COMPUTER NETWORKING

NETWORK SECURITY

INTRODUCTION

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
A school network manager wants to ensure that students can view revision documents left on the school network, while not being able to change or delete them. What level of access should be created to ensure the safety of the network and the files on it?
A
READ-ONLY
B
READ-WRITE
C
INSTALL-READ-WRITE
D
None of the above
Explanation: 

Detailed explanation-1: -Unlike traditional Digital Rights Management (DRM) that applies to mass-produced media like songs and movies, IRM applies to documents, spreadsheets, and presentations created by individuals. IRM protects files from unauthorized copying, viewing, printing, forwarding, deleting, and editing.

Detailed explanation-2: -Select the File tab. Select Info, choose Protect Document, point to Restrict Permission by People, and then select Restricted Access. In the Permissions dialog box, select Restrict permission to this document, and then assign the access levels that you want for each user.

Detailed explanation-3: -User access refers to the mechanisms by which user access to system resources is controlled. In a computer system, the Operating System (OS) is the backbone of the computing environment from which all resources are controlled and run. This means that the operating system is at the core of the entire system’s security.

There is 1 question to complete.