You can set security restriction policies to specify rules that govern exceptions to the security level you specified, and the rule that identifies software according to an Internet Explorer network zone, including the Internet, Local Intranet, Trusted sites, and Restricted sites zones is the New _________Rule

a. Certificate
b. Hash
c. Network Zone
d. Path


C. You can specify zone rules only for Windows Installer software packages.

Computer Science & Information Technology

You might also like to view...

If the line:

friend class A; appears in class B, and the line: friend class B; appears in class C, then: a. Class A is a friend of class C. b. Class A can access private variables of class B. c. Class C can call class A’s private member functions. d. Class B can access class A’s private variables.

Computer Science & Information Technology

When a macro is executed, it starts recording keystrokes

Indicate whether the statement is true or false

Computer Science & Information Technology

Your co-worker sends you a database that he created in Access 2007. You cannot open the database on your computer that uses Access 2003. Your coworker probably took what action?

A) Used an unauthorized copy of Access 2007 to create the database. B) Put a password on the database. C) Forgot to change the file format to an Access 2003 compatible version. D) Sent you a corrupt file.

Computer Science & Information Technology

A Gantt chart can simplify a complex project by combining several activities into a task _____ that contains subsidiary tasks.

A. group B. hierarchy C. network D. bar

Computer Science & Information Technology