1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Murljashka [212]
3 years ago
5

You must configure a certificate authority on your network to use EFS. True or False?

Computers and Technology
1 answer:
Westkost [7]3 years ago
6 0

You do not need to configure a certificate authority on your network to use EFS.

<em>EFS</em> is the short form for<em> Encryption File System</em>. With EFS, users can encrypt their files and folders and even the entire content of a given drive. By encrypting these files and folders, the access to them are restricted and thus increasing, improving and enhancing the security level of the users' data.

In other words, even though there are other ways to restrict access (such as using <em>logon authentication</em> and <em>NTFS file permissions</em>), EFS allows to add another layer of security to data.

To <em>encrypt</em> and <em>decrypt</em> data files and folders in EFS, a <em>certificate authority (CA)</em> could be used. This is however not a requirement. In the case where there is no certificate authority, EFS  will sign a default certificate that will be used for encryption. In other words, <em>EFS will generate its own certificate</em> if none does not exist.

<em>The following are other things to note about EFS</em>

i. EFS uses a public and private key pair to encrypt data.

ii. Users do not need to enable EFS. It is enabled by default.

iii. For EFS to encrypt a file, the NTFS file system must be used.

Since a certificate authority is not required on your network to use EFS, the correct option is:

(b) False.

Read more at: brainly.com/question/10410730

You might be interested in
Analytical processing uses multi-levelaggregates, instead of record level access.? True? False
Dominik [7]

Answer:

True.

Explanation:

Analytical processing uses multi-levelaggregates, instead of record level access.

8 0
4 years ago
A concave lens is also called a diverging lens. please select the best answer from the choices provided t f
nlexa [21]

The answer is true because a concave lens is also called a diverging lens.


5 0
3 years ago
What is the code range for the integumentary system subsection in the cpt coding manual?
boyakko [2]
The code range is <span>10021-19499
</span>

Procedures on the integumentary system have their codes that range within 10021 – 19499 of the CPT manual. This is the 1st subsection of surgery. You will find codes for skin tag removal, incisions, and wound debridement at the front of the integumentary system.



6 0
4 years ago
The preferred means of creating multithreaded Java applications is by implementing the ________ interface. An object of a class
Kaylis [27]

Answer:

Runnable.

Explanation:

Java is an all round programming language which is typically object-oriented and class-based. It was designed by James Gosling, developed by Sun microsystems and released officially on the 23rd of May, 1995. Java programming language is designed to have only a few implementation dependencies as possible because it was intended to be written once, and run on any platform.

Java makes concurrency to be available to software developers through the application programming interface (API) and the language. Also, it supports multiple threads of execution, by making each thread have its respective program counter and method-call stack, which then allow concurrent executions with other threads.

The preferred means of creating multithreaded Java applications is by implementing the runnable interface. An object of a class that implements this interface represents a task to perform. The code is public void run ().

8 0
3 years ago
Which is true about routers and switches?
Julli [10]

Answer:

Routers control traffic between networks while switches control traffic within a network

Explanation:

There are different devices involves in computer networking. These devices include hub, switch, router and other components.

Switch is used to connect the computer with in the network. It controls the traffic between different computers within the network. Different computers are connected with each other through different cables with the help of switch.

On the other hand, different LAN's connected through the cable with a router to communicate with each other. This device is used to control the traffic between different networks.

 

8 0
3 years ago
Other questions:
  • Why should you log out when you finish an online session?
    9·1 answer
  • Emma has used copyright works of a number of artists in her photo album and cited all of them except one. She may be caught for
    6·2 answers
  • Which of the following are personal video journal entries posted on the web? Select one: A. Podcasts B. Vlogs C. Blogs D. Newsgr
    14·1 answer
  • Why do we allow electronic instruments to warm-up before use?
    11·1 answer
  • Convert 4.5 strides to girth
    10·1 answer
  • Distributed computing is a term that describes the work that autonomous computers can do to achieve a common goal, especially in
    10·1 answer
  • What was your favorite animals, game, photo, friends,
    7·2 answers
  • In order to make schemas that will appear in the Schema Library available in the XML Options dialog box, what file extension sho
    10·1 answer
  • The function changeLocation is also called a _____.
    5·2 answers
  • Examples of applying successful visual design principles to bring a web page together are _________________. (Choose all that ap
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!