Review 4 Flashcards
week 20
To make changes to Internet Explorer policies that correspond to an OU, you need a domain controller.
True—Organizational units (OUs) are parts of the Active Directory on a domain controller.
Alt+F8 is the key combination that closes pop-up windows.
False—Alt+F4 is the key combination used to close pop-up windows. Alt+F8 would open macros in many programs
. A proxy server acts as a go-between of a client computer’s web browser and the web server.
True—The proxy server is the mediator between the client and the server. In this case, the server would be an HTTP proxy.
To accept fewer cookies, you would add them to the Restricted Sites zone.
False—Web addresses (or URLs) are added to the Restricted Sites zone. To accept fewer cookies, a user can adjust the slider in the Privacy tab of IE.
ActiveX controls can run on any browser platform.
False. ActiveX controls run on IE, whereas Java applets can run on any platform.
The Network tab in Firefox is used to connect to a proxy server.
True—To connect to a proxy server through the Firefox web browser, you would access the Network tab and select the Manual proxy configuration radio button.
Adblock Plus is an add-on to IE used to block third-party advertisement pop-ups
False—Adblock Plus is an add-on to Firefox, but it does block third-party ads and pop-ups when installed to that browser.
UAC keeps every user in standard mode instead of in administrator mode by default.
True—User Account Control (UAC) keeps every user (besides the actual Administrator account) in standard user mode instead of as an administrator with full administrative rights—even if they are a member of the administrators group.
One way of protecting Microsoft Outlook is to use a password for opening or modifying documents
False—Passwords used in association with documents are a way of safeguarding Microsoft Word or Excel files. In Microsoft Outlook, the .PST file can be password protected.
Input validation is a process that ensures the correct usage of data.
True—If data is not validated correctly, it can lead to security vulnerabilities and data corruption. Input validation ensures the correct usage of data.
Timothy complains about a lot of pop-up Windows when he uses Internet Explorer. Which key combination should you tell him to use to close the pop-up Windows? A. Ctrl+Alt+Del B. Alt+F4 C. Ctrl+Shift+Esc D. Windows key
B. Alt+F4 is the key combination a user should use to close pop-up windows, instead of clicking the window. Ctrl+Alt+Del either brings up the task manager or the security dialog box, depending on the version of Windows and the way it is configured. Ctrl+Shift+Esc opens the task manager, and the Windows key opens the Start menu.
James doesn’t want people to see where he browsed to on the Internet. What is a good way to clear his Internet browsing history?
A. Checkmark the Empty Temporary Internet Files Folder When the Browser Is Closed check box.
B. Use cross-site scripting.
C. Use the disk defragmenter.
D. Clear all cookies in the Advanced Privacy Settings dialog box.
A. By checkmarking the Empty Temporary Internet Files Folder When the Browser Is Closed check box, all temporary Internet files will be cleared as long as the user closes the browser. Cross-site scripting is when the attacker manipulates a client computer into executing code. Disk defragmenter rearranges the contents of a hard disk but does not delete temporary Internet files. Clearing cookies is a good idea; however, all the actual HTML files will still be stored on the hard drive.
Which of the following is placed in an application by programmers either knowingly or inadvertently to bypass normal authentication? A. Input validation B. Sandbox C. Back door D. Virus
C. A backdoor is placed within applications, operating systems, and network devices to bypass normal authentication. Input validation is a process that ensures the correct usage of data and is commonly used by programmers and developers. A sandbox is when a web script runs in its own environment. A virus is a malicious piece of code that can cause damage to a computer if opens and executed by a user.
How can Internet Explorer be centrally managed for several computers?
A. In the Advanced tab of the Internet Options dialog box
B. By way of a group policy
C. By creating an organizational unit
D. In the Registry
B. Group policies can be used in a domain environment to centrally manage Internet Explorer running on multiple computers. The Internet Options dialog box in Internet Explorer enables a user to configure settings for that individual browser. Group policies should be linked to an organizational unit. The Registry can manage Internet Explorer for a single computer but no more than that.
Which of the following should you include as general browser security practices? (Select the two best answers.) A. Use the latest browser. B. Use a proxy server. C. Train your users. D. Use multiple web browsers.
B and C. By using a proxy server, users are shielded from the Internet; the proxy server acts as a go-between for the user’s web browser and the web server. Training your users is always a good idea to increase security. Using the latest browser is usually not a good idea, especially if updates have not been released for it. It’s a good idea to use a single web browser platform for all the client computers. Multiple web browsers can cause confusion and can create a less secure environment.