Which of the following is NOT a Protect Document option?

A) Restrict Saving B) Encrypt with Password
C) Add Digital Signature D) Mark as Final


A

Computer Science & Information Technology

You might also like to view...

The first subscript in an array is ____________________.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Which term best describes a hash or code pattern that antivirus software companies use to compare known viruses to every file on a computer?

A. signatures B. heuristics C. macros D. bots

Computer Science & Information Technology

Nowadays, most organizations use a simpler approach to network design called the ___________ approach.

a. building-block b. frame definition c. prototype d. systems development life cycle e. guided network

Computer Science & Information Technology

The framework for evaluating a system against a set of security requirements that supersedes TCSEC and ITSEC is:

a. The Orange Book b. The CMMI c. The Common Criteria d. COBIT

Computer Science & Information Technology