Fill This Form To Receive Instant Help

Help in Homework
trustpilot ratings
google ratings


Homework answers / question archive / Knowledge Assessment Lesson 7 Multiple Choice Select one or more correct answers for each of the following questions

Knowledge Assessment Lesson 7 Multiple Choice Select one or more correct answers for each of the following questions

Computer Science

Knowledge Assessment Lesson 7

Multiple Choice

Select one or more correct answers for each of the following questions.

1)       What are the names of the two security zones in Internet Explorer that have no sites in them by default? (Choose all that apply.)

a.       Internet

b.       Local intranet

c.        Trusted sites

d.       Restricted sites

2.       Which of the following is NOT one of the add-on types supported by Internet Explorer?

a.       Toolbars and Extensions

b.       Search Providers

c.        Accelerators

d.       SmartScreen Filtering

3.       What does a broken window icon in the Internet Explorer address bar indicate?

a.       A failure to successfully download a certificate from the website

b.       A web page that is incompatible with Internet Explorer

c.        A failure to update a subscribed RSS feed

d.       A failure to print a document from Internet Explorer

4.       Which of the following can be used to highlight content in a browser window instead of typing content directly into the browser’s search box?

a.       Accelerator

b.       Search Provider

c.        RSS Feed

d.       Toolbars and Extensions

  

   When downloading a file from a website in IE 11, the browser’s built-in download manager manages the process. Which of the following are valid options from within the download manager? (Choose all that apply.)

a.       Download and run the selected file.

b.       Download and save the selected file into the program’s default folder.

c.        Download and save the selected file to another folder.

d.       Cancel the download.

[JL3]   Which of the following are true regarding IE in Windows 8.1 and the use of mandatory integrity control? (Choose all that apply.)

a.       IE runs as a low integrity access level

b.       IE runs at a medium integrity access level

c.        IE can write to the History, Cookies, and Favorites folders

d.       IE runs at a high integrity access level

[JL4]   By default, there are no sites included in which of these IE security zones; you must add them manually. (Choose all that apply.)

a.       Trusted Sites

b.       Restricted Sites

c.        Local Intranet

d.       Internet

[JL5]   Which of the following represent techniques used by IE to identify potential phishing websites? (Choose all that apply.)

a.       Online lookup of phishing sites

b.       Onsite analysis

c.        Online lookup of download sites

d.       Offline lookup of download sites

Best Answer

Choose the letter that corresponds to the best answer. More than one answer choice may achieve the goal. Select the BEST answer.

1.       The company is designing a new web-based application that is likely to require extensive access to system resources. Users will connect to it over their local network segment. To make sure the application works as planned, in which security zone should the website be placed to allow it to function at its full capability?

a.     Trusted Sites zone

b.     Internet zone

c.     Local Intranet zone

d.     Restricted Sites zone

2.       A new company has just installed Windows 8.1 on their computers. They want to be able to protect themselves against phishing attacks. Which of these combinations will ensure they are using the best approach to defend against these types of attacks?

a.     Prevent browsing to any sites that are not included in the Trusted Sites zone

b.     Educate users on how to recognize phishing attacks and use SmartScreen Filter to display warnings if the site is suspicious

c.     Prevent browsing to any sites that are not included in the Local Intranet zone

d.     Place a list of known phishing sites into each user’s Restricted Sites zone

3.       Several users on the network do sensitive research for the company using IE on 50 Windows 8.1 computers. They do not want IE to maintain a permanent record of their activities during their browser sessions? What is the best approach to use to address their need?

a.     Configure InPrivate Browsing on each of the computers.

b.     Configure InPrivate Browsing on a subset of the computers and direct the users to only browse when working at those computers.

c.     Configure InPrivate Browsing using Group Policy and apply it to the users’ computers.

d.     Configure InPrivate Browsing using Group Policy and apply it to a subset of the computers; ask users to work on those computers only.

4.       In Windows 8.1, IE runs in protected mode. Which of the following best describes the capabilities of IE when running in this mode?

a.     IE can write to the Temporary Internet files folder.

b.     IE can write to the Temporary Internet files and the History folders.

c.     IE can write to the Temporary Internet files, History, and Cookies folders.

d.     IE can write to the Temporary Internet files, History, Cookies, and Favorites folder.

5.       The company is considering upgrading to Windows 8.1 but is concerned that some of their web-based applications may not be compatible. What is the best way to test for incompatibilities?

a.     Upgrade a few computers to Windows 8.1 and ask users to report any problems they have to the help desk.

b.     Upgrade all computers to Windows 8.1 and ask users to report any problems they have to the help desk.

c.     Upgrade a subset of computers that use all the web-based applications and turn on Compatibility Logging via the Local Group policy.

d.     Upgrade a subset of computers that use all the web-based applications. Ask users to report any problems. If problems are found, clear the Enable Protected Mode checkbox in the Local Intranet zone.

Matching and Identification

1.             Complete the following exercise by matching the terms with their corresponding definitions.

           a)  Add-ons

           b)  Social engineering

           c)  security zones

           d)  accelerators

           e)  SmartScreen Filter

           f)  Protected mode

           g)  InPrivate Mode

           h)  Compatibility View

  1. Describes any attempt to penetrate the security of a system by convincing people to disclose secret information.
  2. Enables browser to display older pages properly.
  3. Enables surfing the Internet without leaving any record of your activities.
  4. Enable users to highlight content in a browser window instead of using the search box.
  5. Examines traffic for evidence of phishing activity.
  6. Used by Internet Explorer to divide websites and assign different sets of privileges to each.
  7. Provides a way to run Internet Explorer with highly reduced privileges.
  8. Software components that interact with the basic functions of the web browser.

Build a List

1.       In order of first to last, specify the correct order of steps to configure a default Search Provider.

        On the Start screen, click the Desktop tile.

        Click the Tools icon, and from the context menu that appears, select Manage Add-ons.

        Select one of the search providers you installed earlier and click Set as default.

        Select Search providers in the Add-on types list.

        Click Close.

        In the taskbar, click the Internet Explorer icon.

2.       Specify the correct order of steps to add a site to a Security Zone.

        Click the Tools icon and select Internet Options.

        In the taskbar, click the Internet Explorer icon.

        Type the URL of the website you want to add to the zone into the Add this website to the zone text box, and then click Add.

        Click Sites.

        On the Start screen, click the Desktop tile.

        Click Close to close the Trusted sites or Restricted sites dialog box.

        Select the zone, either Trusted sites or Restricted sites, to which you want to add a site.

        Click OK to close the Internet Properties sheet.

        Click the Security tab.

 

Option 1

Low Cost Option
Download this past answer in few clicks

8.87 USD

PURCHASE SOLUTION

Already member?


Option 2

Custom new solution created by our subject matter experts

GET A QUOTE