Security Through Settings
Identify settings that should be configured in a new user account to minimize the risk of a security breach to the user's system via the Internet (e.g., account type, group access, and share permissions).
Explain the consequences for not configuring these settings.