1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
eimsori [14]
3 years ago
14

A coworker asks your opinion about how to minimize ActiveX attacks while she browses the Internet using Internet Explorer. The c

oworker recalls there is a setting in the Internet Options dialog box to prompt the user before downloading ActiveX controls, but can't remember which tab to use.
Computers and Technology
1 answer:
levacccp [35]3 years ago
5 0

Answer:

The security tab should be used.

Explanation:

With ActiveX, your internet browser (in this case Internet Explorer) is given permissions to communicate with your computer beyond the borders of HTML.

For example, ActiveX makes it possible for a user to run computer diagnostics directly from their browser.

Therefore, users are opened to ActiveX attacks, especially when they do not get prompted before ActiveX controls are downloaded.

To be prompted before downloading ActiveX controls, go through the following steps:

  1. Open the Internet Explorer application,
  2. Select the Tools menu,
  3. Click Internet Options,
  4. Locate the Security tab,
  5. Click on custom level
  6. Locate the ActiveX controls and plug-ins section.
  7. Enable the Automatic prompting for ActiveX controls option.
  8. Click OK and restart Internet Explorer.

You might be interested in
Application software sold with new device is called ________.
Vinil7 [7]

The name which is given to an application software which is sold with new device is called:

  • Killer application

<h3>What is a Killer Application?</h3>

This refers to the software which is necessary to the functioning of a core value of another technology.

With this in mind, we can see that because these application software are sold with new devices and are made to complement the core values of a tech, then they are referred to a killer app.

Read more about application software here:
brainly.com/question/1538272

4 0
3 years ago
Which Cisco network security tool is a cloud-based service that provides alerts to network professionals about current network a
ArbitrLikvidat [17]

Answer:

Security Intelligence Operations      

Explanation:

Security Intelligence Operations    

  • It is an advanced security framework that offers the detection, assessment and prevention of risks and continuously provides clients with the maximum level of security.
  • It provides quick and efficient security to allow consumers to interact and work together and adopt new technology in a secure manner.
  • It does effective identification of malware, proactive security against loss of data and embraces new technologies to stay ahead of the new threats.
  • The three main components of Cisco Security Intelligence Operations are Cisco SensorBase, Threat Operations Center, and Dynamic updates.
  • Cisco SensorBase is the biggest vulnerability detection database that collects traffic and sensor data from an extensive network of Cisco devices and services worldwide.
  • Threat Operations Center consists of a virtual team of researchers, technicians, security analysts, engineers that collect data from SensorBase and provide actionable intelligence and realistic information to provide security against current and complex threats.
  • Dynamic updates provide real time alerts distributed automatically to monitoring devices, as well as best guidelines and other resources focused on helping customers to monitor attacks, interpret information, and eventually improve the overall security procedures of their organization.
4 0
3 years ago
Whales thrive in the benthic zone because it is full of plankton.<br> Is it true or false
lorasvet [3.4K]

Answer:

true

Explanation:

4 0
3 years ago
If you want the date in your document to update each time the document is opened, _____.
den301095 [7]
By clicking the update automatically<span> checkbox when inserting the date and/or time into a Word document... hope this helps!!!!</span>
8 0
3 years ago
Read 2 more answers
What is wrong with each of the following code segments? int[] values; for (int i = 0; i &lt; values.length; i++) { values[i] = i
tino4ka555 [31]

Answer:

values have been declared but not initialized nor allocated memory. So you are not allowed to use "values.length"

7 0
3 years ago
Other questions:
  • Which evidence helps answer the question "Did the girl
    15·2 answers
  • Using the C language, write a function that accepts two parameters: a string of characters and a single character. The function
    11·1 answer
  • You use ddl to create, modify, and delete the ___________________________ of a database.
    6·1 answer
  • For what kind of work would you use a block plane?
    10·1 answer
  • C++ code pls write the code
    12·1 answer
  • Create an application (that uses the SortedABList) that allows a user to enter a list of countries that he or she has visited an
    11·1 answer
  • If an image has only 4 colors, how many bits are necessary to represent one pixel’s color? Describe a new custom encoding that u
    8·1 answer
  • An ip address contains four sets of numbers what are they called
    11·1 answer
  • Why Do You Need to Set Goals for a LinkedIn Automation Campaign?
    15·1 answer
  • Daniel has a list of numbers that are not in any order. He wants to find the order of the numbers with the help of a spreadsheet
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!