Preview

Nt1310 Unit 3

Powerful Essays
Open Document
Open Document
1041 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Nt1310 Unit 3
1. Which version of Internet Explorer comes with Windows 7?
IE 8
IE 7
IE 9
IE 6

2. What of the following is included with Internet Explorer 8 that enables the browser to display older pages properly?
Compatibility View
IE7 Mode
Down View
Page View

3. Which add-on enables users to send text or other media that you select in an IE browser window to another application, such as an email client, or an Internet resource, such as a blog?
Accelerators
Toolbars and Extensions
InPrivate Filtering
Search Providers

4. What of the following is based on a push technology used with Internet Explorer that notifies you when a Web site is changed?
InPrivate Filtering
SmartScreen Filtering
RSS
Protected mode

5. Which of the following is used to help prevent
…show more content…

Which of the following configures Internet Explorer to only low-integrity disk locations, such as the Temporary Internet Files and the standard IE storage areas, including the History, Cookies, and Favorites folders?
SmartScreen Filtering
InPrivate Filtering
Protected mode
RSS

7. You are visiting a Web site that worked fine when you were using Internet Explorer 6 on a Windows XP machine. However, you suspect that this Web site is not compatible with Internet Explorer 8’s protected mode. Which of the following should you NOT do when troubleshooting this problem?
Move the site to the Trusted Sites zone.
Modify the application.
Run Internet Explorer as a domain administrator.
Disable protected mode in IE.

8. Which of the following is NOT an available security zone found in Internet Explorer?
Trusted Sites
Internet
Custom Sites
Local Intranet

9. Which security zone used in Internet Explorer provides the most elevated set of privileges?
Local Intranet
Trusted Sites
Internet
Restricted Sites

10. Which security zone used in Internet Explorer is used for all Web sites that are not listed in the other three zones?
Local Intranet
Restricted Sites
Trusted Sites


You May Also Find These Documents Helpful

  • Satisfactory Essays

    Nt1310 Unit 3

    • 435 Words
    • 2 Pages

    A circle has an area of 153.86 square inches. Using 3.14 for pi, find the radius and circumference of the circle. Round your answer to the nearest hundredth when necessary.....A…

    • 435 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nt1310 Unit 3

    • 659 Words
    • 3 Pages

    Program description: I calculated the usable area in square feet of a house. Assume that the house has a maximum of four rooms, and that each room is rectangular. I wrote pseudo code statements to declare 4 Integers and labeled them homesqft, room1, room2, room3, and room4. Each room will have its length and width to calculate its area.…

    • 659 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Nt1330 Unit 4

    • 920 Words
    • 4 Pages

    4. Which of the following is not required when configuring port security without sticky learning?…

    • 920 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    M6 Assignment

    • 387 Words
    • 2 Pages

    2. Move the site to the Trusted Sites zone, disable protected mode on IE, and modify the application.…

    • 387 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Nt1310 Unit 3

    • 2062 Words
    • 9 Pages

    This depends on whether they have a wireless router or wired, if they have a wireless router then some internet ready televisions have wireless ability. Either way would work though running an Ethernet cable from the router into the back of the television would give the internet connect that is needed. Looking at the VoIP (Voice over IP) I would suggest Vonage as the service carrier for phone. The phone adapter and software needed for the VoIP is normally included with the purchase of Vonage phone service. The question is rather vague so not sure what other devices they would want to share between the computers that are networked in this scenario.…

    • 2062 Words
    • 9 Pages
    Good Essays
  • Good Essays

    Nt1330 Unit 7 Lab 1

    • 566 Words
    • 3 Pages

    9: This is the final step, Close all browser windows and open a "Command Prompt" (Start Menu >…

    • 566 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    NT 1210, Unit 3 Homework

    • 1335 Words
    • 5 Pages

    b. It exists as a deployed network device, which people can visit on the Internet.…

    • 1335 Words
    • 5 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Solution: This security update resolves seven privately reported vulnerabilities and one publicly disclosed vulnerability in Internet Explorer. The more severe vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.…

    • 272 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    Winsec2E Lab02 AW

    • 294 Words
    • 2 Pages

    4. List at least three different types of access control permissions you can enable for…

    • 294 Words
    • 2 Pages
    Powerful Essays
  • Good Essays

    NT2580 Unit 1

    • 578 Words
    • 3 Pages

    A second domain that is affected is the Workstation Domain. The Workstation Domain is where most users connect to the IT infrastructure. A workstation can be a desktop computer, laptop or any device that connects to the network. A role of the workstation domain is that the organization’s staff should have the access necessary to be productive. Some tasks included are configuring hardware, hardening systems, and verifying antivirus files. Threats that are included in the Workstation Domain include Unauthorized access to the workstation, Desktop/laptop computer operating system software vulnerabilities, viruses, and downloading content like photos/music via the Internet. To protect from unauthorized access, enable…

    • 578 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    IS 3340 FINAL EXAM QUESTIONS

    • 1651 Words
    • 13 Pages

    4. Which among the following is the best reason to define security groups while configuring access…

    • 1651 Words
    • 13 Pages
    Powerful Essays
  • Good Essays

    Lesson 9

    • 673 Words
    • 3 Pages

    ___c____ 3. This Default Security Level in Software Restriction Policies will disallow any executable that requires administrative rights to run.…

    • 673 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    UNIT 2 Assignment 2

    • 1272 Words
    • 6 Pages

    5. A student makes a video recording of a professor teaching a class. The student posts the video to a website. The answers list information that the student used or chose on the computer on which he was processing the video. Which of the following answers is the least likely to impact the size of the video file?…

    • 1272 Words
    • 6 Pages
    Satisfactory Essays
  • Powerful Essays

    An example of Mozilla Firefox 3.5 with two tabs open. Each tab shows a different webpage, thus saving screen space by not requiring multiple windows.…

    • 1625 Words
    • 7 Pages
    Powerful Essays
  • Satisfactory Essays

    To Downlaod from Restube

    • 555 Words
    • 3 Pages

    IE7Pro is a plugin for the Internet Explorer web browser. It allows you to change how your favorite pages behave and look. There are many scripts that have already been written, and if you know javascript you can easily create your own! This site is a repository to download and install IE user scripts.…

    • 555 Words
    • 3 Pages
    Satisfactory Essays

Related Topics