Free Trial

Safari Books Online is a digital library providing on-demand subscription access to thousands of learning resources.

  • Create BookmarkCreate Bookmark
  • Create Note or TagCreate Note or Tag
  • PrintPrint

Review Question Answers

1.Answer D is correct. To reset Internet Explorer to its original settings, navigate to the Advanced tab and click Reset. Answer A is incorrect because reinstalling Internet Explorer does not generally overwrite the settings that are already configured. Answer B is incorrect because resetting zones only affects information specified in the security zones. Answer C is incorrect because this only resets the Advanced options.
2.Answer E is correct. To delete saved passwords in Internet Explorer, you must delete the browsing history. Answers A, B, and C are incorrect because these do not affect any saved passwords. Answer D is incorrect because passwords are not stored with the Advanced settings.
3.Answer D is correct. To prevent passwords from being stored, you have to configure AutoComplete. Answers A, B, and C do not affect AutoComplete and passwords. Answer E is used to delete saved passwords.
4.Answer D is correct. When you have trouble seeing an image, you can use the zoom feature. Answers A and B are incorrect because they affect all programs. Answer C is incorrect because decreasing the zoom makes the image smaller.
5.Answer D is correct. Protected mode helps protect you from websites that try to save files or install programs on your computer. Answer A is incorrect because disabling all ActiveX components might disable functionality that you might use for other websites. Answer B is incorrect because the phishing filter is used to stop users from being tricked into fake sites that emulate corporate sites in an attempt to steal confidential information. Answer C might or might not affect the control, but it is never stated what level the website is.
6.Answer B is correct. When you click some links, the links open separate windows. If you have a pop-up blocker set up, the site might be blocked. Answer A is incorrect because add-ons are designed to run within a website, not as a standalone application. Adding a URL to a trusted site might have some effect on functionality, but it does not allow or disallow the entire window for opening. Answers C and D are incorrect because neither of these affect whether a website opens.
7.Answer B is correct. Some sites are created to look as other sites and are used to lure people to divulge confidential information. Because these sites are “fishing” for information, these sites are referred to as phishing. Answer A is incorrect because protected mode tries to secure the Internet Explorer by securing other files. Answer C is incorrect because a junk mail filter is used in email. Answer D is incorrect because there is no such thing as a fake site filter.
8.Answer C is correct. RSS feeds are used to get automatic updates and notifications when a website posts something new. Answer B is incorrect because dynamic updates are a set of technology to help protect your system when using Internet Explorer. Answer A is incorrect because configuring autoupdate within IIS is used to automatically update Windows security patches and fixes. Answer D is incorrect because closing Internet Explorer and restarting opens up the home page again. It does not notify when other websites get updated.
9.Answer A is correct. The General tab is where you can delete temporary files, history, cookies, saved passwords and web form information. Answer B is incorrect because the Security tab is where you configure the security zones. Answer C is incorrect because the Privacy tab is used to configure the use of cookies and to enable or disable the pop-up blocker. Answer D is incorrect because the Connections tab is used to configure IE to use a proxy server or an Internet connection.
10.Answers A, B, and C are correct. InPrivate Browsing (new to IE 8) enables you to surf the Web without leaving a trail in Internet Explorer. This includes clearing out cookies, deleting temporary files, preventing the storage of form data and passwords, and not storing webpage history. Answer D is incorrect because although InPrivate Browsing encrypts and stores the anti-phishing cache, it does not enable or disable anti-phishing technology.


  

You are currently reading a PREVIEW of this book.

                                                                                                                    

Get instant access to over $1 million worth of books and videos.

  

Start a Free Trial


  
  • Safari Books Online
  • Create BookmarkCreate Bookmark
  • Create Note or TagCreate Note or Tag
  • PrintPrint