Which of the following actions should you take?

You work as a network administrator at ABC.com. The ABC.com network consists of a single
Active Directory domain named ABC.com. All servers on the network have Microsoft Windows
Server 2008 installed and all workstations have Microsoft Windows 7 installed.
The ABC.com network users currently make use of a standalone workstation for storing their
encrypted data. You want to make sure that you are able to access and view this data.
Which of the following actions should you take? (Choose ALL that apply.)

You work as a network administrator at ABC.com. The ABC.com network consists of a single
Active Directory domain named ABC.com. All servers on the network have Microsoft Windows
Server 2008 installed and all workstations have Microsoft Windows 7 installed.
The ABC.com network users currently make use of a standalone workstation for storing their
encrypted data. You want to make sure that you are able to access and view this data.
Which of the following actions should you take? (Choose ALL that apply.)

A.
You should consider executing the Cipher.exe command-line tool with the /r parameter

B.
You should consider having User Account Control (UAC) disabled.

C.
You should consider assigning your user account the Full Control permission to all encrypted
files.

D.
You should consider having a data recovery agent added from the local security policy.

E.
You should consider installing a Certificate Authority and enrolling for an EFS certificate.

Explanation:



Leave a Reply 0

Your email address will not be published. Required fields are marked *