MCTS Chapter 3 Student 12 Flashcards
How does encrypted file sharing work? Pg 137
To share encrypted files, you must have a valid EFS certificate for the user who should have access to the file.
If you need to decrypt folders or files, you can use _________ to access the encrypted files. Pg 138
DRA
When using EFS on a stand alone computer, if the key used to encrypt the files are lost, what happens next? Pg.138
There are no default recovery processes and all access to the files would be lost.
What is the Cipher command line utility used to manually create a DRA? Pg 138
Cipher /R:filemame
The /R switch is used to generate two files. What are they? Pg 138
.pfx which s used for data recovery. And the .cer file has a self signed EFS recovery agent certificate.
Where do you access the local security policy? Pg 139
Administrative tools or the local computer policy MMC snap in > expand Public Key Policies > Encrypting File System
What is the Cipher Utility? Pg 140
Cipher is a command line utility that can be used to encrypt files on NTFS volumes.
What is the syntax for the Cypher command? Pg 140
Cipher /[command parameter] [filename]
Which Cipher command parameter causes any error that occurs to be ignored? Pg 140
/I
Which Cipher command parameter creates a new certificate file and certificate key? Pg 140
/K
Which Cipher command parameter specifies that files or folders should be encrypted? Pg 140
/E
What is RAID? Pg 141
Redundant Array of Independent Disks. Allows an administrator to recover data from a single hard disk failure.
What are the three main levels of RAID? Pg 141 142
RAID 0 (striped). RAID 1 (mirroring). RAID 5 Volume
In Windows 7 is it possible to share encrypted files between multiple computers? Pg.137
Yes.
Which RAID level has a minimum of two hard disks that work together as a single volume for better performance? Pg 141
RAID 0