ANALYZING A COMPUTER IN THIS PROCEDURE, YOU USE THE SECURITY CONFIGURA...

10. Close Internet Explorer after the installation completes.

Lesson Review

The following questions are intended to reinforce key information presented in this

lesson. If you are unable to answer a question, review the lesson materials and try the

question again. You can find answers to the questions in the “Questions and Answers”

section at the end of this chapter.