Why should an administrator enable the "encrypt data access" option on a share containing sensitive information?
What will be an ideal response?
File contents could be intercepted using a network sniffer unless encryption is used.
You might also like to view...
Andy, a chess player, wants to change the background of his Excel workbook to make it look like a chessboard. For this purpose, Andy should use the _____ button.?
A. ?Fill Color B. ?SmartArt C. ?Cell Style D. ?Theme
Which of the following is not true regarding corporate identity?
A) Visual identities are carefully crafted to make products recognizable. B) Logos, color schemes, and fonts are used for years to ensure that customers identify with the product. C) Corporate identities are developed by the senior management of a company. D) People visiting foreign countries are often surprised to recognize the golden arches of McDonald's.
In Expression Web, the medium font size approximates a 14-point font size.
Answer the following statement true (T) or false (F)
Case OFF 1-1Julia will be using the programs within Office 2010 to write, analyze, and present some research she is doing for her Doctorate degree. She is working on becoming comfortable with the items in the program window.Julia also learns that the main area that displays the file that you are working on is called the ____ area.
A. Display B. Work C. Window D. File