加密文件系统( Encrypting File System,EFS)是 Windows操作系统的一个组件。以下说法错误的是()。A、EFS采用加密算法实现透明的文件加密和解密,任何不拥有合适密钥的个人或者程序都不能解密数据B、EFS以公钥加密为基础,并利用了Windows系统中的CryptoAPI体系结构C、EFS加密系统适用于NTFS文件系统和FAT32文件系统(Window7环境下)D、EFS加密过程对用户透明,EFS加密的用户验证过程是在登录Windows时进行的

加密文件系统( Encrypting File System,EFS)是 Windows操作系统的一个组件。以下说法错误的是()。

  • A、EFS采用加密算法实现透明的文件加密和解密,任何不拥有合适密钥的个人或者程序都不能解密数据
  • B、EFS以公钥加密为基础,并利用了Windows系统中的CryptoAPI体系结构
  • C、EFS加密系统适用于NTFS文件系统和FAT32文件系统(Window7环境下)
  • D、EFS加密过程对用户透明,EFS加密的用户验证过程是在登录Windows时进行的

相关考题:

Given that the current directory is empty, and that the user has read and write privileges to the current, and the following:Which statement is true?() A.Compilation fails.B.Nothing is added to the file system.C.Only a new file is created on the file system.D.Only a new directory is created on the file system.E.Both a new file and a new directory are created on the file system.

Given that the current directory is empty, and that the user has read and write permissions, and the following:Which statement is true?() A.Compilation fails.B.The file system has a new empty directory named dir.C.The file system has a new empty directory named newDir.D.The file system has a directory named dir, containing a file f1.txt.E.The file system has a directory named newDir, containing a file f1.txt.

NFS(Network file System)网络文件系统

AIX中哪个文件系统不能支持创建大于2GB的文件()A、Enhanced Journaled File SystemsB、Large File Enabled Journaled File SystemC、Journaled File System

EFS加密文件系统不能加密压缩文件。

在数据库应用系统的需求定义阶段,性能被列为优先要求。访问数据库管理系统(DBMS)文件时,推荐采用如下哪一种技术以获得最佳的输入、输出(I/O)性能()。A、存储区域网络(SAN,Storage area network)B、网络接入存储(NAS,Network Attached Storage)C、网络文件系统(NFS v2,Network file system)D、通用互联网文件系统(CIFS,Common Internet File System)

Which command(s) will result in the smallest sized backup of the text files contained in the /staticFS filesystem?()  A、tar -cvf file_system.tar /staticFS ; gzip file_system.tarB、tar -xvf /staticFS file_system.tar ; gzip file_system.tarC、tar -cvf /staticFS file_system.tar ; compress file_system.tarD、tar -xvf file_system.tar /staticFS  ; compress file_system.tar

All of the following statements accurately describe process for administering file systems EXCEPT:()A、A logical volume must exist prior to running the crfs command to create a file systemB、A file system must be unmounted before it can be removedC、Defining a file system imposes a structure on a logical volumeD、Removing a file system using rmfs automatically removes the underling logical volume

A file system has been corrupted and needs to be restored.  Which file contains the ufsdump levels for this file system? ()A、 /etc/backupB、 /etc/ufsdumpC、 /etc/dumpdatesD、 /etc/fsdumpdates

Your company has a main office and a branch office. Your network contains a single Active Directory domain. You install 25 Windows Server 2008 R2 member servers in the branch office. You need to  recommend a storage solution that meets the following requirements: èEncrypts all data on the hard disks   èAllows the operating system to start only when the authorized user is present What should you recommend?()A、Encrypting File System (EFS)B、File Server Resource Manager (FSRM)C、Windows BitLocker Drive Encryption (BitLocker)D、Windows System Resource Manager (WSRM)

You need to back up your Encrypting File System (EFS) certificate. You must achieve this goal in theminimum amount of time.  What should you do?()A、Run Cipher.exe /x.B、Run Ntbackup.exe /p.C、From Backup and Restore,click Back up now.D、From Backup and Restore,click Create a system image.

You have a computer named Computer1 that runs Windows XP Professional. Computer1 is a member of a workgroup. You need to prevent all users from encrypting files on Computer1. What should you do?() A、For all files, deny the Take ownership permission to the Everyone group. B、From the Local Security Policy, modify the Encrypting File System (EFS) properties.C、From the Certificates snap-in, delete the recovery agent certificate. D、From the Certificates snap-in, delete all trusted root certification authority (CA) certificates.

You need to protect the confidential data files on File2 against unauthorized offline access.   What should you use?()A、Encrypting File System (EFS) on File2B、file screens on Node1 and Node2C、NTFS permissions on File2D、Windows BitLocker Drive Encryption (BitLocker) on Node1 and Node2

Rate your level of proficiency with configuring, managing, and troubleshooting security on Windows XP Professional, including Encrypting File System (EFS), local security policies and configurations, local user and group accounts, and Internet Explorer Security settings.()A、Very HighB、HighC、ModerateD、LowE、Very Low

You have a computer that runs Windows XP and a USB drive that is protected by using BitLocker To Go.You need to ensure that you can copy files from the computer to the USB drive. The solution must retain theexisting files on the USB drive.  What should you do?()A、From a computer that runs Windows 7, change the file system of the USB drive.B、From a computer that runs Windows 7, disable BitLocker To Go for the USB drive.C、Log on to Windows XP as member of the Administrators group.D、Log on to Windows XP by using a user account that has an Encrypting File System (EFS) certificate.

You need to recommend changes to the file server on the main campus that meet the company’s technical requirements.   What should you include in the recommendation?()A、Encrypting File System (EFS)  B、NTFS permissions  C、Syskey  D、Windows BitLocker Drive Encryption (BitLocker)

You have a computer that runs Windows 7. The Encrypting File System (EFS) key is compromised. Youneed to create a new EFS key.  Which command should you run?()A、Certutil -getkeyB、Cipher.exe /kC、Icacls.exe /rD、Syskey.exe

单选题You need to design an access control strategy for the Payment folder for the Sales Managers group. What should you do?()AUse IPSec in transport modeBUse Encrypting File System (EFS) over Web Distributed Authoring and Versioning (WebDAV)CUse PEAP-EAP-TLSDUse Encrypting File System (EFS) remote encryption

单选题AIX中哪个文件系统不能支持创建大于2GB的文件()AEnhanced Journaled File SystemsBLarge File Enabled Journaled File SystemCJournaled File System

单选题You need to design an access control strategy for the financial data used by the accounting department. Your solution must meet business requirements. What should you do?()AModify the properties of the computer object named P_FS2 to enable the Trust computer for delegation attribute. Instruct accounting department users to use Encrypting File System (EFS) to encrypt filesBModify the properties of all accounting department user accounts to enable the Account is trusted for delegation attribute. Instruct accounting department users to use Encrypting File System (EFS) to encrypt filesCModify the properties of accounting department computers to enable the Trust computer for delegation attribute. Configure accounting department client computers to use IPSec to communicate with P_FS2DModify the properties of all administrator accounts in the forest to enable to Account is trusted for delegation attribute. Configure accounting department client computers to use IPSec to communicate with P_FS2

多选题You have a computer that runs Windows 7. The computer is in a workgroup. You need to ensure that youcan decrypt Encrypting File System (EFS) files on the computer if you forget your password.  What are two possible ways to achieve this goal?()AFrom Credential Manager, select Back up vault.BFrom User Accounts, select Create a password reset disk.CFrom User Accounts, select Manage your file encryption certificates.DFrom Authorization Manager, modify the Authorization Manager options.

名词解释题NFS(Network file System)网络文件系统

单选题在数据库应用系统的需求定义阶段,性能被列为优先要求。访问数据库管理系统(DBMS)文件时,推荐采用如下哪一种技术以获得最佳的输入、输出(I/O)性能()。A存储区域网络(SAN,Storage area network)B网络接入存储(NAS,Network Attached Storage)C网络文件系统(NFS v2,Network file system)D通用互联网文件系统(CIFS,Common Internet File System)

单选题You have two computers named Computer1 and Computer2. Computer1 runs Windows Vista. Computer2runs Windows 7. You attempt to migrate the user profiles and data from Computer1 to Computer2 by usingUser State Migration Tool (USMT) 4.0. During the migration, you receive the following error message:Gather was aborted because of an EFS file.You need to ensure that you can successfully migrate the user state from Computer 1 to Computer 2.  Whatshould you do?()AAdd the /efs:copyraw switch to the Loadstate command.BAdd the /efs:copyraw switch to the Scanstate command.CGenerate a new Encrypting File System (EFS)certificate on Computer2.DExport the Encrypting File System (EFS) certificate from Computer1 and import the certificate to Computer2.

单选题Which of the following statements best describes the relationship between a logical volume and a journaled file system (JFS)?()AIncreasing the size of a logical volume also increases the size of the file systemBReducing the size of a logical volume requires reducing the size of the file system firstCIncreasing the size of a file system requires increasing the size of the logical volume firstDIncreasing the size of a file system also increases the size of the logical volume when necessary

单选题Rate your level of proficiency with configuring, managing, and troubleshooting security on Windows XP Professional, including Encrypting File System (EFS), local security policies and configurations, local user and group accounts, and Internet Explorer Security settings.()AVery HighBHighCModerateDLowEVery Low

单选题Given that the current directory is empty, and that the user has read and write privileges to the current directory, and the following: Which statement is true?()A Compilation fails.B Nothing is added to the file system.C Only a new file is created on the file system.D Only a new directory is created on the file system.E Both a new file and a new directory are created on the file system.