Alain D
Alain D
  • Видео 39
  • Просмотров 1 375
8.6.9 - Configure file history testOut Labsim
Zoey is responsible for developing an important new advertising campaign. To protect her data, you have decided to enable File History on her Windows 10 system and configure it to take frequent snapshots of her files.
In this lab, your task is to:
Enable File History on the Data (D:) volume.
Configure File History to save copies of files every 10 minutes.
Retain previous versions of files for 3 months.
Просмотров: 4

Видео

8.6.10 Restore Data from File History
Просмотров 3611 часов назад
You are the IT administrator for a corporate network. You just received an email from Margarita, who produces your organization's monthly magazine. The email was to notify you that she had created a help desk ticket using Issue Trax, and she hoped that someone could help her straight away. The computer you work from is named ITAdmin. In this lab, your task is to: Open Issue Trax and the open ti...
13.3.9 Change a User's Linux Password
Просмотров 17День назад
subscribe please Pascal Bullock (pbullock) forgot her password and needs access to the resources on her computer. You are logged on as Sydney Hoffer. The password for the root account is P@ssw0rd (use a zero). In this lab, your task is to: Find Sydney Hoffer's username. Change the password for the pbullock user account to 1234asdf. Make sure the password is encrypted in the shadow file. Answer ...
13.3.8 Change Your Linux Password
Просмотров 14День назад
You are logged on to your computer as Abigail Pain (apain), who is an administrator on this system. However, you think someone has learned your password. In this lab, your task is to change your password using the following information: Current password: P@ssw0rd (use a zero) New password: V3rySecure1@
8.2.4 Connect VoIP 2
Просмотров 12День назад
SUBSCRIBE. 8.2.4 Connect VoIP 2
12.4.5 Respond to Social Engineering Exploits
Просмотров 5День назад
12.4.5 Respond to Social Engineering Exploits
12.6.4Poison ARP and Analyze with Wireshark
Просмотров 6День назад
12.6.4 Poison ARP and Analyze with Wireshark You are the IT security administrator for a small corporate network. You believe a hacker has penetrated your network and is infiltrating it using ARP poisoning. In this lab, your task is to discover whether ARP poisoning is taking place as follows: Use Wireshark to capture packets on the enp2s0 interface for five seconds. Analyze the Wireshark packe...
11.8.13 Explore Configuration Information 3
Просмотров 8614 дней назад
You are the IT administrator for a small corporate network. Your supervisor has asked you to gather some networking information for the CorpDHCP server. In this lab, your task is to: Use Microsoft's Windows PowerShell to find the answers to the following questions: What is the IPv4 address of the server? What is the subnet mask? How did the computer get its IP configuration information? What te...
11.8.12Explore Configuration Information 2
Просмотров 5014 дней назад
You are the IT administrator for a small corporate network. You are in the process of troubleshooting a networking issue and need to find the answers to several questions. In this lab, your task is to: Use Microsoft's Windows Terminal (PowerShell) to find the answers to the following questions: What is the IPv4 address of the workstation? What is the subnet mask? How did the computer get its IP...
11.8.11 Explore Configuration Information 1
Просмотров 9914 дней назад
You are the IT administrator for a small corporate network. Your supervisor has asked you to gather some networking information for the Office1 computer. In this lab, your task is to: Use Microsoft's Windows Terminal (PowerShell) to find the answers to the following questions: What is the IPv4 address of the workstation? What is the subnet mask? What is the default gateway address? What is the ...
11.7.8 Configure a DSL Internet Connection
Просмотров 3414 дней назад
11.7.8 Configure a DSL Internet Connection You own a computer repair store, and you are on site at a customer's office. They have signed up for DSL internet access. The phone company has turned DSL access on, and the office has obtained DSL service from the ISP. All connectors on the wall plate are for WAN connections only. There are no LAN connections inside the office. When you are finished, ...
11.7.6Back Up Files with File History
Просмотров 3214 дней назад
You have recently installed a new Windows 10 computer. To protect valuable data, you need to implement File History backups on this computer. In this lab, your task is to configure automatic backups for the Exec computer as follows: Save the backup to the Backup (E:) volume. Back up files daily. Keep backup files for 6 months. Back up the entire Data (D:) volume. Make a backup now.
11.6.9 Configure NIC Teaming
Просмотров 4514 дней назад
You are the IT administrator for a small corporate network. You use CorpServer for your production server and need to have the most throughput possible. As a result, you need to configure NIC teaming. In this lab, your task is to configure a NIC team on CorpServer as follows: Move the network cable from the onboard adapter in CorpServer to the 4-port NIC and to port 22 on the switch. Connect ne...
11.3.8 Auditing Device Logs on a Cisco Switch
Просмотров 3314 дней назад
SUBSCRIBE PLEASE You are the IT security administrator for a small corporate network. You need to enable logging on the switch located in the Networking Closet. In this lab, your task is to: Enable Logging and the Syslog Aggregator. Configure RAM Memory Logging as follows: Emergency, Alert, and Critical: Enable Error, Warning, Notice, Informational, and Debug: Disable Configure Flash Memory Log...
11.3.6 Configure Logging on pfSense
Просмотров 6614 дней назад
PLZ SUBSCRIBE You are the IT administrator for a small corporate network. To be more proactive in your defense against potential attacks, you want to save the system logs being captured by the pfSense firewall. In this lab, your task is to: Sign in to pfSense using: Username: admin Password: P@ssw0rd (zero) Configure the general system logs to: Only show 25 logs at a time. Have a maximum log fi...
10.2.4 Connect to a DSL Network
Просмотров 114 дней назад
10.2.4 Connect to a DSL Network
12.4.5 Respond to Social Engineering Exploits
Просмотров 614 дней назад
12.4.5 Respond to Social Engineering Exploits
11.7.7 Configure a Wireless Infrastructure
Просмотров 2714 дней назад
11.7.7 Configure a Wireless Infrastructure
11.7.6 Select and Install a Network Adapter
Просмотров 1314 дней назад
11.7.6 Select and Install a Network Adapter
12.3.3 Implement Physical Security
Просмотров 2114 дней назад
12.3.3 Implement Physical Security
11.7.6 Select and Install a Network Adapter
Просмотров 2214 дней назад
11.7.6 Select and Install a Network Adapter
11.5.10 Create a Home Wireless Network
Просмотров 11014 дней назад
11.5.10 Create a Home Wireless Network
11.5.10 Create a Home Wireless Network
Просмотров 1814 дней назад
11.5.10 Create a Home Wireless Network
11.4.11 Configure Smart Devices
Просмотров 11314 дней назад
11.4.11 Configure Smart Devices
11.3.8 Configure TCP/IP Settings on Windows 11
Просмотров 9614 дней назад
11.3.8 Configure TCP/IP Settings on Windows 11
11.3.7 Configure TCP/IP Settings on Windows 10
Просмотров 4614 дней назад
11.3.7 Configure TCP/IP Settings on Windows 10
9.5.8 Enable Wireless Intrusion Prevention
Просмотров 3414 дней назад
9.5.8 Enable Wireless Intrusion Prevention
9.3.8 Design an Outdoor Wireless Network
Просмотров 4821 день назад
9.3.8 Design an Outdoor Wireless Network
9.3.7 Design an Indoor Wireless Network
Просмотров 2821 день назад
9.3.7 Design an Indoor Wireless Network
9.2.7 Configure Wireless Profiles
Просмотров 8521 день назад
9.2.7 Configure Wireless Profiles