Ch 5 Flashcards

1
Q

At the time this book was published what versions of windows was IE9 available on? pg 260

A

Vista,Win7 32 and 64 bit,Win Sever 2008 and 2008 R2 32 and 64 bit.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How are you able to customize the IE 9 Browser?

pg 261

A

Select the menu bar > right click tools and select from the list.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Why would you need to pin a website to the taskbar of IE 9? pg 261

A

easy access to the web page.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Whats one way to add a web page to the taskbar?

pg 261

A

Drag and drop the tab of the website to the taskbar.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the Searchable Address Bar used for? pg 261

A

Search the internet directly from the Address bar

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Define Active X Filtering? pg 261

A

Active X Filtering allows you to block Active X controls for any site.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

__________helps protect you from online phishing attacks,fraud, and spoofed or malicious websites. pg 262

A

Smart Screeen Filters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

________allows you to use the _______without saving any data from the websites that are visited while the browser in this mode. pg 262

A

InPrivate Browsing and Web

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

________allows you IE9 to check for updates to webpage content you may frequently access? pg 262

A

Web Slices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

In_____________ , websites will be displayed as if you were viewing them in a previous version of Internet Explorer, which will often correct display problems. Pg 265

A

Compatibility View

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

________ can be perpetrated by the cyber criminal pretending to be a legitimate website such as the user’s banking site or credit card site and getting the user to give up their information to a fraudulent site. pg 265

A

Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Define Domain Highlighting? pg 266

A

Its one of the features in windows IE9 that gives the user more feedback about the website they are visiting.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Define Clickjacking ?

A

Clickjacking is a malicious technique of tricking a Web user into clicking on something different from what the user perceives they are clicking on, thus potentially revealing confidential information or taking control of their computer while clicking on seemingly innocuous web pages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

_________________is a type of computer security vulnerability typically found in web applications. XSS enables attackers to inject client-side script into web pages viewed by other users. pg 267

A

Cross-site scripting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly