1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Kamila [148]
3 years ago
10

Which of the following is an encryption tool that allows users to encrypt files and folders by simply right-clicking a given obj

ect and setting a few options?
a. PowerShellb. BitLockerc. Encrypting File System (EFS)d. Trusted PlatformModule (TPM)
Computers and Technology
2 answers:
BigorU [14]3 years ago
8 0

Answer:

C. Encrypting file system (EFS).

Explanation:

Security policies are used in networks and computer systems to protect data from the hands of cyber attackers or hackers. It promotes the confidentiality and integrity of data in the system. Encrypting a data is needed to protect the information in a document from being viewed by attackers.

The encryption hides the actual information using cryptic algorithms. Encrypting file systems are used in windows OS to protect confidential data. It encrypts and decrypts data, in the file explorer.

galben [10]3 years ago
6 0

Answer:

Option C, ENCRYPTING FILE SYSTEM (EFS).

Explanation:

Encryption is one of the best protection methods available to keep all one's digital assets safe.

Encrypting file system (EFS) is a feature of windows 2000 operating system that allows any file or folder be stored in an encrypted form and decrypted only by an individual user and an authorized recovery agent.

EFS provides filesystem-level encryption. This technology enables files to be transparently encrypted to protect confidential data from attackers with physical access to the computer.

To encrypt or a file using EFS;

Open windows explorer

Right-click the file or folder and select properties

Click advanced in the general tab

Check encrypt contents to secure data

Click ok.

Therefore, option C, ENCRYPTING FILE SYSTEM, is an encryption tool that allows users to encrypt files and folders by simply right-clicking a given object and setting a few options.

You might be interested in
Which steps will create a new blank word document
mrs_skeptik [129]

Answer:

Open word

File > New

Select a template

8 0
4 years ago
1. What is the Internet?
3241004551 [841]
A place to watch daisy Taylor vids
8 0
3 years ago
Read 2 more answers
Which term describes unjust behavior due to a person’s gender or race? A. bias B. discrimination C. persecution D. stereotyping
Nady [450]

Unjust behavior due to someone's race or gender is B

discrimination

4 0
3 years ago
Read 2 more answers
Task 5: Create the GET_CREDIT_LIMIT procedure to obtain the full name and credit limit of the customer whose ID currently is sto
lidiya [134]

The SQL statement that would create the GET_CREDIT_LIMIT procedure to obtain the full name and credit limit of the customer is:

GET_CREDIT_LIMIT

SELECT CUST_ID 125

FROM FIRST_NAME, LAST_NAME, CREDIT_LIMIT

WHERE LAST_NAME ="Smith"

<h3>What is SQL?</h3>

This is an acronym that means Structured Query Language that is used in handling data in a database.

Hence, we can see that from the attached image, there is a table that contains the details of customers and their various data such as their first and last names, credit limits, address, etc, and the  GET_CREDIT_LIMIT procedure is shown above.

Read more about SQL here:

brainly.com/question/25694408

#SPJ1

3 0
2 years ago
why do networking components need more examination from an information security perspective than from a systems development pers
padilas [110]
Networking components will eventually interact with computers and devices outside of itself. Whereas during system development you are only interacting with your program internally.

For example, when you first work on a website you can begin working on it on your personal computer not connected to the outside world. When you are done working on your website you will now upload it to a webserver (or you will create your webserver) and now you are opening up the doors so to speak to the Internet. When you "open the door" you need to make sure the proper security is in place so that no one hacks your site. This is ussually done by making sure the webserver you are on does not have any known security vulnerbilities and has the proper firewall settings to prevent unauthorized access.
4 0
4 years ago
Other questions:
  • Out of the following guidlines which should you use when writing a memo?
    10·2 answers
  • Heeeaaaalp please!!!!
    15·2 answers
  • You are assigned to modify an existing Webpage by adding several tables that contain precise wording. The Webpage has had severa
    14·1 answer
  • Your boss has asked you to create a customized letterhead for the business, "Boyne Mountain Ski Shop". Explain how to create the
    6·1 answer
  • 1. Pasar los siguientes ejercicios a diagrama de bloque
    11·1 answer
  • Write a program that prompts the user to enter a Social Security number in the format ddd-dd-dddd, where d is a digit. The progr
    12·1 answer
  • Jim wants to shoot a video. This requires him to move from one place to another. Which type of camera support should Jim use?
    13·1 answer
  • Need help with 4.7 lesson practice
    15·1 answer
  • What happens when you run a program in Python? ​
    12·2 answers
  • Instruction: weird I know (~ ̄³ ̄)~
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!