1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
N76 [4]
3 years ago
8

You need to protect sensitive files from unauthorized users even if the disk is stolen. What feature should you use and on what

file system?
Computers and Technology
1 answer:
Lynna [10]3 years ago
7 0

Answer:

EFS on NTFS

Explanation:

EFS (Encryption File System) allows users to store confidential information about a computer when people who have physical access to your computer could otherwise compromise that information, intentionally or unintentionally. EFS is especially useful for securing sensitive data on portable computers or on computers shared by several users.  An attacker can also steal a computer, remove the hard drive(s), place the drive(s) in another system, and gain access to the stored files. Files encrypted by EFS, however, appear as unintelligible characters when the attacker does not have the decryption key.

The Encrypting File System (EFS) that is included with the operating systems provides the core file encryption technology to store NTFS files encrypted on disk.

You might be interested in
Where could an identity theft access your personal information?
Naily [24]
They can hack into you email or your phone number thats all they need to find where you live how old you are and etc hope this helps

8 0
3 years ago
Read 2 more answers
Cyber security includes which of the following?
Law Incorporation [45]

Answer:

d. All of above

Explanation:

All answers are correct!

5 0
3 years ago
Earthquakes happen in the Earth’s
Nostrana [21]
Earthquakes happen in the Earths "CRUST" because all of the tetonical plates are located in the crust.

hope this helped
5 0
3 years ago
With an example in each, describe the use of two basic functions which are known by the "string.h" header file.
olga nikolaevna [1]

Answer:

strcmp(char * A, char * B);

strcat(char * A, char * B)

Explanation:

One of these basic functions is the function strcmp(char * A, char * B).

This functions compares if two strings are equal; If they are, it returns 0. If not, it returns 1;

So, an example:

char A[13] = "Buffalo Bills";

char B[13] = "Buffalo Bills";

if (strcmp(A,B) == 0)

printf("The strings are the same\n);

else

printf("The strings are not the same");

In this case, they are the same.

----------------------

If for example:

char B[13] = "Buffalo Billz"

It would fall in the else, A and B would not be the same strings.

--------------------------

Other function is the strcat(char * A, char * B);

This function takes two strings as an input, and concatenate them to the first.

For example:

char A[15] = "Buffalo";

char B[5] = "Bills";

strcat(A, B);

printf("%s\n", A);

The output is:

Buffalo Bills

5 0
3 years ago
Design and write a class that implements an ordered list type using a linked list, and a program that exercises and tests the cl
-Dominant- [34]

Answer:

A

Explanation:

7 0
3 years ago
Other questions:
  • _____ is a valuable tool that enables you to find information on the web by specifying words or phrases know as keywords- which
    14·1 answer
  • A ____ is a data network connection that makes use of the public telecommunications infrastructure but maintains privacy through
    13·1 answer
  • Which of the following statements is NOT true about a mainframe computer?
    14·1 answer
  • Which is the correct process for attaching a file?
    12·1 answer
  • A corporation needs an operating system that allows the various teams in its office to network and collaborate on projects. Whic
    10·1 answer
  • What is the primary responsibility of the federal reserve bank??
    11·1 answer
  • You are working with an online tech service to fix a problem with installation of a program on your machine. You grant them remo
    13·1 answer
  • Explain the emerging trends in microcomputer technology in relation to size​
    11·1 answer
  • Question #5
    15·2 answers
  • Define management styles
    14·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!