1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Murljashka [212]
2 years ago
5

You must configure a certificate authority on your network to use EFS. True or False?

Computers and Technology
1 answer:
Westkost [7]2 years ago
6 0

You do not need to configure a certificate authority on your network to use EFS.

<em>EFS</em> is the short form for<em> Encryption File System</em>. With EFS, users can encrypt their files and folders and even the entire content of a given drive. By encrypting these files and folders, the access to them are restricted and thus increasing, improving and enhancing the security level of the users' data.

In other words, even though there are other ways to restrict access (such as using <em>logon authentication</em> and <em>NTFS file permissions</em>), EFS allows to add another layer of security to data.

To <em>encrypt</em> and <em>decrypt</em> data files and folders in EFS, a <em>certificate authority (CA)</em> could be used. This is however not a requirement. In the case where there is no certificate authority, EFS  will sign a default certificate that will be used for encryption. In other words, <em>EFS will generate its own certificate</em> if none does not exist.

<em>The following are other things to note about EFS</em>

i. EFS uses a public and private key pair to encrypt data.

ii. Users do not need to enable EFS. It is enabled by default.

iii. For EFS to encrypt a file, the NTFS file system must be used.

Since a certificate authority is not required on your network to use EFS, the correct option is:

(b) False.

Read more at: brainly.com/question/10410730

You might be interested in
Create a list of 5 potential jobs that students of computer science can obtain.
Schach [20]
1. data scientist
2. software engineer
3. product manager
4. web developer
5. software tester
7 0
3 years ago
Read 2 more answers
True or false The List interface defines a collection for storing elements in a sequential order.
Veseljchak [2.6K]

Answer:

True

Explanation:

A list is a collection where the elements are stored in the ordered sequence and it allows access to each of he elements by its position in the sequence. It allows duplicate values to be stored. It also allows insertion of elements and positional access.

A list is one of the three major categories of the Java collections. The other two categories are maps ans sets.

4 0
3 years ago
What is the least number of bits you would need to borrow from the network portion of a Class B subnet mask to get at least 130
Tatiana [17]

Answer: Eight

Explanation:

A class B address is 255.255.0.0. We need to borrow 8 bits from the network portion to have atleast 130 host per subnet.

11111111.00000000.00000000.00000000

8 0
3 years ago
A string variable can hold digits such as account numbers and zip codes.<br><br> FALSE<br><br> TRUE
gavmur [86]
True. The second one is right
6 0
3 years ago
Moore’s law refers to?
puteri [66]

Answer:

Moore’s law states that processor speeds, or overall processing power for computers will double every two years.

Explanation:

  • Moore’s law is more than an observation than a law which was originated in 1970. The observation is about the number of transistors that is present in any system or an integrated system that will be doubled every couple of years.
  • The real-world application of Moore's law can be seen during computing your business taxes, piloting a spaceship, or changing the television station, etc.
7 0
3 years ago
Other questions:
  • This is the main work area of your computer.
    7·1 answer
  • Complete the paragraph to explain how Angelina can notify readers that her report is just a draft. Angelina has decided to add t
    12·2 answers
  • Which is not an example of a mobile operating system?
    9·1 answer
  • Sulfur content is measured in
    11·1 answer
  • Lisa is modifying a spreadsheet. Which view will allow Lisa to see how her changes will look when she prints the spreadsheet?
    13·2 answers
  • A program uses two classes: dog and poodle. which class is the base class and which is the derived class?
    7·2 answers
  • Assume you have an Access database with five different tables, including various pieces of information about your client base. Y
    9·1 answer
  • Please help Ill give you brainliest if I get 2 answers. Which is used to input information on a laptop?
    6·1 answer
  • Not every organization integrates with the Internet, but all use some or most of the technology that gave rise to it.
    15·1 answer
  • Keli is unable to find a shape that meets her needs. Which feature in Power Point should she use to create shapes that are compl
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!