Fill This Form To Receive Instant Help

Help in Homework
trustpilot ratings
google ratings


Homework answers / question archive / Test Bank, Lesson 6 Configuring File Services and Disk Encryption Multiple Choice 1) Encryption is the process of converting data into what kind of format? a

Test Bank, Lesson 6 Configuring File Services and Disk Encryption Multiple Choice 1) Encryption is the process of converting data into what kind of format? a

Business

Test Bank, Lesson 6 Configuring File Services and Disk Encryption

Multiple Choice

1) Encryption is the process of converting data into what kind of format?

a. compiled

b. unreadable

c. hidden

d. non-functional

 

 

2. After a file has been encrypted, it is stored in what format?

a. hidden

b. executable

c. encrypted

d. converted

 

 

3. An encrypted file can be converted back to its original format by a process known as what?

a. encryption

b. digitization

c. decryption

d. encapsulation

 

4. Single-key encryption is also known as what kind of encryption?

a. hash

b. simple

c. signal

d. symmetric

 

5. Public-key cryptography uses how many keys?

a. one

b. two

c. two pair

d. 256

 

 

6. What’s the status of your data if someone has your public key?

a. compromised

b. broken

c. hacked

d. safe

 

7. What is one purpose of using hash function encryption?

a. to store passwords in a non-readable format

b. to demonstrate one-way encryption techniques

c. to provide keyless encryption and decryption algorithms

d. to keep track of 128-bit key pairs

 

 

8. What key length is considered to be minimally strong for encryption algorithms?

a. 56

b. 80

c. 128

d. 256

 

9. What happens to files and subfolders within an EFS encrypted folder?

a. Nothing; they must be encrypted individually.

b. They’re encrypted but at a lower encryption level.

c. They’re left unencrypted but hidden.

d. They’re encrypted with the parent folder.

 

10. You can encrypt individual files, but Microsoft recommends encrypting at what level?

a. file system

b. drive

c. file group

d. folder

 

11. EFS encryption is what type of feature that can be enabled or disabled at will, similar in effect to read-only, compression, or hidden?

a. status

b. characteristic

c. attribute

d. handle

 

 

12. What happens if you move unencrypted files into an encrypted folder?

a. Nothing.

b. The new files become encrypted.

c. The new files become hidden.

d. The new files become encrypted at a lower encryption level.

 

13. If you’re a command-line user, what command will encrypt files and folders?

a. encrypt.exe

b. compress.exe

c. efs.exe

d. cipher.exe

 

14. What built-in computer hardware feature makes BitLocker Drive Encryption far more secure than other forms of folder or file-based encryption?

a. Certificates

b. hardware-assisted virtualization

c. Trusted Platform Module

d. BIOS-enabled anti-virus software

15. On what type of computer is BitLocker not commonly used?

a. laptops

b. desktops

c. netbooks

d. servers

 

 

Short Answer

 

16. Starting with Windows 8, BitLocker supports a new technology that allows it to be enabled before the operating system is installed. What is this new technology?

17. How can you recover EFS encrypted files if someone leaves the company and doesn’t give their passwords?

18. List three of the four file systems that BitLocker supports.

19. Storing your BitLocker recovery key in a safe place is very important. Where, ultimately, should you store this information in a corporate environment?

20. Why is BitLocker To Go an important technology to use as a standard practice?

21. Network Unlock works most like which BitLocker mode?

Best Answer

 

22. From a security standpoint, which BitLocker operational mode is most secure?

a. TPM only

b. startup key only

c. TPM + startup PIN

d. TPM + startup key

 

 

23. Where is the most secure location to store secure key recovery information?

a. on an encrypted USB device

b. in a secure cabinet on an encrypted USB device

c. in Active Directory

d. on the local device

24. Encryption does not protect a file or folder from deletion. To protect a file or folder from deletion, what technology should you use?

a. BitProtector

b. NTFS permissions

c. SSL/TLS

d. compression

Build List

 

25. Order the following steps to install BitLocker Drive Encryption.

a. Select Role-based or feature-based installation.

b. On the Select features page, select BitLocker Drive Encryption.

c. Select a server from the server pool and click the name of the server to install BitLocker to.

d. Reboot the system.

e. Choose Server Manager > Manage > Add Roles and Features.

 

26. Order the following steps to turn on BitLocker Drive Encryption.

a. Type a password in the Enter your password and Reenter your password text boxes.

b. Click Turn on BitLocker for the volume that you want to encrypt.

c. On the How do you want to back up your recovery key? page, click the Save to a file option.

d. On the Are you ready to encrypt this drive? page, click Start encrypting.

e. On the Choose how much of your drive to encrypt page, select Encrypt used disk space only or Encrypt entire drive.

f. Choose Control Panel > System and Security > BitLocker Drive Encryption.

g. On the Choose how you want to unlock this drive page, select Use a password to unlock the drive.

h. Save the BitLocker recovery key.

 

27. Order the following steps to back up an EFS Certificate.

a. On the File to Export page, type a name for the file and the location or click Browse, navigate to a location, type a filename, and then click Save.

b. On the Security page, select the Password checkbox and type the password in the Password and Confirm password text boxes.

c. Open Personal and then select Certificates.

d. At the command prompt, type certmgr.msc.

e. On the Export Private Key page, click Yes, export the private key.

f. In the main pane, right-click the certificate that lists Encrypting File System under Intended Purposes, select All Tasks, and then click Export.

 

Repeated Answer

 

28. BitLocker has multiple operational modes for OS drives that define the steps involved in the boot process. Match the TPM + startup PIN BitLocker mode with its correct description.

a. The system stores the BitLocker volume encryption key on the TPM chip, but you must supply a personal identification number (PIN) and insert a USB flash drive containing a startup key before the system can unlock the BitLocker volume and complete the system boot sequence.

b. The system stores the BitLocker volume encryption key on the TPM chip and accesses it automatically when the chip has determined that the boot environment is unmodified. This unlocks the protected volume and the computer continues to boot. No administrative interaction is required during the system boot sequence.

c. The system stores the BitLocker volume encryption key on the TPM chip, but you must supply a PIN before the system can unlock the BitLocker volume and complete the system boot sequence.

d. The system stores the BitLocker volume encryption key on the TPM chip, but you must insert a USB flash drive containing a startup key before the system can unlock the BitLocker volume and complete the system boot sequence.

 

 

29. BitLocker has multiple operational modes for OS drives that define the steps involved in the boot process. Match the TPM + startup PIN + startup key BitLocker mode with its correct description.

a. The system stores the BitLocker volume encryption key on the TPM chip, but you must supply a personal identification number (PIN) and insert a USB flash drive containing a startup key before the system can unlock the BitLocker volume and complete the system boot sequence.

b. The system stores the BitLocker volume encryption key on the TPM chip and accesses it automatically when the chip has determined that the boot environment is unmodified. This unlocks the protected volume and the computer continues to boot. No administrative interaction is required during the system boot sequence. 

c. The system stores the BitLocker volume encryption key on the TPM chip, but you must supply a PIN before the system can unlock the BitLocker volume and complete the system boot sequence.

d. The system stores the BitLocker volume encryption key on the TPM chip, but you must insert a USB flash drive containing a startup key before the system can unlock the BitLocker volume and complete the system boot sequence.

 

 

30. BitLocker has multiple operational modes for OS drives that define the steps involved in the boot process. Match the TPM only BitLocker mode with its correct description.

a. The system stores the BitLocker volume encryption key on the TPM chip, but you must supply a personal identification number (PIN) and insert a USB flash drive containing a startup key before the system can unlock the BitLocker volume and complete the system boot sequence.

b. The system stores the BitLocker volume encryption key on the TPM chip and accesses it automatically when the chip has determined that the boot environment is unmodified. This unlocks the protected volume and the computer continues to boot. No administrative interaction is required during the system boot sequence. 

c. The system stores the BitLocker volume encryption key on the TPM chip, but you must supply a PIN before the system can unlock the BitLocker volume and complete the system boot sequence.

d. The system stores the BitLocker volume encryption key on the TPM chip, but you must insert a USB flash drive containing a startup key before the system can unlock the BitLocker volume and complete the system boot sequence.

 

 

31. BitLocker has multiple operational modes for OS drives that define the steps involved in the boot process. Match the TPM + startup key BitLocker mode with its correct description.

a. The system stores the BitLocker volume encryption key on the TPM chip, but you must supply a personal identification number (PIN) and insert a USB flash drive containing a startup key before the system can unlock the BitLocker volume and complete the system boot sequence.

b. The system stores the BitLocker volume encryption key on the TPM chip and accesses it automatically when the chip has determined that the boot environment is unmodified. This unlocks the protected volume and the computer continues to boot. No administrative interaction is required during the system boot sequence. 

c. The system stores the BitLocker volume encryption key on the TPM chip, but you must supply a PIN before the system can unlock the BitLocker volume and complete the system boot sequence.

d. The system stores the BitLocker volume encryption key on the TPM chip, but you must insert a USB flash drive containing a startup key before the system can unlock the BitLocker volume and complete the system boot sequence.

 

Option 1

Low Cost Option
Download this past answer in few clicks

8.87 USD

PURCHASE SOLUTION

Already member?


Option 2

Custom new solution created by our subject matter experts

GET A QUOTE