1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
r-ruslan [8.4K]
3 years ago
7

Which statement below is not true of EFS

Computers and Technology
2 answers:
lapo4ka [179]3 years ago
5 0

Which statement below is not true of EFS is EFS cannot store files encrypted.

<h3>Explanation: </h3>

The Encrypting File System (EFS) is a feature introduced in version 3.0 of NTFS that provides filesystem-level encryption. EFS is useful for mobile computer users, whose computer are subject to physical theft, and for storing highly sensitive data. Encryption itself is the method where the information is converted into secret code that hides the information's true meaning

Encrypting File System (EFS) is used to encrypt files and folders. EFS is easy to use, with nothing more than a check box in a file’s properties. It is not fully supported on Windows 7 Starter, Windows 7 Home Basic, and Windows 7 Home Premium.

EFS uses several cryptographic algorithms as follows:

  • Data Encryption Standard eXtended (DESX)
  • Triple Data Encryption Standard (3DES)
  • Advanced Encryption Standard (AES)
  • Rivest, Shamir, Adleman (RSA)

A cryptographic algorithm is a set of well-defined but complex mathematical instructions used to encrypt or decrypt data. There are three main types of cryptographic algorithms:

  • (1) secret key
  • (2) public key
  • (3) hash functions

There are two basic types of cryptographic systems such as symmetric (private key) and asymmetric (public key).

Hope it helps!

Learn more about encrypting   brainly.com/question/12742104

#LearnWithBrainly

ohaa [14]3 years ago
3 0

<em>Statements that do not apply to EFS are statements that EFS cannot store files encrypted. </em>

<h2>Further Explanation </h2>

Encrypting File System or EFS is a core technology (in Windows 2000, XP Professional, and Windows Server 2003) that allows encrypted file storage in a volume formatted using the NTFS file system.

<em>Version of Windows that supports EFS </em>

  • Windows 2000 Family: Windows 2000 Professional, Windows 2000 Server, Windows 2000 Datacenter Server, and Windows 2000 Advanced Server
  • Windows XP Family: Windows XP Professional, Windows XP Professional 64-bit Edition, Windows XP Professional x64 Edition
  • Windows Server 2003 Family: Windows Server 2003 Standard Edition, Windows Server 2003 Enterprise Edition, Windows Server 2003 Datacenter Edition
  • Windows Vista Family: Windows Vista Business Edition, Windows Vista Enterprise Edition, Windows Vista Ultimate Editon
  • Codenamed Longhorn Windows Server family: Longhorn (all beta versions, as of April 2007, reaching Beta 3 version)

EFS uses several cryptographic algorithms, which are as follows:

  • Data Encryption Standard eXtended (DESX)
  • Triple Data Encryption Standard (3DES)
  • Advanced Encryption Standard (AES)
  • Rivest, Shamir, Adleman (RSA)

Learn More

  1. About Software brainly.com/question/11950006
  2. Type of Data brainly.com/question/10762715

Details:

Grade: Middle School

Subject: Computers and Technology

Keyword: Software, Windows, Encryption, EFS

You might be interested in
What is referred to by the phrase “Web 2.0”?
Tresset [83]

Answer:

Web 2.0

the second stage of development of the World Wide Web, characterized especially by the change from static web pages to dynamic or user-generated content and the growth of social media.

Explanation:

It refers to websites that emphasizes user-generated content, ease of use,  compatible with other products, systems, and devices for end users.

4 0
3 years ago
True or false A thesaurus is a brunch of commands grouped together as a single command used to automate task
Nina [5.8K]

False a thesaurus are a list of synonyms or antonyms

4 0
3 years ago
What is the missing line of code?
Ray Of Light [21]

Answer:

phrase[2:5]

Explanation:

Given:

The above code segment

Required

Which instruction returns 'u a'

First, we need to get the index of u in the phrase:

u is at the third position but in programming, index starts at 0.

So, u is at index 2

Next, we need to get the index of a in the phrase:

a is at index 4

One of the ways to return a sub string from a string in python is string[start:stop+1]

Where:

start = 2 ----- index of u

stop = 4  ----- index of a

phrase ---- The string variable

So, the instruction that returns 'u a' is: phrase[2:5]

<em>Where 5 = 4 + 1</em>

5 0
3 years ago
What does Joann need to change in her outline?
Alona [7]
Where’s the outline?
6 0
3 years ago
Read 2 more answers
Non linear editing can cause _____ where edit and re-edit and re-edit again can cause video to be less true than the original ma
Oxana [17]

Non-linear editing can cause modification in the original video whereas editing and re-edit and re-edit again can cause the video to be less true than the original material.

<h3>What is non-linear editing?</h3>

In non-linear editing, the editor can do any operation with the video like adding or removing any frame without starting from the beginning.

It's been characterized as a ‘cut and paste’ technique that can really innovate how video makers approach videography.

Therefore Non-linear editing can cause modification in the original video whereas editing and re-editing and re-editing again can cause the video to be less true than the original material.

To know more about non-linear editing follow

brainly.com/question/15614247

#SPJ4

8 0
2 years ago
Other questions:
  • When computers connect to one another to share information, but are not dependent on each other to work, they are connected thro
    7·1 answer
  • Bob received a message from Alice which she signed using a digital signature. Which key does Bob use to verify the signature?Gro
    13·1 answer
  • If you inadvertently delete a file, you may be able to retrieve it from the A. Drop Box. B. System Restore. C. Restore File. D.
    15·1 answer
  • Assume that a is an array of two or more integers, and that b and c are integers.
    13·1 answer
  • If the speakers are not working on a laptop, what could be the problem besides the speakers?
    5·1 answer
  • 3. Matthew captures traffic on his network and notices connections using ports 20, 22, 23, and 80. Which port normally hosts a p
    14·1 answer
  • Why a commerce student must learn about SDLC (Software Development Life Cycle) and its phases?
    12·1 answer
  • What is the output?
    12·1 answer
  • Is pseudocode obtained from Algorithm or is Algorithm obtained from pseudocode?
    8·1 answer
  • Plz help me I will mark as the brainlest I only need long answer plz help me ​
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!