Preview

Lab 3 Lab Assessment Questions Answers

Satisfactory Essays
Open Document
Open Document
496 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Lab 3 Lab Assessment Questions Answers
Assessment Worksheet

Configuring BitLocker and Windows Encryption

Course Name and Number: _Operating Systems: Hardening and Security - ISSC342_____
Student Name: ___________ Benson Kungu_______________________________________
Instructor Name: __________ Mylonakos, Peter______________________________________
Lab Due Date: ____________June 21, 2015__________________________________________
Overview

In this lab, you used the Microsoft Encrypting File System (EFS) to encrypt files and folders on a Windows Server 2012 machine. You documented the success or failure of your encryption efforts. You also installed Microsoft BitLocker Drive Encryption, a data protection feature that is used to resist data theft and the risk of exposure from lost, stolen, or decommissioned computers. You encrypted a data drive on the remote server and decrypt it using a recovery key.
Lab Assessment Questions & Answers

1. Within a Microsoft Windows Server 2012 environment, who has access rights to the EFS features and functions in the server?
The user who creates the file because the encryption will be based on the password of the account.
2. What are some best practices you can implement when encrypting BitLocker drives and the use of BitLocker recovery passwords?
With BitLocker you can have all the data encrypted at once, when you access the data and enter the decryption key you will have access until the encryption is activated again by a user or a restart of the system.
3. What was the recovery key generated by BitLocker in this lab?
097889-293733-129327-110748-261129-223003-123838-665907
4. How would you grant additional users access rights to your EFS encrypted folders and data files?
Using the data/folder properties it can be added the users that the creator users is allowing to access the data.
5. What are the main differences between EFS and BitLocker?
ETS is used for securing files and folders and relies on the logged on user certificate details to encrypt on decrypt files

You May Also Find These Documents Helpful

  • Good Essays

    • Depositor - user/users group with access rights to create database documents and not view them afterwards (excluding, possible, Public…

    • 767 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Nt1330 Unit 5 Study Guide

    • 603 Words
    • 3 Pages

    Share permissions: The shared permissions are only applicable to users that are accessing a file over the network. If the user is local administrator to the server (or workstation) the directory resides on that user would be able to access.…

    • 603 Words
    • 3 Pages
    Powerful Essays
  • Satisfactory Essays

    Unit 9 Lab 1

    • 334 Words
    • 2 Pages

    5. Once a file has been initially encrypted, file sharing is enabled through a new button in the user interface (UI). A file must be encrypted first and then saved before additional users may be added. After selecting the Advanced Properties of an encrypted file, a user may be added by selecting the Details button. Individual users may add other users from the local machine or from the Active Directory, provided the user has a valid certificate for EFS.…

    • 334 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    References: Encryption Wizard 3.4.0 free download - Downloads - freeware, shareware, software trials, evaluations - PC & Tech Authority Downloads. (n.d.). Retrieved May 15, 2014, from http://downloads.pcauthority.com.au/article/27624-encryption_wizard…

    • 515 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Hollis IS3230 Unit 3 Lab3

    • 766 Words
    • 4 Pages

    3. What permissions are necessary to allow an Active Directory Group called AD_Group to read and write files in a sensitive directory such as C:\ERPdocuments\HRfiles?…

    • 766 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    I learned how to add a domain controller to an Active Directory domain, back up and restore Active Directory, and recognize and respond to Active Directory replication issues.…

    • 1334 Words
    • 6 Pages
    Powerful Essays
  • Powerful Essays

    ____ supports advanced authentication and encryption technologies; however, it requires Windows machines on both sides of any remote connection.…

    • 817 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    In the workstation domain, we need to make sure that each of the workstations, whether desktop or laptop, has antivirus and malware protection installed on them. Laptops are very vulnerable for loss or theft, so all company laptops should have an encrypted hard drive so that if they are stolen, the data contained on them is not recovered by anyone but the owner.…

    • 512 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Lab 7 & 8

    • 1094 Words
    • 5 Pages

    Authorized secure remote access, Traffic inspection and Coordinated Threat Control, Centralized security management and enterprise-wide visibility and control.…

    • 1094 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    The technology enables files to be transparently encrypted to protect confidential data from attackers with physical access to the computer. EFS is available in all versions of Windows developed for business environments from Windows 2000 onwards .By default, no files are encrypted, but encryption can be enabled by users on a per-file, per-directory, or per-drive basis. Some EFS settings can also be mandated via Group Policy in Windows domain environments. Cryptographic file system implementations for other operating systems are available, but the Microsoft EFS is not compatible with any of…

    • 462 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    It’s imperative that proper user/groups structures are established. Every user will be a member of the group however; every user won’t be an owner of a group. The owner can change attributes and grant access to files within the group they own.…

    • 689 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    It 240 Week 2 Appendixb

    • 565 Words
    • 3 Pages

    1. You are the network administrator for a new company that has 10 users and that plans to add 5 more users within a year. The files need to be accessed by all 10 users, and each user must have different security rights.…

    • 565 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    A secure and efficient protocol is used, ECC elliptic curve cryptography a public key cryptography…

    • 470 Words
    • 2 Pages
    Good Essays
  • Good Essays

    In this lab, you used Nmap commands within the Zenmap application to scan the virtual network…

    • 652 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Task B 307

    • 338 Words
    • 1 Page

    To ensure security you would have you computer network encrypted, and multiple passwords for computers you should never use the same password they should always be different, when using filing cupboards you would should have locks on them and different locks with different keys for each cupboard..…

    • 338 Words
    • 1 Page
    Satisfactory Essays