05.03.2013 Views

MCSA/MCSE Self-Paced Training Kit (Exam 70-270): Installing ...

MCSA/MCSE Self-Paced Training Kit (Exam 70-270): Installing ...

MCSA/MCSE Self-Paced Training Kit (Exam 70-270): Installing ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

16-58 Chapter 16 Configuring Security Settings and Internet Options<br />

4. How can you have the Internet Temporary Files folder emptied each time you<br />

close your browser?<br />

Lesson Summary<br />

■ Use the General tab of the Internet Options dialog box to configure your home<br />

page, temporary Internet file settings, history settings, and Internet Explorer<br />

appearance.<br />

■ Use the Security tab of the Internet Options dialog box to configure settings for the<br />

four security zones Internet Explorer uses to categorize sites: Internet, Local Intranet,<br />

Trusted Sites, and Restricted Sites. Web sites are placed into the Internet zone<br />

unless you place them into another zone.<br />

■ Use the Privacy tab of the Internet Options dialog box to configure how Internet<br />

Explorer handles cookies and to enable the Pop-Up Blocker.<br />

■ Use the Content tab of the Internet Options dialog box to configure the Content<br />

Advisor, which blocks Web sites based on their content.<br />

■ Use the Connections tab of the Internet Options dialog box to configure the connections<br />

that Internet Explorer uses to connect to the Internet. You can also use<br />

this tab to configure a proxy server.<br />

■ Use the Programs tab of the Internet Options dialog box to configure the programs<br />

that Internet Explorer uses by default for e-mail messages, newsgroups, contacts,<br />

and so on.<br />

■ Use the Advanced tab of the Internet Options dialog box to configure additional<br />

settings that govern the browsing experience.<br />

Case Scenario Exercise<br />

In this exercise, you will read a scenario about configuring Local Security Policy and<br />

then answer the questions that follow. If you have difficulty completing this work,<br />

review the material in this chapter before beginning the next chapter. You can find<br />

answers to these questions in the “Questions and Answers” section at the end of this<br />

chapter.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!