Which of the following occurs when you encrypt a file using EFS within a domain
environment? (Choose all that apply.)
a. An asymmetric private key is generated and used to encrypt the file contents
b. A copy of the symmetric encryption key is stored within the file metadata and
asymmetrically encrypted with your public key
c. A symmetric encryption key is generated and used to encrypt the file contents
d. A copy of the symmetric encryption key is stored within the file metadata and
asymmetrically encrypted with recovery agent's public key - ANSb. A copy of the symmetric
encryption key is stored within the file metadata and asymmetrically encrypted with your
public key
c. A symmetric encryption key is generated and used to encrypt the file contents
d. A copy of the symmetric encryption key is stored within the file metadata and
asymmetrically encrypted with recovery agent's public key
Only the NTFS filesystem supports all of the basic and advanced attributes for folders and
files. True or False? - ANStrue
Which of the following can be used to set the compress attribute for an NTFS file? (Choose
all that apply.)
a. Set-ItemProperty
b. cipher.exe
c. compress.exe
d. compact.exe - ANSa. Set-ItemProperty
d. compact.exe
Which of the following basic NTFS/ReFS permissions allows you to delete a file? (Choose all
that apply.)
a. Full control
b. Modify
c. Write
d. Read and execute - ANSa. Full control
b. Modify
You wish to grant a specific user the ability to view the read-only attribute on files within a
particular folder on the system, but do not wish to grant any other access. What advanced
permission should you assign to this user?
a. Traverse folder/execute file
b. Read attributes
c. Read extended attributes
d. Read permissions
Hide Feedback - ANSb. Read attributes