How does a user get to be an efs recovery agent

Assignment Help Management Information Sys
Reference no: EM131715451

LAB : CONFIGURING FILE SERVICES AND DISK ENCRYPTION

Exercise 6.1 Encrypting Files with EFS

Overview

For files that are extremely sensitive, you can use EFS to encrypt the files. During this exercise, you encrypt a file using Encrypting File System (EFS), which is a built-in feature of NTFS.

Mindset

Encryption is a way to add an additional layer of security. If the laptop is stolen and the hard drive is put into another system where the thief or hacker is an administrator, the files could not be read without the proper key. If you want to encrypt individual documents, you can use Encrypting File System (EFS).

Exercise 6.2 Configuring the EFS Recovery Agent

Overview

During this exercise, you configure EFS Recovery Agents so that you can recover EFS encrypted files although the agent is not the owner of the file.

Mindset

When an employee leaves the company, that employee's files might be encrypted, which would be unreadable to anyone else. Using an EFS recovery agent, you will be able to recover those files and make them available to the user or users who have replaced the departed user.

Exercise 6.3 Backing Up and Restoring EFS Certificates

Overview

During this exercise, you backup an EFS certificate which you later restoreafter you delete the certificate.

Mindset

You have a standalone computer that failed and had to be rebuilt. On the computer, you had some files that were encrypted with EFS. Fortunately, you backed up the files from time to time to a removable drive. After you rebuilt the computer, you copied the files from the removable drive.

Although you are using the same username and password that you used before, you cannot open the files because they are encrypted. Unfortunately, there is not much you can do unless you have the EFS certificates with the correct keys to decipher the documents. Therefore, it is important that you always have a backup of the EFS certificates in case the system needs to be replaced.

Exercise 6.4 Encrypting a Volume with BitLocker

Overview

In this exercise, you create a new volume and then use BitLocker to encrypt the entire volume.

Mindset

EFS will encrypt only individual files; BitLocker can encrypt an entire volume. Therefore, if you want to encrypt an entire drive on a laptop, you can use BitLocker.

LAB REVIEW QUESTIONS

1. In Exercise 6.1, how do you enable EFS?

2. In Exercise 6.1, how do you allow other users to view an EFS file that you encrypted?

3. In Exercise 6.2, how does a user get to be an EFS Recovery Agent?

4. In Exercise 6.3, what format did you use when backing up the certificates, so that it can also store the private and public keys?

5. In Exercise 6.4, what did you use to encrypt an entire volume?

6. In Exercise 6.4, from where do you control BitLocker?

Lab Challenge Deploying Network Unlock

Overview

To complete this challenge, you will list the software components needed to implement Network Unlock and specify the server to which you would install the software component.

Mindset

You are an administrator for Contoso.com and you need to deploy Network Unlock on the Contoso network.

Reference no: EM131715451

Questions Cloud

What type of system does this company currently utilize : Discuss the accounting issues at hand. What type of system does this company currently utilize to estimate uncontrollable
Discuss the life-giving properties of blood : Discuss the life-giving properties of blood, and the symbolism with respect to atonement for sins-blood is a symbol of life given by God.
Design low fidelity mock-up prototypes for phone and kiosk : Determined technical and human interaction requirements for both kiosk and smart phone. Designed low fidelity mock-up prototypes for both the phone and kiosk.
Calculation of inventory at the lower of cost : Jassal Music Inc. is located in Edmonton, Alberta, and reports its financial information using IFRS. A calculation of inventory at the lower of cost
How does a user get to be an efs recovery agent : Create a new volume and then use BitLocker to encrypt the entire volume. How does a user get to be an EFS Recovery Agent?
Discuss accounting for ordinary or preference shares : Is there any difference between accounting for ordinary or preference shares
Responsible for global warming : Carbon dioxide is a greenhouse gas that is thought to be responsible for global warming. Using this information, explain why destruction of the Earth's rain
Discuss problem-economic report of the president : What kind of information can be found in the "Economic Report of the President?" Find a web site that contains the "Economic Report of the President".
Distinguish a heterozygous ptc genotype : 1. How do you distinguish a heterozygous PTC genotype (Tt) from the homozygous dominant (TT) genotype?

Reviews

Write a Review

Management Information Sys Questions & Answers

  Ways that organization security policies can be influenced

Identify the various ways that agency or organization security policies can be influenced.2. Compare and contrast the difference between legislation and other regulatory documents, i.e., guidance, standards, directives, executive orders, etc.

  Discuss about the risk management

"With proper planning, it is possible to eliminate most/all risks from a project/endeavor?" Why, or why not?

  Critical characteristics or attributes of dss

Executive Information System EIS - Produce a paper discussing the most critical characteristics or attributes of DSS or EIS in which you summarize your findings to support your position.

  Find the process id of the script and kill the job

Modify the program to add a trap for SIGINT and SIGTERM. Save the script and then run the script in the background. Use the jobs command to display a list of the jobs currently running.

  Why is collaboration so important in technical communication

In this course, we have covered a lot of ground. Discuss what you have learned about technical and business communications over the last nine weeks. Describe which area of technical communications was most important to you, and explain why.

  What key concerns functional tactics address in marketing

What are three types of opportunities for sharing that form a sound basis for diversification or vertical integration? Give an example of each from companies you have read about.

  Describe and discuss at least two backup strategies

Perform a search on the Web for articles and stories about social engineering attacks or reverse social engineering attacks.

  Describe the resources that will be needed for training

Prepare a 4- to 5-slide PowerPoint presentation that will provide general information to the company employees about how the startup of the new system will affect them and what to expect in each of the stages of deployment.

  Describe the common web server threats and vulnerabilities

Describe the common mobile code security issues facing organizations today. Describe the common Web server threats and vulnerabilities.

  Find the first tcp handshake

What is the IP address of the host that started the handshake? What is the TCP port connection pair for this handshake? In the first packet of the handshake, the source port is the ephemeral port this host wants to use for the connection, and the d..

  Developing engaging interview questions

Developing engaging interview questions is the significant to a positive employment interview. Questions can be categorized in to two areas.

  What is the typical it implementation process

What is the typical IT implementation process? What are the roles and responsibilities involved in system implementation, How did the process described in the case study fail to include the fundamental activities identified of Health Care Informati..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd