Skip to content
Pass Microsoft, Cisco, Sap and Salesforce Exams
Menu
  • Home
  • Exams
  • Certifications
  • Cloud Computing
  • Cyber Security
  • Contact Us
  • Log in
  • Sign up
Menu

Antimalware Programs – 100-150 Exam Study Guide

Posted on 2024-10-122024-09-09 by examcert

Antimalware Programs (39.5.7)

Malware includes viruses, worms, Trojan horses, keyloggers, spyware, and adware. These are designed to invade privacy, steal information, damage the computer, or corrupt data. It is important that you protect computers and mobile devices using reputable antimalware software. Table 39-6 summarizes the types of antimalware programs that are available.

Table 39-6 Types of Antimalware Programs

Windows Defender Firewall (39.5.8)

A firewall selectively denies traffic to a computer or network segment. Firewalls generally work by opening and closing the ports used by various applications. By opening only the required ports on a firewall, you are implementing a restrictive security policy. Any packet not explicitly permitted is denied. In contrast, a permissive security policy permits access through all ports, except those explicitly denied. In the past, software and hardware were shipped with permissive settings. As users neglected to configure their equipment, the default permissive settings left many devices exposed to attackers. Most devices now ship with settings as restrictive as possible, while still allowing easy setup.

To allow program access through the Windows Defender Firewall, search for Control Panel, open it, and then locate and click Windows Defender Firewall to open it. Click Allow an app or feature through Windows Defender Firewall, as shown in Figure 39-17.

Figure 39-17 Allowing an App Access Through Windows Defender Firewall

If you wish to use a different software firewall, you will need to disable Windows Firewall. To disable the Windows Firewall, click Turn Windows Firewall on or off, as shown in Figure 39-18.

Figure 39-18 Turning Off Windows Defender Firewall

Windows Defender Firewall includes many additional features. Click Advanced settings to open them, as shown in Figure 39-19.

Figure 39-19 Accessing Advance Settings in Windows Defender Firewall

Here you can create inbound or outbound traffic rules based on different criteria. You can also import and export policies or monitor different aspects of the firewall, as shown in Figure 39-20.

Figure 39-20 Importing a Policy in Windows Defender Firewall

Check Your Understanding—Firewall and Host-Based Intrusion Prevention (39.5.9)
Refer to the online course to complete this activity.

Secure Wireless Access (39.6)
Wireless networks introduce their own unique security concerns.

Video—WLAN Threats (39.6.1)
Wireless networks are growing rapidly. It is important to understand wireless network vulnerabilities, threats, and exploits.
Refer to the online course to view this video.

Post navigation

← Customizing matching rules – Certified Advanced Salesforce Admin Exam Guide
Exploring and customizing rules →

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Categories

  • 100-150 Study Course
  • AWS Study Course
  • AZ-104 Study Course
  • Certified Advanced Salesforce Admin
  • Cisco Study Course
  • CLF-C02 Study Course
  • Google
  • Google Associate Cloud Engineer
  • Microsoft Study Course
  • Salesforce
  • Study Course
© 2024 Zeusexam, Inc. All rights reserved. | Privacy Statement | Terms of Use | Use of Cookies | Trust | Accessibility | Cookie Preferences | Your Privacy Choices