Reference no: EM132315788
1. Configuring BitLocker and Windows Encryption
1. Within a Microsoft Windows Server 2016 environment, who has access rights to the EFS features and functions in the server?
2. What are some best practices you can implement when encrypting BitLocker drives and the use of BitLocker recovery passwords?
3. What was the recovery key generated by BitLocker in this lab?
4. How would you grant additional users access rights to your EFS encrypted folders and data files?
5. What are the main differences between EFS and BitLocker?
6. The customer privacy data policy in your company's data classification standard requires encryption in two places: data stored locally or on a LAN, and data stored on a laptop. Describe your solution for meeting this policy requirement.
2. Identifying and Removing Malware from Windows Systems
1. What is the one thing that a virus, a worm, spyware, and malicious code have in common? What are the differences among these three threats: a virus, a bworm, and spyware?
2. How often should you update your antivirus protection?
3. Why is it a best practice to have and to carry an antivirus boot-up disk or CD?
4. Is the manual quick scan good enough protection for a system?
5. What best practices for the workstation domain that can mitigate the risks and threats caused by malicious code?
6. If you have an up-to-date antivirus program, do you still need a malware detection program like Windows Defender?
7. What are some of the most common symptoms of malware?
8. What risk or threat do malware applications, such as spyware, pose to the workstation domain?