Your network contains a terminal server named S25 that is utilized by 15 employees to run applications and to gain access to the Internet. One day, these employees report that they receive security messages while browsing Internet Web sites. They are unable to modify the Internet Explorer security settings on their client computers. Which of the following should you do to allow these employees to modify the Internet Explorer security settings on their client computers while connected to S25?
  1. Log on to S25 as Administrator and add http:// to the list of trusted sites in Internet Explorer.
  2. Uninstall Internet Explorer Enhanced Security Configuration on S25.
  3. Instruct all the employees to add http:// to the list of trusted sites in Internet Explorer on their client computers.
  4. Instruct all the employees to change the Internet Explorer privacy settings on their client computers to Low.
Explanation
Answer - B - You should uninstall Internet Explorer Enhanced Security Configuration on S25.

Key Takeaway: Internet Explorer Enhanced Security Configuration establishes security settings that define how users browse Internet and intranet Web sites. These settings also reduce the exposure of your server to Web sites that might present a security risk. This enhanced level of security can prevent Web sites from displaying correctly in Internet Explorer and can restrict access to network resources, such as files on UNC shared folders.
Was this helpful? Upvote!
Login to contribute your own answer or details

Top questions

Related questions

Most popular on PracticeQuiz