IE 8
IE 7
IE 9
IE 6
2. What of the following is included with Internet Explorer 8 that enables the browser to display older pages properly?
Compatibility View
IE7 Mode
Down View
Page View
3. Which add-on enables users to send text or other media that you select in an IE browser window to another application, such as an email client, or an Internet resource, such as a blog?
Accelerators
Toolbars and Extensions
InPrivate Filtering
Search Providers
4. What of the following is based on a push technology used with Internet Explorer that notifies you when a Web site is changed?
InPrivate Filtering
SmartScreen Filtering
RSS
Protected mode
5. Which of the following is used to help prevent …show more content…
attackers that penetrate the computer’s defense from accessing vital system components?
RSS
Protected mode
SmartScreen Filtering
InPrivate Filtering
6.
Which of the following configures Internet Explorer to only low-integrity disk locations, such as the Temporary Internet Files and the standard IE storage areas, including the History, Cookies, and Favorites folders?
SmartScreen Filtering
InPrivate Filtering
Protected mode
RSS
7. You are visiting a Web site that worked fine when you were using Internet Explorer 6 on a Windows XP machine. However, you suspect that this Web site is not compatible with Internet Explorer 8’s protected mode. Which of the following should you NOT do when troubleshooting this problem?
Move the site to the Trusted Sites zone.
Modify the application.
Run Internet Explorer as a domain administrator.
Disable protected mode in IE.
8. Which of the following is NOT an available security zone found in Internet Explorer?
Trusted Sites
Internet
Custom Sites
Local Intranet
9. Which security zone used in Internet Explorer provides the most elevated set of privileges?
Local Intranet
Trusted Sites
Internet
Restricted Sites
10. Which security zone used in Internet Explorer is used for all Web sites that are not listed in the other three zones?
Local Intranet
Restricted Sites
Trusted Sites
Internet
11. Which security zone used in Internet Explorer and usually used by local Web sites does not run in protected mode and has significant access to the system, including the ability to run certain scripts?
Internet
Restricted Sites
Trusted Sites
Local Intranet
12. What technology is used with IE 8 to help defend against phishing?
SmartScreen Filtering
RSS
Protected mode
InPrivate Filtering
13. What feature found in Internet Explorer 8 enables you to surf the Internet without leaving any record of your activities?
RSS
Protected mode
SmartScreen Filtering
InPrivate Filtering
14. You open Internet Options in Internet Explorer 8.0. Which tab do you use to enable or disable the pop-up blocker?
General
Advanced
Security
Privacy
15. Which of the following is used in Internet Explorer and is a text file that contains information about you and your web-surfing habits that a Web site maintains on your computer?
Cookie
Digital certificate
Digital signature
Phishing filter
16. How do you know if you are using SSL while browsing with Internet Explorer?
You have a red exclamation point on the address bar
You have a gold lock in the address bar
You have a broken page button on the address bar
You have a blue eye on the address bar.
17. When using SSL communications, the public key is stored in a _______________
Cookie
Digital certificate
RSS Feed
Secure Socket
18. What program that comes with Windows 7 is a wizard-based solution that users or administrators can use to automatically configure an executable file to use an appropriate Windows 7 compatibility mechanism?
Program Rights and Attributes Configurator
Program Compatibility Troubleshooter
Windows 7 Program Programmer
Program Compatibility Looker
19. When you open the properties of an executable file, which of the following is NOT a compatibility mode setting?
Run This Program as an Administrator
Run This Program in Black and White
Run in 256 Colors
Run in 640 x 480 screen resolution
20. You have a program that ran on your Windows XP machine that was running SP2. You try to install the program on Windows 7, but it does not run. What should you try first to overcome this problem?
Modify the NTFS permissions for the folder where the program is.
Configure a Windows emulation mode.
Add all users to the Administrators group.
Add all users to the Power Users group.
21. For application incompatibilities that are not readily solvable with the Windows 7 compatibility mode settings, Microsoft has released the ________________________, a collection of programs that enables administrators to gather information about incompatibilities between specific applications and Windows 7 and create customized solutions that enable those applications to run.
Application Compatibility Toolkit
Program Compatibility Looker
Windows 7 Program Programmer
Program Rights and Attributes Configurator
22. A compatibility fix, formerly known as a _________, is a software component that sits between an application and the operating system.
DSC
SMP shim PIN
23. What specialized program collects compatibility information for web pages and web-based applications?
Application Compatibility Toolkit
Program Rights and Attributes Configurator
Internet Explorer Compatibility Test Tool
Windows 7 Program Programmer
24. If you have a program that ran in Windows XP but does not run in Windows 7, what should you load to run the program?
Application Compatibility Toolkit
Program Rights and Attributes Configurator
Windows 7 Program Programmer
Windows XP Mode
25. Software Restriction policies and AppLocker are configured through ______________.
Registry
Control Panel
Administrative Tools
Group policies
26. __________________ can provide an interface between the browser and another software product or between the browser and a specific set on the Internet.
Add-ons
27. ____________________describes any attempt to penetrate the security of a system by convincing people to disclose secret information.
Social Engineering
28. ___________________ is a technique that takes social engineering to a mass scale that uses convincing-looking Web sites that urge users to supply personal information, such as passwords and account numbers.
Phishing
29. ____________________ are useful Web site controls, most are simply annoying advertisements, and few can even be a source of spyware or other malicious programs.
Pop-Ups
30. Using InPrivate Mode: establishes a rules-based access control mechanism for applications. provides a collection of compatabily fixes. provides a method for classifying Web sites, based on their potential dangers. prevents Internet Explorer from logging a browser history.