网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
加密文件系统( Encrypting File System,EFS)是 Windows操作系统的一个组件。以下说法错误的是()。
- A、EFS采用加密算法实现透明的文件加密和解密,任何不拥有合适密钥的个人或者程序都不能解密数据
- B、EFS以公钥加密为基础,并利用了Windows系统中的CryptoAPI体系结构
- C、EFS加密系统适用于NTFS文件系统和FAT32文件系统(Window7环境下)
- D、EFS加密过程对用户透明,EFS加密的用户验证过程是在登录Windows时进行的
参考答案
更多 “加密文件系统( Encrypting File System,EFS)是 Windows操作系统的一个组件。以下说法错误的是()。A、EFS采用加密算法实现透明的文件加密和解密,任何不拥有合适密钥的个人或者程序都不能解密数据B、EFS以公钥加密为基础,并利用了Windows系统中的CryptoAPI体系结构C、EFS加密系统适用于NTFS文件系统和FAT32文件系统(Window7环境下)D、EFS加密过程对用户透明,EFS加密的用户验证过程是在登录Windows时进行的” 相关考题
考题
Given that the current directory is empty, and that the user has read and write privileges to the current, and the following:Which statement is true?()
A.Compilation fails.B.Nothing is added to the file system.C.Only a new file is created on the file system.D.Only a new directory is created on the file system.E.Both a new file and a new directory are created on the file system.
考题
Given that the current directory is empty, and that the user has read and write permissions, and the following:Which statement is true?()
A.Compilation fails.B.The file system has a new empty directory named dir.C.The file system has a new empty directory named newDir.D.The file system has a directory named dir, containing a file f1.txt.E.The file system has a directory named newDir, containing a file f1.txt.
考题
AIX中哪个文件系统不能支持创建大于2GB的文件()A、Enhanced Journaled File SystemsB、Large File Enabled Journaled File SystemC、Journaled File System
考题
在数据库应用系统的需求定义阶段,性能被列为优先要求。访问数据库管理系统(DBMS)文件时,推荐采用如下哪一种技术以获得最佳的输入、输出(I/O)性能()。A、存储区域网络(SAN,Storage area network)B、网络接入存储(NAS,Network Attached Storage)C、网络文件系统(NFS v2,Network file system)D、通用互联网文件系统(CIFS,Common Internet File System)
考题
Which command(s) will result in the smallest sized backup of the text files contained in the /staticFS filesystem?() A、tar -cvf file_system.tar /staticFS ; gzip file_system.tarB、tar -xvf /staticFS file_system.tar ; gzip file_system.tarC、tar -cvf /staticFS file_system.tar ; compress file_system.tarD、tar -xvf file_system.tar /staticFS ; compress file_system.tar
考题
All of the following statements accurately describe process for administering file systems EXCEPT:()A、A logical volume must exist prior to running the crfs command to create a file systemB、A file system must be unmounted before it can be removedC、Defining a file system imposes a structure on a logical volumeD、Removing a file system using rmfs automatically removes the underling logical volume
考题
A file system has been corrupted and needs to be restored. Which file contains the ufsdump levels for this file system? ()A、 /etc/backupB、 /etc/ufsdumpC、 /etc/dumpdatesD、 /etc/fsdumpdates
考题
Your company has a main office and a branch office. Your network contains a single Active Directory domain. You install 25 Windows Server 2008 R2 member servers in the branch office. You need to recommend a storage solution that meets the following requirements: èEncrypts all data on the hard disks èAllows the operating system to start only when the authorized user is present What should you recommend?()A、Encrypting File System (EFS)B、File Server Resource Manager (FSRM)C、Windows BitLocker Drive Encryption (BitLocker)D、Windows System Resource Manager (WSRM)
考题
You need to back up your Encrypting File System (EFS) certificate. You must achieve this goal in theminimum amount of time. What should you do?()A、Run Cipher.exe /x.B、Run Ntbackup.exe /p.C、From Backup and Restore,click Back up now.D、From Backup and Restore,click Create a system image.
考题
You have a computer named Computer1 that runs Windows XP Professional. Computer1 is a member of a workgroup. You need to prevent all users from encrypting files on Computer1. What should you do?() A、For all files, deny the Take ownership permission to the Everyone group. B、From the Local Security Policy, modify the Encrypting File System (EFS) properties.C、From the Certificates snap-in, delete the recovery agent certificate. D、From the Certificates snap-in, delete all trusted root certification authority (CA) certificates.
考题
You need to protect the confidential data files on File2 against unauthorized offline access. What should you use?()A、Encrypting File System (EFS) on File2B、file screens on Node1 and Node2C、NTFS permissions on File2D、Windows BitLocker Drive Encryption (BitLocker) on Node1 and Node2
考题
Rate your level of proficiency with configuring, managing, and troubleshooting security on Windows XP Professional, including Encrypting File System (EFS), local security policies and configurations, local user and group accounts, and Internet Explorer Security settings.()A、Very HighB、HighC、ModerateD、LowE、Very Low
考题
You have a computer that runs Windows XP and a USB drive that is protected by using BitLocker To Go.You need to ensure that you can copy files from the computer to the USB drive. The solution must retain theexisting files on the USB drive. What should you do?()A、From a computer that runs Windows 7, change the file system of the USB drive.B、From a computer that runs Windows 7, disable BitLocker To Go for the USB drive.C、Log on to Windows XP as member of the Administrators group.D、Log on to Windows XP by using a user account that has an Encrypting File System (EFS) certificate.
考题
You need to recommend changes to the file server on the main campus that meet the company’s technical requirements. What should you include in the recommendation?()A、Encrypting File System (EFS) B、NTFS permissions C、Syskey D、Windows BitLocker Drive Encryption (BitLocker)
考题
You have a computer that runs Windows 7. The Encrypting File System (EFS) key is compromised. Youneed to create a new EFS key. Which command should you run?()A、Certutil -getkeyB、Cipher.exe /kC、Icacls.exe /rD、Syskey.exe
考题
单选题You need to design an access control strategy for the Payment folder for the Sales Managers group. What should you do?()A
Use IPSec in transport modeB
Use Encrypting File System (EFS) over Web Distributed Authoring and Versioning (WebDAV)C
Use PEAP-EAP-TLSD
Use Encrypting File System (EFS) remote encryption
考题
单选题AIX中哪个文件系统不能支持创建大于2GB的文件()A
Enhanced Journaled File SystemsB
Large File Enabled Journaled File SystemC
Journaled File System
考题
单选题You need to design an access control strategy for the financial data used by the accounting department. Your solution must meet business requirements. What should you do?()A
Modify the properties of the computer object named P_FS2 to enable the Trust computer for delegation attribute. Instruct accounting department users to use Encrypting File System (EFS) to encrypt filesB
Modify the properties of all accounting department user accounts to enable the Account is trusted for delegation attribute. Instruct accounting department users to use Encrypting File System (EFS) to encrypt filesC
Modify the properties of accounting department computers to enable the Trust computer for delegation attribute. Configure accounting department client computers to use IPSec to communicate with P_FS2D
Modify the properties of all administrator accounts in the forest to enable to Account is trusted for delegation attribute. Configure accounting department client computers to use IPSec to communicate with P_FS2
考题
多选题You have a computer that runs Windows 7. The computer is in a workgroup. You need to ensure that youcan decrypt Encrypting File System (EFS) files on the computer if you forget your password. What are two possible ways to achieve this goal?()AFrom Credential Manager, select Back up vault.BFrom User Accounts, select Create a password reset disk.CFrom User Accounts, select Manage your file encryption certificates.DFrom Authorization Manager, modify the Authorization Manager options.
考题
单选题在数据库应用系统的需求定义阶段,性能被列为优先要求。访问数据库管理系统(DBMS)文件时,推荐采用如下哪一种技术以获得最佳的输入、输出(I/O)性能()。A
存储区域网络(SAN,Storage area network)B
网络接入存储(NAS,Network Attached Storage)C
网络文件系统(NFS v2,Network file system)D
通用互联网文件系统(CIFS,Common Internet File System)
考题
单选题You have two computers named Computer1 and Computer2. Computer1 runs Windows Vista. Computer2runs Windows 7. You attempt to migrate the user profiles and data from Computer1 to Computer2 by usingUser State Migration Tool (USMT) 4.0. During the migration, you receive the following error message:Gather was aborted because of an EFS file.You need to ensure that you can successfully migrate the user state from Computer 1 to Computer 2. Whatshould you do?()A
Add the /efs:copyraw switch to the Loadstate command.B
Add the /efs:copyraw switch to the Scanstate command.C
Generate a new Encrypting File System (EFS)certificate on Computer2.D
Export the Encrypting File System (EFS) certificate from Computer1 and import the certificate to Computer2.
考题
单选题Which of the following statements best describes the relationship between a logical volume and a journaled file system (JFS)?()A
Increasing the size of a logical volume also increases the size of the file systemB
Reducing the size of a logical volume requires reducing the size of the file system firstC
Increasing the size of a file system requires increasing the size of the logical volume firstD
Increasing the size of a file system also increases the size of the logical volume when necessary
考题
单选题Rate your level of proficiency with configuring, managing, and troubleshooting security on Windows XP Professional, including Encrypting File System (EFS), local security policies and configurations, local user and group accounts, and Internet Explorer Security settings.()A
Very HighB
HighC
ModerateD
LowE
Very Low
考题
单选题Given that the current directory is empty, and that the user has read and write privileges to the current directory, and the following: Which statement is true?()A
Compilation fails.B
Nothing is added to the file system.C
Only a new file is created on the file system.D
Only a new directory is created on the file system.E
Both a new file and a new directory are created on the file system.
热门标签
最新试卷