1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Murljashka [212]
2 years ago
5

You must configure a certificate authority on your network to use EFS. True or False?

Computers and Technology
1 answer:
Westkost [7]2 years ago
6 0

You do not need to configure a certificate authority on your network to use EFS.

<em>EFS</em> is the short form for<em> Encryption File System</em>. With EFS, users can encrypt their files and folders and even the entire content of a given drive. By encrypting these files and folders, the access to them are restricted and thus increasing, improving and enhancing the security level of the users' data.

In other words, even though there are other ways to restrict access (such as using <em>logon authentication</em> and <em>NTFS file permissions</em>), EFS allows to add another layer of security to data.

To <em>encrypt</em> and <em>decrypt</em> data files and folders in EFS, a <em>certificate authority (CA)</em> could be used. This is however not a requirement. In the case where there is no certificate authority, EFS  will sign a default certificate that will be used for encryption. In other words, <em>EFS will generate its own certificate</em> if none does not exist.

<em>The following are other things to note about EFS</em>

i. EFS uses a public and private key pair to encrypt data.

ii. Users do not need to enable EFS. It is enabled by default.

iii. For EFS to encrypt a file, the NTFS file system must be used.

Since a certificate authority is not required on your network to use EFS, the correct option is:

(b) False.

Read more at: brainly.com/question/10410730

You might be interested in
1. Which of the following are considered CAD powerhouses?
allsm [11]

Answer:

1. D.Autodesk and microstation.

2. D. the creation of a computer model, paricularly for purposes of studying.

3. A.internet delivered through standard household phone lines.

4. C.3-D sculptures used to pray for fertility.

5. C.technology.

Explanation:

8 0
3 years ago
Which two climates have moderate rainfall and experience warm summers and cold winters due to their position relative to mountai
77julia77 [94]
Most probably grassland and steppes
6 0
2 years ago
Henri is working in a complex financial spreadsheet that has hundreds of columns of data. If he is at column AN and would like t
Alisiya [41]
Answer: Contro; + Home

This key combination will return you to the first row, first column of the current worksheet.
8 0
3 years ago
Which best describe a resource each student could use to find information
marta [7]

Online library resources

Explanation

Students can utilize online library resources from various campus available for online educational uses.In the library, information on current research in the various displines can be obtained through a search on the book, journal or document.In addition to that, goggle offers academic journals and academic documents prepared by scholars for other academicians to read and get information.

8 0
3 years ago
Read 2 more answers
Multiple Choice
zalisa [80]
Zeros and ones
Hope the helps
Godspeed
7 0
2 years ago
Other questions:
  • Read the spreadsheet formula below, then answer the question.
    14·2 answers
  • How i can connect to internet automatically when i switch on my computer?
    8·1 answer
  • Your mom wants to purchase a computer. She has heard about how the Windows 8 operating system is best-geared for a touch-enabled
    8·1 answer
  • A text-only forum accessed through a bulletin board service (BBS) is known as a _____.
    14·1 answer
  • Write a program that reads a person's first and last names, separated by a space. Then the program outputs last name, comma, fir
    9·1 answer
  • What type of waves in the electromagnetic spectrum has the Search for Extraterrestrial Intelligence (SETI) mostly analyzed in th
    15·1 answer
  • Explain the role of a computer in education​
    9·1 answer
  • You need to subnet a network that has 5 subnets, each with at least 16 hosts. Which classful subnet mask would you use?A. 255.25
    12·1 answer
  • Is Brainly cheating??
    10·2 answers
  • The readline method of bufferedreader returns _____ when end of file is reached.
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!