________________ enables you to create and work with rights-protected files and folders and ensure that only authorized users have access to these types of data
a. The Active Directory Services Interface (ADSI) Edit snap-in
b. The Ldp.exe administrative tool
c. Active Directory Rights Management Services
d. The Active Directory Schema snap-in
C. AD RMS includes a certification service that identifies authorized users, a licensing service that provides these users with access to protected documents, and a logging service that assists administrators in monitoring and troubleshooting AD RMS.
You might also like to view...
In the pseudocode of this text you can use the __________ library module to delete specific characters from a string.
Fill in the blank(s) with the appropriate word(s).
You can assign the contents of one array to another by using
A) the assignment operator. B) the equality operator. C) both array names. D) A and C together. E) none of the above.
The _______ switch can be used with thesplitcommand to adjust the size of segmented volumes created by theddcommand.
A. ?-p B. ?-s C. ?-b D. ?-S
A ____ program creates fake packets and flood the wireless network.
A. MAC B. packet sniffer C. packet generator D. CSMA/CA