Configuring Windows security features

Posted on
Share on Google+Share on LinkedInShare on FacebookShare on RedditTweet about this on TwitterEmail this to someone

These questions are based on 70-620 – TS: Configuring Microsoft Windows Vista Client Microsoft Self-Test Software Practice Test.

 

Objective: Configuring Windows security features
SubObjective: Configure Windows Defender

 

Multiple Answer, Multiple Choice

 

You want to add a program that is detected by Windows Defender as malicious to the list of allowed items. What are the possible ways to add the program to the list of allowed items in Windows Defender? (Each correct answer presents a complete solution. Choose two.)

 

 

  1. Select the Always Allow option in the Action column on the Scan Results page in Windows Defender.
  2. Click the Add button under the Advanced options heading on the Options page in Windows Defender.
  3. Click the Allowed items link on the Tools and Settings page in Windows Defender.
  4. Select the Ignore option in the Action column on the Scan Results page in Windows Defender.

 

Answer:
A. Select the Always Allow option in the Action column on the Scan Results page in Windows Defender.

 

B. Click the Add button under the Advanced options heading on the Options page in Windows Defender.

 

Tutorial:
You should select the Always Allow option in the Action column on the Scan Results page, or you should click the Add button under the Advanced options heading on the Options page in Windows Defender. When you run a spyware scan in Windows Defender, the spyware detected by Windows Defender is displayed on the Scan Results page. The Scan Results page contains information such as threat description and suggests appropriate actions that you want to take for detected spyware. You also can modify the action for each of the detected programs before applying them. To apply the selected actions, you should click the Apply Actions button on the Scan Results page. When you want to prevent Windows Defender from notifying you about a program that you want to use, you can add that program to the list of allowed items in Windows Defender. To add a program to the Allowed items list, you can select the Always Allow option on the Scan Results page. The Always Allow option automatically adds the program to the Allowed items list in Windows Defender. When a program is added to the list of allowed items, Windows Defender will stop detecting the program in future scans. Alternatively, you can also add the program file manually to the Do not scan these files or locations list. This causes Windows Defender to stop notifying you about the programs that are listed under the Do not scan these files or locations list.

 

You should not click the Allowed items link on the Tools and Settings page in Windows Defender. The Allowed items page displays only the list of programs that should not be monitored or scanned by Windows Defender during a scan. The Allowed items page allows you to only remove any program from the list of allowed items. To remove a program from the Allowed items list, you should select the program and click the Remove From List button on the Allowed items page. You cannot add any new program to the list from the Allowed items page.

 

You should not select the Ignore option in the Action column on the Scan Results page in Windows Defender. Selecting the Ignore option causes Windows Defender to ignore the threat during this scan only. The threat will be detected again by Windows Defender during the next spyware scan. The Ignore option does not add the detected program to the list of allowed items.

 

Reference:
TechNet Home > Windows Vista Home > Technical Library > Security and Protection > Windows Defender > Windows Defender (RTM) Guide > Windows Defender Solution

 

TechNet Home > Windows Vista Home > Technical Library > Security and Protection > Windows Defender > Windows Defender (Beta 2) Guide > Spyware Removal after a Scan

 

TechNet Home > Windows Vista Home > Technical Library > Security and Protection > Windows Defender > Windows Defender (Beta 2) Guide > Spyware Detection

Share on Google+Share on LinkedInShare on FacebookShare on RedditTweet about this on TwitterEmail this to someone
cmadmin

ABOUT THE AUTHOR

Posted in Archive|

Comment:

Leave a comment

Your email address will not be published. Required fields are marked *

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <strike> <strong>