7.4.10

¡Supera tus tareas y exámenes ahora con Quizwiz!

Which of the following should you set up to ensure encrypted files can still be decrypted if the original user account becomes corrupted?

DRA

You would like to implement BitLocker to encrypt data on a hard disk, even if it is moved to another system. You want the system to boot automatically without providing a startup key on an external USB device. What should you do?

Enable the TPM in the BIOS.

Which of the following security solutions would prevent a user from reading a file that she did not create?

EFS

You want a security solution that protects the entire hard drive and prevents access even if the drive is moved to another system. Which solution should you choose?

BitLocker

You've used BitLocker to implement full volume encryption on a notebook system. The notebook motherboard does not have a TPM chip, so you've used an external USB flash drive to store the BitLocker startup key. You use EFS to encrypt the C:\Secrets folder and its contents. Which of the following is true in this scenario? (Select two.)

By default, only the user who encrypted the C:\Secrets\confidential.docx file will be able to open it.,If the C:\Secrets\confidential.docx file is copied to an external USB flash drive, the file will be saved in an unencrypted state.

You create a new document and save it to a hard drive on a file server on your company's network. Then you employ an encryption tool to encrypt the file using AES. This activity is an example of accomplishing which security goal?

Confidentiality

Which utility would you MOST likely use on OS X to encrypt and decrypt data and messages?

GPG

You want to protect data on hard drives for users with laptops. You want the drive to be encrypted, and you want to prevent the laptops from booting unless a special USB drive is inserted. In addition, the system should not boot if a change is detected in any of the boot files. What should you do?

Implement BitLocker without a TPM

You have transferred an encrypted file across a network using the Server Message Block (SMB) Protocol. What happens to the file's encryption?

The file is unencrypted when moved.

Which of the following database encryption methods encrypts the entire database and all backups?

Transparent Data Encryption (TDE)


Conjuntos de estudio relacionados

Farewell to Manzanar (Chapters 1-3)

View Set

Chapter 10: Grief and Loss, Grief and Loss - Videbeck Ch.10, Chapter 10: Grief and Loss, Chapter 10

View Set

Memmler's Structure and Function of the Human Body 10e: Chapter 3 Cells and Their Function

View Set

Chapter 11-COMPENSATION: ESTABLISHING A PAY STRUCTURE/PAY FOR PERFORMANCE

View Set

ELA 10 - A Doll's House, Pt3: Theme and Society (Pre-test)

View Set