Within a Microsoft Windows 2008 server R2 environment, who has access rights to
ID: 3559706 • Letter: W
Question
Within a Microsoft Windows 2008 server R2 environment, who has access rights to the EFS features and functions in the server?
There are three modes of access control that Bitlocker can enable on drives. List these three modes.
What feature and function can you enable to mitigate the risk caused by USB thumb drives moving confidential data to/from a USB hard drive?
What are some best practices you can implement when encryptingBitLocker drives and the use of Bitlocker recovery passwords?
What encryption algorithm is supported BitLocker?
What is the Trusted Platform Module (TPM) within Bitlocker and how does this verify the integrity of the workstation domain and laptops boot process?
How do you add additional user
Explanation / Answer
Within a Microsoft Windows 2008 Server R2 environment, who has access rights to the EFS features and functions in the server? Only users that have rights to encrypt file systems certainties and have rights to encrypt and decrypt but this is not a default thing, these rights would have to be given to them. 2. There are three modes of access control that Bitlocker can enable on drives. List these three modes. Three modes that run on Bitlocker are: TPM, PIN, and USB 3. What feature and function can you enable to mitigate the risk caused by USB thumb drives moving confidential data to/from a USB hard drive? You can be able to use either a USB key/password or smartcard, via windows prompts and it should encrypt the data. 4. What are some best practices you can implement when encrypting BitLocker drives and the use of Bitlocker recovery passwords? For encrypting BitLocker drives and the use of Bitlocker recovery passwords, Windows will ask where you would like to save a recovery key and it gives you some options which are: Save to USB flash drive, a file, or print the recovery key. 5. What encryption algorithm is supported BitLocker? The main encryption algorithm is asymmetric algorithm, secure hash algorithm or elliptic curve cryptography could be used to. 6. What is the Trusted Platform Module (TPM) within Bitlocker and how does this verify the integrity of the Workstation Domain and laptops boot process? TPM within Bitlocker is microchip to accomplish and protect the key used for volume encryption and decryption. This will use TPM, PIN, USB and any combination of the three for authentication purposes. 7. How do you add additional user
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.