Lesson 12
Match the following terms with the related description or usage. 1. Apply whether a resource is accessed locally or across the network. 2. A system response to BitLocker, detecting that the boot files have been tampered with. 3. Encrypts files and folders to protect sensitive data. 4. Provides 48 random numbers that enable you to access a BitLocker-encrypted drive. 5. Permissions set for folders when you share them in workgroups and domains. 6. A simple, administrative interface for setting encryption policies across an organization. 7. A microchip in which BitLocker stores its keys. 8. An additional tab added in Windows 10 to enable users to view the effective permissions on a resource. 9. Validates boot files, operating system files, and any BitLocker-encrypted volumes; a user must have a USB flash drive before the computer can boot into Windows. 10. Automatically created by EFS. Files/folders can be recovered when people lose their keys or leave the company.
___3_____ a) EFS ___6_____ b) MBAM ____1____ c) NTFS permissions ____4____ d) Recovery key ___10_____ e) ERA ____9____ f) TPM-Startup key ____5____ g) Share permission ____2____ h) Recovery mode ____7____ i) TPM v1.2 chip ____8____ j) Effective Access tab
Which of the following statements is true of BitLocker Drive Encryption? (Choose all that apply.)
a. BitLocker encrypts used disk space only. d. BitLocker encrypts entire drives.
Which of the following methods should be used to assign a recovery agent for EFS?
a. Configure a DRA in a GPO.
Which of the following methods is most effective for confirming that there is a TPM chip in a computer?
a. Open the tpm.msc console.
Which of the following TPM modes provides the strongest protection?
a. TPM-Smart Card mode
Which of the following statements best describes a characteristic of a folder that is encrypted with EFS? (Choose all that apply.)
a. The color of the folder displays with a yellow padlock in File Explorer. c. The Encrypt contents to secure data attribute is checked in the folder's Advanced attributes dialog box.
Which of the following scenarios could cause BitLocker to go into recovery mode? (Choose all that apply.)
b. Changing the boot order to another drive c. Moving the BitLocker drive to another computer
Which of the following is the best solution to protecting files and folders on a hard drive when multiple users are provided access to the same computer?
b. EFS
A user has several files and more will be added in the future. She wants to define the NTFS permissions for the files that contain the word legal for users who are part of the legal department. What should she do?
b. Enable and configure DAC.
Which of the following tools prevents the installation of removable devices on a stand-alone Windows 10 computer?
b. LGPE
Which of the following methods is the fastest way to decrypt a file stored on a computer that has both NTFS and FAT32 volumes?
b. Move it to a FAT32 volume.
Which of the following are options for backing up a BitLocker recovery key when encrypting removable media? (Choose all that apply.)
b. Save it to a file. d. Back it up to the Microsoft user account.
Which of the following methods is most effective for disabling the use of removable media across an entire network?
b. Use GPMC to create a GPO and apply it across the domain.
A recovery key is a string of how many random numbers?
c. 48
To encrypt a drive with BitLocker, which of the following is the minimal amount of space that must be available?
c. 64MB
Which of the following share permissions on a FAT32 volume enable adding files and folders to a shared folder? (Choose all that apply.)
c. Change d. Full Control