Configure file and disk encryption Flashcards

(61 cards)

1
Q

TPM

A

Trusted platform module

Cryptography specification and name of the chip used in PC hardware to allow for Bitlocker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Bitlocker is available in what editions of Windows desktop

A

Windows Vista / 7 Ultimate
Windows Vista / 7 Enterprise
Windows Pro 8
Windows Enterprise 8

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

First server version to have bitlocker

A

Server 2008

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

FDE

A

Full Disk Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Bitlocker

A

software-based full disk encryption data-protection security features.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Bitlocker is available in what editions of Server 2012

A

All of them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Bitlocker To Go

A

Data on a USB device is encrypted.

Bitlocker exe is put on the drive and requires a password to access the data on the drive.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Five Bitlocker implementation

A
TPM
USB
TPM+USB
TPM+PIN
TPN+PIN+USB

Note that this means Bitlocker does not need a TPM chip to store a trusted key. You can use the USB instead

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

TPM chip does what for Bitlcoker

A

Preboot execution security
Confirms that hardware has not been tampered with
Confirms that files were not accessed while PC was off

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

USB instead of TPM for Bitlocker

A

You must always have the USB plugged in, to even turn on…

You can simulate the TPM chip with the USB device.
One downside: You can’t detect system integrity / confirm there was no hardware tampering, or that files weren’t accessed from the HD while the PC was off.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Recovery Key

A

Optional key to use in the event that you lose the TPM chip (hardware failure) or the USB or any other requirement (PIN) to boot.

For emergencies.

Can be password, key stored on USB, can be printed, or distributed via Group Policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

BL requirements to use TPM

A

TPM 1.2 or 2.0
TCG-compliant BIOS or UEFI firmware
Support for USB mass storage devices
separate partition on the drive just for data that’s encrypted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

EPS

A

Encrypted File System

Allows users to right-click a file , open properties, and encrypt files / folders.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Add-BitLockerKeyProtector

A

Adds a key protector for a BitLocker volume.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Backup-BitLockerKeyProtector

A

Saves a key protector for a BitLocker volume in AD DS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Clear-BitLockerAutoUnlock

A

Removes BitLocker automatic unlocking keys.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Disable-BitLocker

A

Disables BitLocker encryption for a volume.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Disable-BitLockerAutoUnlock

A

Disables automatic unlocking for a BitLocker volume.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Enable-BitLocker

A

Enables encryption for a BitLocker volume.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Enable-BitLockerAutoUnlock

A

Enables automatic unlocking for a BitLocker volume.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Get-BitLockerVolume

A

Gets information about volumes that BitLocker can protect.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Lock-BitLocker

A

Prevents access to encrypted data on a BitLocker volume.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Remove-BitLockerKeyProtector

A

Removes a key protector for a BitLocker volume.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Resume-BitLocker

A

Restores Bitlocker encryption for the specified volume.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Suspend-BitLocker
Suspends Bitlocker encryption for the specified volume.
26
Unlock-BitLocker
Restores access to data on a BitLocker volume.
27
Bitlocker implementation: TPM
Use just the TPM chip, which stores encryption keys and can detect hardware tampering and HD access while hardware is offline
28
Bitlocker implementation: USB
USB stick simulates the TPM chip. Provides encryption keys but does not detect hardware tampering or HDC access while hardware is offline
29
Bitlocker implementation: TPM+USB
TPM does what the TPM does (encryption, tamper detect) AND you require a USB stick just to boot the PC.
30
Bitlocker implementation:TPM+PIN
TPM does what the TPM does (encryption, tamper detect) AND you require a PIN just to boot the PC.
31
Bitlocker implementation:TPN+PIN+USB
TPM does what the TPM does (encryption, tamper detect) AND you require a PIN and the USB stick to boot the pc.
32
What version will allow you to store the recovery key in your .NET Passport account?
w8 | This means the key is stored in the cloud
33
What are the hard disk requirements for BitLocker?
You need two disks, or one disk with two partition. The boot / system volume cannot be encrypted. The OTHER volume, with the OS and your encrypted data, is encrypted.
34
BitLocker Network Unlock
A service that allows PCs resuming from hibernation or rebooting to forgo the entering of a PIN on those startups if you use TPM + PIN or USB + PIN.
35
Bitlocker Network Unlock is available as of
Windows 8 | Server 2012
36
Bitlocker Network Unlock requires clients to have what drivers
UEFI DHCP drivers
37
What server requirements are there for BitLocker Network Unlock?
The service must be installed on Server 2012 It must be on a server with WDS role installed There must be a *seperate* DHCP server You must have a properly configured public/private key pairing You must select clients via group policy
38
UEFI
Unified Extensible Firmware Interface | Next generation for BIOS
39
manage-bde: status
Provides information about all drives on the computer, whether or not they are BitLocker-protected.
40
manage-bde: on
Encrypts the drive and turns on BitLocker.
41
manage-bde: off
Decrypts the drive and turns off BitLocker. All key protectors are removed when decryption is complete.
42
manage-bde: pause
Pauses encryption or decryption.
43
manage-bde: resume
Resumes encryption or decryption.
44
manage-bde: lock
Prevents access to BitLocker-protected data.
45
manage-bde: unlock
Allows access to BitLocker-protected data with a recovery password or a recovery key.
46
manage-bde: autounlock
Manages automatic unlocking of data drives.
47
manage-bde: protectors
Manages protection methods for the encryption key.
48
manage-bde: tpm
Configures the computer's Trusted Platform Module (TPM). This command is not supported on computers running Windows 8 or win8_server_2. To manage the TPM on these computers, use either the TPM Management MMC snap-in or the TPM Management cmdlets for Windows PowerShell.
49
manage-bde: setidentifier
Sets the drive identifier field on the drive to the value specified in the Provide the unique identifiers for your organization Group Policy setting.
50
manage-bde: forcerecovery
Forces a BitLocker-protected drive into recovery mode on restart. This command deletes all TPM-related key protectors from the drive. When the computer restarts, only a recovery password or recovery key can be used to unlock the drive.
51
manage-bde: changepassword
Modifies the password for a data drive.
52
manage-bde: changepin
Modifies the PIN for an operating system drive.
53
manage-bde: changekey
Modifies the startup key for an operating system drive.
54
manage-bde: keypackage
Generates a key package for a drive.
55
manage-bde: upgrade
Upgrades the BitLocker version.
56
manage-bde: WipeFreeSpace
Wipes the free space on a drive.
57
EFS
Older alternative to BitLocker | Encrypting File System
58
EFS encryption is based on
The local user's password. | Changing the password can invalidate that cert
59
EFS encryption for domains is based on
2 or more keys. 1st -- the user's key / agent 2nd -- The domain's recovery key / agent, set by group policy This enables Admins to recover data if the user's key is lost.
60
best practices for EFS
keep multiple recovery agents encrypt folders, not files export keys from AD so there's a backup
61
Why should you encrypt folders, not files, for EFS
If you encrypt just the file, and not the folder containing the file, when users open the file Windows creates a clear-text copy of that file (it does this always, not just for bitlocker. That ~filename.doc) which will not be encrypted.