Case WDX 1-1Sharon is working on a sensitive company document and needs to make sure only authorized personnel can view or make changes to the document. Sharon wants to use Information Rights Management to restrict access to the document. Which command on the Protect Document button menu should she use?

A. Mark as Final
B. Encrypt with Password
C. Restrict Permission by People
D. Restrict Editing

Answer: C

Computer Science & Information Technology

You might also like to view...

A collection of organized data is called a ________

A) folder B) workbook C) database D) table

Computer Science & Information Technology

To pass parameters in a URL via POST, append a ________ to the URL, followed by a list of values of the parameters, separating them with ________.

(a) !, & (b) ?, & (c) ?, @ (d) $, #

Computer Science & Information Technology