1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
N76 [4]
3 years ago
8

You need to protect sensitive files from unauthorized users even if the disk is stolen. What feature should you use and on what

file system?
Computers and Technology
1 answer:
Lynna [10]3 years ago
7 0

Answer:

EFS on NTFS

Explanation:

EFS (Encryption File System) allows users to store confidential information about a computer when people who have physical access to your computer could otherwise compromise that information, intentionally or unintentionally. EFS is especially useful for securing sensitive data on portable computers or on computers shared by several users.  An attacker can also steal a computer, remove the hard drive(s), place the drive(s) in another system, and gain access to the stored files. Files encrypted by EFS, however, appear as unintelligible characters when the attacker does not have the decryption key.

The Encrypting File System (EFS) that is included with the operating systems provides the core file encryption technology to store NTFS files encrypted on disk.

You might be interested in
What does this comparison block indicate?
natima [27]

Answer:

This comparison block indicates that the comparison is true if the left side is equal to the right side.

Explanation:

The comparison uses the = operator, which is the assignment operator in most programming languages. This operator is used to assign a value to a variable. In this case, the comparison is checking whether the value of the getItem variable is equal to 5. If the value of getItem is equal to 5, then the comparison will evaluate to true. If the value of getItem is not equal to 5, then the comparison will evaluate to false.

5 0
1 year ago
When your phone sends/receives text messages (specifically using SMS), the total data sent/received contains more than just your
Alexandra [31]

An SMS is a short code that is used by businesses to opt in consumers to their SMS programs, and then used to send text message coupons, offers, promotions to those customers that had previously opted.

Explanation:

When Someone tries to call you, the tower sends your phone a message over the control channel that tells your phone to play its ringtone. The tower gives your phone a pair of voice channel frequencies to use for the call.

The MMS and other data driven services works on the fundamental voice network and is based on the big three GSM, CDMA and TDMA network technologies. The SMS allows text messages of 160 characters (letters, numbers and symbols).

The text messaging is an act of composing and sending electronic messages consist of alphabetic and numeric character between two or more more mobile devices.

7 0
4 years ago
Read 2 more answers
Device drivers perform the actual communication between physical devices and the operating system. Group of answer choices True
jeka94

Answer:

true

Explanation:

5 0
2 years ago
What does CPC stand for?
Ahat [919]
I think it means cost per click depending on the actual context of why you need it.
Hope it helps
6 0
3 years ago
Read 2 more answers
Can anyone one help in outlook....plzzzz:)
Inessa [10]
I know a few of them like:

9 is F
(I think) 8 is J
4 is E
(I think) 5 is B

I will attempt to figure the others out but for now here is all I have

EDIT: I think 7 is C
8 0
3 years ago
Other questions:
  • Type of file can a user send a technician in order to get help remotely, when using remote assistance
    5·1 answer
  • Where is the bios in the soft ware or hard ware
    13·2 answers
  • What do you think the need for so many different form factors and server types are?
    13·1 answer
  • ______________________________Encompasses all of the information contained within a single business process or unit of work, and
    8·1 answer
  • What is the advantage of processor affinity on SMP computers ?
    14·1 answer
  • Someone plzzzz help me
    5·1 answer
  • Which SCSI standard allows for the technique known as “hot swapping”? Ultra SCSI Original SCSI Serial SCSI Fast-Wide SCSI
    5·1 answer
  • The letters G, H, T, Y, B, and N are what type of keys?
    15·2 answers
  • WILL GIVE A BRAINLIEST!!! PLS HELP!!!
    9·1 answer
  • Write a C++ program to grade the answers to a true-false quiz given to students in a course. The quiz consists of 5 true-false q
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!