NETWORK SECURITY
INTRODUCTION
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
READ-ONLY
|
|
READ-WRITE
|
|
INSTALL-READ-WRITE
|
|
None of the above
|
Detailed explanation-1: -Unlike traditional Digital Rights Management (DRM) that applies to mass-produced media like songs and movies, IRM applies to documents, spreadsheets, and presentations created by individuals. IRM protects files from unauthorized copying, viewing, printing, forwarding, deleting, and editing.
Detailed explanation-2: -Select the File tab. Select Info, choose Protect Document, point to Restrict Permission by People, and then select Restricted Access. In the Permissions dialog box, select Restrict permission to this document, and then assign the access levels that you want for each user.
Detailed explanation-3: -User access refers to the mechanisms by which user access to system resources is controlled. In a computer system, the Operating System (OS) is the backbone of the computing environment from which all resources are controlled and run. This means that the operating system is at the core of the entire system’s security.