1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Kamila [148]
3 years ago
10

Which of the following is an encryption tool that allows users to encrypt files and folders by simply right-clicking a given obj

ect and setting a few options?
a. PowerShellb. BitLockerc. Encrypting File System (EFS)d. Trusted PlatformModule (TPM)
Computers and Technology
2 answers:
BigorU [14]3 years ago
8 0

Answer:

C. Encrypting file system (EFS).

Explanation:

Security policies are used in networks and computer systems to protect data from the hands of cyber attackers or hackers. It promotes the confidentiality and integrity of data in the system. Encrypting a data is needed to protect the information in a document from being viewed by attackers.

The encryption hides the actual information using cryptic algorithms. Encrypting file systems are used in windows OS to protect confidential data. It encrypts and decrypts data, in the file explorer.

galben [10]3 years ago
6 0

Answer:

Option C, ENCRYPTING FILE SYSTEM (EFS).

Explanation:

Encryption is one of the best protection methods available to keep all one's digital assets safe.

Encrypting file system (EFS) is a feature of windows 2000 operating system that allows any file or folder be stored in an encrypted form and decrypted only by an individual user and an authorized recovery agent.

EFS provides filesystem-level encryption. This technology enables files to be transparently encrypted to protect confidential data from attackers with physical access to the computer.

To encrypt or a file using EFS;

Open windows explorer

Right-click the file or folder and select properties

Click advanced in the general tab

Check encrypt contents to secure data

Click ok.

Therefore, option C, ENCRYPTING FILE SYSTEM, is an encryption tool that allows users to encrypt files and folders by simply right-clicking a given object and setting a few options.

You might be interested in
The work day has just started and you receive reports that the inventory management server is not accessible on your company's n
drek231 [11]

Answer:

Option 3 i.e., Server manager is the correct option.

Explanation:

The server manager is the MS windows tool for the purpose to examine and maintain the function of the server and alter the configuration. So, when the user gets the reports of the management server of the inventory or stock which is not usable by the company's server of the following user. Then, he recalls the new admin of the server. The server manager tool should be used by the admin of the server.

7 0
3 years ago
In Windows 7's Jump List, what can we do?
olga_2 [115]

Answer:se muestran los documentos recientes, la de iTunes muestra links para abrir la iTunes Store o reproducir toda nuestra colección, etc

Explanation:

4 0
2 years ago
Who plays warzone im a roze sweat and ill try to carry with loadout
alexira [117]

Answer:

I type play warzone- If u wanna add me my user is Chachee_Girl. Dont ask- and im on ps5

8 0
2 years ago
Which statements describe the use of styles in Word? Check all that apply.
algol [13]

Answer:

can be used to make word docments look the same

Explanation:

4 0
3 years ago
Read 2 more answers
Distinguish between engineering and architecture​
Liula [17]

difference between engineering and architecture are.

A engineer is a person whose job involves designing and building engines, machines, roads, bridges ,etc .

While architect design buildings only.

3 0
2 years ago
Other questions:
  • Suppose you have a certain amount of money in a savings account that earns compound monthly interest, and you want to calculate
    10·2 answers
  • To connect multiple usb devices to a single usb port, a ____ can be used.
    12·1 answer
  • Which device or software application detects errors in system configurations?
    8·1 answer
  • Which is an example of correct HTML?
    10·1 answer
  • HELP ME PLZ QUICK Adam is writing a program that: 1) has the user guess a number, and 2) tells the user how many guesses it took
    11·1 answer
  • Cameron oversees inventory tracking in her school store. Which feature in a database allows her to organize the items from highe
    6·1 answer
  • Concerning Structured Cabling, select the statement that is true, or select, "All statements are false."
    5·1 answer
  • 4. Give four reasons why a laptop computer is more expensive than a desktop computer of the
    10·1 answer
  • Phishing (pronounced fishing) is malware sent through e-mail that looks like a legitimate message from a trusted sender. The goa
    10·2 answers
  • Writing queries in sql to compile data from a database is related to the physical level of databases true or false?.
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!