Windows 7 Configuration Chapter 07

Download as doc, pdf, or txt
Download as doc, pdf, or txt
You are on page 1of 10

Lesson 7: Working with Applications Multiple Choice 1.Which version of Internet Explorer comes with Windows 7?

a) IE 6 b) IE 7 c) IE 8 d) IE 9 Answer: c Difficulty: Easy Section Reference: Administering Internet Explorer Explanation: Windows 7 includes the latest version of the Internet Explorer web browser, Version 8, which enhances the features introduced in Version 7 and includes some important upgrades of its own. 2. What of the following is included with Internet Explorer 8 that enables the browser to display older pages properly? a) Compatibility View b) Down View c) Page View d) IE7 mode Answer: a Difficulty: Easy Section Reference: Configuring Compatibility View Explanation: The problem with using a new version of Internet Explorer is that many of the pages on the Internet still conform to older versions of the standards, and IE 8 might not display them properly. To accommodate these older pages, IE 8 includes a feature called Compatibility View, which enables the browser to display older pages properly. 3. Which add-on enables users to send text or other media that you select in an IE browser window to another application, such as an email client, or an Internet resource, such as a blog? a) Toolbars and Extensions b) Search Providers c) Accelerators d) InPrivate Filtering Answer: c Difficulty: Medium Section Reference: Managing Add-Ons Explanation: Add-ons can provide an interface between the browser and another software product or between the browser and a specific site on the Internet. Accelerators enable users to send text or other media they select in an IE browser window to another application, such as an email client, or an Internet resource, such as a blog.

Page 1 of 10

4. What of the following is based on a push technology used with Internet Explorer that notifies you when a Web site is changed? a) InPrivate Filtering b) RSS c) Protected mode d) SmartScreen Filtering Answer: b Difficulty: Medium Section Reference: Configuring RSS Feeds Explanation: Many Web sites that provide frequently changing content, such as news sites and blogs, support a push technology called RSS feeds, which simplifies the process of delivering updated content to designated users. IE includes an integrated RSS reader so users can subscribe to their favorite feeds and have updated content delivered to their browsers on a regular basis. 5. Which of the following is used to help prevent attackers that penetrate the computers defense from accessing vital system components? a) InPrivate Filtering b) RSS c) Protected mode d) SmartScreen Filtering Answer: c Difficulty: Medium Section Reference: Understanding Protected Mode Explanation: Protected mode is essentially a way to run Internet Explorer with highly reduced privileges. Windows 7 includes a security feature called Mandatory Integrity Control (MIC), which assigns various integrity access levels to processes running on the computer. These integrity access levels control what system resources the process is allowed to access. 6. Which of the following configures Internet Explorer to only low-integrity disk locations, such as the Temporary Internet Files and the standard IE storage areas, including the History, Cookies, and Favorites folders? a) InPrivate Filtering b) RSS c) Protected mode d) SmartScreen Filtering Answer: c Difficulty: Medium Section Reference: Understanding Protected Mode Explanation: Protected mode is essentially a way to run Internet Explorer with highly reduced privileges. Windows 7 includes a security feature called Mandatory Integrity Control (MIC), which assigns various integrity access levels to processes running on the computer. These integrity access levels control what system resources the process is allowed to access.

Page 2 of 10

7. You are visiting a Web site that worked fine when you were using Internet Explorer 6 on a Windows XP machine. However, you suspect that this Web site is not compatible with Internet Explorer 8s protected mode. Which of the following should you NOT do when troubleshooting this problem? a) Move the site to the Trusted Sites zone. b) Disable protected mode in IE. c) Modify the application. d) Run Internet Explorer as a domain administrator. Answer: d Difficulty: Medium Section Reference: Resolving Protected Mode Incompatibilities Explanation: After you determine the exact source of your applications incompatibility, you can use the following techniques to try to resolve the problem: Move the site to the Trusted Sites zone, disable protected mode in IE, and modify the application. Running Internet Explorer as a domain administrator when visiting sites that contain malware is not recommended. 8. Which of the following is NOT an available security zone found in Internet Explorer? a) Internet b) Custom Sites c) Local Intranet d) Trusted Sites Answer: b Difficulty: Medium Section Reference: Configuring Security Zones Explanation: To provide different levels of access to specific applications, Internet Explorer divides the addresses accessible with the web browser into several different security zones, each of which has a different set of privileges. The four zones are Internet, Local Intranet, Trusted Sites, and Restricted Sites. 9. Which security zone used in Internet Explorer provides the most elevated set of privileges? a) Internet b) Restricted Sites c) Local Intranet d) Trusted Sites Answer: d Difficulty: Easy Section Reference: Configuring Security Zones Explanation: The Trusted Sites zone provides the most elevated set of privileges and is intended for sites that you can trust not to damage the computer. By default, there are no sites in this zone; you must add them manually. 10. Which security zone used in Internet Explorer is used for all Web sites that are not listed in the other three zones?

Page 3 of 10

a) Internet b) Restricted Sites c) Local Intranet d) Trusted Sites Answer: a Difficulty: Easy Section Reference: Configuring Security Zones Explanation: The Internet zone is used by all Web sites that are not listed in the other three zones. Sites in the Internet zone run in protected mode and have minimal access to the computers drives and configuration settings. 11. Which security zone used in Internet Explorer and usually used by local Web sites does not run in protected mode and has significant access to the system, including the ability to run certain scripts? a) Internet b) Restricted Sites c) Local Intranet d) Trusted Sites Answer: c Difficulty: Easy Section Reference: Configuring Security Zones Explanation: The Local Intranet zone is applied to Web sites and content that is stored on a corporate or business network. The security level for the Local Intranet zone is set to Medium (but you can change it to any level). 12. What technology is used with IE 8 to help defend against phishing? a) InPrivate Filtering b) RSS c) Protected mode d) SmartScreen Filtering Answer: d Difficulty: Medium Section Reference: Configuring the SmartScreen Filter Explanation: Defending against phishing is more a matter of educating users than competing in a technological arms race, as is the case with viruses and other types of malware. Internet Explorer 8 includes a component called the SmartScreen Filter that examines traffic for evidence of phishing activity and displays a warning to the user if it finds any. It is up to the user to recognize the warning signs and to refrain from supplying confidential information to unknown parties. 13. What feature found in Internet Explorer 8 enables you to surf the Internet without leaving any record of your activities? a) InPrivate Filtering

Page 4 of 10

b) RSS c) Protected mode d) SmartScreen Filtering Answer: a Difficulty: Medium Section Reference: Using InPrivate Mode Explanation: Internet Explorer has always maintained a record of each users activities, in the form of temporary files, cookies, and a browsing history. The user can delete these elements individually after the fact, but there was no easy way to prevent IE from gathering them all in the first place. InPrivate Mode is a new feature of IE8 that enables you to surf the Internet without leaving any record of your activities. 14. You open Internet Options in Internet Explorer 8.0. Which tab do you use to enable or disable the pop-up blocker? a) General b) Security c) Privacy d) Advanced Answer: c Difficulty: Easy Section Reference: Configuring the Pop-Up Blocker Explanation: Pop-up windows are now a fact of Internet web browsing. Some pop-ups are useful Web site controls. However, most are simply annoying advertisements, and a few can even be dangerous sources of spyware or other malicious programs. Internet Explorer includes a pop-up blocker that you can configure to suppress some or all pop-ups. To access the Pop-up Blocker configuration, click start and then control panel. Select Network and Internet, then Internet Options. Click the Privacy tab. 15. Which of the following is used in Internet Explorer and is a text file that contains information about you and your web-surfing habits that a Web site maintains on your computer? a) Phishing filter b) Cookie c) Digital certificate d) Digital signature Answer: b Difficulty: Easy Section Reference: Configuring Privacy Settings Explanation: Another big privacy issue in Internet Explorer is cookies. Although the term has other applications in computer networking, in the context of Internet Explorer, a cookie is a file containing information about you or your web-surfing habits that a Web site maintains on your computer. 16. How do you know if you are using SSL while browsing with Internet Explorer?

Page 5 of 10

a) You have a blue eye on the address bar. b) You have a broken page button on the address bar. c) You have a red exclamation point on the address bar d) You have a gold lock in the address bar. Answer: d Difficulty: Easy Section Reference: Browsing with Certificates Explanation: When a Windows 7 IE user connects to a site that is secured using SSL, a gold lock appears in the address bar, along with the name of the organization to which the certification authority issued the certificate. 17. When using SSL communications, the public key is stored in a _________. a) RSS Feed b) Secure Socket c) Digital certificate d) Cookie Answer: c Difficulty: Easy Section Reference: Browsing with Certificates Explanation: Secure Sockets Layer (SSL) is the protocol that most Web sites use when establishing secure connections with clients over the Internet. SSL communication is based on the exchange of digital certificates. A digital certificate is a credential issued by a trusted party that confirms the identity of the web server and enables the client and the server to exchange encrypted traffic. A web server participating in a PKI receives a digital certificate from a certification authority (CA), which contains its public key. The server also generates a private key, which it stores locally. 18. What program that comes with Windows 7 is a wizard-based solution that users or administrators can use to automatically configure an executable file to use an appropriate Windows 7 compatibility mechanism? a) Program Compatibility Looker b) Program Compatibility Troubleshooter c) Program Rights and Attributes Configurator d) Windows 7 Program Programmer Answer: b Difficulty: Easy Section Reference: Troubleshooting Program Compatibility Explanation: The Program Compatibility Troubleshooter is a wizard-based solution that users or administrators can use to automatically configure an executable file to use an appropriate Windows 7 compatibility mechanism (Windows XP mode, run as administrator, and so on). Thus, the troubleshooter is not a compatibility mechanism in itself; it is just a method for applying other mechanisms.

Page 6 of 10

19. When you open the properties of an executable file, which of the following is NOT a compatibility mode setting? a) Run in 640 x 480 screen resolution b) Run This Program as an Administrator c) Run This Program in Black and White d) Run in 256 Colors Answer: c Difficulty: Easy Section Reference: Setting Compatibility Modes Explanation: In addition to the version emulations, you can also select any or all of the following compatibility mode settings: Run in 256 Colors, Run in 640 x 480 Screen Resolution, Disable Visual Themes, Disable Desktop Composition, Disable Display Scaling on High DPI Images, and Run This Program as an Administrator. 20. You have a program that ran on your Windows XP machine that was running SP2. You try to install the program on Windows 7, but it does not run. What should you try first to overcome this problem? a) Configure a Windows emulation mode. b) Modify the NTFS permissions for the folder where the program is. c) Add all users to the Administrators group. d) Add all users to the Power Users group. Answer: a Difficulty: Easy Section Reference: Setting Compatibility Modes Explanation: To configure the compatibility mode settings for an application, you must open the Properties sheet for the applications executable file (or a shortcut pointing to that executable file) and select the Compatibility tab. Then select the Run the Program in Compatibility Mode check box and select a previous version of Windows from the drop-down list. 21. For application incompatibilities that are not readily solvable with the Windows 7 compatibility mode settings, Microsoft has released the ________________________, a collection of programs that enables administrators to gather information about incompatibilities between specific applications and Windows 7 and create customized solutions that enable those applications to run. a) Program Compatibility Looker b) Application Compatibility Toolkit c) Program Rights and Attributes Configurator d) Windows 7 Program Programmer Answer: b Difficulty: Medium Section Reference: Using the Application Compatibility Toolkit

Page 7 of 10

Explanation: The Application Compatibility Toolkit (ACT) 5.5 is available as a free download from the Microsoft Download Center to help you gather information about incompatibilities and create customized solutions that enable those applications to run. 22. A compatibility fix, formerly known as a _________, is a software component that sits between an application and the operating system. a) PIN b) DSC c) SMP d) shim Answer: d Difficulty: Easy Section Reference: Compatibility Administrator Explanation: A compatibility fix, formerly known as a shim, is a software component that sits between an application and the operating system. The fix translates the function calls that the application makes to the operating system so that the application receives the same responses it would get from an earlier operating system version. A collection of compatibility fixes is called a compatibility mode. 23. What specialized program collects compatibility information for web pages and web-based applications? a) Internet Explorer Compatibility Test Tool b) Application Compatibility Toolkit c) Program Rights and Attributes Configurator d) Windows 7 Program Programmer Answer: a Difficulty: Easy Section Reference: Internet Explorer Compatibility Test Tool Explanation: The Internet Explorer Compatibility Test Tool is a specialized program that collects compatibility information for web pages and web-based applications. Unlike the Application Compatibility Manager, this real-time tool examines the compatibility of the Web sites you access with Internet Explorer 8. 24. If you have a program that ran in Windows XP but does not run in Windows 7, what should you load to run the program? a) Windows XP Mode b) Application Compatibility Toolkit c) Program Rights and Attributes Configurator d) Windows 7 Program Programmer Answer: a Difficulty: Medium Section Reference: Using Windows XP Mode

Page 8 of 10

Explanation: Windows XP Mode is a free download that enables a computer running a Windows 7 Professional, Enterprise, or Ultimate edition to create a virtual Windows XP machine on which you can run any native Windows XP application. Windows XP Mode is essentially a Microsoft Virtual PC installation with Windows XP running on a virtual machine. 25. Software Restriction policies and AppLocker are configured through __________. a) Registry b) Control Panel c) Administrative Tools d) Group policies Answer: d Difficulty: Medium Section Reference: Configuring Application Restrictions Explanation: Windows 7 supports two mechanisms for restricting application, both of which you can deploy using Group Policy settings: software restriction policies and AppLocker. Fill in the Blank 26. _________ can provide an interface between the browser and another software product or between the browser and a specific set on the Internet. Answer: Add-ons Difficulty: Easy Section Reference: Managing Add-Ons Explanation: Internet Explorer is designed to be a versatile platform that can interact with a variety of other resources on the computer, on the network, and on the Internet. One of the ways that IE does this is through add-ons. Add-ons are separate software components, created by Microsoft or by third parties, that interact with the basic functions of the web browser. Add-ons can provide an interface between the browser and another software product or between the browser and a specific site on the Internet. 27. ______________ describes any attempt to penetrate the security of a system by convincing people to disclose secret information. Answer: Social Engineering Difficulty: Medium Section Reference: Configuring the SmartScreen Filter Explanation: Social engineering is a term that describes any attempt to penetrate the security of a system by convincing people to disclose secret information. Many would-be attackers have realized that discovering a users password with an elaborate software procedure is a lot more difficult than simply calling the user up and asking for it. When asked for information by an authoritative-sounding person purporting to work for the IT department, most people are eager to help and are all too willing to give out information that should be kept confidential.

Page 9 of 10

28. ___________ is a technique that takes social engineering to a mass scale that uses convincing-looking Web sites that urge users to supply personal information, such as passwords and account numbers. Answer: Phishing Difficulty: Medium Section Reference: Configuring the SmartScreen Filter Explanation: Phishing is a technique that takes social engineering to a mass scale. Instead of convincing-sounding telephone callers, phishing uses convincing-looking Web sites that urge users to supply personal information, such as passwords and account numbers. For example, an attacker might send out thousands of email messages directed at customers of a particular bank, urging them to update their account information or risk having their accounts closed. Unsuspecting users click the hyperlink in the email and are taken to a web page that looks very much like that of the actual bank site, but it isnt. The page is part of a bogus site set up by the attacker and probably copied from the bank site. This false site proceeds to ask the user for information such as bank account numbers, PINs, and passwords, which the attacker can then use to access the account. 29. __________ are useful Web site controls, most are simply annoying advertisements, and few can even be a source of spyware or other malicious programs. Answer: Pop-ups Difficulty: Easy Section Reference: Configuring the Pop-Up Blocker Explanation: Pop-up windows are now a fact of Internet web browsing. Some pop-ups are useful Web site controls. However, most are simply annoying advertisements, and a few can even be dangerous sources of spyware or other malicious programs. Internet Explorer includes a pop-up blocker that you can configure to suppress some or all pop-ups. Essay 30. Explain how Phishing works? Answer: Phishing is a technique that takes social engineering to a mass scale. Instead of convincing-sounding telephone callers, phishing uses convincing-looking Web sites that urge users to supply personal information, such as passwords and account numbers. For example, an attacker might send out thousands of email messages directed at customers of a particular bank, urging them to update their account information or risk having their accounts closed. Unsuspecting users click the hyperlink in the email and are taken to a web page that looks very much like that of the actual bank site, but it isnt. The page is part of a bogus site set up by the attacker and probably copied from the bank site. This false site proceeds to ask the user for information such as bank account numbers, PINs, and passwords, which the attacker can then use to access the account. Difficulty: Medium Section Reference: Configuring the SmartScreen Filter

Page 10 of 10

You might also like