EBK A+ GUIDE TO IT TECHNICAL SUPPORT (H
9th Edition
ISBN: 9781305446427
Author: ANDREWS
Publisher: YUZU
expand_more
expand_more
format_list_bulleted
Concept explainers
Expert Solution & Answer
Chapter 18, Problem 2TC
Explanation of Solution
Given: Folder properties box and Encrypt contents.
To find: The problem discovered when the user opens the properties box folder to encrypt the folder but, finds that the Encrypt content to secure data is dimmed.
Solution:
Files and folders can be encrypted using the Windows Encrypted File System that works with the NTFS file system, business and professional windows’s edition...
Expert Solution & Answer
Want to see the full answer?
Check out a sample textbook solutionStudents have asked these similar questions
What is the preferred mechanism for backup up user account files? What are the differences between File History backups and using the Backup and Restore (Windows 7) tool? Under what circumstances would you use the WBAdmin backup tool?
No written by hand solution
Encrypt the plans.txt file using the password pinky and save the output to /opt/book/encryption/secret-key/plans.aes. h. Provide a screenshot of the output in terminal and a screenshot of the contents of the folder opt/book/encryption/secret-key /.
Commands to be used:
• cd /opt/book/encryption/secret-key
• aescrypt -e plans.txt -p pinky -o plans.aes
i. Explain what type of encryption aes is, and what is the main difference between aes and RSA encryption algorithm
Please, give permission for these users by using NTFS advance permission in windows 10.Nothing is missing....I wan you to type step by step U1 to 8 so, I can follow yours. When you give permission to each user please type it steps so I can follow, make sure no steps to be missed....Thank you
User1 should be able to change Attributes and Permissions on all files in all folders.
User2 should be able to Read, Append to files from the C folder and in the O folder and all of their respective subfolders, but not delete subfolders.
User3 should have the ability to create folders and files in both the S folder and E folders.
User4 can delete files as well as create folders and files in the A folder.
User5 can delete files as well as create folders and files in the K folder and its subfolders.
User6 should have the ability to Read/Writ and create files and folders in the C folder and O folders as well as delete subfolders. He should also be able to change permissions in the T folder.…
Chapter 18 Solutions
EBK A+ GUIDE TO IT TECHNICAL SUPPORT (H
Knowledge Booster
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.Similar questions
- When error messages indicate that the Windows registry is corrupted and you cannot boot from the hard drive, what tool or method is the first best option to fix the problem? The second best option? a. Use bootable media to launch Windows RE and use System Restore to apply a restore point. b. Use bootable media to launch Windows RE and perform a startup repair. c. Use bootable media to launch Windows RE and then use commands to recover the registry from backup. d. Refresh Windows using a system image or custom refresh image.arrow_forwardWhen a user, Belinda Lim, signs in to Windows, she cannot see her Documents folder in File Explorer and some of her Windows user settings are lost. You suspect her user profile is corrupted. Which tool or method should you use first to investigate and/or solve the problem? Second? a. Check the C:\User\Belinda Lim\Documents folder. b. Check the C:\Users\Belinda Lim\Documents folder. c. Use the chkdsk command. d. Use the sfc command.arrow_forwardYou open a folder Properties box to encrypt the folder, click Advanced, and discover Encrypt contents to secure data is dimmed. What is the most likely problem? Encryption has not been enabled. Use the Computer Management console to enable it. You are not using an edition of Windows that supports encryption. Most likely a virus has attacked the system and is disabling encryption. Encryption applies only to files, not folders.arrow_forward
- What kind of file format is an encrypted list of passwords saved in by a password manager? Is it a USB device, a website, an external hard drive, or a disk on your local computer?arrow_forwarduse Linux commands to find the encryption key and original textarrow_forward14) Using zenity, write script to display dialog box to enter First Name, then another dialog box to enter Last Name, andanother dialog box to enter password, where the password when entered is masked. Then these input should bedisplayed in single dialog box scripts MUST be in bash shell linux commandsarrow_forward
- Sharon recently lost an encryption certificate that rendered some of her EFS-encrypted files unrecoverable. To prevent a similar situation from arising in the future, she wants to create a recovery certificate for recently encrypted files. She creates the recovery certificate.What should Sharon do next? a. Run cipher with the /r:filename option, where filename is the name of the recovery certificate b. Import the recovery certificate into the local security policy as a data recovery agent c. Use the public key of the recovery certificate to encrypt the symmetric key d. Run cipher with the /u option to update the existing encrypted filesarrow_forwardq12- Windows stores its local users’ passwords in ? a. system32 folder b. C:\My Documents c. /etc/passwd d. Security Account Managerarrow_forwardUpload PDF file containing screenshots from Terminal to answer following questions: 1 - How to compile JAVA program, then if and only if succeeded RUN the program? 2 - How to check how many argument were entered by user? 3 - 1+2+3, how to represnt it in shell command ? 4 - You have shell script named 'test.sh', how to run the file ? 5 - How to check if directory exists?arrow_forward
- Write the command that can be used to answer the following questions. (Hint: Try eachout on the system to check your results.)a. Find all files on the system that have the word “test” as part of their filename.b. Search the PATH variable for the pathname to the awk command.c. Find all files in the /usr directory and subdirectories that are larger than 50 kilobytesin size.d. Find all files in the /usr directory and subdirectories that are less than 70 kilobytesin size.e. Find all files in the / directory and subdirectories that are symbolic links.f. Find all files in the /var directory and subdirectories that were accessed less than60 minutes ago.g. Find all files in the /var directory and subdirectories that were accessed less than sixdays ago.h. Find all files in the /home directory and subdirectories that are empty.i. Find all files in the /etc directory and subdirectories that are owned by the groupbin.arrow_forwardAnswer the following question: Which AVG feature scans every single file as it is opened, saved, or copied? A. Detection Warning B. File Shield C. Archive Detection D. Encrypted Filearrow_forwardWhy is it more secure to require a user to press Ctrl+Alt+Delete to log on rather than displaying the Windows Welcome screen?arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- A+ Guide To It Technical SupportComputer ScienceISBN:9780357108291Author:ANDREWS, Jean.Publisher:Cengage,CompTIA Linux+ Guide to Linux Certification (Mind...Computer ScienceISBN:9781305107168Author:Jason EckertPublisher:Cengage Learning
A+ Guide To It Technical Support
Computer Science
ISBN:9780357108291
Author:ANDREWS, Jean.
Publisher:Cengage,
CompTIA Linux+ Guide to Linux Certification (Mind...
Computer Science
ISBN:9781305107168
Author:Jason Eckert
Publisher:Cengage Learning