What is used to encrypt files when using the efs


Asked by admin @ in Computers and Technology viewed by 284 People


Which of the following is an encryption tool that allows users to encrypt files and folders by simply right-clicking a given object and setting a few options?

a. PowerShellb. BitLockerc. Encrypting File System (EFS)d. Trusted PlatformModule (TPM)

Answered by admin @



Answer:

Option C, ENCRYPTING FILE SYSTEM (EFS).

Explanation:

Encryption is one of the best protection methods available to keep all one's digital assets safe.

Encrypting file system (EFS) is a feature of windows 2000 operating system that allows any file or folder be stored in an encrypted form and decrypted only by an individual user and an authorized recovery agent.

EFS provides filesystem-level encryption. This technology enables files to be transparently encrypted to protect confidential data from attackers with physical access to the computer.

To encrypt or a file using EFS;

Open windows explorer

Right-click the file or folder and select properties

Click advanced in the general tab

Check encrypt contents to secure data

Click ok.

Therefore, option C, ENCRYPTING FILE SYSTEM, is an encryption tool that allows users to encrypt files and folders by simply right-clicking a given object and setting a few options.


Similar Questions

You can use _________ to script your configuration file

Asked by admin @ in Computer Science viewed by 442 persons

You can use _________ to script your configuration file

Which command is used to change the file name

Asked by admin @ in Computer Science viewed by 338 persons

Which command is used to change the file name

The file extensions avi m4v and ogv are used for

Asked by admin @ in Computers and Technology viewed by 356 persons

The file extensions .webm, .m4v, and .ogv are used for:

What are the two basic functions used in encryption algorithms

Asked by admin @ in Computer Science viewed by 325 persons

What are the two basic functions used in encryption algorithms?

Name a popular software used for file compression and archiving

Asked by admin @ in Computer Science viewed by 390 persons

Name a popular software used for file compression and archiving

Name the software used for downloading files from the internet

Asked by admin @ in CBSE BOARD X viewed by 369 persons

Name the software used for downloading files from the internet

What did theodore roosevelt use to file lawsuits against corporations

Asked by maham237 @ in History viewed by 300 persons

File usage across jenkins jobs can be tracked using

Asked by admin @ in Computer Science viewed by 362 persons

File usage across Jenkins jobs can be tracked using : a) Plugins b) Distributed build c) Fingerprints d) none

Give at least one reason why asymmetric encryption is useful

Asked by maham237 @ in Computers And Technology viewed by 307 persons

In symmetric encryption the same key is used to encrypt and decrypt a message. in asymmetric encryption different keys are used to encrypt and decrypt. give at least one reason …

Overcoming fixed mindset: a step-by-step guide to cultivating a growth mindset

Asked by wiki @ in Health viewed by 1301 persons

Which of the following would best complete this list?

Asked by wiki @ in Social Studies viewed by 758 persons

What had the king decided to do before he saw the spider

Asked by vanshika149 @ in English viewed by 1160 persons

Describe the karez in your own words

Asked by rajesh064 @ in English viewed by 1333 persons

What is 8 + (x + 5)?

Asked by jaylord7 @ in Mathematics viewed by 1112 persons

Most viewed questions in Computers And Technology


A customer wants to increase the storage capacity by 25gb

Asked by admin @ in Computers and Technology viewed by 4437 persons


A backup of sewage in the operation's storeroom is considered

Asked by admin @ in Computers and Technology viewed by 1000 persons




Solid yellow line bordering your lane of traffic marks a

Asked by admin @ in Computers and Technology viewed by 614 persons



Which of the following is not a windows utility program

Asked by admin @ in Computers and Technology viewed by 599 persons


When is a wrecker considered to be an emergency vehicle

Asked by admin @ in Computers and Technology viewed by 581 persons


Which operation on a pwc requires more than idle speed

Asked by admin @ in Computers and Technology viewed by 578 persons



Which of the following statements is true of a database

Asked by admin @ in Computers and Technology viewed by 568 persons


Which of the following is not true about an entrepreneur

Asked by admin @ in Computers and Technology viewed by 542 persons


Kitchen gadgets draw a context diagram for the order system

Asked by admin @ in Computers and Technology viewed by 520 persons