________________ enables you to create and work with rights-protected files and folders and ensure that only authorized users have access to these types of data

a. The Active Directory Services Interface (ADSI) Edit snap-in
b. The Ldp.exe administrative tool
c. Active Directory Rights Management Services
d. The Active Directory Schema snap-in


C. AD RMS includes a certification service that identifies authorized users, a licensing service that provides these users with access to protected documents, and a logging service that assists administrators in monitoring and troubleshooting AD RMS.

Computer Science & Information Technology

You might also like to view...

In the pseudocode of this text you can use the __________ library module to delete specific characters from a string.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

You can assign the contents of one array to another by using

A) the assignment operator. B) the equality operator. C) both array names. D) A and C together. E) none of the above.

Computer Science & Information Technology

The _______ switch can be used with thesplitcommand to adjust the size of segmented volumes created by theddcommand.

A. ?-p B. ?-s C. ?-b D. ?-S

Computer Science & Information Technology

A ____ program creates fake packets and flood the wireless network.

A. MAC B. packet sniffer C. packet generator D. CSMA/CA

Computer Science & Information Technology