Language:EN
Pages: 5
Rating : ⭐⭐⭐⭐⭐
Price: $10.99
Page 1 Preview
all entries the ddf and drf are added the files he

All entries the ddf and drf are added the files header

308 Chapter 5 • Managing and Troubleshooting the Encrypting File System

3. A log file is created that records events as they occur during the encryption process.

4. EFS identifies the user’s key pair and then uses the public key to create an entry for the user in the data decryption field.

9. The log file and the backup file are deleted at the end of the encryption process.

10. The requester’s profile is unloaded from the Registry if needed.

www.syngress.com

A: No. Compression and encryption are incompatible.The Windows graphical inter-face clearly shows that compression and encryption cannot both be enabled at the same time on a file.The interface has check boxes for the compression and encryp-tion attributes. Selecting one check box deselects the other check box.

Q: Can I store an encrypted file in an unencrypted directory?

Self Test

A Quick Answer Key follows the Self Test questions. For complete questions, answers, and epxlanations to the Self Test questions in this chapter as well as the other chapters in this book, see the Self Test Appendix.

C. Yes, because EFS also provides end-to-end security for data.

D. No, because EFS cannot be used on network file servers, only on a local computer.

D. Extra users have been added to the files contained in the folder.You must not have extra users added to a file in order to apply both encryption and com-pression to it.

3. Catherine is the senior member of the accounting department in your company. She has several database files that need to be protected from access by other mem-bers of her department who have NTFS permissions allowing them read and write access to the network share where the database files are located.What is the

(Choose all that apply.)

A. Instruct Catherine to create a new folder and place her database documents inside it.

4. Chris wants to use EFS encryption on some of her files that are stored on the network file server.The file server is running Windows NT 4.0 SP6.Will she be able to use EFS encryption? Why or why not?

A. Yes. SP6 upgrades NTFS v4 to NTFS v5, which is the version used by Windows 2000.

A. Plaintext

B. Encoded

312 Chapter 5 • Managing and Troubleshooting the Encrypting File System

6. Hannah has several critical payroll files on which she would like to increase secu-rity by encrypting them with EFS encryption.The files are named payroll1.pay, payroll2.pay, and payroll3.pay and are located in the Payroll folder on her com-puter.What does she need to encrypt to ensure maximum security is obtained for these files and the data they contain?

User Operations

7. Austin is preparing to copy several hundred EFS encrypted files from one Windows 2000 NTFS folder to another Windows 2000 NTFS folder.All the files are EFS encrypted.The source folder is EFS encrypted.The destination folder is not EFS encrypted.What will be the result of his action to copy these files?

www.syngress.com

You are viewing 1/3rd of the document.Purchase the document to get full access instantly

Immediately available after payment
Both online and downloadable
No strings attached
How It Works
Login account
Login Your Account
Place in cart
Add to Cart
send in the money
Make payment
Document download
Download File
img

Uploaded by : Jason Lee

PageId: DOCF3B4C12