Case WDX 1-1Sharon is working on a sensitive company document and needs to make sure only authorized personnel can view or make changes to the document. Sharon wants to use Information Rights Management to restrict access to the document. Which command on the Protect Document button menu should she use?

A. Mark as Final
B. Encrypt with Password
C. Restrict Permission by People
D. Restrict Editing


Answer: C

Computer Science & Information Technology

You might also like to view...

STDEV.P should be used to calculate standard deviation when all data for a population is present

Indicate whether the statement is true or false

Computer Science & Information Technology

Describe an easy way to tell whether an icon is a shortcut

A) If the icon says shortcut in the corner B) If the icon has an arrow through the icon C) If the icon has a bent arrow in the corner D) If the icon has a map

Computer Science & Information Technology

The process of managing a database is called database ____________________.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Using CMYK inks only, it is possible to reproduce a color photo.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology