9.3 ~ File Encryption

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

You need to use a common USB flash drive to transport important sensitive information for your organization. Which of the following would be the BEST program for protecting the data on the flash drive with encryption? a. BitLocker To Go b. EFS c. Microsoft Defender d. BitLocker

a. BitLocker To Go

Which of the following is true of the Windows BitLocker program? a. BitLocker is designed to protect files against offline access only. b. BitLocker is designed for use on the Home version of Windows 10 and later. c. BitLocker is designed to protect files against offline and online access. d. BitLocker is designed to encrypt individual files.

a. BitLocker is designed to protect files against offline access only.

When you arrive at your company, you discover that a hard drive with your customers' sensitive information has been stolen. You feel confident that the thief will not be able to view the data on the hard drive because you had previously taken security precautions to protect the data in case the hard drive was stolen. Which of the following precautions is the MOST likely solution you used to protect the data on the hard drive? a. BitLocker with TPM b. BitLocker To Go c. Microsoft Defender d. Windows Security

a. BitLocker with TPM

You have decided to use BitLocker as your whole disk encryption solution for the hard drive on your laptop. The laptop includes a TPM chip. What happens if you store the startup key required to unlock the hard drive in the TPM chip? a. You can boot the hard drive without providing the startup key. b. You are prompted to insert a USB drive with the startup key. c. You can boot the hard drive from another computer without providing the startup key. d. You are prompted to provide the startup key before booting the hard drive.

a. You can boot the hard drive without providing the startup key.

A user has a file that contains sensitive data. Which of the following security technologies should he or she use to encrypt the single file? a. BitLocker b. EFS c. Single sign-on d. Administrative share

b. EFS

Which of the following security solutions would prevent you from reading a file that you did not create? a. IPSec b. VPN c. EFS d. BitLocker

c. EFS

After creating an FEK (file encryption key) for a file, what does EFS do next to add a greater level of security for the file? a. EFS creates a symmetric key. b. EFS instructs Windows to create a key pair (private and public). c. EFS encrypts the FEK by creating a key pair (private and public). d. EFS stores the FEK with the public key.

c. EFS encrypts the FEK by creating a key pair (private and public).

Which of the following protocols establish a secure connection and encrypt data for a VPN? (Select three.) a. FTP b. WEP c. L2TP d. IPsec e. PPTP f. WPA g. RDP

c. L2TP d. IPsec e. PPTP

You have used EFS to encrypt a directory of highly sensitive company files on your hard drive. You then decide to copy one of the files in the directory to a thumb drive to edit the files on a laptop computer while you are travelling to an industry conference. What is the result of copying the file to the thumb drive? a. The file remains secure and accessible. b. The file becomes inaccessible. c. The file is compressed and remains secure. d. The file will no longer be encrypted.

d. The file will no longer be encrypted.

Which of the following components is a special hardware chip included on a computer's motherboard that contains software that generates and stores cryptographic keys? a. BIOS/UEFI b. BitLocker partition c. USB device d. Trusted Platform Module (TPM)

d. Trusted Platform Module (TPM)


संबंधित स्टडी सेट्स

Learning How to Learn: Powerful mental tools to help you master tough subjects: Chunking

View Set

Straighterline A&P 1 Cumulative Final

View Set

ITE115 Module 01: Impact of Digital Technology Quiz

View Set

chapter 7: emotional and social development in infancy and toddlerhood

View Set

Abn. Psych - MO13 - Schizophrenia and related disorders

View Set

Ch 62 MS trauma and orthopedic surgery, ch 62 MS trauma and orthopedic surgery, Ch. 62 - Musculoskeletal Trauma & Orthopedic Surgery, Chapter 62: Musculoskeletal Trauma and Orthopedic Surgery, Chapter 64: Arthritis and Connective Tissue Diseases, Lew...

View Set

AP Environmental Science Unit 1 - Environmental History & Sustainability

View Set

Chapter 34: Assessment and Management of Patients with Inflammatory Rheumatic Disorders

View Set