Case WDX 1-1Sharon is working on a sensitive company document and needs to make sure only authorized personnel can view or make changes to the document. Sharon wants to use Information Rights Management to restrict access to the document. Which command on the Protect Document button menu should she use?
A. Mark as Final
B. Encrypt with Password
C. Restrict Permission by People
D. Restrict Editing
Answer: C
You might also like to view...
The function call string1.erase(5) will:
a. Return a copy of string1 minus the character that occupied position 5. b. Erase all characters up to and including the character in position 5 from string1. c. Erase all characters starting from and including the character in position 5 to the end of string1. d. Return a copy of string1 minus every fifth character.
What interfaces are in the package java.lang?
What will be an ideal response?
Class __________ fires are safely extinguished with non-conducting agents only.
A. A B. B C. C D. D
A technique in which an attacker captures a packet and uses computer information to pretend to be the sending computer is known as
A) A denial-of-service attack B) Session hijacking C) Spam D) Phishing