Sharon recently lost an encryption certificate that rendered some of her EFS-encrypted files unrecoverable. To prevent a similar situation from arising in the future, she wants to create a recovery certificate for recently encrypted files. She creates the recovery certificate. What should Sharon do next? a. Run cipher with the /r:filename option, where filename is the name of the recovery certificate b. Import the recovery certificate into the local security policy as a data recovery agent c. Use the public key of the recovery certificate to encrypt the symmetric key d. Run cipher with the /u option to update the existing encrypted files
Sharon recently lost an encryption certificate that rendered some of her EFS-encrypted files unrecoverable. To prevent a similar situation from arising in the future, she wants to create a recovery certificate for recently encrypted files. She creates the recovery certificate. What should Sharon do next? a. Run cipher with the /r:filename option, where filename is the name of the recovery certificate b. Import the recovery certificate into the local security policy as a data recovery agent c. Use the public key of the recovery certificate to encrypt the symmetric key d. Run cipher with the /u option to update the existing encrypted files
Chapter14: Security, Troubleshooting, And Performance
Section: Chapter Questions
Problem 12RQ
Related questions
Question
-
Sharon recently lost an encryption certificate that rendered some of her EFS-encrypted files unrecoverable. To prevent a similar situation from arising in the future, she wants to create a recovery certificate for recently encrypted files. She creates the recovery certificate.
What should Sharon do next?a. Run cipher with the /r:filename option, where filename is the name of the recovery certificateb. Import the recovery certificate into the local security policy as a data recovery agentc. Use the public key of the recovery certificate to encrypt the symmetric keyd. Run cipher with the /u option to update the existing encrypted files
Expert Solution
This question has been solved!
Explore an expertly crafted, step-by-step solution for a thorough understanding of key concepts.
This is a popular solution!
Trending now
This is a popular solution!
Step by step
Solved in 2 steps
Recommended textbooks for you
LINUX+ AND LPIC-1 GDE.TO LINUX CERTIF.
Computer Science
ISBN:
9781337569798
Author:
ECKERT
Publisher:
CENGAGE L
LINUX+ AND LPIC-1 GDE.TO LINUX CERTIF.
Computer Science
ISBN:
9781337569798
Author:
ECKERT
Publisher:
CENGAGE L