Windows Firewall and Network Security

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson
Download our mobile app to listen on the go
Get App

Questions and Answers

What type of privileges might be granted to users, other than the right to sign in?

  • Disabling firewall settings.
  • Accessing other user accounts without permission.
  • Installing unapproved software.
  • Changing the system date and time. (correct)

Which built-in user group has limited privileges and is given a temporary profile that is deleted when the user signs out?

  • Power Users group
  • Users group
  • Guests group (correct)
  • Administrators group

Which of the following is true regarding the Power Users group in later versions of Windows?

  • It has full control over all system files.
  • It is the default group for all new user accounts.
  • It can perform most of the same tasks as an administrator.
  • Windows 10/8/7 offers a Power Users group only for backward compatibility with legacy applications. (correct)

Why is it easier to assign permissions to user groups rather than individual accounts when managing several user accounts?

<p>User accounts automatically inherit all permissions from the group, and changes only need to be made at the group level. (C)</p>
Signup and view all the answers

What does the /r parameter request in the gpresult command?

<p>A summary of the <code>gpresult</code> information (A)</p>
Signup and view all the answers

When should you use share permissions on FAT volumes?

<p>Always use share permissions on FAT volumes. (D)</p>
Signup and view all the answers

What three permission levels are available when sharing a folder?

<p>Full Control, Change, Read (D)</p>
Signup and view all the answers

Which action is performed in the 'Advanced Sharing' settings of a folder's properties?

<p>Setting the number of simultaneous users (D)</p>
Signup and view all the answers

Which of the following actions is a step in troubleshooting shared folders and files using Windows?

<p>Opening the Network and Sharing Center. (D)</p>
Signup and view all the answers

What must you ensure when verifying default settings for a private network profile to control access to folders and files?

<p>Turn on network discovery. (B)</p>
Signup and view all the answers

When setting up a SOHO network or a personal computer, what type of firewall is automatically configured?

<p>Personal firewall (B)</p>
Signup and view all the answers

What is the primary function of a personal firewall?

<p>To filter inbound and outbound network traffic on a single computer. (C)</p>
Signup and view all the answers

Which tab in Internet Options allows you to manage settings that prevent annoying pop-ups?

<p>Privacy (B)</p>
Signup and view all the answers

Which tab in the Internet Options box allows configuring proxy server settings for speeding up Internet access?

<p>Connections (D)</p>
Signup and view all the answers

What action can be performed within the 'Programs' tab of Internet Options concerning add-ons?

<p>Enabling or disabling selected add-ons (B)</p>
Signup and view all the answers

Under which tab in Internet Options can you delete browsing history?

<p>General (B)</p>
Signup and view all the answers

What is the purpose of using the 'Check Names' feature when adding a user to a group?

<p>To verify that the group name is correct. (B)</p>
Signup and view all the answers

When are NTFS permissions most effective for security?

<p>When the folder is on an NTFS volume (D)</p>
Signup and view all the answers

Which tool is used to manage web credentials and Windows credentials stored on a Windows computer?

<p>Credential Manager (D)</p>
Signup and view all the answers

What is the purpose of the BitLocker Drive Encryption feature in Windows?

<p>To encrypt the entire Windows volume and any other volume on the drive. (A)</p>
Signup and view all the answers

Flashcards

Privileges

In Windows, refers to what an account is allowed to do in the system.

Permissions

Relates to which user accounts or user groups are granted access to data/folders.

Principle of Least Privilege

Specifies that employees should only have the privileges they need.

Administrators group

Administrator accounts belong to this group by default.

Signup and view all the flashcards

Users group

Standard user accounts belong to this group by default.

Signup and view all the flashcards

Guests group

Group with limited privileges and a temporary profile.

Signup and view all the flashcards

Power Users group

Lets users read/write system parts beyond own profile folders.

Signup and view all the flashcards

Workgroup sharing

Apply to each local computer; each manages its access to shared resources.

Signup and view all the flashcards

Domain controlling

Administered by the network administrator for entire network.

Signup and view all the flashcards

Windows Firewall

Personal firewall protecting from intrusion and attacks.

Signup and view all the flashcards

File and Folder Encryption

Encryption in Windows file systems using the Windows Encrypting File System.

Signup and view all the flashcards

BitLocker Drive Encryption

Secures entire Windows volumes by encryption.

Signup and view all the flashcards

Advanced tab

Contains several settings to control Internet Explorer.

Signup and view all the flashcards

Authentication

Windows authenticates a user when first creating the user account.

Signup and view all the flashcards

Policy editors

The Local Group Policy and Local Security Policy editors.

Signup and view all the flashcards

Windows security

Security measures used to protect resources without hindering users work.

Signup and view all the flashcards

Personal Firewall

A personal firewall protects the computer, filters inbound and outbound traffic.

Signup and view all the flashcards

Connections tab

Allows you to configure proxy server settings and create a VPN connection.

Signup and view all the flashcards

Programs tab

Helps internet explorer display multimedia content, manage email and small apps.

Signup and view all the flashcards

Privacy tab

Use to block cookies that might invade your privacy or steal your identity.

Signup and view all the flashcards

Study Notes

Windows External Settings

  • Real-time Internet Channel Scan can scan all internet traffic, provide intrusion protection and detect unwanted software/applications before it arrives.

Firewalls

  • Firewalls protect a computer from intrusion and attack, automatically configured when setting up security for a new network.
  • A personal firewall protects a personal computer or other computers on a SOHO network.
  • Firewalls filter inbound and outbound traffic.
  • When setting up a SOHO network or a personal computer, configure a personal firewall on each computer.

Types of firewalls

  • Network hardware firewall serves as a hardware firewall to protect the network.
  • Network software firewall is redundant firewall and application firewall, which is software installed on a computer.
  • Personal firewall is a personal firewall or application firewall to protect a personal computer.
  • Three types of firewalls are used to protect a network and individual computers on the network: network hardware, network software and personal firewalls.

Configuring Security Levels For Network Connections

  • The way to set the security for network connections is to open the Network and Sharing Center in Control Panel and click Change Advanced Sharing Settings.
  • You can choose specific options for each profile, or let Windows create a separate network profile for each network you use.
  • Options for Windows 10/8/7 are private and public profiles.

Internet Options

  • Some web servers use HTTP with the SSL or TLS protocols (called HTTP Secure or HTTPS) to secure transmissions to and from the web server.
  • To get information about the site security, click the padlock that appears in the browser address box when HTTPS is used.
  • If you have a problem with Internet Explorer 11, try installing Windows updates, applying a restore point, or refreshing Windows 10/8.
  • When you click the Tools icon and click Internet Options, the Internet Options box appears.
  • Another method is to click Internet Options in the Classic view of Control Panel.
  • The Internet Options box contains the General, Security, Privacy, Content, Connections, Programs, and Advanced tabs.

Internet Options Tabs

  • Use the General tab can change the home page or add a second home page.
  • To delete what Internet Explorer has kept of browsing, click Delete in the Browsing History box, and deselect the first item.
  • To maximize the allowed space used for temporary Internet files and control its location, on the General tab, click Settings In the Temporary Internet Files and Website Files box.
  • You can set a zone security level on the Security tab.
  • The Internet, medium-high is default value.
  • ActiveX control is a small app or add-on that can be downloaded from a website along with a webpage and is executed by Internet Explorer to enhance the webpage.
  • Use the Privacy tab to block cookies that might invade your privacy or steal your identity.
  • The Privacy tab is used to control the Pop-up Blocker.

Programs Tab

  • The Programs tab displays multimedia content, manage email, translate text, or other actions.
  • The Programs tab, click Manage add-ons to open the Manage Add-ons box.
  • In the left pane under Show, all add-ons installed on the computer can be selected.
  • An add-on can be selected and click Enable or click Disable.
  • Downloaded ActiveX controls and add-ons can be uninstalled using this window.
  • You can also uninstall downloaded add-ons using the Programs and Features window in Control Panel.

Advanced Tab

  • The Advanced tab contains several miscellaneous settings used to control Internet Explorer.
  • This tab resets Internet Explorer to all default settings if there are problems with the settings.

BIOS/UEFI Authentication

  • BIOS/UEFI firmware on the motherboard offer password protection for a drive lock password(required to change BIOS/UEFI setup) and a user password (required to use the system or view BIOS/UEFI setup).
  • Firmware may offer a drive lock password, which is required to accesses the hard drive; and a user password for the system as well.
  • A BIOS/UEFI setup Security screen can be seen where you can set the Administrator and User passwords.

Managing User Credentials

  • Open the Credential Manager applet in Control Panel to manage passwords and digital certificates stored on a Windows computer.
  • The Windows Credential allow you to manage web credentials and Windows credentials.

Local Group Policy and Local Security Policy Editors

  • Windows offers multiple options to ensure security measures protect resources.
  • Three tools can control policy: the Local Group Policy, the Local Security Policy and Active Directory.

Password Creation

  • To create strong passwords, follow the requirements for creating passwords in Windows.
  • Some requirements include: not using words in any language, not using numbers or symbols alone, not using names, not using adjacent keys on your keyboard, and using 16 or more characters etc.

File and Folder Encryption.

  • Files and folders can be encrypted using the Windows Encrypting File System (EFS).
  • To encrypt a folder, right-click it and open its Properties box.
  • On the General tab, click Advanced.
  • Check Encrypt contents to secure data and click OK.
  • In File Explorer, encrypted file and folder names are displayed in green by default.

BitLocker Drive Encryption

  • Windows professional and business editions locks down a hard drive by encrypting the entire Windows volume and restricting access by requiring one/two encryption keys.
  • Three ways to use BitLocker Drive Encryption depend on the type of protection and the computer hardware available: Computer authentication(Trusted Platform Module) chip, User authentication, Computer and user authentication.

User Accounts in User Groups

  • Computer users should be classified to determine the privileges they need to do their jobs.
  • The support technician will be responsible to make sure the user account assigned to the employee has the privileges and no more,.

Types of User Accounts

  • When using the User Accounts applet in Control Panel to manage user accounts, one can choose between two account types: Administrator or Standard to create an account.
  • When use Local Users and Groups in Computer Management to create an account, the account type is automatically a Standard user.

Built-in User Groups

  • A user account can belong to one or more user groups.
  • By default, Administrator accounts belong to the Administrators group, and standard user accounts belong to the Users group.
  • The Guests group has limited privileges on the system.
  • Older editions of Windows have a Power Users group that can read from and write to parts of the system other than its own user profile folders.

Methods to assign permissions to folders and files:

  • Workgroup sharing: privileges/permissions are set up on each local computer so that each computer access to its files, folders, & printers shared on the peer-to-peer network.
  • Domain controlling: In a Windows computer belonging to a domain instead of a workgroup/homegroup, all security should be managed by the network administrator for the entire network.

Share Permissions

  • Share Permissions are set up to grant different users or user groups different levels of access to shared resources.
  • Steps on how to use Share Permissions: Open the Properties box for the folder on a FAT volume and select the Sharing tab and click Advanced Sharing.
  • Check Share this folder and then click Permissions.
  • Add the select users or groups box and click OK.
  • Select the user/group that needs limited
  • To delete the Everyone group, select it in the Permissions box and click Remove.

Support and Troubleshoot Shared Folders and Files

  • If you have problems accessing a shared resource, follow these steps: Troubleshooting, Open the Network and Sharing Center, Verify that the settings are default etc..
  • If you want a Windows 8/7 computer to access Homegroup resources, select Allow Windows to manage homegroup connections.
  • If you want to share the Public folder to the network, go to the Public folder sharing section and select Turn on sharing.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

More Like This

Use Quizgecko on...
Browser
Browser