Task 16: Are the rules active or inactive? What network(s) are affected by the rules?
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
Have a brief look at the Remote Desktop Outbound Rules for example.
Important: You are not expected to be able to setup Inbound or Outbound Rules.
Next Topics
Computer Security:
Antivirus
Internet settings.
Antivirus
Task 1: Download and install the trial version of anti-virus software Avira AntiVir Personal.
http://www.download.com
Important: Don’t register the software
Once downloaded, start the software checking your C drive. Stop it after a minute.
How would you update the software with the latest new virus information so that it is able to detect and isolate them?
……………………………………………………………………………………………………………
There is no need to run the update.
What other software can you download on a free trial from this website? There is no need to do so.
……………………………………………………………………………………………………………
Question: Why is it important to force windows to show file extensions?
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
Task 2: How would you set up your OS to display file extensions when displaying file details?
……………………………………………………………………………………………………………
Internet Security Levels
Task 3: What security setting is your Internet browser set to and how could it be changed?
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
Active X Controls
Theory 1: What are Active X controls?
Write down a brief description in your own words in the space provided.
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
Task 4: Where is the option in the Internet Explorer browser that manages ActiveX controls?
Ref: http://technet.microsoft.com/en-us/library/cc817491.aspx
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
How would you set up or disable automatic prompting for ActiveX controls?
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
How would you disable the download of unsigned ActiveX controls?
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
What is an Internet Explorer add-on?
Hint: Choose Tools from the menu, Then choose Manage Add-ons. In the “Show” drop down box click All add-ons.
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
How would you disable one of the add-ons? For example how would you disable the Windows Media Player ActiveX control? Hint: Right click on the add-on to see the additional information about it.
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
Related Reading:
http://pcsupport.about.com/od/fixtheproblem/ht/disableie7activ.htm
http://windows.microsoft.com/en-US/windows-vista/Internet-Explorer-add-ons-frequently-asked-questions
Theory 2: What is a popup Blocker?
Write down a brief description in your own words in the space provided.
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
Theory 3: What is a Phishing? And describe what a Phishing Filter does?
Write down a brief description in your own words in the space provided.
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
Task 5: How do you get into the popup Blocker settings?
Ref: http://browsers.about.com/od/internetexplorertutorials/ss/ie8popupblocker_7.htm
Task 6: How do you turn on the Smart Screen Filter in Internet Explorer?
Note: Phishing Filter has been updated and replaced by SmartScreen Filter in Internet Explorer 8.
Ref: http://support.microsoft.com/kb/930168
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
Questions to be done on your own time and discussed in the next lab:
1 What is a Trojan horse? How can it damage your computer?
Write down a brief description in your own words in the space provided.
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
2 What is a Cookie?
Write down a brief description in your own words in the space provided.
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
3 What is a Worm?
Ref: http://en.wikipedia.org/wiki/Morris_worm
Write down a brief description in your own words in the space provided.
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
4 What is spyware?
Write down a brief description in your own words in the space provided.
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
Revision
Q1. Turn on the firewall. How would you set up your computer to allow another computer to connect to yours using the Skype software or Remote Assistance? How did you do this?
Q2. How would you set up Internet Explorer to enable the Pop Up Blocker.
Q3(a) You have downloaded Skype which is a software application that allows users to make voice calls over the Internet. What settings do you need to set or check for, on Windows Firewall in order for Skype to work correctly.
(b) Describe how you would set these settings.
Q4(a) Windows Firewall keeps track of communication through the firewall in a log file.
What is the name of the firewall log file and where is it stored?
(b) Can this filename be changed? ……………………………
(c) What is its maximum size? When set to this size express your answer in Gigabytes and Terabytes.
Lab 9: Firewalls, AntiVirus etc.. Page of
Share with your friends: |