05.03.2013 Views

MCSA/MCSE Self-Paced Training Kit (Exam 70-270): Installing ...

MCSA/MCSE Self-Paced Training Kit (Exam 70-270): Installing ...

MCSA/MCSE Self-Paced Training Kit (Exam 70-270): Installing ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Further Reading<br />

Further Reading<br />

27-3<br />

Internet Explorer. Click the Security tab, click the Internet zone, and then<br />

click the Custom Level button. On the Security Settings dialog box, set the<br />

Reset To list to High and click the Reset button. Click Yes when prompted.<br />

Restart Internet Explorer and revisit the same Web sites. What happens?<br />

Restore the security settings in Internet Explorer to their defaults. Note that<br />

you can add specific sites to the predefined site collections: Internet, Local<br />

Intranet, Trusted Sites, and Restricted Sites. You can also customize the security<br />

settings for each of these collections.<br />

❑ Practice 2: Launch Internet Explorer. Open the Internet Options dialog box<br />

from the Tools menu and click the Privacy tab to review the options for customizing<br />

how Internet Explorer handles cookies.<br />

❑ Practice 3: Launch Internet Explorer, and then open the Internet Options dialog<br />

box from the Tools menu and click the Content tab. Click the Certificates<br />

button to open the Certificates dialog box. View all the tabs available in this<br />

dialog box. With a certificate selected, click the Advanced button to examine<br />

the purpose of the certificate. Close this dialog box and click the View button<br />

to examine the certificate itself.<br />

❑ Practice 4: Launch Internet Explorer, and then open the Internet Options dialog<br />

box from the Tools menu and click the Advanced tab. Scroll to the bottom<br />

of the list to examine the additional security settings that can be configured<br />

for Internet Explorer, such as enabling or disabling Secure Sockets Layer (SSL)<br />

2 and SSL 3.<br />

This section lists supplemental readings by objective. We recommend that you study<br />

these sources thoroughly before taking exam <strong>70</strong>-2<strong>70</strong>.<br />

Objective 7.1 Microsoft Corporation. Microsoft Windows XP Professional Resource<br />

<strong>Kit</strong> Documentation. Redmond, WA: Microsoft Press, 2001. Read Chapter 17,<br />

“Encrypting File System.” This chapter takes a close look at how to implement and<br />

resolve common problems with EFS (available online at http://<br />

www.microsoft.com/resources/documentation/Windows/XP/all/reskit/en-us/<br />

prnb_efs_qutx.asp).<br />

Microsoft Corporation. “Protecting Data by Using EFS to Encrypt Hard Drives.”<br />

2004. This article is available at http://www.microsoft.com/smallbusiness/gtm/<br />

securityguidance/articles/protect_data_efs.mspx. (If the article has moved, search<br />

for the title at http://www.microsoft.com.)<br />

Objective 7.2 Microsoft Corporation. Microsoft Windows XP Professional Resource<br />

<strong>Kit</strong> Documentation. Redmond, WA: Microsoft Press, 2001. Read Chapter 13, “File<br />

Systems,” focusing on the sections that discuss NTFS. Read Chapter 15, “Logon

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!