Upload rate field, enter 15.Using the drop-down menu for the top Units, select Mbit/s.For the Download rate, enter 20.Using the drop-down menu for the bottom Units, select Mbit/s.Select Next. Enable and configure a penalty box.Make sure you are on Step 3 of 8.Under Penalty Box, select Enable to enable the penalize IP or alias option.In the Address field, enter HighBW. This is the alias created earlier.For Bandwidth, enter 2.Select Next. Continue to step 6 of 8.For Step 4 of 8, scroll to the bottom and select Next.For Step 5 of 8, scroll to the bottom and select Next. Raise and lower the applicable application's priority.Make sure you are on Step 6 of 8.Under Raise or lower other Applications, select Enable to enable other networking protocols.Under Remote Service / Terminal emulation, use the:MSRDP drop-down menu to select Higher priority.VNC drop-down menu to select Higher priority.Under VPN:Use the PPTP drop-down menu to select Higher priorityUse the IPSEC drop-down Testout Labs Exam Questions & Answers 85 Questions with 100% Verified Correct Answers Latest Updated 2024 121 Pages Top Ranked Guaranteed Success A+…. the copy icon (two files) for the rule with a source of LAN net.For the Action field, make sure Pass is selected.Using the drop-down menu for the Interface field, select DMZ.Under Source, use the drop-down menu to select DMZ net.Under Destination, make sure it is configured for any.Under Extra Options, change the description to Allow DMZ to any rule.Scroll to the bottom and select Save.Select Apply Changes. Configure pfSense's DHCP server for the DMZ interface.From the menu bar, select Services > DHCP Server.Under the Services breadcrumb, select DMZ.Select Enable.Configure the Range field as follows:From: 172.16.1.100To: 172.16.1.200Scroll to the bottom and select Save. 5.3.5 Configure a Perimeter Firewall You work as the IT security administrator for a small corporate network. You recently placed a web server in the demilitarized zone (DMZ). You need to configure the perimeter firewall on the network security appliance (pfSense) to allow access to the web server from the LAN and from the WAN. You also want to allow all traffic from the LAN network to the DMZ network. In this lab, your task is to perform the following: Access the pfSense management console:Username: adminPassword: P@ssw0rd (zero) Testout Labs Exam Questions & Answers 85 Questions with 100% Verified Correct Answers Latest Updated 2024 121 Pages Top Ranked Guaranteed Success A+…. Add an HTTP firewall rule that allows traffic from the WAN to the web server in the DMZ. Add an HTTPS firewall rule that allows traffic from the WAN to the web server in the DMZ.Use the following table for the HTTP and HTTPS rules:ParameterSettingSourceWANSource and destination port/serviceHTTP (80), HTTPS (443)DestinationA single hostIP address for host172.16.1.5DescriptionsFor HTTP: HTTP to DMZ from WANFor HTTPS: HTTPS to DMZ from WAN Add a firewall rule that allows all traffic from the LAN network to the DMZ network. Use the description LAN to DMZ Any. - Correct answer Complete this lab as follows: Sign in to the pfSense management console.In the Username field, enter admin.In the Password field, enter P@ssw0rd (zero).Select SIGN IN or press Enter. Create and configure a firewall rule to pass HTTP traffic from the internet to the Web server.From the pfSense menu bar, select Firewall > Rules.Under the Firewall breadcrumb, select DMZ.Select Add (either one).Make sure Action is set to Pass.Under Source, use the drop-down to select WAN net.Select Display Advanced.For Source Port Range, use the From drop-down to select HTTP (80).Under Destination, use the Destination drop-down to select Single host or alias.In the Destination Address field, enter 172.16.1.5.Using the Destination Port Range drop-down, select HTTP (80).Under Extra Options, in the Description field, enter HTTP to DMZ from WAN.Select Save.Select Apply Changes. Testout Labs Exam Questions & Answers 85 Questions with 100% Verified Correct Answers Latest Updated 2024 121 Pages Top Ranked Guaranteed Success A+…. Create and configure a firewall rule to pass HTTPS traffic from the internet to the Web server.For the rule just created, select the Copy icon (two files).Under Source, select Display Advanced.Change the Source Port Range to HTTPS (443).Under Destination, change the Destination Port Range to HTTPS (443).Under Extra Options, change the Description filed to HTTPS to DMZ from WAN.Select Save.Select Apply Changes. Create and configure a firewall rule to pass all traffic from the LAN network to the DMZ network.Select Add (either one).Make sure Action is set to Pass.For Protocol, use the drop-down to select Any.Under Source, use the drop-down to select LAN net.Under Destination, use the drop-down to select DMZ net.Under Extra Options, change the Description filed to LAN to DMZ Any.Select Save.Select Apply Changes. 5.4.3 Configure NAT You are the IT administrator for a small corporate network. One of your assignments is to manage several computers in the demilitarized zone (DMZ). However, your computer resides on the LAN network. To be able to manage these machines remotely, you have decided to configure your pfSense device to allow several remote control protocols to pass through the pfSense device using NAT port forwarding. In this lab, your task is to create NAT forwarding rules to: Access the pfSense management console:Username: adminPassword: P@ssw0rd (zero) Testout Labs Exam Questions & Answers 85 Questions with 100% Verified Correct Answers Latest Updated 2024 121 Pages Top Ranked Guaranteed Success A+…. Configure the VPN server using the following settings:Interface: WANProtocol: UDP on IPv4 onlyDescription: CorpNet-VPNTunnel network IP: 198.28.20.0/24Local network IP: 198.28.56.18/24Concurrent Connections: 4DNS Server 1: 198.28.56.1 Configure the following:A firewall ruleAn OpenVPN rule Set the OpenVPN server just created to Remote Access (User Auth). Create and configure the following standard remote VPN users:UsernamePasswordFull NameblindleyL3tM31nNowBrian LindleyjphillipsL3tM31nTooJacob Phillips - Correct answer While completing this lab, use the following information: Create and configure the following standard remote VPN users:UsernamePasswordFull NameblindleyL3tM31nNowBrian LindleyjphillipsL3tM31nTooJacob Phillips Complete this lab as follows: Sign into the pfSense management console.In the Username field, enter admin.In the Password field, enter P@ssw0rd (zero).Select SIGN IN or press Enter. Start the VPN wizard and select the authentication backend type.From the pfSense menu bar, select VPN > OpenVPN.From the breadcrumb, select Wizards.Under Select an Authentication Backend Type, make sure Local User Access is selected.Select Next. Create a new certificate authority certificate.For Descriptive Name, enter CorpNet- CA.For Country Code, enter GB.For State, enter Cambridgeshire.For City, enter Woodwalton.For Organization, enter CorpNet.Select Add new CA. Testout Labs Exam Questions & Answers 85 Questions with 100% Verified Correct Answers Latest Updated 2024 121 Pages Top Ranked Guaranteed Success A+…. Create a new server certificate.For Descriptive Name, enter CorpNet.Verify that all of the previous changes (Country Code, State/Providence, and City) are the same.Use all other default settings.Select Create new Certificate. Configure the VPN server.Under General OpenVPN Server Information:Use the Interface drop-down menu to select WAN.Verify that the Protocol is set to UDP on IPv4 only.For Description, enter CorpNet-VPN.Under Tunnel Settings:For Tunnel Network, enter 198.28.20.0/24.For Local Network, enter 198.28.56.18/24.For Concurrent Connections, enter 4.Under Client Settings, in DNS Server1, enter 198.28.56.1.Select Next. Configure the firewall rules.Under Traffic from clients to server, select Firewall Rule.Under Traffic from clients through VPN, select OpenVPN rule.Select Next.Select Finish. Set the OpenVPN server just created to Remote Access (User Auth).For the WAN interface, select the Edit Server icon (pencil).For Server mode, use the drop-down and select Remote Access (User Auth).Scroll to the bottom and select Save. Configure the following Standard VPN users.From the pfSense menu bar, select System > User Manager.Select Add.Configure the User Properties as follows:Username: UsernamePassword: PasswordFull name: FullnameScroll to the bottom and select Save.Repeat steps 8b-8d to created the remaining VPN users. 5.5.5 Testout Labs Exam Questions & Answers 85 Questions with 100% Verified Correct Answers Latest Updated 2024 121 Pages Top Ranked Guaranteed Success A+…. Configure a VPN Connection iPad You work as the IT security administrator for a small corporate network. You recently set up the Remote Access VPN feature on your network security appliance to provide you and your fellow administrators with secure access to your network. You are currently at home and would like to connect your iPad to the VPN. Your iPad is connected to your home wireless network. In this lab, your task is to: Add an IPSec VPN connection using the following values:ParameterValueDescriptionCorpNetVPNServer198.28.56.34AccountmbrownSec retasdf1234$ Turn on the VPN. Verify that a connection is established. The password for mbrown is L3tM31nN0w (0 = zero). - Correct answer Complete this lab as follows: Verify your connection to the Home-Wireless network.Select Settings.Select Wi-Fi. Add and configure a VPN.From the left menu, select General.From the right menu, select VPN.Select Add VPN Configuration.Select IPSec.In the Description field, enter CorpNetVPN.In the Server field, enter 198.28.56.34.In the Account field, enter mbrown.In the Secret field, enter asdf1234$.In the upper right, select Save. Connect to the VPN just created.Under VPN Configuration, slide Not Connected to ON.When prompted, enter L3tM31nN0w (0 = zero) as the password.Select OK. Testout Labs Exam Questions & Answers 85 Questions with 100% Verified Correct Answers Latest Updated 2024 121 Pages Top Ranked Guaranteed Success A+…. Enable and configure DNS block lists.Under the Firewall breadcrumb, select DNSBL.Select Enable DNSBL.For DNSBL Virtual IP, enter 192.168.0.0.Scroll to the bottom and expand TLD Blacklist.Enter the following URLs in the TLD Blacklist box:financereports.cototalpad.comsalesscript.infoExpand TLD Whitelist and then enter the following URLs:.www.google.com.play.google.com.drive.google.comSelect Save. 5.9.6 Secure a Switch You are the IT security administrator for a small corporate network. You need to secure access to your switch, which is still configured with the default settings. Access the switch management console through Chrome on http://192.168.0.2 with the username cisco and password cisco. In this lab, your task is to: Create a new user account with the following settings:Username: ITSwitchAdminPassword: Admin$only1844User Level: Read/Write Management Access (15) Edit the default user account as follows:Username: ciscoPassword: CLI$only1958User Level: Read-Only CLI Access (1) Save the changes to the switch's startup configuration file. - Correct answer Complete this lab as follows: Testout Labs Exam Questions & Answers 85 Questions with 100% Verified Correct Answers Latest Updated 2024 121 Pages Top Ranked Guaranteed Success A+…. Log in to the CISCO switch.From the taskbar, select Google Chrome.In the URL field, enter 192.168.0.2 and press Enter.Maximize the window for easier viewing.In the Username and Password fields, enter cisco (case sensitive).Select Log In. Create a new user account.From Getting Started under Quick Access, select Change Device Password.Select Add.For the username, enter ITSwitchAdmin (case sensitive).For the password, enter Admin$only1844 (case sensitive).For Confirm Password, enter Admin$only1844.For User Level, make sure Read/Write Management Access (15) is selected.Select Apply.Select Close. Edit the default user account.Under User Account Table, select cisco (the default user) and then select Edit.For the password, enter CLI$only1958.For Confirm Password, enter CLI$only1958.For User Level, select Read-Only CLI Access (1).Select Apply. Save the changes to the switch's startup configuration file.From the top of the switch window, select Save.Under Source File Name, make sure Running configuration is selected.Under Destination File Name, make sure Startup configuration is selected.Select Apply.Select OK.Select Done. 5.11.6 Spoof MAC Addresses with SMAC As an IT administrator, you need to know how security breaches are caused. You know that SMAC is used for MAC spoofing, so you are going to spoof your MAC address. In this lab, your task is to complete the following: Testout Labs Exam Questions & Answers 85 Questions with 100% Verified Correct Answers Latest Updated 2024 121 Pages Top Ranked Guaranteed Success A+…. On Office2, use ipconfig /all and find the IP address and MAC address. Using SMAC, spoof the MAC address on ITAdmin to match that of Office2. Refresh the IP address on ITAdmin. Verify the MAC and IP address now match Office2. - Correct answer Complete this lab as follows: Find the MAC address for Office2.Right-click Start and then select Windows PowerShell (Admin).From the Command Prompt, type ipconfig /all and press Enter.Find the MAC address. Spoof the MAC address.From the top navigation tabs, select Floor 1 Overview.Under IT Administration, select ITAdmin.In the Windows search bar, type SMAC.Under Best match, right-click SMAC and select Run as administrator.In the New Spoofed Mac Address field, type 00:00:55:55:44:15 (the MAC address from Office2).Select Update MAC.Select OK to confirm the adapter restart. Renew the IP information for the ITAdmin computer.Right-click Start and select Windows PowerShell (Admin).From the Command Prompt, type ipconfig /renew to renew the IP address.Type ipconfig /all to confirm the MAC address and the IP address have been updated. 5.11.9 Harden a Switch Testout Labs Exam Questions & Answers 85 Questions with 100% Verified Correct Answers Latest Updated 2024 121 Pages Top Ranked Guaranteed Success A+…. Update the firmware image to the latest version by downloading the firmware files found in C:\Sx300_Firmware\Sx300_FW-1.2.7.76.ros. - Correct answer Complete this lab as follows: Create and configure an Access Profile named MgtAccess.From the left pane, expand and select Security > Mgmt Access Method > Access Profiles.Select Add.Enter the Access Profile Name of MgtAccess.Enter the Rule Priority of 1.For Action, select Deny.Select Apply and then select Close. Add a profile rule to the MgtAccess profile.From the left pane, under Security > Mgmt Access Method, select Profile Rules.Select the MgtAccess profile and then select Add.Enter a Rule Priority of 2.For Management Method, select HTTP.For Applies to Source IP Address, select User Defined.For IP Address, enter 192.168.0.10.Enter the 255.255.255.0.Select Apply and then select Close. Set the MgtAccess profile as the active access profile.From the left pane, under Security > Mgmt Access Method, select Access Profiles.Use the Active Access Profile drop-down list to select MgtAccess.Select Apply.Select OK. Save the changes to the switch's startup configuration file.At the top, select Save.For Source File Name, make sure Running configuration is selected.For Destination File Name, make sure Startup configuration is selected.Select Apply.Select OK. Upgrade the firmware image to the latest version.From the left pane, select Getting Started.Under Quick Access, select Upgrade Device Software.For File Name, select Choose File.Browse to and select C:\Sx300_Firmware\Sx300_FW-1.2.7.76.ros.Select Testout Labs Exam Questions & Answers 85 Questions with 100% Verified Correct Answers Latest Updated 2024 121 Pages Top Ranked Guaranteed Success A+…. Open.Select Apply.Select OK.From the left pane, under File Management, select Active Image.For Active Image After Reboot, use the drop-down menu to select Image 2.Select Apply.From the left pane under Administration, select Reboot.From the right pane, select Reboot.Select OK. 5.11.11 Secure Access to a Switch 2 You are the IT security administrator for a small corporate network. You need to increase the security on the switch in the Networking Closet by creating an access control list. You have been asked to prevent video game consoles from connecting to the switch. In this lab, your task is to: Create a MAC-based ACL named GameConsoles. Configure the GameConsoles MAC-based access control entry (ACE) settings as follows:PriorityActionDestinationMAC AddressSource MAC Address1DenyAnyValue: 00041F111111Mask: 0000001111112DenyAnyValue: 005042111111Mask: 0000001111113DenyAnyValue: 000D3A111111Mask: 0000001111114DenyAnyValue: 001315111111Mask: 0000001111115DenyAnyValue: 0009BF111111Mask: 0000001111116DenyAnyValue: 00125A111111Mask: 000000111111 Bind the GameConsoles ACL to all of the GE1-GE30 interfaces.Use Copy Settings to apply the binding to multiple interfaces Testout Labs Exam Questions & Answers 85 Questions with 100% Verified Correct Answers Latest Updated 2024 121 Pages Top Ranked Guaranteed Success A+…. Save the changes to the switch's startup configuration file. Use the default settings. - Correct answer While completing this lab, use the following information: Configure the GameConsoles MAC-based access control entry (ACE) settings as follows: PriorityActionDestinationMAC AddressSource MAC Address1DenyAnyValue: 00041F111111Mask: 0000001111112DenyAnyValue: 005042111111Mask: 0000001111113DenyAnyValue: 000D3A111111Mask: 0000001111114DenyAnyValue: 001315111111Mask: 0000001111115DenyAnyValue: 0009BF111111Mask: 0000001111116DenyAnyValue: 00125A111111Mask: 000000111111 Complete this lab as follows: Create the GameConsoles ACL.From the Getting Started page, under Quick Access, select Create MAC-Based ACL.Select Add.In the ACL Name field, enter GameConsolesClick Apply and then click Close. Create MAC-based access control.Select MAC-Based ACE Table.Select Add.Enter the priority.Select the action.For Destination MAC Address, make sure Any is selected.For Source MAC Address, select User Defined.Enter the source MAC address value.Enter the source MAC address mask.Click Apply.Repeat steps 2c-2i for additional ACE entries.Click Close. Bind the GameConsoles ACL to all of the interfaces.From the left pane, under Access Control, select ACL Binding (Port).Select GE1.At the bottom of the window, select Testout Labs Exam Questions & Answers 85 Questions with 100% Verified Correct Answers Latest Updated 2024 121 Pages Top Ranked Guaranteed Success A+…. press Enter.For Username, enter ITSwitchAdmin.For Password, enter Admin$only (password is case-sensitive).Select Log In. Create a VLAN.From the Getting Started pane, under Initial Setup, select Create VLAN.Select Add.For VLAN ID, enter 2.For VLAN Name, enter IPCameras.Select Apply.Select Close. Configure a VLAN.From the left pane, under VLAN Management, select Port to VLAN.From the the VLAN ID equals to drop-down menu, select 2.Select Go.For ports GE18, GE19, GE20, and GE21, select Untagged.Select Apply. Connect the IP camera in the lobby to the VLAN and mount the IP cameras.From the top navigation area, select Floor 1.Under Lobby, select Hardware.Under Shelf, expand CCTV Cameras.Drag the IP Camera (Lobby) to the workspace.Under Workspace for the IP camera, select Back to switch to the back view of the IP camera.Under Shelf, expand Cables and then select a Cat5e Cable, RJ45.Under Selected Component, drag a RJ45 Connector to the RJ-45 port on the IP Camera wall mount plate.From the wall plate's Partial Connections list, drag the other connector to the RJ-45 port on the back of the IP camera.Drag the IP camera to the IP camera wall plate. Connect the IP camera in the networking closet to the VLAN and mount the IP cameras.From the top navigation area, select Floor 1.Under Networking Closet, select Hardware.Under Shelf, expand CCTV Cameras.Drag the IP Camera (Networking Closet) to the workspace.Under Workspace for the IP camera, select Back to switch to the back view of the IP camera.Under Shelf, expand Cables and then select Cat5e Testout Labs Exam Questions & Answers 85 Questions with 100% Verified Correct Answers Latest Updated 2024 121 Pages Top Ranked Guaranteed Success A+…. Cable, RJ45.Under Selected Component, drag a RJ45 Connector to the RJ-45 port on the IP Camera mount wall plate.Under Selected Component, drag the unconnected RJ45 cable to the RJ-45 port on the back of the IP camera.To mount the IP camera, drag the IP camera to the IP camera wall plate. Connect the DHCP server and laptop to the VLAN.In the networking closet, under Shelf, select a Cat5e Cable, RJ45.Under Selected Component, drag a RJ45 Connector to port 21 on the switch.Under Selected Component, drag the unconnected RJ45 Connector to port 21 on the patch panel. Connect the laptop to the VLAN.From the top menu, select Floor 1.Under IT Administration, select Hardware.Above the laptop, select Back to switch to the back view of the laptop.Under Shelf, select Cat5e Cable, RJ45.Under Selected Component, drag a RJ45 Connector to the RJ-45 port on the laptop.Under Selected Component, drag the unconnected RJ45 Connector to the open RJ-45 port on the wall plate.To verify that all components are connected, you can change location to the network closet hardware view. You should see green link/activity lights on ports 18 - 21 of the switch. You should also see amber Power Over Ethernet (POE) lights on ports 19 and 20, which are connected to the IP cameras. Launch the IP camera monitoring software.Under the laptop's workspace, select Front.On the IT-Laptop2, select Click to view Windows 10.From the taskbar, select Start.Select IP Cameras.Verify that both cameras are detected on the network. Testout Labs Exam Questions & Answers 85 Questions with 100% Verified Correct Answers Latest Updated 2024 121 Pages Top Ranked Guaranteed Success A+…. 5.13.5 Restrict Telnet and SSH Access You are in the process of configuring a new router. The router interfaces connect to the following networks: InterfaceNetworkFastEthernet0/0192.168.1.0/24FastEthernet0/1192.168.2.0/24FastEth ernet0/1/0192.168.3.0/24 Only Telnet and SSH access from these three networks should be allowed. In this lab, your task is to: Use the access-list command to create a standard numbered access list using number 5. Add a permit statement for each network to the access list. Use the access-class command to apply the access list to VTY lines 0-4. Use the in direction to filter incoming traffic. Save your changes in the startup-config file. - Correct answer Complete this lab as follows: Enter the configuration mode for the router:From the exhibit, select the router.From the terminal, press Enter.Type enable and then press Enter.Type config term and then press Enter. From the terminal, create a standard numbered access list using number 5. Add a permit statement for each network to the access list.Type access-list 5 permit 192.168.1.0 0.0.0.255 and then press Enter.Type access-list 5 permit 192.168.2.0 Testout Labs Exam Questions & Answers 85 Questions with 100% Verified Correct Answers Latest Updated 2024 121 Pages Top Ranked Guaranteed Success A+…. Enter the configuration mode for the router:From the exhibit, select the router.From the terminal, press Enter.Type enable and then press Enter.Type config term and then press Enter. From the terminal, create a standard numbered access list using number 25. Add statements to the access list to block traffic to the required hosts.Type access-list 25 deny host 199.68.111.199 and press Enter.Type access-list 25 deny host 202.177.9.1 and press Enter.Type access-list 25 deny host 211.55.67.11 and press Enter. From the terminal, add a statement to allow all other traffic from all other hosts, by typing access-list 25 permit any and pressing Enter. From the terminal, apply Access List 25 to the Serial0/0/0 interface to filter incoming traffic.Type int s0/0/0 and press Enter.Type ip access-group 25 in and press Enter.Type Ctrl + Z. 6.5.5 Create OUs You are the IT administrator for a small corporate network. You have just installed Active Directory on a new Hyper-V guest server named CorpDC. Now you need to create an Active Directory organizational unit (OU) structure based on the company's departmental structure. In this lab, your task is to create the following organizational units (OUs) on the CorpDC server and ensure that each is protected from accidental deletion as follows: Testout Labs Exam Questions & Answers 85 Questions with 100% Verified Correct Answers Latest Updated 2024 121 Pages Top Ranked Guaranteed Success A+…. Beneath the CorpNet.local domain, create the following OUs:AccountingAdminsMarketingResearch-DevServersSupportWorkstationsSales Within the Sales OU, create the following OUs:SalesManagersTempSales - Correct answer While completing this lab, use the following information: Beneath the CorpNet.local domain, create the following OUs:AccountingAdminsMarketingResearch-DevServersSupportWorkstationsSales Beneath the Sales OU, create the following OUs:SalesManagersTempSales Complete this lab as follows: Access the CorpDC server.From the left pane of Hyper-V Manager, select CORPSERVER.From the Virtual Machines pane, double-click CorpDC. Create the Active Directory organizational units (OUs) beneath the CorpNet.local domain.From Server Manager's menu bar, select Tools > Active Directory Users and Computers.From the left pane, right-click CorpNet.local and then select New > Organizational Unit.You can also create OUs by selecting the Create a new organizational unit in the current container icon () located in the Active Directory Users and Computers ribbon.Enter the name of the OU to be created.Ensure that Protect container from accidental deletion is selected and then select OK.Repeat steps 2b - 2d until all the required domain OUs are created. Create the OUs within the Sales OU.From the left pane, select CorpNet.local > Sales.From the menu bar, select the Create a new organizational unit in the current container icon.Enter the name of the OU to be created.Ensure that Protect container Testout Labs Exam Questions & Answers 85 Questions with 100% Verified Correct Answers Latest Updated 2024 121 Pages Top Ranked Guaranteed Success A+…. from accidental deletion is selected and then select OK.Repeat steps 3a - 3d to create the remaining OU. 6.5.6 Delete OUs You are the IT administrator for a corporate network. You have just installed Active Directory on a new Hyper-V guest server named CorpDC. You have created an Active Directory structure based on the company's departmental structure. While creating the structure, you added a Workstations OU in each of the departmental OUs. After further thought, you decide to use one Workstations OU for the entire company. As a result, you need to delete the departmental Workstations OUs. In this lab, your task is to delete the following OUs on CorpDC: Within the Marketing OU, delete the Workstations OU. Within the Research-Dev OU, delete the Workstations OU. Within the Sales OU, delete the Workstations OU. - Correct answer To complete this lab, you need to delete the following OUs on CorpDC: Within the Marketing OU, delete the Workstations OU. Within the Research-Dev OU, delete the Workstations OU. Within the Sales OU, delete the Workstations OU. Complete this lab as follows: Testout Labs Exam Questions & Answers 85 Questions with 100% Verified Correct Answers Latest Updated 2024 121 Pages Top Ranked Guaranteed Success A+…. Windows Settings.Right-click Security Settings and select Import Policy.Browse to the C:\Templates.Select ws_sec.inf and then click Open. 6.5.11 Create User Accounts You are the IT administrator for a small corporate network. You recently added an Active Directory domain to the CorpDC server to manage network resources centrally. You now need to add user accounts in the domain. In this lab, your task is to create the following user accounts on CorpDC: UserJob RoleDepartmental OUJuan SuarezMarketing managerMarketing\MarketingManagersSusan SmithPermanent sales employeeSales\PermSalesMark BurnesSales managerSales\SalesManagersBorey ChanTemporary sales employeeSales\TempSales Use the following user account naming standards and specifications as you create each account: Create the user account in the departmental OU corresponding to the employee's job role. User account name: First name + Last name Logon name: firstinitial + lastname with @CorpNet.local as the domain Original password: asdf1234$ (must change after the first logon) Testout Labs Exam Questions & Answers 85 Questions with 100% Verified Correct Answers Latest Updated 2024 121 Pages Top Ranked Guaranteed Success A+…. Configure the following for the temporary sales employee:Limit the logon hours to allow logon only from 8:00 a.m. to 5:00 p.m., Monday through Friday.Set the user account to expire on December 31st of the current yea - Correct answer Use the following user account specifications as you create each account. UserJob RoleDepartmental OUJuan SuarezMarketing managerMarketing\MarketingManagersSusan SmithPermanent sales employeeSales\PermSalesMark BurnesSales managerSales\SalesManagersBorey ChanTemporary sales employeeSales\TempSales Complete this lab as follows: Access Active Directory Users and Computers on the CorpDC server.From Hyper-V Manager, select CORPSERVER.From the Virtual Machines pane, double-click CorpDC.From Server Manager's menu bar, select Tools > Active Directory Users and Computers.Maximize the window for better viewing. Create the domain user accounts.From the left pane, expand CorpNet.local.Browse to the appropriate OU.Right-click the OU and select New > User.In the First name field, enter the user's first name.In the Last name field, enter the user's last name.In the User logon name field, enter the user's logon name which should be the first letter of the user's first name together with their last name. (e.g. jsuarez)The domain, @CorpNet.local, is appended automatically to the end of the logon name.Click Next.Select Next.In the Password field, enter asdf1234$.In the Confirm password field, enter asdf1234$.Make sure User must change password at next logon is selected and Testout Labs Exam Questions & Answers 85 Questions with 100% Verified Correct Answers Latest Updated 2024 121 Pages Top Ranked Guaranteed Success A+…. then click Next.Select Finish to create the object.Repeat steps 3e-3m to create the additional users. Modify user account restrictions for the temporary sales employee.Right-click Borey Chan and select Properties.Select the Account tab.Select Logon hours.From the Logon Hours dialog, select Logon Denied to clear the allowed logon hours.Select the time range of 8:00 a.m. to 5:00 p.m., Monday through Friday.Select Logon Permitted to allow logon.Select OK.Under Account expires, select End of.In the End of field, use the drop- down calendar to select 31 December of the current year.Select OK. 6.5.12 Manage User Accounts You are the IT administrator for a small corporate network. You recently added an Active Directory domain on the CorpDC server to manage network resources centrally. Organizational units in the domain represent departments. User and computer accounts are in their respective departmental OUs. Over the past few days, several personnel changes have occurred that require changes to user accounts. In this lab, your task is to use the following information to make the necessary user account changes on CorpDC: Testout Labs Exam Questions & Answers 85 Questions with 100% Verified Correct Answers Latest Updated 2024 121 Pages Top Ranked Guaranteed Success A+…. You are the IT administrator for the CorpNet domain. You have decided to use groups to simplify the administration of access control lists. Specifically, you want to create a group containing the department managers. In this lab, your task is to use Active Directory Users and Computers to complete the following actions on the CorpDC server: In the Users container, create a group named Managers. Configure the group as follows:Group scope: GlobalGroup type: Security Make the following users members of the Managers group: Organization UnitUsernameAccountingMark WoodsResearch-DevPat BentonMarketing\MarketingManagersJuan SuarezResearch- Dev\ResearchManagersArlene KimblySales\SalesManagersMark BurnesSupport\SupportManagersShelly Emery - Correct answer Complete this lab as follows: Access Active Directory Users and Computers on the CorpDC server.From Hyper-V Manager, select CORPSERVER.From the Virtual Machines pane, double-click CorpDC.From Server Manager's menu bar, select Tools > Active Directory Users and Computers.Maximize the window for better viewing. In the Users container, create a group named Managers.From the left pane, expand and select CorpNet.local > Users.Right-click the Users container and select New > Group.You can also create a new group by selecting the Create a new group in the current container icon found in the ribbon.In the Group name field, enter Managers.A Testout Labs Exam Questions & Answers 85 Questions with 100% Verified Correct Answers Latest Updated 2024 121 Pages Top Ranked Guaranteed Success A+…. pre-Windows 2000 group name is created automatically, but it can be changed.Under Group scope, make sure Global is selected.Under Group type, make sure Security is selected and select OK. Add user accounts to the Managers group.From the left pane, ensure that the Users container is still selected.From the right pane, right-click Managers and select Properties.Select the Members tab.Select Add.In the Enter the object names to select field, enter all the usernames. Use a semicolon to separate each name.Example: Steve Hoffer; Peter Williams; Princess DianaSelect Check Names.Select OK to add the users and close the dialog.Select OK to close the Managers Properties dialog.You can also add individ 6.5.14 Create Global Groups You are the IT Administrator for the CorpNet.local domain. You are in the process of implementing a group strategy for your network. You have decided to create global groups as shadow groups for specific departments in your organization. Each global group will contain all users in the corresponding department. In this lab, your task is to: Create the following global security groups on the CorpDC server in their corresponding OUs:OU CreationLocationNew Group NameAccountingAccountingResearch- DevResearch-DevSalesSales Testout Labs Exam Questions & Answers 85 Questions with 100% Verified Correct Answers Latest Updated 2024 121 Pages Top Ranked Guaranteed Success A+…. Add all user accounts in the corresponding OUs and sub-OUs as members of the newly created groups. - Correct answer While completing this lab, use the following information: OU CreationLocationNew Group NameAccountingAccountingResearch-DevResearch- DevSalesSales Complete this lab as follows: Access Active Directory Users and Computers on the CorpDC server.From Hyper-V Manager, select CORPSERVER.From the Virtual Machines pane, double-click CorpDC.From Server Manager's menu bar, select Tools > Active Directory Users and Computers.Maximize the window for better viewing.From the left pane, expand CorpNet.local. Create the groups.Right-click the OU where the new group is to be added and select New > Group.In the Group name field, enter the name of the group.Make sure the Global Group scope is selected.Make sure the Security Group type is selected.Click OK. Add users to groups.In the right pane, right-click the user account(s) and select Add to a group. (Use the Ctrl or Shift keys to select and add multiple user accounts to a group at one time.)In the Enter the object names to select field, enter the name of the group.Select Check Names and verify that the object name was found.Click OK to accept the groups added.Click OK to acknowledge the change.If a sub-OU with users exist, double-click on the sub-OU and then repeat step 3. Do this for each sub-group. Testout Labs Exam Questions & Answers 85 Questions with 100% Verified Correct Answers Latest Updated 2024 121 Pages Top Ranked Guaranteed Success A+…. You are the IT security administrator for a small corporate network. You are working to increase the authentication security of the domain. You need to make sure that only authorized users have administrative rights to all local machines. Local users and groups can be controlled through a GPO linked to the domain. In this lab, your task is to edit the Default Domain Policy and configure the Local Users and Groups policy settings as follows: Create a policy to update the built-in Administrator local group. Delete all member users. Delete all member groups. Add BUILTIN\Administrator to the group. Add %DOMAINNAME%\Domain Admins to the group - Correct answer Complete this lab as follows: Access the CorpNet.local domain under Group Policy Management.From Server Manager, select Tools > Group Policy Management.Maximize the windows for better viewing.Expand Forest: CorpNet.local > Domains > CorpNet.local. Create a policy to update the built-in Administrator local group.Right-click Default Domain Policy and select Edit.Maximize the windows for better viewing.Under Computer Configuration, expand Preferences > Control Panel Settings.Right-click Local Users and Groups and select New > Local Group.Using the Group name drop-down, select Administrators (built-in).Select Delete all member users to remove all member users.Select Delete all member groups to remove all member groups.Select Add.In the Testout Labs Exam Questions & Answers 85 Questions with 100% Verified Correct Answers Latest Updated 2024 121 Pages Top Ranked Guaranteed Success A+…. Name field, enter BUILTIN\Administrator and then select OK.Select Add.In the Name field, enter %DOMAINNAME%\Domain Admins and then select OK.Select OK to save the policy. 6.6.7 Secure Default Accounts You work as the IT security administrator for a small corporate network. You are improving office computers' security by renaming and disabling default computer accounts. In this lab, your task is to perform the following on the Office1 computer: Rename the Administrator account Yoda. Disable the Guest account. Verify that Password never expires is not selected for any local users. This forces them to change their passwords regularly. Delete any user accounts with User must change password at next logon selected. This indicates that a user has never logged in. Start Lab - Correct answer Complete this lab as follows: Access the computer's Computer Management tool.Right-click Start and select Computer Management.Under System Tools, expand Local Users and Groups.Select Users. Testout Labs Exam Questions & Answers 85 Questions with 100% Verified Correct Answers Latest Updated 2024 121 Pages Top Ranked Guaranteed Success A+…. Rename the Administrator account.From the center pane, right-click Administrator and select Rename.Enter Yoda and press Enter. Disable the Guest account.Right-click Guest and select Properties.Select Account is disabled and click OK. Remove Password never expires option if it is selected.Right-click a user and select Properties.Deselect Password never expires (if selected) and then select OK.Repeat step 4 for each user. Delete any unused accounts.Right-click the user that has User must change password at next logon selected and select Delete.Click Yes to confirm deletion of the account. 6.6.8 Enforce User Account Control You are the IT administrator for a small corporate network. The company has a single Active Directory domain named CorpNet.xyz. You need to increase the domain's authentication security. You need to make sure that User Account Control (UAC) settings are consistent throughout the domain and in accordance with industry recommendations. In this lab, your task is to configure the following UAC settings in the Default Domain Policy on CorpDC as follows: User Account ControlSettingAdmin Approval mode for the built-in Administrator accountEnabledAllow UIAccess applications to prompt for elevation without using the Testout Labs Exam Questions & Answers 85 Questions with 100% Verified Correct Answers Latest Updated 2024 121 Pages Top Ranked Guaranteed Success A+…. In this lab, your task is to perform the following on CorpDC: Enforce the existing Research-DevGPO linked to the Research-Dev OU. Edit the Research-DevGPO and configure the following local security setting policies located in the Computer Configuration section:PolicySettingInteractive logon: Require smart cardEnableInteractive logon: Smart card removal behaviorForce logoff - Correct answer While completing this lab, use the following information to configure the following Security Options policies: PolicySettingInteractive logon: Require smart cardEnableInteractive logon: Smart card removal behaviorForce logoff Complete this lab as follows: Access the CorpDC server.In Hyper-V Manager, select CORPSERVER.Double-click CorpDC. Enforce the existing Research-DevGPO.From Server Manager, select Tools > Group Policy Management.Maximize the window for better viewing.From the left pane, expand Forest: CorpNet.local > Domains > CorpNet.local > Group Policy Objects.From the left pane, select the Research-DevGPO.From the Scope tab under Links, right-click Research-Dev and then select Enforced. Edit Research-DevGPO polices.From the left pane, right-click Research-DevGPO and then select Edit.Maximize the window for better viewing.Under Computer Configuration, expand Policies > Windows Settings > Security Settings > Local Policies.Select Security Options.From the right pane, double-click the policy and select Properties.Select Define Testout Labs Exam Questions & Answers 85 Questions with 100% Verified Correct Answers Latest Updated 2024 121 Pages Top Ranked Guaranteed Success A+…. this policy setting.Select additional parameters to configure the policy setting.Select OK.Repeat steps 3e-3h to configure the additional policy setting. 6.7.4 Create a User Account The VP of marketing has told you that Paul Denunzio will join the company as a market analyst in two weeks. You need to create a new user account for him. In this lab, your task is to: Create the pdenunzio user account. Include the full name, Paul Denunzio, as a comment for the user account. Set eye8cereal as the password for the user account. When you're finished, view the /etc/passwd file to verify the creation of the account. Answer the question. - Correct answer Complete this lab as follows: Create the Paul Denunzio account and comment.From the Linux prompt, type useradd - c "Paul Denunzio" pdenunzio and press Enter. Create a password for Paul.Type passwd pdenunzio and press Enter.Type eye8cereal as the password and press Enter.Retype eye8cereal as the password and press Enter. Verify that the account was created.Type cat /etc/passwd and press Enter. Answer the question.In the top right, select Answer Questions.Select the correct answer.Select Score Lab. Testout Labs Exam Questions & Answers 85 Questions with 100% Verified Correct Answers Latest Updated 2024 121 Pages Top Ranked Guaranteed Success A+…. 6.7.5 Rename a User Account Brenda Cassini (bcassini) was recently married. You need to update her Linux user account to reflect her new last name of Palmer. In this lab, your task is to use the usermod command to: Rename Brenda's user account bpalmer. Change Brenda's comment field to read Brenda Palmer. Change and move Brenda's home directory to /home/bpalmer. When you're finished, view the /etc/passwd file and /home directory to verify the modification. - Correct answer Complete this lab as follows: Rename the bpalmer account and move her home directory.From the Linux prompt, type usermod -l bpalmer bcassini -m -c "Brenda Palmer" -d /home/bpalmer and press Enter. Verify account modification.Type cat /etc/passwd and press Enter.Type ls /home and press Enter to verify that the account was modified. 6.7.6 Delete a User Terry Haslam (thaslam) was dismissed from the organization. His colleagues have harvested the files they need from his home and other directories. Your company Testout Labs Exam Questions & Answers 85 Questions with 100% Verified Correct Answers Latest Updated 2024 121 Pages Top Ranked Guaranteed Success A+…. Every seven years, your company provides a six-week sabbatical for every employee. Vera Edwards (vedwards), Corey Flynn (cflynn), and Bhumika Kahn (bkahn) are leaving today. Maggie Brown (mbrown), Brenda Cassini (bcassini), and Arturo Espinoza (aespinoza) are just returning. The company security policy mandates that user accounts for employees gone for longer than two weeks be disabled. In this lab, your task is to: Lock the following user accounts:vedwardscflynnbkahn Unlock the following user accounts:mbrownbcassiniaespinoza When you're finished, view the /etc/shadow file to verify the changes. - Correct answer Complete this lab as follows: Lock the applicable accounts.At the prompt, type usermod -L vedwards or passwd -l vedwards and press Enter.Type usermod -L cflynn or passwd -l cflynn and press Enter.Type usermod -L bkahn or passwd -l bkahn and press Enter. Unlock the applicable accounts.Type usermod -U mbrown or passwd -u mbrown and press Enter.Type usermod -U bcassini or passwd -u bcassini and press Enter.Type usermod -U aespinoza or passwd -u aespinoza and press Enter. Verify your changes by typing cat /etc/shadow and pressing Enter.The inclusion of the exclamation point (!) in the password field indicates whether the account is disabled. 6.8.3 Testout Labs Exam Questions & Answers 85 Questions with 100% Verified Correct Answers Latest Updated 2024 121 Pages Top Ranked Guaranteed Success A+…. Rename and Create Groups Currently, all the salespeople in your company belong to a group called sales. The VP of sales wants two sales groups, a western sales division and an eastern sales division. In this lab, your task is to: Rename the sales group to western_sales_division. Create the eastern_sales_division group. Remove aespinoza as a member of the western_sales_division group. Assign aespinoza as a member of the eastern_sales_division group. When you're finished, view the /etc/group file or use the groups command to verify the changes. - Correct answer Complete this lab as follows: Rename the sales group western_sales_division and create the eastern_sales_division group.At the prompt, type groupmod -n western_sales_division sales and press Enter.Type groupadd eastern_sales_division and press Enter. Modify the group membership as needed.Type usermod -G eastern_sales_division aespinoza and press Enter.When you assign aespinoza to the eastern_sales_division group using the usermod -G option, the user account is removed from the western_sales_division group. Use cat /etc/group or groups aespinoza to verify aespinoza's group membership. 6.8.4 Add Users to a Group Testout Labs Exam Questions & Answers 85 Questions with 100% Verified Correct Answers Latest Updated 2024 121 Pages Top Ranked Guaranteed Success A+…. Maggie Brown (mbrown) and Corey Flynn (cflynn) have recently been hired in the human resources department. You have already created their user accounts. In this lab, your task is to: Add the hr group as a secondary group for the mbrown and cflynn user accounts. When you're finished, view the /etc/group file or use the groups command to verify the changes. - Correct answer Complete this lab as follows: Add users to the hr group.At the prompt, type usermod -G hr mbrown and press Enter.Use usermod -G hr cflynn and press Enter. Verify the group membership for the users added to each group.Use groups mbrown and press Enter.Use groups cflynn and press Enter. 6.8.5 Remove a User from a Group Corey Flynn (cflynn) currently belongs to several groups. Due to some recent restructuring, he no longer needs to be a member of the hr group. To preserve existing group membership, use the usermod -G command to list all groups to which the user must belong. Do not include the primary group name in the list of groups. In this lab, your task is to: Remove cflynn from the hr group. Preserve all other group memberships. Testout Labs Exam Questions & Answers 85 Questions with 100% Verified Correct Answers Latest Updated 2024 121 Pages Top Ranked Guaranteed Success A+…. Encrypt the user data into the file to be shared. Name the file send.png and save it in the Documents folder. Password-protect the file with NoMor3L3@ks! as the password. Confirm the functionality of the steganography by extracting the data and opening the file to confirm that the associated username has been embedded into the file. - Correct answer Complete this lab as follows: Encrypt the user data into the file to be shared.In the search field on the taskbar, type OpenStego.Under Best match, select OpenStego. Select the Message, Cover, and Output Stego files.For Message File, select the ellipses [...] button at the end of the field.Double-click John.txt to select the file.For Cover File, select the ellipses [...] button at the end of the field.Double-click gear.png to select the file.For Output Stego File, select the ellipses [...] button at the end of the field.In the File name field, enter send.png and then select Open. Password protect the file.In the Password field, enter NoMor3L3@ks!In the Confirm Password field, enter NoMor3L3@ks!Select Hide Data.Select OK. Extract the data and open the file.Under Data Hiding, select Extract Data.For the Input Stego File field, select the ellipses [...] button.Double-click send.png to select the file with the encryption.For the Output Folder for Message File, select the ellipses [...] button.Double-click Export to set it as the destination of the file output.Click Select Folder.In the Password field, enter NoMor3L3@ks! as the password.Select Extract Data.Select OK. Testout Labs Exam Questions & Answers 85 Questions with 100% Verified Correct Answers Latest Updated 2024 121 Pages Top Ranked Guaranteed Success A+…. Verify that the decryption process was successful.From the taskbar, select File Explorer.Double-click Documents to navigate to the folder.Double-click Export to navigate to the folder.Double-click John.txt. 7.3.5 Compare an MD5 Hash You are the IT administrator at a small corporate office. You just downloaded a new release for a program you use. You need to make sure the file was not altered before you received it. Another file containing the original file hash was also downloaded. Both files are located in the C:\Downloads folder. In this lab, your task is to use MD5 hash files to confirm that the Release.zip file was unaltered. From Windows PowerShell: Generate a file hash for the new Release.zip file. View the hash of the original file stored in the release821hash.txt file. Use the following command to compare the original hash of the Release.zip file to its calculated hash to see if they match:"new hash" -eq "known hash"You can highlight text in PowerShell and right-click it to copy the text to the active line. If using Chromebooks, highlight the desired hash amount and then click on the touchpad using 2 fingers to copy and paste the value. Answer the question. - Correct answer Complete this lab as follows: Testout Labs Exam Questions & Answers 85 Questions with 100% Verified Correct Answers Latest Updated 2024 121 Pages Top Ranked Guaranteed Success A+…. View the files in the C:\Downloads folder.Right-click Start and select Windows PowerShell (Admin).At the prompt, type cd C:\downloads and press Enter to navigate to the directory that contains the files.Type dir and press Enter to view the available files. Confirm that the Release.zip file is unaltered.Type get-filehash Release.zip -a md5 and press Enter to view the MD5 hash.Type get-content release821hash.txt and press Enter to view the known hash contained in the .txt file.Type "new hash" -eq "known hash" and press Enter to determine whether the file hashes match.The new hash is the hash generated by the get-filehash file_name -a md5 command.The known hash is the hash generated by the get-content file_name.txt command.Include the quotation marks and the file extensions with the file names in the commands. Answer the question.In the top right, select Answer Questions.Answer the question.Select Score Lab. 7.4.3 Encrypt Files with EFS At work, you share a computer with other users. You want to secure the contents of the Finances folder so that unauthorized users cannot view its contents. In this lab, your task is to: Encrypt the D:\Finances folder and all of its contents. Add the Susan user account as an authorized user for the D:\Finances\2020report.xls file. - Correct answer Complete this lab as follows: Testout Labs Exam Questions & Answers 85 Questions with 100% Verified Correct Answers Latest Updated 2024 121 Pages Top Ranked Guaranteed Success A+…. Configure BitLocker encryption.Select Encrypt entire drive and then select Next.Make sure that New encryption mode is selected and then select Next.Select Run BitLocker system check and then select Continue.Select Restart now.The computer will reboot, and the encryption process will run automatically.When the encryption process is complete, select Close. Verify that encryption is enabled.From the Windows taskbar, select File Explorer.From the left pane, select This PC.From the right pane, verify that the System (C:) drive shows the encryption lock icon. 7.5.6 Manage Certificates You are the IT administrator for a growing corporate network. You manage the certification authority for your network. As part of your daily routine, you perform several certificate management tasks. CorpCA, the certification authority, is a guest server on CorpServer2. In this lab, your task is to complete the following: Your network uses smart cards to control access to sensitive computers. Currently, the approval process dictates that you manually approve smart card certificate requests.Approve pending certificate requests for smart card certificates from tsutton and mmallory. Deny the pending web server certificate request for CorpSrv12. Testout Labs Exam Questions & Answers 85 Questions with 100% Verified Correct Answers Latest Updated 2024 121 Pages Top Ranked Guaranteed Success A+…. User bchan lost his smartcard. Revoke the certificate assigned to bchan.CorpNet.com using the Key Compromise reason code. Unrevoke the CorpDev3 certificate. - Correct answer Complete this lab as follows: Access Certification Authority on the CORPSERVER2 server.From Hyper-V Manager, select CORPSERVER2.Maximize the window for easier viewing.From the Virtual Machines pane, double-click CorpCA.From Server Manager's menu bar, select Tools > Certification Authority.Maximize the window for easier viewing.From the left pane, expand CorpCA-CA. Approve the pending certificate request for tsutton and mmallory.Select Pending Requests.From the right pane, scroll to the Request Common Name column.Right-click tsutton and select All Tasks > Issue to approve the certificate.Right-click mmallory and select All Tasks > Issue. Deny the pending request for CorpSrv12.Right-click CorpSrv12.CorpNet.com and select All Tasks > Deny.Select Yes. Revoke bchan's certificates.From the left pane, select Issued Certificates.From the right pane, right-click bchan.CorpNet.com and select All Tasks > Revoke Certificate.Using the Reason code drop-down menu list, select Key Compromise.Select Yes. Unrevoke the CorpDev3 certificate.From the left pane, select Revoked Certificates.From the right pane, right-click CorpDev3.CorpNet.com and select All Tasks > Unrevoke Certificate. Testout Labs Exam Questions & Answers 85 Questions with 100% Verified Correct Answers Latest Updated 2024 121 Pages Top Ranked Guaranteed Success A+…. 8.1.5 Configure a Wireless Network You are a network technician for a small corporate network. You just installed a Ruckus zone controller and wireless access points throughout your office buildings using wired connections. You now need to configure basic wireless network settings. Access the Wireless Controller console through Chrome on http://192.168.0.6 with the username admin and the password password. The username and password are case sensitive. In this lab, your task is to: Create a WLAN using the following settings:Name: CorpNet WirelessESSID: CorpNetType: Standard UsageAuthentication: OpenEncryption: WPA2Encryption algorithm: AESPassphrase: @CorpNetWeRSecure! Connect the Exec-Laptop in the Executive office to the new wireless network. - Correct answer Complete this lab as follows: Access the Ruckus zone controller.From the taskbar, open Chrome.In the URL field, enter 192.168.0.6 and press Enter.Maximize the window for easier viewing. Log into the Wireless Controller console.In the Admin field, enter admin (case sensitive).In the Password field, enter password as the password.Select Login. Create a new WLAN.Select the Configure tab.From the left menu, select WLANs.Under WLANs, select Create New.In the New Name field, enter the CorpNet Wireless.In the ESSID field, enter the CorpNet.Under Type, make sure Standard Usage is Testout Labs Exam Questions & Answers 85 Questions with 100% Verified Correct Answers Latest Updated 2024 121 Pages Top Ranked Guaranteed Success A+…. Configure load balancing.Select Run load balancing on 2.4GHz radio.In the Adjacent radio threshold(dB) field, enter 40.Select Run load balancing on 5GHz radio.In the Adjacent radio threshold(dB) field, enter 40.On the right, select Apply. Configure band balancing.Select Percent of clients on 2.4GHz radio.Enter the 30.On the right, select Apply. Adjust the AP power level.From the left menu, select Access Points.From the top right, select Exhibit to determine which access points to adjust.Select Edit next to the access point to be modified.Under Radio B/G/N(2.4G) next to TX Power, make sure Override Group Config is selected.From the TX Power drop-down list, select -3dB (1/2).Under Radio A/N/AC(5G) next to TX Power, make sure Override Group Config is selected.From the TX Power drop-down list, select -3dB (1/2).Select OK.Repeat steps 5b - 5h for additional access poin 8.3.6 Harden a Wireless Network You are a network technician for a small corporate network. You need to increase the security of your wireless network. Your new wireless controller provides several security features that you want to implement. Access the Wireless Controller console through Chrome on http://192.168.0.6 with the username admin and the password password. The username and password are case sensitive. Testout Labs Exam Questions & Answers 85 Questions with 100% Verified Correct Answers Latest Updated 2024 121 Pages Top Ranked Guaranteed Success A+…. In this lab, your task is to: Change the admin username and password for the Zone Director controller to the following:Admin Name: WxAdminPassword: ZDAdminsOnly!$ (O is the capital letter O) Set up MAC address filtering (L2 Access Control) to create a whitelist called Allowed Devices that includes the following wireless devices:00:18:DE:01:34:6700:18:DE:22:55:9900:02:2D:23:56:8900:02:2D:44:66:88 Implement a device access policy called NoGames that blocks gaming consoles from the wireless network. - Correct answer Complete this lab as follows: Access the Ruckus zone controller.From the taskbar, select Google Chrome.In the URL field, enter 192.168.0.6 and press Enter.Maximize the window for easier viewing. Log in to the wireless controller console.In the Admin field, enter admin (case sensitive).In the Password field, enter password as the password.Select Login. Change the admin username and password for the Zone Director controller.From the top, select the Administer tab.Make sure Authenticate using the admin name and password is selected.In the Admin Name field, enter WxAdmin.In the Current Password field, enter password.In the New Password field, enter ZDAdminsOnly!$.In the Confirm New Password field, enter ZDAdminsOnly!$.On the right, select Apply. Enable MAC address filtering.From the top, select the Configure tab.From the left menu, select Access Control.Expand L2-L7 Access Control.Under L2/MAC address Access Control, select Create New.In the Name field, enter Allowed Devices.Under Restriction, make sure Only allow all stations listed below is selected.Enter a MAC address.Select Testout Labs Exam Questions & Answers 85 Questions with 100% Verified Correct Answers Latest Updated 2024 121 Pages Top Ranked Guaranteed Success A+…. Create New.Repeat step 4g-4h for each MAC address you would like to add to the ACL.Select OK. Configure access controls.Under Access Control, expand Device Access Policy.Select Create New.In the Name field, enter NoGames.Select Create New.In the Description field, enter Games.Using the OS/Type drop-down list, select Gaming.In the Type field, select Deny.Under Uplink, make sure Disabled is selected.Under Downlink, make sure Disabled is selected.Select Save.Select OK. 8.3.7 Configure WIPS You are a network technician for a small corporate network. You would like to enable Wireless Intrusion Prevention on the wireless controller. You are already logged in as WxAdmin. Access the Wireless Controller console through Chrome on http://192.168.0.6. In this lab, your task is to: Configure the wireless controller to protect against denial-of-service (DOS) attacks as follows:Protect against excessive wireless requests.Block clients with repeated authentication failures for two minutes (120 seconds). Configure Intrusion Detection and Prevention as follows:Report all rogue devices regardless of type.Protect the network from rogue access points. Enable Rogue DHCP Server Detection. - Correct answer Complete this lab as follows: Testout Labs Exam Questions & Answers 85 Questions with 100% Verified Correct Answers Latest Updated 2024 121 Pages Top Ranked Guaranteed Success A+…. Add.Make sure the Action field is set to Pass.For Mac Address, enter 00:00:1B:12:34:56.Select Save. Allow an IP address to pass through the portal.Under the Services breadcrumb, select Allowed IP Addresses.Select Add.For IP Address, enter 198.28.1.100.Use the IP address drop-down menu to select 16. This sets the subnet mask to 255.255.0.0.For the Description field, enter Admin's Laptop.Make sure Direction is set to Both.Select Save. 9.1.6 Create Virtual Machines You have installed Hyper-V on ITAdmin. You're experimenting with creating virtual machines. In this lab, your task is to create two virtual machines named VM1 and VM2. Use the following settings as specified for each machine: VM1: Virtual machine name: VM1 Virtual machine location: D:\HYPERV Generation: Generation 1 Startup memory: 1024 MB (do not use dynamic memory) Networking connection: External Virtual hard disk name: VM1.vhdx Testout Labs Exam Questions & Answers 85 Questions with 100% Verified Correct Answers Latest Updated 2024 121 Pages Top Ranked Guaranteed Success A+…. Virtual hard disk location: D:\HYPERV\Virtual Hard Disks Virtual hard disk size: 50 GB Operating system will be installed later VM2: Virtual machine name: VM2 Virtual machine location: D:\HYPERV Generation: Generation 1 Startup memory: 2048 MB (use dynamic memory) Networking connection: Internal Virtual hard disk name: VM2.vhdx Virtual hard disk location: D:\HYPERV\Virtual Hard Disks Virtual hard disk size: 250 GB Operating system will be installed later Minimum RAM: 512 MB Maximum RAM: 4096 MB - Correct answer While completing this lab, use the following virtual machine (VM) specifications: VM1: Virtual machine name: VM1 Virtual machine location: D:\HYPERV Generation: Generation 1 Startup memory: 1024 MB (do not use dynamic memory) Testout Labs Exam Questions & Answers 85 Questions with 100% Verified Correct Answers Latest Updated 2024 121 Pages Top Ranked Guaranteed Success A+…. Networking connection: External Virtual hard disk name: VM1.vhdx Virtual hard disk location: D:\HYPERV\Virtual Hard Disks Virtual hard disk size: 50 GB Operating system will be installed later VM2: Virtual machine name: VM2 Virtual machine location: D:\HYPERV Generation: Generation 1 Startup memory: 2048 MB (use dynamic memory) Networking connection: Internal Virtual hard disk name: VM2.vhdx Virtual hard disk location: D:\HYPERV\Virtual Hard Disks Virtual hard disk size: 250 GB Operating system will be installed later Minimum RAM: 512 MB Maximum RAM: 4096 MB Complete this lab as follows: Access the Hyper-V Manager.Select Start.Expand Windows Administrative Tools and then select Hyper-V Manager. Testout Labs Exam Questions & Answers 85 Questions with 100% Verified Correct Answers Latest Updated 2024 121 Pages Top Ranked Guaranteed Success A+…. Configure Data Erase to wipe all data after 10 failed passcode attempts. Require unknown networks to be added manually. Turn off Bluetooth. - Correct answer Complete this lab as follows: Verify the current version of iOS installed on your iPad.Select Settings.From the Settings pane, select General.From the General pane, select About.In the top right, select Answer Questions.Answer Question 1. Leave the question dialog open. Apply the latest software update.From the About pane's heading, select General. This returns you to the General settings.From the General pane, select Software Update.Select Download and Install.Select Agree.Select OK. The software is downloaded.Select Install.The installation automatically starts after 10 seconds.Slide the arrow to the right to unlock the iPad.Answer Question 2 and then minimize the question dialog. Configure Auto-Lock.From the Settings pane, select Display & Brightness.From the right pane, select Auto-Lock and then select 5 minutes. Configure Complex Passcode Lock and Data Erase.From the left menu, select Touch ID & Passcode.From the right pane, select Turn Passcode On.Enter the new passcode of C@sp3rSelect Next.Re-enter
[email protected] Done.Scroll down and then slide Erase Data to ON.Select Enable.Select Require Passcode.Select After 5 minutes. Require unknown networks to be manually added.From the left menu, select Wi-Fi.Slide Ask to Join Networks to OFF. Testout Labs Exam Questions & Answers 85 Questions with 100% Verified Correct Answers Latest Updated 2024 121 Pages Top Ranked Guaranteed Success A+…. Turn off Bluetooth as follows:From the left pane, select Bluetooth.Slide Bluetooth to OFF.In the top right, select Answer Questions.Select Score Lab. 9.8.6 Create a Guest Network for BYOD You are a network technician for a small corporate network. You need to enable BYOD Guest Access Services on your network for guests and employees that have mobile phones, tablets, and personal computers. In this lab, your task is to perform the following: Access the Wireless Controller console through Google Chrome on http://192.168.0.6.Username: admin (case sensitive)password: password Set up Guest Access Services using the following parameters:Name: Guest_BYODAuthentication: Use guest pass authenticationThe guest should be presented with your terms of use statement and then allowed to go to the URL he or she was trying to access.Verify that 192.168.0.0/16 is on the list of restricted subnets. Create a guest WLAN using the following parameters:Network name: GuestESSID: Guest_BYODType: Guest AccessAuthentication: OpenEncryption Method: NoneGuest Access Service: Guest_BYODIsolate guest wireless clients from other clients on the access point. Open a new Google Chrome window and request a guest pass using the BYODAdmin user as follows:URL: 192.168.0.6/guestpassUsername: BYODAdmin (case Testout Labs Exam Questions & Answers 85 Questions with 100% Verified Correct Answers Latest Updated 2024 121 Pages Top Ranked Guaranteed Success A+…. sensitive)Password: P@ssw0rd (0 is a zero)Use any full name in the Full Name field.Make a note of or copy and paste the key in the Key field. Use the key from the guest pass request to authenticate to the wireless LAN Guest_BYOD from the Gst-Lap laptop computer in the Lobby. - Correct answer Complete this lab as follows: Access and log into the Ruckus ZoneDirector.From the taskbar, select Google Chrome.In the URL field, enter 192.168.0.6 and then press Enter.Maximize the window for easier viewing.In the Admin field, enter admin (case sensitive).In the Password field, enter password as the password.Select Login. Set up Guest Access Services.Select the Configure tab.From the left menu, select Guest Access.Under Guest Access Service, select Create New.Change the Name field to Guest_BYOD.For Terms of Use, select Show terms of use.Expand Restricted Subnet Access.Verify that 192.168.0.0/16 is listed.Select OK. Create a Guest WLAN.From the left menu, select WLANs.Under WLANs, select Create New.Change the Name to Guest.Change the ESSID to Guest_BYOD.Under Type, select Guest Access.For Wireless Client Isolation, select Isolate wireless client traffic from other clients on the same AP.Select OK.Close Google Chrome. Request a Guest password.Open a new Google Chrome browser window.In the URL field, enter 192.168.0.6/guestpass and then press Enter.Maximize the window for easier viewing.In the Username field, enter BYODAdmin (case sensitive).Enter P@ssw0rd as