13.8.8 - File Encryption - Practice Questions

Ace your homework & exams now with Quizwiz!

You want a security solution that protects the entire hard drive, preventing access even when it is moved to another system. Which of the following is the BEST method for achieving your goals? ---------------------------------- BitLocker EFS VPN IPsec

BitLockerBitLocker is a Microsoft security solution that encrypts the entire contents of a hard drive, protecting all files on the disk. BitLocker uses a special key, which is required to unlock the hard disk. You cannot unlock/decrypt a drive simply by moving it to another computer. EFS is a Windows file encryption option, but only encrypts individual files. Encryption and decryption is automatic and dependent upon the file's creator and whether other uses have read permissions. A virtual private network (VPN) uses an encryption protocol (such as IPsec, PPTP, or L2TP) to establish a secure communication channel between two hosts or between one site and another site. Data that passes through the unsecured network is encrypted and protected.

A user stores sensitive data on a USB flash drive. Which of the following can be used to encrypt the data on this drive? -------------------------------------------------------------------- Administrative share Run as administrator Single sign-on Bitlocker To Go

Bitlocker To Go --------------------------- Bitlocker To Go can be used to encrypt a USB flash drive. A single sign-on permits a user and their programs to use their credentials to automatically log in to other sites and services. It's not used for encryption. Run as administrator is used to run an application with elevated privileges, not to encrypt data. An administrative share is used by administrators to access system drives. It's not used for encryption.

Which of the following security solutions would prevent a user from reading a file which she did not create? ----------------------------------------------------------- EFS VPN IPSec BitLocker

EFS ------------------- EFS is a Windows file encryption option that encrypts individual files so that only the user who created the file can open it. Decryption is automatic when the file owner opens it. Other users cannot open the encrypted file unless specifically authorized. BitLocker is a Microsoft security solution which encrypts the entire contents of a hard drive, protecting all files on the disk. BitLocker uses a special key which is required to unlock the hard disk. You cannot unlock/decrypt a drive simply by moving it to another computer. A virtual private network (VPN) uses an encryption protocol (such as IPSec, PPTP, or L2TP) to establish a secure communication channel between two hosts, or between one site and another site. Data that passes through the unsecured network is encrypted and protected.

A user has a file that contains sensitive data. Which of the following can be used to encrypt a single file? ------------------------------------------- EFS BitLocker Single sign-on Administrative share

EFS ------------------------------- Encrypting File Server (EFS) is a Windows feature that can be used to encrypt a single file or multiple files and folders. BitLocker is a Windows feature that encrypts an entire disk. A single sign-on permits a user and their programs to use their credentials to automatically log in to other sites and services; it's not used for encryption. An administrative share is used by administrators to access system drives; it's not used for encryption.

Which of the following protocols establish a secure connection and encrypt data for a VPN? (Select THREE). -------------------------------------------------------------------------- L2TP PPTP RDP IPSec FTP

L2TP PPTP IPSec --------------------------------- A virtual private network (VPN) uses an encryption protocol (such as IPSec, PPTP, or L2TP) to establish a secure communication channel between two hosts, or between one site and another site. Data that passes through the unsecured network is encrypted and protected. The Remote Desktop Protocol (RDP) is used by Windows Terminal Services based applications, including Remote Desktop. FTP is used for transferring files and will not establish a secure connection.

A VPN is used primary for what purpose? ------------------------------------------------------ Support the distribution of public Web documents Allow remote systems to save on long distance charges Allow the use of network-attached printers Support secured communications over an untrusted network

Support secured communications over an untrusted network ------------------------------------------------------------- A VPN (Virtual Private Network) is used primarily to support secured communications over an untrusted network. A VPN can be used over a local area network, across a WAN connection, over the Internet, and even between a client and a server over a dial-up connection through the Internet. All of the other items listed in this question are benefits or capabilities that are secondary to this primary purpose.

Which of the following components is a special hardware chip included on the computer motherboard that contains software in firmware that generates and stores cryptographic keys? ------------------------------------------- BitLocker partition USB device Trusted Platform Module (TPM) BIOS/UEFI

Trusted Platform Module (TPM) ---------------------------------------- A Trusted Platform Module (TPM) is a special hardware chip included on the computer motherboard that contains software in firmware that generates and stores cryptographic keys. The TPM chip must be enabled in the BIOS/UEFI. A USB device is used to save the BitLocker key on a system that does not have a TPM chip. Implementing BitLocker requires two NTFS partitions.

Which of the following wireless security methods uses a common shared key configured on the wireless access point and all wireless clients? ----------------------------------------------- WPA Personal and WPA2 Personal WEP, WPA Personal, WPA Enterprise, WPA2 Personal, and WPA2 Enterprise WEP WEP, WPA Personal, and WPA2 Personal WPA Enterprise and WPA2 Enterprise

WEP, WPA Personal, and WPA2 Personal ------------------------------------------------ Shared key authentication can be used with WEP, WPA, and WPA2. Shared key authentication used with WPA and WPA2 is often called WPA Personal or WPA2 Personal. WPA Enterprise and WPA2 Enterprise use 802.1x for authentication. 802.1x authentication uses usernames and passwords, certificates, or devices such as smart cards to authenticate wireless clients.

Which of the following provides the BEST security for wireless networks? ------------------------------------- WAP WEP WPA2 CSMA/CD 802.11a

WPA2 --------------- Wi-Fi Protected Access (WPA) provides encryption and user authentication for wireless networks. Wired Equivalent Privacy (WEP) also provides security, but WPA is considered more secure than WEP. A wireless access point (WAP) is a hardware device, like a switch, that provides access to the wireless network. 802.11a is a wireless networking standard that defines the signal characteristics for communicating on the wireless network. CSMA/CD is a media access control method that controls when a device can communicate on the network.

Which of the following forms of networking is highly susceptible to eavesdropping (data interception) and must be secured accordingly? -------------------------------------------------------------------------- Wireless ISDN DSL Satellite Dial-up

Wireless ------------------------------- All forms of networking are potentially vulnerable to eavesdropping. Wireless networks by definition broadcast network transmissions openly and therefore can be detected by outsiders. Subsequently wireless networks should maintain data encryption to minimize the risk of transmitting information to unintended recipients.


Related study sets

6th Grade Social Studies - Australia

View Set

chapter 6: merchandising operations and the multistep income statement

View Set

Example and Application Practice - Midterm 1 PSYC 309A

View Set

Chapter 38: Caring for Clients with Cerebrovascular Disorders

View Set