Match the following Trust Center options with the correct description:

I. Add-Ins
II. Privacy Options
III. Trusted Documents
IV. Trusted Publishers
V. File Block Settings

A. Enables you to trust network documents to open without Excel displaying any security warnings
B. Directs Excel to trust digitally signed workbooks by certain creators
C. Enables you to select which types of files, such as macros, to open in Protected View or which file type to prevent saving a file in
D. Enables you to deal with nonmacro privacy issues
E. Enables you to specify which add-ins will be allowed to run given the desired level of security


E, D, A, B, C

Computer Science & Information Technology

You might also like to view...

The ____________________ pseudo-header consists of three fields taken from the IP header: the IP Source Address field value, the IP Destination Address field value, and the Protocol field value.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

The ________ property determines the size of the picture in the form

Fill in the blank(s) with correct word

Computer Science & Information Technology

With the original evidence safely stored, you should make a(n) ________ of the forensic image

Fill in the blank(s) with correct word

Computer Science & Information Technology

What parameters are normally needed to configure a device or application for a proxy server?

A) IP address and port number B) Name and URL C) Name and IP address D) MAC address and IP address

Computer Science & Information Technology