9.3.9 Practice Questions
1. You have used EFS to encrypt a directory of highly sensitive company files on your hard drive. You then decide to copy one of the files in the directory to a thumb drive to edit the files on a laptop computer while you are travelling to an industry conference. What is the result of copying the file to the thumb drive?
The file will no longer be encrypted.
2. After creating an FEK (file encryption key) for a file, what does EFS do next to add a greater level of security for the file?
EFS encrypts the FEK by creating a key pair (private and public).
3. Which of the following security solutions would prevent you from reading a file that you did not create?
EFS 4. Which of the following protocols establish a secure connection and encrypt data for a VPN? (Select three.)
IPsec
PPTP
L2TP
5. You have decided to use BitLocker as your whole disk encryption solution for the hard drive on your laptop. The laptop includes a TPM chip. What happens if you store the startup key required to unlock the hard drive in the TPM chip
You can boot the hard drive without providing the startup key.
6. A user has a file that contains sensitive data. Which of the following security technologies should he or she use to encrypt the single file?
EFS 7. Which of the following is true of the Windows BitLocker program?
BitLocker is designed to protect files against offline access only.
8. You need to use a common USB flash drive to transport important sensitive information for your organization. Which of the following would be the BEST program for protecting the data on the flash drive with encryption?
BitLocker To Go
9. Which of the following components is a special hardware chip included on a computer's motherboard that contains software that generates and stores cryptographic keys?
Trusted Platform Module (TPM)
10. When you arrive at your company, you discover that a hard drive with your customers' sensitive information has been stolen. You feel confident that the thief will not be able to view the data on the hard drive because you had previously taken security precautions to protect the data in case the hard drive was stolen. Which of the following precautions is the MOST likely solution you used to protect the data on the hard drive?
BitLocker with TPM