1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
N76 [4]
3 years ago
8

You need to protect sensitive files from unauthorized users even if the disk is stolen. What feature should you use and on what

file system?
Computers and Technology
1 answer:
Lynna [10]3 years ago
7 0

Answer:

EFS on NTFS

Explanation:

EFS (Encryption File System) allows users to store confidential information about a computer when people who have physical access to your computer could otherwise compromise that information, intentionally or unintentionally. EFS is especially useful for securing sensitive data on portable computers or on computers shared by several users.  An attacker can also steal a computer, remove the hard drive(s), place the drive(s) in another system, and gain access to the stored files. Files encrypted by EFS, however, appear as unintelligible characters when the attacker does not have the decryption key.

The Encrypting File System (EFS) that is included with the operating systems provides the core file encryption technology to store NTFS files encrypted on disk.

You might be interested in
Which type of address is the ip address 232. 111. 255. 250?.
Nitella [24]

Answer:

It is either an internal IP address or it is a private IP address.

Explanation:

6 0
2 years ago
If you are writing an article on your favorite cuisine, which form of illustration would best fit the article?
andrezito [222]
The best article to use for this is a website that describes the food.
6 0
3 years ago
Read 2 more answers
Which of the following is not a use of a hash function
soldi70 [24.7K]

Answer:

the answer would be there

Explanation:

7 0
3 years ago
Can anyone help???
Ugo [173]

Answer: Protocol identifier

Explanation:

Just took the test and resource name was incorrect. Hope this helps :)

6 0
3 years ago
Read 2 more answers
Which of the following is FALSE? Select one: a. The fast-paced and collaboration-based business environment makes email less use
12345 [234]

Answer:

The Atos case demonstrates that it is possible to cut out e-mail entirely.

Explanation:

6 0
3 years ago
Other questions:
  • Your new home has a vacuum system. what kind of computer is controlling it?
    5·1 answer
  • A _____ is a device that not only provides surge protection, but also furnishes desktop computers and network devices with batte
    7·1 answer
  • A c++ member function that uses, but does not change, the value of a member variable is called
    13·1 answer
  • Which of the following websites can help you learn about general career trends?
    13·1 answer
  • Lube job---------$18.00
    14·1 answer
  • A hotel salesperson enters sales in a text file. Each line contains the following, separated by semicolons: The name of the clie
    8·1 answer
  • Which type of security software prevents, detects, and removes the malware program that tries to collect personal information or
    8·2 answers
  • Which statistical function in a spreadsheet helps you to see how far each number varies, on average, from the average value of t
    5·1 answer
  • Examples of application software​
    7·2 answers
  • Choose all stages of the information processing cycle.
    12·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!