Chapter 7 Windows 7 Configuration
Which version of internet explorer comes with windows 7?
What of the following is included with internet explorer 8 that enables the browser to display older pages properly?
Which add-on enables users to send text or other media that you select in an IE browser window to another application, such as an email client or an internet resource, such as a blog?
What of the following is based on push technology used with internet Explorer that notifies you when a Web site is changed?
What of the following is used to help prevent attackers that penetrate the computer’s defense from accessing vital system components?
Which of the following configures internet explroer to only low integrity disk locations, such as temporary internet files and standard IE storage areas including the History, Cookies and Favorite Folders.
you are visiting a web site that worked fine when you were using internet explorer 6 on windows xp machine. However, you suspect that this web site is not compatible with windows explorer 8’s protected mode which of the following should you not do when trouble shooting this problem?>
Run internet explorer as a Domain Admin
Which of the following is not a available security zone found in internet explorer?
Which security zone used in internet explorer provides the most elevated set of privileges?
Which security zone used in internet explorer is used for all web sites that are not listed in the other three zones?
Which security zone used in internet explorer and usually used by local web sites does not run in protected mode and has significant access to the system, including the ability to run certain scripts?
What technology is used with IE 8 to help defend against phishing?
What Feature found in internet explorer 8 enables you to surf the internet without leaving any record of your activities?
You Open Intern Options in Internet Explorer 8.0 Which tab do you use to enable or disable the pop up blocker?
Which of the following is used in internet explorer and is a text file that contains information about you and your web surfing habits that a web site maintains on your computer?
How do you know if you are using SSL, while browsing with internet explorer?
you have a gold lock in the address bar
When using SSL Communications, the public key is stored in a BLANK
what program that comes with Windows 7 is a wizard-based solution that users or administrators can use to automatically configure an executable file to use an appropriate windows 7 compatibility mechanism?
program compatibility troubleshooter
when you open the properties of an executable file, which of the following is NOT a compatibility mode setting?
Run the program black and white
You have a program that ran on your windows xp machine that was running sp2 you try to install the program on windows 7 but it does not run. what should you try first to overcome this problem?
Configure a Windows emulation Mode
For application incompatibility that are not readily solvable with Windows 7 compatibility mode settings, Microsoft has released the BLANK a collection of programs that enables administrators to gather information about incompatibility between specific applications and windows 7 and create customized solutions that enable applications to run,
application compatibility toolkit
A compatibility fix, formerly known as a BLANK is a software component that sits between an application and the operating system.
what specialized program collects compatibility information for web pages and web based applications?
Internet Explorer compatibility Test tool
If you have a program that ran in windows xp but does not run in windows 7, what should load to run the program?
Windows XP Mode
Software restriction policies and Applocker are configured through BLANK?
BLANK can provide an interface between the browser and another software product or between the browser and a specific set on the internet?
BLANK Describes any attempt to penetrate the security of a system by convincing people to disclose secret information
Blank is a technique that takes social engineering to a mass scale that uses convincing-looking websites that urge users to supply personal information, such as passwords and account number?
Blank are useful Web site controls, most are simply annoying advertisements, and few can even be a source of spyware or other malicious programs?