Browsing
Protection
Control
Interfaces
Configuration
100
This is not the latest version of IE browser but it was when Windows 7 was released.
What is IE ver. 8?
100
Most of these are simply annoying advertisements, and few can even be a source of spyware or other malicious programs. (Found in web pages.)
What are pop-ups?
100
SSL communication is based on the exchange of this item which supplies credentials issued by trusted parties that confirm the web server’s identity and enables the client and the server to exchange encrypted traffic.
What is a digital certificate?
100
To delete browsing history, cookies, passwords, and temporary Internet files, open Internet Options and click the Delete button on this tab.
What is the General tab?
100
These can provide an interface between the browser and another software product or between the browser and a specific set on the Internet.
What are add-ons?
200
To configure InPrivate Browsing, open Internet Options and select this tab.
What is the General tab?
200
This technique takes social engineering to a mass scale that uses convincing-looking websites that urge users to supply personal information, such as passwords and account numbers.
What is phishing?
200
This is used in IE and helps prevent anyone else who might be using your computer from seeing what sites you have visited.
What is InPrivate browsing?
200
This is a file containing information about you or your web-surfing habits that a website maintains on your computer.
What is a cookie?
200
This configures IE to only low-integrity disk locations, such as the Temporary Internet Files and the standard IE storage areas, including the History, Cookies, and Favorites folders.
What is protected mode?
300
This technology will notify you when a web page changes. It enables users to subscribe to their favorite feeds and have updated content delivered regularly to their browsers
What is RSS?
300
To provide different levels of access to specific applications, IE divides the addresses accessible with the web browser into four different security zones, each of which has a different set of privileges. These access levels are.....
What is Internet, Local Intranet, Trusted Sites, and Restricted Sites?
300
Defending against phishing is more a matter of educating users than competing in a technological arms race, as is the case with viruses and other types of malware. IE 8 includes a component that examines traffic for evidence of phishing activity and displays a warning if it finds any.
What is the SmartScreen Filter?
300
This was introduced with the IE ver. 8 browser to assist with displaying older web pages properly.
What is Compatibility View?
300
This describes any attempt to penetrate the security of a system by convincing people to disclose secret information.
What is social engineering?
400
This feature found in IE 8 enables you to surf the Internet without leaving any record of your activities.
What is InPrivate Filtering?
400
If ActiveX has been added to IE, go here to disable it.
What is Manage Add-ons?
400
This add-on to IE ver 8 enables you to send text or other media you select in an IE browser window to another application, such as an email client, or an Internet resource, such as a blog.
What are accelerators?
400
You must have this Windows component enabled to use Protected mode in IE.
What is User Account Control (UAC)?
400
When a Windows 7 IE user connects to a site that is secured using SSL, this appears in the address bar, along with the name of the organization to which the certification authority issued the certificate.
What is a gold lock?
500
This is a technology and framework that enables powerful applications with rich user interfaces to run within a web browser. Some examples of this technology includes components which include the Microsoft Update component that scans your computer for missing updates, Shockwave Flash, and the SharePoint component.
What is ActiveX?
500
This security zone in IE provides the most elevated set of privileges.
What is Trusted Sites?
500
This component or technology enables powerful applications with a rich user interface to be accessed through a web interface.
What is ActiveX?
500
This mode is essentially a way to run IE with highly reduced privileges. It helps prevent attackers that penetrate the computer’s defense from accessing vital system components.
What is protected mode?
500
This security zone in IE is applied to websites and content that is stored on a corporate or business network.
What is Local Intranet?
M
e
n
u