deck_4229647 Flashcards

1
Q

How does encrypted file sharing work? Pg 137

A

To share encrypted files, you must have a valid EFS certificate for the user who should have access to the file.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

If you need to decrypt folders or files, you can use _________ to access the encrypted files. Pg 138

A

DRA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

When using EFS on a stand alone computer, if the key used to encrypt the files are lost, what happens next? Pg.138

A

There are no default recovery processes and all access to the files would be lost.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the Cipher command line utility used to manually create a DRA? Pg 138

A

Cipher /R:filemame

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The /R switch is used to generate two files. What are they? Pg 138

A

.pfx which s used for data recovery. And the .cer file has a self signed EFS recovery agent certificate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Where do you access the local security policy? Pg 139

A

Administrative tools or the local computer policy MMC snap in > expand Public Key Policies > Encrypting File System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the Cipher Utility? Pg 140

A

Cipher is a command line utility that can be used to encrypt files on NTFS volumes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the syntax for the Cypher command? Pg 140

A

Cipher /[command parameter] [filename]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which Cipher command parameter causes any error that occurs to be ignored? Pg 140

A

/I

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which Cipher command parameter creates a new certificate file and certificate key? Pg 140

A

/K

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which Cipher command parameter specifies that files or folders should be encrypted? Pg 140

A

/E

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is RAID? Pg 141

A

Redundant Array of Independent Disks. Allows an administrator to recover data from a single hard disk failure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the three main levels of RAID? Pg 141 142

A

RAID 0 (striped). RAID 1 (mirroring). RAID 5 Volume

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

In Windows 7 is it possible to share encrypted files between multiple computers? Pg.137

A

Yes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which RAID level has a minimum of two hard disks that work together as a single volume for better performance? Pg 141

A

RAID 0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which RAID level is known as mirroring? Pg 142

A

RAID 1

17
Q

What are the minimum and maximum amount of disks that RAID 5 can use as one volume?

A

3 disks is the minimum. 32 disks is the maximum

18
Q

What is the difference between software RAID and hardware RAID?

A

Many hardware RAID systems are hot swappable. Software RAID is set up through the Disk Management utility and is not available unless you have multiple hard disks installed in the Windows 7 machine.