Free IC3-3 Exam Braindumps (page: 16)

Page 15 of 36

You are designing a TCP/IP-based network. You have to connect various offices in a premise. The major concern is to choose the appropriate technology that supports your requirement. Drag and drop the maximum cable lengths supported by their networking technologies to their respective boxes.

  1. See Explanation section for answer.

Answer(s): A

Explanation:



The maximum cable lengths supported by different technologies are shown in the table below:



Internet Explorer 8 has a new feature that increases privacy by not storing history, cookies, temporary Internet files, or other data. One way this feature can be accessed is by pressing Ctrl+Shift+P while in Internet Explorer 8.
What is this feature called?

  1. SmartScreen Filter
  2. InPrivate Browsing
  3. Cross-Site Scripting Filter
  4. Compatibility View

Answer(s): B

Explanation:

InPrivate Browsing is a feature of Internet Explorer 8.
When this feature is active, Internet Explorer does not store history, cookies, temporary Internet files, or other data, thus protecting privacy of the user while using Internet Explorer 8. InPrivate Browsing can be activated by pressing Ctrl+Shift+P. This feature is quite helpful when a user does not want to leave any trace of his Web browsing activity such as, e-mailing at an Internet cafe or shopping for a gift.
Answer option A is incorrect. SmartScreen filter protects the users against phishing scams and malware sites. It does not prevent the storage of browsing data.
Answer option C is incorrect. XSS Filter can help provide automatic detection and prevention of Type-1 XSS attacks without affecting performance or compatibility. It does not prevent the storage of browsing data.
Answer option D is incorrect. Compatibility view does not protect browsing data of the users.



Maria works as a Security Administrator for Company Inc. The company has a Windows-based network. Maria has been assigned a project to configure cookie settings in Internet Explorer 8. For which of the following purposes can a cookie be used? Each correct answer represents a complete solution. Choose all that apply.

  1. Session tracking
  2. Storing and locking viruses
  3. Authentication
  4. Storing site preference

Answer(s): A,C,D

Explanation:

A cookie, also known as a tracking cookie, browser cookie, and HTTP cookie, is a text file stored as plain text on a user's computer by a web browser.
A cookie consists of one or more name-value pairs containing bits of information, which may be encrypted for information privacy and data security purposes.
A cookie can be used for the following purposes: Authentication Session tracking (State maintenance)Storing site preferences The identifier for a server-based session Anything else that can be accomplished through storing textual data Answer option B is incorrect.
A cookie cannot be used to store and lock viruses.



Which of the following is a type of network connection that allows a user to stay connected to a network while moving from room to room?

  1. Cable
  2. T1
  3. DSL
  4. WiFi

Answer(s): D

Explanation:

A WiFi network connection allows a user to stay connected to a network while moving from room to room.
Answer options A, C, and B are incorrect. These networks do not allow a user to stay connected to a network while moving from room to room.






Post your Comments and Discuss Certiport IC3-3 exam with other Community members:

IC3-3 Exam Discussions & Posts