Case-Based Critical Thinking Questions
?
Case 7-1
Ted knows that macros can be helpful to him in his work with Excel spreadsheets, but he also knows they have their hazards, so he comes to you for guidance about what kind of security settings he should put in place, and at what times.
?
?
After a year of work, Ted is taking coursework to become a VBA programmer. He is working on developing an application that contains macros. Which should his option be in the Trust Center?
A. Enable all trusted macros
B. Enable all macros
C. Disable all macros except digitally signed macros
D. Disable a macro with notification
Answer: B
You might also like to view...
Which of the following describes only the general characteristics of an object?
a. initialization b. abstraction c. detailed specification d. initiation e. None of these
Which of the following identifies who can perform a given action to a file or folder and is found in ACLs?
A. Access Control Entries (ACE) B. digital certificates C. Access Entries Keys (AEK) D. Kerberos keys
What are the two ICMPv6 message types sent between the source and destination when the ping command is used?
A. Client Echo, Client Reply B. Hello Request, Hello Reply C. Client Hello, Server Ack D. Echo Request, Echo Reply
The Office Clipboard can collect different types of information, not just text
Indicate whether the statement is true or false