</p> You have been asked to build a custom package for a group of users, and that custom package must allow those users to share and collaborate on a Microsoft Word document. Which custom component for Internet Explorer must be added to allow for users to collobarte on an Excel Spreadsheet?
# v: @. T, ]* Y A. NetMeeing
" O5 V, h# f6 u5 {1 E! p- p% v$ ? B. VRLM Viewer
% T. _ `. A; x# C) J C. ActiveX Control for Excel% e; X4 X2 e1 r4 z8 j
D. NetShow" n2 z3 d3 K: v% Q6 }- \% ^
Answer: A2 p/ \/ Q0 I0 H, C8 k
A device that acts a security barrier between your Intranet and Internet is a?( \& V n+ V: [0 {- o7 c, O8 [8 _
A. Gateway server. |+ Q/ B' J# r; L
B. Proxy server
& Q6 L9 h6 q$ Z0 e8 F O$ \ C. PDC. @$ }6 A4 k. [
D. Setup Server3 A3 |% c' C5 v& C# i
Answer: B
5 \& t C* E% h' X0 V Which of the following custom files must you sign digitally? Choose two.% r5 G7 J! U6 T3 |
A. Setup. exe/ f; N6 n& z" }
B. IE40cif. Cab5 I0 _6 x2 u) V, m
C. IE40. cif* U' P: v7 l W4 B a
D. Desktop. cab
. M- Z5 N. z6 }3 J3 w, X& @ Answer: B, D
8 S) K- |# G, k: I. k" q What are the reasons you might receive a message regarding a file might not be safe for downloading?
9 H$ ?; n" s5 P) S9 { A. You have not upgraded to Authenticode 2.0.# H# f* j2 G3 Y. ?. @* \
B. The software you are downloading is a Java Applet.
6 |0 [6 o: b3 F. k C. The software that you attempted to download has not been marked as safe for scripting.
: g% C6 |" X9 Z, L6 ] D. The publisher's certificate has expired.
6 ] I z& u0 Y; p) z) S- b Answer: A, D
1 K9 a$ _. s2 `4 L7 l How should a user, who connects to the Internet just when she is connected to her corporate LAN, configure her options when subscribing to a Web Site?3 Z$ i; n+ X: ~7 n
A. Manually- \) f- p. J$ s& @( H
B. Scheduled Weekly: m# F% ?1 z6 s- x- N
C. Scheduled Daily# W2 q6 X$ y1 D+ ^" X
D. Personal Schedule" |2 \; [+ l p
Answer: D+ m. m$ _8 v# W) M+ Y. D
In a AT& T Unix system that holds your custom IE4.0 installation files. Which must be capitalized, for IE4.0 setup to work properly? Choose all that apply.
4 u+ I4 L" M6 W, c2 L# ]% ]! C& S A. BRANDING. CAB P8 Z' l4 ^1 ]) |7 w, H+ L
B. DESKTOP. CAB
. D: R3 ]# J7 @' J' x C. IE40CIF. CAB: B# j$ ]1 D/ ?: T/ p7 R
D. IE4SETUP. EXE6 d4 J) X' F% J& }4 T( L2 l
Answer: A, B, C, D8 ]( K0 [. l) l ~3 r2 [
Which of the following settings will enable downloads from sites in a Trusted zone?
& S' ^7 p2 b, Z A. choosing the Custom security setting for the zone and choosing Enable for File Download' ^0 W: W/ i$ w4 @
B. choosing the security setting of Low1 G0 D) I! _" `8 s) x* ~; |. @
C. choosing the security setting of Medium7 ~8 _; K& d. z, ^9 f
D. choosing the security setting of Custom
5 ]0 n- K3 z8 I, \* v0 M Answer: A, B, C
8 `5 r+ K4 ^8 s$ `, ~7 D Using a setup server and custom sign- up files that contain information about your ISP service, that contains a link to an HTML page on your server, is called what?
/ J% T! H' {* \1 D1 T% l, N2 z A. Setup. htm
; ?( {4 R1 j {8 [ B. Signup. htm
! |+ e. c( m: R" S, }) t C. Server. htm0 K3 [/ c0 _8 K
D. Info. htx6 U5 L8 u4 d) s; O7 n& n* \
Answer: B |