Hi everybody
As promised, Carol’s back again with answers to her fun quiz questions for the RMS sharing app. Want bragging rights for getting them all correct? Let me know on twitter!
Reminders: Follow us on twitter ( @TheRMSGuy ) and join in our our new RMS peer community at www.yammer.com/AskIPTeam .
Cheers,
Dan (on behalf of the RMS team)
-----------------------------------
Carol here, with answers to my post from yesterday that had 10 quiz questions for you to test how well you knew the Rights Management sharing application (also known as the RMS sharing app). Here they are again, with the answers, and with links where you can find more information. Let us know if you would like to see more quiz questions like this to test your knowledge on RMS. Send feedback to AskIPTeam@Microsoft.com .
1. How do you obtain the RMS sharing application?
A. It’s included in AD RMS
B. It’s included in Windows Azure RMS
C. It’s included with Office 356
D. It’s a free download on the Microsoft Download Center
Answer: D.
You download and install the free RMS sharing application from the Microsoft Download Center. It works in concert with AD RMS or Windows Azure RMS (and it’s fully supported with Office 356), but you can still protect your data with the RMS sharing application if your company doesn’t have either of these by using “RMS for individuals” at no charge.
More information:
- Download and install the Rights Management sharing application
- Introducing Microsoft Rights Management for individuals
- Sign up for Rights Management for individuals
2. Which of the following types of documents natively support RMS, so that you can specify the read-only permission?
A. Word
B. PowerPoint
C. Excel
D. PDF
Answer: A, B, C, D.
All these types of documents can natively support RMS, including PDF documents when you use the Foxit Enterprise Reader.
More information:
- Foxit Enterprise Reader with the Foxit RMS Plug-in
- Download page that lists the supported applications for the RMS sharing application
3. Which of the following statements are true for generic protection?
A. Unauthorized users cannot open the document
B. The document is encrypted before it’s opened
C. You can protect files of any type
D. The option to work on all devices is automatically enabled
Answer: A, B, C, D.
Use generic protection for applications and files that do not natively support RMS. This level of support still supports authorization and encryption, and it works with all file types, but you cannot set restrictive policies such as an read-only. When you use generic protection, the option “Allow consumption on all devices” is automatically selected and cannot be changed in the RMS sharing application.
More information:
4. Which versions of Windows currently support the RMS sharing application?
A. Windows Vista
B. Windows 7
C. Windows 8
D. Windows 8.1
Answer: B, C, D.
The RMS sharing application is currently supported on Windows 7,Windows 8, and Windows 8.1. There are no plans to support it on Vista and older Windows versions.
More information:
5. Which of the following file types can RMS natively support?
A. .dot
B. .doc
C. .xps
D. .potm
E. .thmx
Answer: A, B, C, D, E.
RMS can natively support all these different file types, which are supported by Office 2010 and Office 2013.
More information:
6. Which of the following can’t you do with the RMS sharing application?
A. Multi-select files and protect them with a single template
B. Set protection for a folder so that new files in that folder are automatically protected
C. Set protection on files that are read-only
D. Remove protection from a file that you’ve previously protected
Answer: B and C.
The RMS sharing application supports multi-selecting files with or without a template, and supports removing protection from a file. Although you can set protection for a folder, this action sets protection on all the files currently in the folder but will not automatically set protection on new files. You also cannot protect files if your permissions on them are read-only; you must have write permissions to protect files.
More information:
- Protect a file on a device (protect in-place) by using the Rights Management sharing application
- Remove protection from a file by using the Rights Management sharing application
- Common issues section in the FAQ for the RMS Sharing Application for Windows
7. Which of the following does the RMS sharing application do when you use the Share Protected option in an Office application?
A. Create an encrypted email with an encrypted attachment
B. Create an unencrypted email with an encrypted attachment
C. Include a link in the email to download the RMS sharing application
D. Automatically creates and sends the email with the attachment
Answer: B and C.
When you select the option to Share Protected, the RMS sharing application creates an unencrypted email that contains an encrypted attachment. Because the email message itself is unencrypted, it reliably passes through email systems and inspection mechanisms. Although the RMS sharing application automatically creates the email message for you, which includes a link to download the RMS sharing application, you can edit this message and then must click Send (it is not sent automatically).
More information:
8. You want to safely share a confidential document with somebody outside your organization. Which of the following email addresses are currently supported by the RMS sharing application?
A. user@microsoft.com
B. user@contoso.com
C. user@hotmail.com
D. user@gmail.com
Answer: A and B.
The RMS sharing application doesn’t (yet) support personal email addresses and you must use a company address.
More information:
9. You’ve just deployed the RMS sharing application so that users on a highly-confidential project can safely email documents to a partner company. Will this require any changes to perimeter security systems?
A. Yes, security systems that check for attachments might require changes to accommodate protected attachments
B. No, no changes will be required on security systems that check for attachments
Answer: A.
When you send a protected attachment by using the RMS sharing application, it might change the file name of the attachment. For example, a .txt file becomes a .ptxt file. If the partner company has security systems that inspects the file name of attachments before delivering them to recipients, they might need to update the policy rules to let the new file names through as legitimate attachments.
More information:
10. You want to securely share some files with your co-workers by using a network share on a file server. You copy them to the file server and use File Explorer to add the Rights Management protection. Which option do you then select?
A. Share Protected
B. Protect in-place
Answer: B.
The Protect in-place option adds Rights Management protection to the files on the network share, and remains with the files, even if they are later copied to another location. The Share Protected option is for when you want to share files by email and it protects the attachment and leaves the original unprotected.
More information:
- Protect a file on a device (protect in-place) by using the Rights Management sharing application
- Protect a file that you share by email by using the Rights Management sharing application
<end quiz>