Mark is also educating his users to be good Internet citizens and use the safe web sur?

Mark works as a Desktop Administrator for TechMart Inc. The company has a Windows-based
network. He has bees assigned a project to upgrade the browsers to Internet Explorer (IE) 8 for
working with the latest Internet technologies Mark wants to ensure that the company uses a
number of the security features built into the browser while maintaining functionality within the
company’s intranet. Mark is also educating his users to be good Internet citizens and use the safe
web sur?ng. Which of the following actions will Mark take to configure Internet zone feature in IE 8
and to enable users to easily browse the local intranet without disturbing the security levels?

Mark works as a Desktop Administrator for TechMart Inc. The company has a Windows-based
network. He has bees assigned a project to upgrade the browsers to Internet Explorer (IE) 8 for
working with the latest Internet technologies Mark wants to ensure that the company uses a
number of the security features built into the browser while maintaining functionality within the
company’s intranet. Mark is also educating his users to be good Internet citizens and use the safe
web sur?ng. Which of the following actions will Mark take to configure Internet zone feature in IE 8
and to enable users to easily browse the local intranet without disturbing the security levels?

A.
Develop a social awareness of security threats within an organization.

B.
Call a team member while behaving to be someone else for gaining access to sensitive
information.

C.
Provide protection against a Distributed Denial of Services attack.

D.
Go into the Internet Options, select the Security, and add the intranet site to the list of Local
Intranet Site.

Explanation:

The Internet zone feature in IE 8 can be configured and users are enabled to easily browse the local
intranet without disturbing the security levels by using the following steps:
1.Go into the Internet Options and select the Security.
2.Add the intranet site to the list of Local Intranet Site.

Answer C While stressing the Con?dentiality, Integrity, and Availability triangle in the training of
users, the process of providing availability is related to security training to ensure the protection
against a Distributed Denial of Services attack.



Leave a Reply 0

Your email address will not be published. Required fields are marked *