Laporan Praktikum Keamanan Siber - Tugas 2 - Kelas C - Kelompok 3
Laporan Praktikum Keamanan Siber - Tugas 2 - Kelas C - Kelompok 3
TUGAS 2
Mata Kuliah :
TIK3072C Praktikum Keamanan Siber Sherwin
Reinaldo U Aldo Sompie ST, MT Xaverius B.N.
Najoan ST, MT
Dibuat oleh :
© Cisco and/or its affiliates. All rights reserved. Cisco Confidential Page 1 of 63 www.netacad.com
Lab – Monitor and Manage System Resources in Windows
Background / Scenario
In this lab, you will explore processes. Processes are programs or applications in execution. You will explore
the processes using Process Explorer in the Windows Sysinternals Suite. You will also start and observe a
new process.
Required Resources
• 1 Windows PC with Internet access
© Cisco and/or its affiliates. All rights reserved. Cisco Confidential Page 2 of 63 www.netacad.com
Lab – Monitor and Manage System Resources in Windows
b. Open Tcpview.exe. Accept the Process Explorer License Agreement when prompted. Click Yes to allow
this app to make changes to your device.
c. Exit the File Explorer and close all the currently running applications.
b. Double-click lsass.exe.
What is lsass.exe? In what folder is it located?
proses otoritas keamanan lokal adalah nama untuk lsass.exe.
Itu ada di folder C:\Windows\System32\
c. Close the properties window for lsass.exe when done.
d. View the properties for the other running processes.
Note: Not all processes can be queried for properties information.
© Cisco and/or its affiliates. All rights reserved. Cisco Confidential Page 3 of 63 www.netacad.com
Lab – Monitor and Manage System Resources in Windows
c. Reopen the web browser. Research some of the processes listed in TCPView. Record your findings.
Port lokal dan alamat lokal dapat bervariasi antar proses. Proses lsass.exe memeriksa validitas
login pengguna di PC. Eksekusi services.exe digunakan untuk memulai dan menghentikan
layanan dan mengubah pengaturan default untuk memulai layanan. Proses svnhost.exe (host
layanan) menangani proses berbagi sumber daya sistem. Sebagian besar sumber daya yang
disebutkan ini terletak di folder C:\Windows\System32\. Jika executable ini berada di tempat lain
pada sistem, mungkin malware, seperti virus, spyware, Trojan, atau worm
© Cisco and/or its affiliates. All rights reserved. Cisco Confidential Page 4 of 63 www.netacad.com
Lab – Monitor and Manage System Resources in Windows
Required Resources
• 1 Windows PC with Internet access
© Cisco and/or its affiliates. All rights reserved. Cisco Confidential Page 5 of 63 www.netacad.com
Lab – Monitor and Manage System Resources in Windows
d. To locate the web browser process, drag the Find Window's Process icon ( ) into the opened web
browser window. Microsoft Edge was used in this example.
© Cisco and/or its affiliates. All rights reserved. Cisco Confidential Page 6 of 63 www.netacad.com
Lab – Monitor and Manage System Resources in Windows
e. The Microsoft Edge process can be terminated in the Process Explorer. Right-click the selected process
and select Kill Process.
What happened to the web browser window when the process is killed?
Jendela browser web ditutup.
b. Drag the Find Window's Process icon ( ) into the Command Prompt window and locate the highlighted
Command Prompt process in Process Explorer.
© Cisco and/or its affiliates. All rights reserved. Cisco Confidential Page 7 of 63 www.netacad.com
Lab – Monitor and Manage System Resources in Windows
c. The process for the Command Prompt is cmd.exe. Its parent process is explorer.exe process. The
cmd.exe has a child process, conhost.exe.
d. Navigate to the Command Prompt window. Start a ping at the prompt and observe the changes under the
cmd.exe process.
What happened during the ping process?
Proses PING.EXE terdaftar di bawah cmd.exe selama proses ping, dan kemudian hilang
setelah proses ping selesai.
e. As you review the list of active processes, you find that the child process conhost.exe may be suspicious.
To check for malicious content, right-click conhost.exe and select Check VirusTotal. When prompted,
click Yes to agree to VirusTotal Terms of Service. Then click OK for the next prompt.
f. Expand the Process Explorer window or scroll to the right until you see the VirusTotal column. Click the
link under the VirusTotal column. The default web browser opens with the results regarding the malicious
content of conhost.exe.
g. Right-click the cmd.exe process and select Kill Process. What happened to the child process
conhost.exe?
© Cisco and/or its affiliates. All rights reserved. Cisco Confidential Page 8 of 63 www.netacad.com
Lab – Monitor and Manage System Resources in Windows
Proses child tergantung pada proses Parent. Jadi, ketika proses Parent berhenti, proses child
juga berhenti.
c. Examine the details of the thread. What type of information is available in the Properties window?
Thread ID, CPU, Cycles Delta, Start Address
© Cisco and/or its affiliates. All rights reserved. Cisco Confidential Page 9 of 63 www.netacad.com
Lab – Monitor and Manage System Resources in Windows
© Cisco and/or its affiliates. All rights reserved. Cisco Confidential Page 10 of 63 www.netacad.com
Lab – Monitor and Manage System Resources in Windows
o HKEY_CURRENT_CONFIG stores the hardware information that is used at bootup by the local
computer.
b. In a previous step, you had accepted the EULA for Process Explorer. Navigate to the EulaAccepted
registry key for Process Explorer.
Click to select Process Explorer in HKEY_CURRENT_USER > Software > Sysinternals > Process
Explorer. Scroll down to locate the key EulaAccepted. Currently, the value for the registry key
EulaAccepted is 0x00000001(1).
© Cisco and/or its affiliates. All rights reserved. Cisco Confidential Page 11 of 63 www.netacad.com
Lab – Monitor and Manage System Resources in Windows
c. Double-click EulaAccepted registry key. Currently the value data is set to 1. The value of 1 indicates that
the EULA has been accepted by the user.
d. Change the 1 to 0 for Value data. The value of 0 indicates that the EULA was not accepted. Click OK to
continue.
What is value for this registry key in the Data column?
0x00000000(0) hexadecimal(decimal)
e. Open the Process Explorer. Navigate to the folder where you have downloaded SysInternals. Open the
folder SysInternalsSuite > Open procexp.exe.
When you open the Process Explorer, what did you see?
Kotak dialog Perjanjian Lisensi Process Explorer
© Cisco and/or its affiliates. All rights reserved. Cisco Confidential Page 12 of 63 www.netacad.com
Lab – Monitor and Manage System Resources in Windows
Required Resources
• A Windows PC
© Cisco and/or its affiliates. All rights reserved. Cisco Confidential Page 13 of 63 www.netacad.com
Lab – Monitor and Manage System Resources in Windows
b. The Manage Accounts window opens. Click Add a new user in PC settings.
© Cisco and/or its affiliates. All rights reserved. Cisco Confidential Page 14 of 63 www.netacad.com
Lab – Monitor and Manage System Resources in Windows
c. The Settings window opens. Click Add someone else to this PC.
d. The How will this person sign in? window opens. Click I don't have this person's sign-in
information.
© Cisco and/or its affiliates. All rights reserved. Cisco Confidential Page 15 of 63 www.netacad.com
Lab – Monitor and Manage System Resources in Windows
e. The Let's create your account window opens. Click Add a user without a Microsoft account.
© Cisco and/or its affiliates. All rights reserved. Cisco Confidential Page 16 of 63 www.netacad.com
Lab – Monitor and Manage System Resources in Windows
f. The Create an account for this PC window opens. Provide the necessary information to create the new
user account named User1. Click Next to create the new user account.
© Cisco and/or its affiliates. All rights reserved. Cisco Confidential Page 17 of 63 www.netacad.com
Lab – Monitor and Manage System Resources in Windows
Untuk mengakses akun administrator, seseorang harus keluar dari pengguna 1 dan masuk
sebagai administrator
© Cisco and/or its affiliates. All rights reserved. Cisco Confidential Page 18 of 63 www.netacad.com
Lab – Monitor and Manage System Resources in Windows
b. In the Change an Account window, click the User1 account. Click Change the account type.
© Cisco and/or its affiliates. All rights reserved. Cisco Confidential Page 19 of 63 www.netacad.com
Lab – Monitor and Manage System Resources in Windows
© Cisco and/or its affiliates. All rights reserved. Cisco Confidential Page 20 of 63 www.netacad.com
Lab – Monitor and Manage System Resources in Windows
b. Click OK to confirm the deletion. What is another way to delete a user account?
untuk menghapus akun pengguna cara lain adalah pergi ke pengaturan dan klik di atasnya setelah klik
pada akun dan klik pada keluarga dan orang lain dan klik pengguna di bawah ini yang Anda temukan
hapus melalui proses ini kami dapat menghapus
Reflection
1. Why is it important to protect all accounts with strong passwords?
kata sandi yang kuat akan melindungi komputer dan situs web login lainnya dari kami yang kuat
dapat melindungi dari peretas, jika kata sandi kita minggu, peretas akan diretas dan mereka akan
melakukannya mendapatkan akses, kata sandi harus diotorisasi
2. Why would you create a user with Standard privileges?
Akun pengguna standar lebih aman dan disarankan untuk suka menggunakan aplikasi dan tugas dan
menjelajahi web, dan akun administrator dicadangkan untuk itu, dan administratif seperti untuk
memperbarui sistem dan aplikasi
© Cisco and/or its affiliates. All rights reserved. Cisco Confidential Page 21 of 63 www.netacad.com
Lab – Monitor and Manage System Resources in Windows
Background / Scenario
PowerShell is a powerful automation tool. It is both a command console and a scripting language. In this lab,
you will use the console to execute some of the commands that are available in both the command prompt
and PowerShell. PowerShell also has functions that can create scripts to automate tasks and work together
with the Windows Operating System.
Required Resources
• 1 Windows PC with PowerShell installed and Internet access
© Cisco and/or its affiliates. All rights reserved. Cisco Confidential Page 22 of 63 www.netacad.com
Lab – Monitor and Manage System Resources in Windows
CommandTypeNameVersionSource
----------------------------
Aliasdir -> Get-ChildItem
© Cisco and/or its affiliates. All rights reserved. Cisco Confidential Page 23 of 63 www.netacad.com
Lab – Monitor and Manage System Resources in Windows
NETSTAT [-a] [-b] [-e] [-f] [-n] [-o] [-p proto] [-r] [-s] [-x] [-t] [interval]
-a Displays all connections and listening ports.
-b Displays the executable involved in creating each connection or listening port. In some cases well-known
executables host multiple independent components, and in these cases the sequence of components involved in
creating the connection or listening port is displayed. In this case the executable name is in [] at the bottom, on top is
the component it called, and so forth until TCP/IP was reached. Note that this option can be time-consuming and will
fail unless you have sufficient permissions.
<some output omitted>
b. To display the routing table with the active routes, enter netstat -r at the prompt.
PS C:\Users\CyberOpsUser> netstat -r
===========================================================================
Interface List
3...08 00 27 a0 c3 53 ......Intel(R) PRO/1000 MT Desktop Adapter
10...08 00 27 26 c1 78 ......Intel(R) PRO/1000 MT Desktop Adapter #2
1...........................Software Loopback Interface 1
===========================================================================
© Cisco and/or its affiliates. All rights reserved. Cisco Confidential Page 24 of 63 www.netacad.com
Lab – Monitor and Manage System Resources in Windows
© Cisco and/or its affiliates. All rights reserved. Cisco Confidential Page 25 of 63 www.netacad.com
Lab – Monitor and Manage System Resources in Windows
d. The netstat command can also display the processes associated with the active TCP connections. Enter
the netstat -abno at the prompt.
PS C:\Windows\system32> netstat -abno
© Cisco and/or its affiliates. All rights reserved. Cisco Confidential Page 26 of 63 www.netacad.com
Lab – Monitor and Manage System Resources in Windows
Active Connections
e. Open the Task Manager. Navigate to the Details tab. Click the PID heading so the PID are in order.
f. Select one of the PIDs from the results of netstat -abno. PID 756 is used in this example.
© Cisco and/or its affiliates. All rights reserved. Cisco Confidential Page 27 of 63 www.netacad.com
Lab – Monitor and Manage System Resources in Windows
g. Locate the selected PID in the Task Manager. Right-click the selected PID in the Task Manager to open
the Properties dialog box for more information.
What information can you get from the Details tab and the Properties dialog box for your selected PID?
PID 756 dikaitkan dengan proses svchost.exe. Pengguna untuk proses ini adalah LAYANAN
JARINGAN dan menggunakan memori 58,5Kb.
Confirm
Are you sure you want to perform this action?
Performing the operation "Clear-RecycleBin" on target "All of the contents of the Recycle Bin".
[Y] Yes [A] Yes to All [N] No [L] No to All [S] Suspend [?] Help (default is "Y"): y
© Cisco and/or its affiliates. All rights reserved. Cisco Confidential Page 28 of 63 www.netacad.com
Lab – Monitor and Manage System Resources in Windows
Reflection
PowerShell was developed for task automation and configuration management. Using the Internet, research
commands that you could use to simplify your tasks as a security analyst. Record your findings.
Penerbit sumber daya yang sangat berguna dengan serangkaian alat untuk memanfaatkan dan
bekerja dengan baik, ini memberi kita keuntungan besar karena membuat hidup kita lebih sederhana
dan lebih mudah pada saat pekerjaan seperti: iklan, kalender, antara lain .lain-lain.Selain itu, ini milik
MICROSOFT OFFICE, yang bahkan memiliki versi 2016 yang memungkinkan kita lebih jelas, alat,
presentasi dan keanggunan, seperti program ini, digunakan untuk membuat selebaran, halaman lipat,
kalender dan di antara iklan lainnya.
© Cisco and/or its affiliates. All rights reserved. Cisco Confidential Page 29 of 63 www.netacad.com
Lab – Monitor and Manage System Resources in Windows
Recommended Equipment
• A Windows PC with Internet access
Part 8: Starting and Stopping the Routing and Remote Access service
You will explore what happens when a service is stopped and then started. In this part, you will use routing
and remote access service as the example service. This service allows the local device to become a router or
a remote access server.
a. Click Start > Search and select Control Panel > Click Network and Sharing Center.
Note: If your Control Panel is set to View by: Category, change it to View by: Large icons or View by:
Small icons. This lab assumes that you are using one of these settings.
Step 2: Click Change adapter settings in the left pane. Reduce the size of the Network Connections
window and leave it open.
© Cisco and/or its affiliates. All rights reserved. Cisco Confidential Page 30 of 63 www.netacad.com
Lab – Monitor and Manage System Resources in Windows
Step 3: Navigate to the Administrative Tools. (Click Start > Search for and select Control Panel > Click
Administrative Tools)
Step 4: The Administrative Tools window opens. Double-click the Performance Monitor icon.
© Cisco and/or its affiliates. All rights reserved. Cisco Confidential Page 31 of 63 www.netacad.com
Lab – Monitor and Manage System Resources in Windows
Step 5: The Performance Monitor window opens. Make sure Performance Monitor in the left pane is
highlighted. Click the Freeze Display icon (pause button) to stop the recording.
© Cisco and/or its affiliates. All rights reserved. Cisco Confidential Page 32 of 63 www.netacad.com
Lab – Monitor and Manage System Resources in Windows
Step 6: Right-click the Performance Monitor menu bar and select Clear to clear the graph. Leave this
window open.
© Cisco and/or its affiliates. All rights reserved. Cisco Confidential Page 33 of 63 www.netacad.com
Lab – Monitor and Manage System Resources in Windows
Step 8: Expand the width of the Services window so you have a clear view of the content. Scroll down in the
right pane until you see the service Routing and Remote Access. Double-click Routing and Remote
Access.
Step 9: The Routing and Remote Access Properties (Local Computer) window opens. In the Startup type
drop-down field, select Manual and then click Apply.
The Start button is now active. Do NOT click the Start button yet. Leave this window open.
Step 10: Navigate to Performance Monitor window. Click the Unfreeze Display icon to start the recording.
© Cisco and/or its affiliates. All rights reserved. Cisco Confidential Page 34 of 63 www.netacad.com
Lab – Monitor and Manage System Resources in Windows
Step 11: Click the Routing and Remote Access Properties (Local Computer) window. To start the service,
click Start. A window with a progress bar opens.
Step 12: The Routing and Remote Access Properties (Local Computer) window now shows the Stop and
Pause button active. Leave this window open
Step 13: Navigate to Network Connections window. Press the function key F5 to refresh the content.
What changes appear in the window after starting the Routing and Remote Access service?
Ikon Incoming Connections sekarang ditampilkan.
Step 14: Navigate to Routing and Remote Access Properties (Local Computer) window and click Stop.
Step 15: Navigate to Network Connections window.
Ikon Incoming Connections tidak lagi ditampilkan.
© Cisco and/or its affiliates. All rights reserved. Cisco Confidential Page 35 of 63 www.netacad.com
Lab – Monitor and Manage System Resources in Windows
What changes appear in the right pane after stopping the Routing and Remote Access service?
Step 16: Navigate to Performance Monitor window and click the Freeze Display icon to stop the recording.
Which Counter is being recorded the most in the graph (hint: look at the graph color and Counter color)?
%Processor Time.
Step 17: Click the Change graph type drop-down menu, select Report.
© Cisco and/or its affiliates. All rights reserved. Cisco Confidential Page 36 of 63 www.netacad.com
Lab – Monitor and Manage System Resources in Windows
© Cisco and/or its affiliates. All rights reserved. Cisco Confidential Page 37 of 63 www.netacad.com
Lab – Monitor and Manage System Resources in Windows
Step 21: Click the Performance Monitor window. Click the Unfreeze Display icon to start the recording.
Step 22: Close all open windows you opened during Part 1 of this lab.
c. Click the arrow next to Event Viewer then click the arrow next to Windows Logs. Select System.
© Cisco and/or its affiliates. All rights reserved. Cisco Confidential Page 38 of 63 www.netacad.com
Lab – Monitor and Manage System Resources in Windows
Step 4: The Event Properties window opens for the first event. Click the down arrow key to locate an event
for Routing and Remote Access. You should find four events that describe the order for starting and
stopping the Routing and Remote Access service.
© Cisco and/or its affiliates. All rights reserved. Cisco Confidential Page 39 of 63 www.netacad.com
Lab – Monitor and Manage System Resources in Windows
© Cisco and/or its affiliates. All rights reserved. Cisco Confidential Page 40 of 63 www.netacad.com
Lab – Monitor and Manage System Resources in Windows
Step 2: The Create new Data Collector Set window opens. In the Name field, type Memory Logs. Select
the Create manually (Advanced) radio button, and click Next.
© Cisco and/or its affiliates. All rights reserved. Cisco Confidential Page 41 of 63 www.netacad.com
Lab – Monitor and Manage System Resources in Windows
Step 3: The What type of data do you want to include? screen opens. Check the Performance counter
box then click Next.
Step 4: The Which performance counters would you like to log? screen opens. Click Add.
© Cisco and/or its affiliates. All rights reserved. Cisco Confidential Page 42 of 63 www.netacad.com
Lab – Monitor and Manage System Resources in Windows
Step 5: From the list of available counters, locate and expand Memory. Select Available MBytes and click
Add>>.
Step 6: You should see the Available MBytes counter added in the right pane. Click OK.
© Cisco and/or its affiliates. All rights reserved. Cisco Confidential Page 43 of 63 www.netacad.com
Lab – Monitor and Manage System Resources in Windows
Step 8: In the Where would you like the data to be saved? screen, click Browse.
© Cisco and/or its affiliates. All rights reserved. Cisco Confidential Page 44 of 63 www.netacad.com
Lab – Monitor and Manage System Resources in Windows
Step 9: The Browse For Folder window opens. Select your (C:) drive which is Local Disk (C:) in the figure
below. Select PerfLogs and click OK.
Step 10: The Where would you like the data to be saved? window opens with the directory information that
you selected in the previous step. Click Next.
© Cisco and/or its affiliates. All rights reserved. Cisco Confidential Page 45 of 63 www.netacad.com
Lab – Monitor and Manage System Resources in Windows
Step 11: The Create the data collector set? screen opens. Click Finish.
Step 12: Expand User Defined, and select Memory Logs. Right-click Data Collector01and select
Properties.
© Cisco and/or its affiliates. All rights reserved. Cisco Confidential Page 46 of 63 www.netacad.com
Lab – Monitor and Manage System Resources in Windows
Step 13: The DataCollector01 Properties window opens. Change the Log format: field to Comma
Separated.
© Cisco and/or its affiliates. All rights reserved. Cisco Confidential Page 47 of 63 www.netacad.com
Lab – Monitor and Manage System Resources in Windows
Step 16: Select the Memory Logs icon in the left pane of the Performance Monitor window. Click the green
arrow icon to start the data collection set. Notice a green arrow is placed on top of the Memory Logs
icon.
Step 17: To force the computer to use some of the available memory, open and close a browser.
© Cisco and/or its affiliates. All rights reserved. Cisco Confidential Page 48 of 63 www.netacad.com
Lab – Monitor and Manage System Resources in Windows
Step 18: Click the black square icon to stop the data collection set.
© Cisco and/or its affiliates. All rights reserved. Cisco Confidential Page 49 of 63 www.netacad.com
Lab – Monitor and Manage System Resources in Windows
Note: If the Windows cannot open the file: message is displayed, select the radio button Select a
program from a list of installed programs > OK > Notepad > OK.
Step 22: The Performance Monitor > Confirm Delete window opens. Click Yes.
Step 23: Open drive C: > PerfLogs folder. Right-click on the folder that was created to hold the Memory log
file, then click Delete.
Step 24: The Delete Folder window opens. Click Yes.
Step 25: Close all open windows.
© Cisco and/or its affiliates. All rights reserved. Cisco Confidential Page 50 of 63 www.netacad.com
Lab – Windows Task Manager
Introduction
In this lab, you will explore Task Manager and manage processes from within Task Manager.
Part 1: Working in the Processes tab
Part 2: Working in the Services tab
Part 3: Working in the Performance tab
Background / Scenario
The Task Manager is a system monitor program that provides information about the processes and programs
running on a computer. It also allows the termination of processes and programs and modification of process
priority.
Required Resources
• A Windows PC with Internet access
© Cisco and/or its affiliates. All rights reserved. Cisco Confidential Page 51 of 63 www.netacad.com
Lab – Windows Task Manager
c. Click More details to see all the processes that are listed in the Processes tab.
d. Expand the Windows Command Processor heading. What is listed under this heading?
Command Prompt
e. There are three categories of processes listed in the Processes tab: Apps, Background processes, and
Windows processes.
o The Apps are the applications that you have opened, such as Microsoft Edge, Task Manager, and
Windows Command Processor, as shown in the figure above. Other applications that are opened by
the users, such as web browsers and email clients, will also be listed here.
o The Background processes are executed in the background by applications that are currently open.
o The Windows processes are not shown in the figure. Scroll down to view them on your Windows PC.
Windows processes are Microsoft Windows services that run in the background.
© Cisco and/or its affiliates. All rights reserved. Cisco Confidential Page 52 of 63 www.netacad.com
Lab – Windows Task Manager
Some of the background processes or Windows processes may be associated with foreground
processes. For example, if you open a command prompt window, the Console Window Host process will
be started in the Windows process section, as shown below.
f. Right-click Console Window Host and select Properties. What is the location of this filename and
location of this process?
Nama file terkait adalah conhost.exe dan terletak di folder C:\Windows\System32.
g. Close the command prompt window. What happens to Windows Command Processor and Console
Window Host when the command prompt window is closed?
Proses terkait telah berakhir dan tidak lagi terdaftar di Task Manager.
© Cisco and/or its affiliates. All rights reserved. Cisco Confidential Page 53 of 63 www.netacad.com
Lab – Windows Task Manager
Step 2: Click the Memory heading. Click the Memory heading a second time.
© Cisco and/or its affiliates. All rights reserved. Cisco Confidential Page 54 of 63 www.netacad.com
Lab – Windows Task Manager
© Cisco and/or its affiliates. All rights reserved. Cisco Confidential Page 55 of 63 www.netacad.com
Lab – Windows Task Manager
© Cisco and/or its affiliates. All rights reserved. Cisco Confidential Page 56 of 63 www.netacad.com
Lab – Windows Task Manager
© Cisco and/or its affiliates. All rights reserved. Cisco Confidential Page 57 of 63 www.netacad.com
Lab – Windows Task Manager
© Cisco and/or its affiliates. All rights reserved. Cisco Confidential Page 58 of 63 www.netacad.com
Lab – Windows Task Manager
© Cisco and/or its affiliates. All rights reserved. Cisco Confidential Page 59 of 63 www.netacad.com
Lab – Windows Task Manager
© Cisco and/or its affiliates. All rights reserved. Cisco Confidential Page 60 of 63 www.netacad.com
Lab – Windows Task Manager
© Cisco and/or its affiliates. All rights reserved. Cisco Confidential Page 61 of 63 www.netacad.com
Lab – Windows Task Manager
© Cisco and/or its affiliates. All rights reserved. Cisco Confidential Page 62 of 63 www.netacad.com
Lab – Windows Task Manager
Step 4: Click Open Resource Monitor to open the Resource Monitor utility from the Performance tab in Task
Manager.
Reflection
Why is it important for an administrator to understand how to work within the Task Manager?
Pengelola Tugas dapat menjadi alat yang berharga bagi administrator saat memecahkan masalah
dengan PC Windows. Ini memberikan informasi tentang CPU, memori, disk, dan penggunaan jaringan.
Ini juga menyediakan cara untuk mengakhiri tugas atau membatalkan proses.
© Cisco and/or its affiliates. All rights reserved. Cisco Confidential Page 63 of 63 www.netacad.com