3.4.10 Encryption

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/9

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

10 Terms

1
New cards

You create a new document and save it to a hard drive on a file server on your company's network. Then you employ an encryption tool to encrypt the file using AES.

This activity is an example of accomplishing which security goal?

Confidentiality

2
New cards

Which of the following should you set up to ensure encrypted files can still be decrypted if the original user account becomes corrupted?

DRA

data recovery agent

3
New cards

You want a security solution that protects the entire hard drive and prevents access even if the drive is moved to another system.

Which solution should you choose?

BitLocker

4
New cards

Which of the following security solutions would prevent a user from reading a file that they did not create?

EFS

5
New cards

You've used BitLocker to implement full volume encryption on a notebook system. The notebook motherboard does not have a TPM chip, so you've used an external USB flash drive to store the BitLocker startup key.

You use EFS to encrypt the C:\Secrets folder and its contents.

Which of the following is true in this scenario? (Select two.)

If the C:\Secrets\confidential.docx file is copied to an external USB flash drive, the file will be saved in an unencrypted state.

By default, only the user who encrypted the C:\Secrets\confidential.docx file will be able to open it.

6
New cards

Which utility would you MOST likely use on OS X to encrypt and decrypt data and messages?

GPG

GNU Privacy Guard

7
New cards

Which of the following statements about GPG (GNU Privacy Guard) and PGP (Pretty Good Privacy) is true?

Both GPG and PGP can be used for encrypting, decrypting, and signing data

8
New cards

You would like to implement BitLocker to encrypt data on a hard disk, even if it is moved to another system. You want the system to boot automatically without providing a startup key on an external USB device.

What should you do?

Enable the TPM in the BIOS

9
New cards

You want to protect data on hard drives for users with laptops. You want the drive to be encrypted, and you want to prevent the laptops from booting unless a special USB drive is inserted. In addition, the system should not boot if a change is detected in any of the boot files.

What should you do?

Implement BitLocker with a TPM

10
New cards

Which of the following database encryption methods encrypts the entire database and all backups?

Transparent Data Encryption (TDE)