Chapter 7 Flashcards
Which version of Internet Explorer comes with Windows 7?
IE 6
IE 7
IE 8
IE 9
IE 8
What of the following is included with Internet Explorer 8 that enables the browser to display older pages properly?
Compatibility View
Down View
Page View
IE7 mode
Compatibility View
Which add-on enables users to send text or other media that you select in an IE browser window to another application, such as an email client, or an Internet resource, such as a blog?
Toolbars and Extensions
Search Providers
Accelerators
InPrivate Filtering
Accelerators
Which of the following is NOT an available security zone found in Internet Explorer?
Internet
Custom Sites
Local Intranet
Trusted Sites
Custom Sites
Which security zone used in Internet Explorer provides the most elevated set of privileges?
Internet
Restricted Sites
Local Intranet
Trusted Sites
Trusted Sites
You open Internet Options in Internet Explorer 8.0. Which tab do you use to enable or disable the pop-up blocker?
General
Security
Privacy
Advanced
Privacy
How do you know if you are using SSL while browsing with Internet Explorer?
You have a blue eye on the address bar.
You have a broken page button on the address bar.
You have a red exclamation point on the address bar.
You have a gold lock in the address bar.
You have a gold lock in the address bar.
When you open the properties of an executable file, which of the following is NOT a compatibility mode setting? Run in 640 x 480 screen resolution Run This Program as an Administrator Run This Program in Black and White Run in 256 Colors
Run This Program in Black and White
A collection of programs that enables
administrators to gather information about incompatibilities between specific applications and
Windows 7, and create customized solutions that enable those applications to run.
Application Compatibility Toolkit (ACT)
application control policies
certification authority
phishing
Application Compatibility Toolkit (ACT)
A new Windows 7 (and Windows Server 2008 R2) feature that is updates the concept implemented in software restriction policies. AppLocker also uses rules, which administrators must manage, but the process of creating the rules is much easier, thanks to a wizard-based interface. Also known as AppLocker.
application control policies
public key infrastructure (PKI)
security zones
Application Compatibility Toolkit (ACT)
application control policies
A new Windows 7 (and Windows Server 2008 R2) feature that is updates the
concept implemented in software restriction policies. AppLocker also uses rules, which
administrators must manage, but the process of creating the rules is much easier, thanks to a
wizard-based interface. Also known as application control policies.
protected mode
AppLocker
Secure Sockets Layer (SSL)
SmartScreen Filter
AppLocker
A trusted service, whether software or commercial, that issues digital
certificates to other entities.
Microsoft Certification
certification authority
Program Compatibility Troubleshooter
software restriction policies
certification authority
A software component that sits between an application and the operating system. The fix translates the function calls that the application makes to the operating system so that the application receives the same responses it would get from an earlier operating system
version. Also known as a shim.
InPrivate Mode
compatibility fix
compatibility mode
Program Compatibility Troubleshooter
compatibility fix
A collection of compatibility fixes.
InPrivate Mode
compatibility fix
compatibility mode
Program Compatibility Troubleshooter
compatibility mode
A feature in Internet Explorer 8 that enables the browser to properly display web pages designed to older standards.
InPrivate Mode
compatibility view
compatibility mode
Program Compatibility Troubleshooter
compatibility view
A feature in Internet Explorer 8 that enables users to browse the Internet without leaving behind a history of their activities.
InPrivate Mode
compatibility view
compatibility mode
Program Compatibility Troubleshooter
InPrivate Mode
An information theft technique that uses convincing-looking Web sites to urge users
to supply personal information, such as passwords and account numbers.
social engineering
phishing
phishing
A wizard-based solution that users or administrators can use to automatically configure an executable file to use an appropriate Windows 7 compatibility mechanism.
InPrivate Mode
compatibility view
compatibility mode
Program Compatibility Troubleshooter
Program Compatibility Troubleshooter
An operational state that is designed to prevent attackers that do penetrate the computer’s defenses from accessing vital system components.
protected mode
AppLocker
Secure Sockets Layer (SSL)
SmartScreen Filter
protected mode
A secure communication method that requires two encryption keys—a public one and a private one. Data encrypted using the public key can only
be decrypted with the private key, and in the same way, data encrypted with the private key can
only be encrypted using the public key.
protected mode
public key infrastructure (PKI)
Secure Sockets Layer (SSL)
SmartScreen Filter
public key infrastructure (PKI)
A means of pushing frequently changing content to Internet subscribers. News sites
and blogs typically maintain text-based feeds, but it is also possible for an RSS feed to push
images, audio, or video content to users.
RSS
A certificate-based security protocol that most computers use when transmitting encrypted data over the Internet.
protected mode
public key infrastructure (PKI)
Secure Sockets Layer (SSL)
SmartScreen Filter
Secure Sockets Layer (SSL)
A feature of Internet Explorer that divides the addresses accessible with the web browser into different security zones, each of which has a different set of privileges.
public key infrastructure (PKI)
security zones
Secure Sockets Layer (SSL)
SmartScreen Filter
security zones
A software component that sits between an application and the operating system. The fix
translates the function calls that the application makes to the operating system so that the
application receives the same responses it would get from an earlier operating system version.
Compatibility Fix
Compatibility View
Shim
Shim
A feature in Internet Explorer 8 that examines traffic for evidence of phishing activity and displays a warning to the user if it finds any. It is up to the user to recognize the warning signs and to refrain from supplying confidential information to unknown
parties.
Software restriction policies
SmartScreen Filter
Windows XP Mode
security zones
SmartScreen Filter
An information theft technique in which an attacker convinces people to disclose secret information. Many attackers have realized that discovering a user’s password by calling the user and asking for it is the simplest method for gaining access to their network.
social engineering
phishing
social engineering
Group policy settings that enable administrators to specify the programs that are allowed to run on workstations by creating rules of various types.
Windows XP Mode
software restriction policies
compatibility fix
Application Compatibility Toolkit
software restriction policies
A free download that enables a computer running Windows 7 Professional, Enterprise, or Ultimate edition to create a virtual Windows XP machine on which you can run any native Windows XP application.
Windows XP Mode