Upgrade to remove ads
MOAC 70-687 Lesson 8 Knowledge Assessment
Terms in this set (27)
What are the names of the two security zones in IE that have no sites in them by default?
c.Trusted sites d.Restricted sites
Which of the following is NOT one of the add-on types supported by IE8?
What does a broken window icon in the IE8 address bar indicate?
b. A webpage that is incompatible with IE8
Which of the following can be used to highlight content in a browser window instead of typing content directly into the browser's search box?
When you subscribe to an RSS Feed in IE, the content is updated how frequently by default?
When downloading a file from a website in IE10, the browser's built-in download manager manages the process. Which of the following are valid options from within the download manager?
a. Download and run the selected file. b. Download and save the selected file into the program's default folder. c. Download and save the selected file to another folder. d. Cancel the download.
Which of the following best describes the role of a WebSocket?
c. Allows clients and servers to exchange data immediately as it becomes available. d. An open connection between client and server that remains open as long as the systems have data to exchange.
Which of the following are true regarding IE in Windows 8 and the use of mandatory integrity control?
a. IE runs as a low integrity access level. c. IE can write to the History, Cookies, and Favorites folders.
By default, there are no sites included in which of these IE security zones; you must add them manually.
a.Trusted sites b.Restricted sites
Which of the following represent techniques used by IE to identify potential phishing websites?
a. Online lookup of phishing sites b. Onsite analysis c. Online lookup of download sites
The company is designing a new web-based application that is likely to require extensive access to system resources. Users will connect to it over their local network segment. To make sure the application works as planned, in which security zone should the website be placed to allow it to function at its full capability?
c. Local intranet zone
A new company has just installed Windows 8 on their computers. They want to be able to protect themselves against phishing attacks. Which combinations below will ensure they are using the best approach to defend against these types of attacks?
b. Educate users on how to recognize phishing attacks and use SmartScreen Filter to display warnings if the site is suspicious.
Several users on the network do sensitive research for the company using IE on 50 Windows 8 computers. They do not want IE to maintain a permanent record of their activities during their browser sessions? What is the best approach to use to address their need?
c. Configure InPrivate Browsing using Group Policy and apply it to the users' computers.
In Windows 8, IE runs in protected mode. Which of the following best describes the capabilities of IE when running in this mode?
d.IE can write to the Temporary Internet files, History, Cookies, and Favorites folder.
The company is considering upgrading to Windows 8 but is concerned that some of their web-based applications may not be compatible. What is the best way to test for incompatibilities?
c. Upgrade a subset of computers that use all of the web-based applications and turn on compatibility logging via the Local Group policy.
Describes any attempt to penetrate the security of a system by convincing
people to disclose secret information.
Enables browser to display older pages properly.
Enables clients and servers to exchange data immediately.
Enables surfing the Internet without leaving any record of your activities.
Enable users to highlight content in a browser window instead of using the search box.
A push technology that simplifies the process of delivery updated content
to designated users.
Examines traffic for evidence of phishing activity.
Used by IE to divide websites and assign different sets of privileges to each.
Lesson 8 - Matching and Identification) Security zones
Provides a way to run IE with highly reduced privileges.
Software components that interact with the basic functions of the web browser.
THIS SET IS OFTEN IN FOLDERS WITH...
70-698 MOAC Lesson 4 Key Terms
70-698 MOAC Lesson 3 Key Terms
Exam 70-687 Configuring Windows 8 - Lessons 1-8
70-698 MOAC Lesson 2 Key Terms
YOU MIGHT ALSO LIKE...
SY0 501 July01
Edgar Info Sec+
OTHER SETS BY THIS CREATOR
SQL Database Warehousing
Stats Chapter 1, 2, 3
OTHER QUIZLET SETS
unit 1 history
Internal Auditing Ch 5
Pathophysiology Unit 4
Government - Ch.1 Test (Multiple Choice)