1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
boyakko [2]
3 years ago
15

Janet manages the security of the database servers at the mortgage company where she works. The servers are Windows Server 2016;

she’s concerned about file system security. Which Microsoft feature would be most helpful to implement security to the file systems?
Computers and Technology
1 answer:
Mariulka [41]3 years ago
3 0

Answer:

encrypted file system (EFS)

Explanation:

The Encrypting File System (EFS) on windows is a Microsoft feature that help store sensitive file or information on a hard disk in an encrypted format so as to protect it from attackers or any other unauthorize individual. The EFS uses a combination symmetric key encryption and public key technology to protect the files, it is then encrypted with a symmetric algorithm known as DESX.

You might be interested in
There is always this thing that comes out and I can't answer one's question. How do I undo this?
Y_Kistochka [10]
You should enter your email address
8 0
3 years ago
Read 2 more answers
These are keywords used with mysql_query/ mysqli_queryto update records in a table.
Brrunno [24]

Answer:

D.insert, into, values

3 0
3 years ago
Read 2 more answers
Computer files containing nothing but printable characters are called ____ files.
natali 33 [55]
Computer files containing nothing but printable characters are called text files<span>.</span>
7 0
3 years ago
Which of the following tasks can you perform using a word processor?
My name is Ann [436]
Create a outline of sections to be included in a document
8 0
3 years ago
A compressed file uses a(n) ____ as the last character in the file extension.
rjkz [21]
If it was done with the compress command, capital Z
6 0
3 years ago
Other questions:
  • Conceptual note-taking is the act of
    15·1 answer
  • What is the function of the modem?
    12·2 answers
  • A system developer needs to provide machine-to-machine interface between an application and a database server in the production
    6·1 answer
  • When you purchase software in a box, reading the ________ is important to know if the software will function properly?
    13·1 answer
  • Write a program that performs the following tasks: Display a friendly greeting to the user Prompt the user for the value to conv
    13·1 answer
  • Need help please. this effect my technology
    15·1 answer
  • Read the argument below and determine the underlying principle that was used to come to the conclusion presented: It is recommen
    5·1 answer
  • An entrepreneur identifies and fills the gap between what the society needs and what is available is called​
    5·1 answer
  • Explain program and programming with two examples of each<br>Help​
    12·1 answer
  • 2 differences between system and applications software​
    9·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!