Which tool should you use?

The company implements a data recovery agent (DRA) for Bitlocker.

A portable computer fails.

The help desk reports that it is unable to use the DRA to recover the data from the computer’s hard disk drive.

You need to ensure that the DRA can be used to recover data from the hard disk drives of all portable computers.

Which tool should you use?

The company implements a data recovery agent (DRA) for Bitlocker.

A portable computer fails.

The help desk reports that it is unable to use the DRA to recover the data from the computer’s hard disk drive.

You need to ensure that the DRA can be used to recover data from the hard disk drives of all portable computers.

Which tool should you use?

A.
CertUtil.exe

B.
Cipher.exe

C.
Manage-bde.exe

D.
SDelete.exe

Explanation:
Topic 3, A. Datum Corporation

Scenario:

You are an enterprise desktop support technician for A. Datum Corporation.

Active Directory Configuration

The company has three offices. The offices are configured as shown in the following table.
(Exhibit)

The network contains a single Active Directory domain named adatum.com. Two Group Policy objects (GPOs) are configured as shown in the following table.

The relevant servers in the main office are configured as shown in the following table.

Wireless Network

A wireless network is implemented in the main office. The wireless network is configured to use WPA2-Enterprise security.

Client Configuration

All client computers run Windows 7 Enterprise and are configured to use DHCP. Windows Firewall is disabled on all client computers.

All computers in the research department have Windows XP Mode and Windows Virtual PC installed. You deploy a custom Windows XP Mode image to the research department computers.
An application named

App1 is installed in the image.

Each research department computer has the following hardware:

– 4 GB of RAM
– Intel Core i7 processor
– 500 -GB hard disk drive

Corporate Security Policy

The corporate security policy includes the following requirements:

– Users without domain accounts must be denied access to internal servers.
– All connections to the company’s wireless access points must be encrypted.
– Only employees can be configured to have user accounts in the Active Directory domain.
– The hard disk drives on all portable computers must be encrypted by using Windows BitLocker Drive Encryption (BitLocker).



Leave a Reply 0

Your email address will not be published. Required fields are marked *