Chapter 4 Flashcards

1
Q

True or False? Encryption should never be the only control in place to protect data.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Hajar is a system administrator for a defense contractor. She seeks to encrypt sensitive business files for traveling employees. Each employee is given USB drive encrypted with a password at the beginning of their trip, containing only the files they will need. What encryption method and tool does Hajar use?

  • Encrypting File System (EFS) file encryption
  • BitLocker Drive Encryption
  • Encrypting File System (EFS) folder encryption
  • BitLocker To Go
A

BitLocker To Go

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

True or False? A Trusted Platform Module (TPM) is a microchip.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What happens if encryption starts by using asymmetric encryption to exchange a symmetric key, given the organizations cannot absolutely verify their identity?

A

Data transfer starts insecurely but is exchanged most quickly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

True or False? The Encrypting File System (EFS) does not require special hardware.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following encrypts entire volumes and normally uses a computer’s Trusted Platform Module (TPM) hardware to store encryption keys?

A

BitLocker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the best solution for securing network traffic between two application servers with specific open ports?

A

VPN using Layer 2 Tunneling Protocol (L2TP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

True or False? All BitLocker authentication modes are considered transparent operations.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Chris, a security architect, has decided to adopt public key infrastructure (PKI) for a more formal approach to securely handling keys in a medium-sized organization. Chris’s system will initiate a connection to a target system. During the PKI process, which of the following allows Chris’s system to get the target’s public key?

  • Private key of trusted entity
  • Private key of trusted target
  • Public key of a registration authority
  • Public key of a trusted entity
A

Public key of a trusted entity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Why is it recommended to use folder encryption rather than file-level encryption with EFS?

  • Data are encrypted before being stored on the disk but backed up in a plaintext file.
  • File-level EFS cannot encrypt plaintext files.
  • When file-level EFS encrypts plaintext files on a disk, the files are deleted but readable traces of the files are left behind.
  • EFS is incapable of encrypting any data at the file level.
A

When file-level EFS encrypts plaintext files on a disk, the files are deleted but readable traces of the files are left behind.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

True or False? In Encrypting File System (EFS), each user must choose to enable encryption for specific files or folders.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

True or False? Because BitLocker Drive Encryption encrypts entire volumes, only administrators can enable or disable encryption.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

True or False? BitLocker is enabled by default on Windows Server 2022: Azure Datacenter cloud-hosted systems.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

True or False? Encryption provides confidentiality and availability of data.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

True or False? A virtual private network (VPN) exists between a client and a server or between two servers.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

It is considered a best practice to __________ prior to encrypting with BitLocker.

A

make a backup of your data or disk drives

17
Q

How many characters are in the BitLocker recovery password key?

A

48 characters

18
Q

Which tool encrypts entire drives, rendering them unusable unless one possesses the correct key to unlock the drive?

19
Q

Within a Microsoft Windows environment, who has access rights to the Encrypting File System (EFS) features and functions?
* Only the creator of the EFS file
* Only the domain administrator
* Both the creator of the EFS file and the domain administrator
* All users who desire access to the EFS file

A

Both the creator of the EFS file and the domain administrator

20
Q

Which of the following is an encryption tool that allows users to encrypt files and folders by right-clicking a given object?

A

Encrypting File System (EFS)

21
Q

What is the most likely outcome if both sets of encryption keys are damaged or lost?

A

The data cannot be decrypted.

22
Q

True or False? A code signing digital certificate identifies an individual and is commonly used with electronic signatures.

23
Q

True or False? Transport Layer Security (TLS) was formerly called Advanced Encryption Standard (AES).

24
Q

True or False? Transport Layer Security (TLS) creates an encrypted tunnel between a web client and a web server.

25
True or False? Windows supports the use of digital signatures to provide nonrepudiation.
True
26
Dori seeks to encrypt business-critical areas of the file server. Most important to her is the assurance that no trace of plaintext files can be identified after the encryption process. What encryption method and tool should Dori use? * BitLocker To Go * Encrypting File System (EFS) folder encryption * Encrypting File System (EFS) file encryption * BitLocker Drive Encryption
BitLocker Drive Encryption
27
Which of the following delivers a trusted public key that can be used with assurance it belongs to the stated owner? * PKI registration authority * Digital certificate * Encrypting File System * Cipher
Digital certificate
28
Within which of the following can Group Policy store the data recovery agent for BitLocker? * Notepad * Active Directory * Trusted Platform Module * PowerShell
Active Directory
29
BitLocker uses the computer's __________ chip to store encryption keys.
Trusted Platform Module (TPM)
30
When configuring Encrypting File System (EFS), what indicated that the file was encrypted? * font change * color change * lock icon * EFS icon
lock icon
31
Regarding BitLocker recovery passwords, it is a best practice to:
make a backup of the passwords.