MD-100 Configure threat protection Microsoft Quiz Answers

Get MD-100 Configure threat protection Microsoft Quiz Answers

This learning path introduces students to protecting devices from external threats. This path will teach students about using encryption, firewalls, and IPSec to help protect against threats.

This learning path helps prepare you for Exam MD-100: Windows Client.

Prerequisites:

  • Students should have a basic understanding of computer networks and hardware concepts.
  • Students should have a basic understanding of OS and Application concepts.
  • Students should have experience with using Windows 10 or later.

Enroll on Microsoft

Module 1: Explore malware and threat protection

In this module, you will learn about malware and common network-related security threats and the steps that you can take to mitigate them.

Learning objectives:

After completing this module, you will be able to:

  • Describe malware.
  • Understand the sources of malware.
  • Describe ways of mitigating malware.
  • Identify common network-related security threats.
  • Describe the methods by which you can mitigate these common security threats.
  • Describe tools for securing users identity.
  • Describe tools for securing data on Windows.
  • Describe tools for securing Windows devices.

Prerequisites:

  • Students should have a basic understanding of computer networks and hardware concepts.
  • Students should have a basic understanding of OS and Application concepts.
  • Students should have experience with using Windows 10 or later.

This module is part of these learning paths:

Quiz 1: Knowledge check

Q1. You have deployed several defense mechanisms to protect users from Phishing attacks. However, some users are still falling prey to these attacks. Which of the following statements will help educate your users about Phishing?

  • Scammers imitate someone you know, so verify their email address rather than contact information or brand accuracy
  • Hover over links to uncover the URL
  • Phishing scams are exclusively perpetrated in email

Q2. Northwind Traders has recently been the victim of several cyber security attacks. The attackers have used eavesdropping and man-in-the-middle attacks to steal data in transit across the Internet. Which of the following defense mechanisms can help mitigate the risk of these attacks?

  • Intrusion detection
  • Domain Name System Security Extensions
  • VPNs and DirectAccess

Q3. Hackers recently attacked Trey Research by overloading its DNS system with a large number of fake requests. The purpose of this attack was to overload and shut down the server that hosts DNS. What is this common network security threat known as?

  • Man-in-the-middle attack
  • Denial of service attack
  • Brute force network attack

Q4. Fabrikam is looking to update their antiquated system design. They currently connect their host servers directly to the Internet. While this makes their hosts servers available to Internet users, it also allows those users access to Fabrikam’s corporate intranet. Which of the following defense mechanisms should they implement to resolve this issue?

  • Perimeter networks
  • Internet Protocol security (IPsec)
  • Firewalls

Q5. A hacker has captured network packets that workstations connected to your network send and receive. You have concerns that your organization’s sensitive data has been compromised. What is this kind of network-based security threat known as?

  • Man-in-the-middle attack
  • Port scanning
  • Eavesdropping

Module 2: Explore Microsoft Defender

The module explains how Microsoft Defender can be used to protect against malware and reduce exposure to attacks using a firewall.

Learning objectives:

After completing this module, you will be able to:

  • Use Microsoft Defender to detect and quarantine malware.
  • Describe the purpose of a firewall.
  • Describe Windows Defender Firewall functionality.
  • Explain network-location profiles.
  • Explain the increased functionality of Windows Defender Firewall with Advanced Security.

Prerequisites:

  • Students should have a basic understanding of computer networks and hardware concepts.
  • Students should have a basic understanding of OS and Application concepts.
  • Students should have experience with using Windows 10 or later.

This module is part of these learning paths:

Quiz 1: Knowledge check

Q1. Which of the following items analyzes network traffic and filters out harmful traffic, such as attempts to cause a denial-of-service attack or an SQL injection attack?

  • Block at first sight
  • Firewall
  • Microsoft Defender for Endpoint

Q2. In which type of network location is network discovery turned on by default, and you can’t create or join a HomeGroup?

  • Domain networks
  • Private networks
  • Guest or public networks

Q3. As the Desktop Administrator for Lucerne Publishing, Patti Fernandez wants to allow incoming traffic for a specific desktop management tool when a computer is on the company’s domain network, but block traffic when the computer connects to public or private networks. Which of the following tools should Patti use to provide this functionality?

  • Microsoft Defender for Endpoint
  • Windows Defender Firewall with Advanced Security
  • Block at first sight

Q4. Adventure Works Cycles has set the Windows Defender Firewall option that allows an app or feature through Windows Defender Firewall. Turning on this option enables Adventure Works’ administrators to define a list of approved programs that can communicate through their firewall. What else can Adventure Works do to help decrease security risks with its communication architecture?

  • Allow all programs to communicate through the firewall
  • Open a port without scoping the port to a specific app
  • Close ports when you don’t require them

Q5. You suspect that spyware has infected a specific area of your computer. You want to run a quick scan to determine whether your computer is infected. Which of the following tools will provide this functionality?

  • Windows Defender Firewall with Advanced Security
  • Microsoft Defender for Endpoint
  • Microsoft Defender Antivirus

Module 3: Explore device encryption features

This module explains the benefits of using encryption to protect drives and files against unauthorized access.

Learning objectives:

After completing this module, you will be able to:

  • Describe the benefits of drive encryption with BitLocker
  • Describe the benefits of Encrypted File System

Prerequisites:

  • Students should have a basic understanding of computer networks and hardware concepts.
  • Students should have a basic understanding of OS and Students should have experience with using Windows 10 or later.

This module is part of these learning paths:

Quiz 1: Knowledge check

Q1. What does BitLocker use to verify the integrity of a computer’s startup process?

  • The BitLocker recovery password
  • a Trusted Platform Module chip
  • Windows Information Protection

Q2. Which of the following is a feature of EFS?

  • EFS encrypts individual files based on user accounts
  • With EFS, files don’t remain encrypted if they’re moved or copied to another system that doesn’t also provide encryption
  • EFS is easier to implement and manager than BitLocker

Q3. Contoso is interested in using BitLocker to provide additional protection for their computers’ operating systems and any data that’s stored on those operating systems or in other volumes. Which of the following is a feature of BitLocker?

  • To install BitLocker, you must manually partition each computer’s hard disk to enable the use of BitLocker
  • BitLocker requires a TPM chip
  • The BitLocker recovey password is required if you move a BitLocker encrypted drive to another computer

Q4. Tailspin Toys doesn’t have BitLocker installed on any of the company’s computers. However, the company is now considering implementing BitLocker because it recently had an attacker gain access to the startup process components on several computers. The attacker changed the code in these components and gained access to the computers even though the data on the computers’ disks was encrypted. Once the attacker gained access to confidential information such as user passwords, they were able to circumvent other Windows security protections. How would BitLocker have prevented these attacks?

  • By requiring a TPM chip
  • BitLocker doesn’t allow the system to start when it’s been tampered with
  • BitLocker requires a recovery password to enter recovery mode

Q5. BitLocker has entered a locked state on a user’s computer in your domain environment. You need the recovery password to unlock the encrypted data on the volume. Locating a BitLocker password requires several conditions. Which of the following items is one of the conditions that must be met to locate the password?

  • You must be a domain administrator or have delegate permissions
  • The computer must be quarnteened from the network
  • BitLocker must be configured to store recovery information in AD DS

Module 4: Explore connection security rules

This module describes how connection security rules can be used to provide additional security to protect data transmitted across networks.

Learning objectives:

After completing this module, you will be able to:

  • Describe the purpose and functionality of IPsec.
  • Describe how to configure IPsec.
  • Describe connection security rules.
  • Explain authentication options.
  • Monitor connections.

Prerequisites:

  • Students should have a basic understanding of computer networks and hardware concepts.
  • Students should have a basic understanding of OS and Application concepts.
  • Students should have experience with using Windows 10 or later.

This module is part of these learning paths:

Quiz 1: Knowledge check

Q1. How does IPsec provide protection from replay attacks?

  • By using sequence numbers
  • By using one of several available algorithms to encrypt data
  • By signing traffic

Q2. A connection security rule forces authentication between two peer computers before they can establish a connection and transmit secure information. Windows Defender Firewall with Advanced Security uses IPsec to enforce configurable rules. Which type of connection security rule allows you to protect connections between gateway computers, and typically use it when you are connecting across the Internet between two security gateways?

  • Server to server
  • Tunnel
  • Isolation

Q3. As the IT Support professional for Contoso, you want to use the New Connection Security Rule Wizard to create a new rule that specifies how you want authentication to apply to inbound and outbound connections. Which authentication option should you select if you want to specify that all inbound and outbound traffic must authenticate, but that the connection is allowable if authentication fails?

  • Require authentication for inbound and outbound connections option
  • Require authentication for inbound connections and Request authentication for outbound connections option
  • Request authentication for inbound and outbound connections option

Q4. As the IT Support professional for Fabrikam, Holly Spencer created firewall rules to allow traffic through the company’s firewall. Holly now wants to secure this traffic using IPsec. What must Holly do to secure this traffic with IPsec?

  • Create connection security rules that apply between the computers that are the two endpoints
  • Create connection security rules that apply to services
  • Create connection security rules that apply to programs

Q5. Your organization has identified potential weaknesses in its private networks that may make them susceptible to exploitation. As an IT support professional for your organization, you are tasked to implement IPsec. Which of the following items is a feature of IPsec?

  • IPsec offers self-authentication before and during communications
  • IPsec has two modes: Basic and Advanced
  • IPsec provides a private channel for sending and exchanging potentially sensitive or vulnerable data

Module 5: Explore advanced protection methods

This module explores additional tools used to provide additional layers of security within an organization.

Learning objectives:

After completing this module, you’ll be able to:

  • Describe the features and use of the Security Compliance Toolkit
  • Describe the features of AppLocker
  • Describe methods of securing data in the enterprise
  • Describe the benefits and features of Microsoft Defender for Endpoint

Prerequisites:

  • Students should have a basic understanding of computer networks and hardware concepts.
  • Students should have a basic understanding of OS and Application concepts.
  • Students should have experience with using Windows 10 or later.

This module is part of these learning paths:

Quiz 1: Knowledge check

Q1. Northwind Traders has several users that have been running unauthorized software. As a result, the company has begun experiencing a higher incidence of malware infections and help-desk calls. What can Northwind Traders do to restrict which software can run on user PC’s and devices?

  • Implement the Microsoft Security Compliance Toolkit
  • Implement AppLocker
  • Implement Windows Device Health Attestation

Q2. As the IT Support professional for Tailspin Toys, you enabled AppLocker restrictions for the Universal Windows apps by configuring the appropriate Group Policy settings. You did so by creating a new rule in the Local Group Policy editor. During this process, you created the default rule. What does the default rule do?

  • It enables the Application Identity service to run on all computers affected by your AppLocker policy
  • It enables all signed package apps to run
  • It identifies applications, and then processes the AppLocker policies against the identified applications

Q3. What feature in Microsoft Defender for Endpoint enables it to identify attacker tools, techniques, and procedures, and generate alerts when these are observed in collected sensor data?

  • Threat intelligence
  • Cloud security analytics
  • Endpoint behavioral sensors

Q4. Which Microsoft Defender for Endpoint feature protects Windows kernel-mode processes against the injection and execution of malicious or unverified code?

  • Microsoft Defender Application Guard
  • Microsoft Defender Exploit Guard
  • Microsoft Defender Device Guard

Q5. As the Enterprise Security administrator for Fabrikam, Holly Spencer wants to manage the company’s group policy objects (GPOs). What tool should Holly use to accomplish this task?

  • The Group Policy Management Editor
  • The AppLocker Microsoft Management Console
  • The Microsoft Security Compliance Toolkit
Conclusion:

I hope this MD-100 Configure threat protection Microsoft Quiz Answers would be useful for you to learn something new from this problem. If it helped you then don’t forget to bookmark our site for more Coding Solutions.

This Problem is intended for audiences of all experiences who are interested in learning about Data Science in a business context; there are no prerequisites.

Keep Learning!

More Coding Solutions >>

LeetCode Solutions

Hacker Rank Solutions

CodeChef Solutions

Leave a Reply

Your email address will not be published. Required fields are marked *