What should you recommend that the users do?

Users at the Manufacturing site must have a secondary method of decrypting their existing files if they lose access to their certificate and private key or if the EFS Admin’s certificate is not available.

You need to recommend a solution to ensure that a secondary method is available to users. The solution must not require accessing or altering the existing encrypted files before decrypting them.

What should you recommend that the users do?

Users at the Manufacturing site must have a secondary method of decrypting their existing files if they lose access to their certificate and private key or if the EFS Admin’s certificate is not available.

You need to recommend a solution to ensure that a secondary method is available to users. The solution must not require accessing or altering the existing encrypted files before decrypting them.

What should you recommend that the users do?

A.
From the command line, run the cipher.exe /e command.

B.
From the command line, run the certutil.exe /backupKey command.

C.
Enroll for a secondary EFS certificate.

D.
Export their EFS certificates with private keys to an external location.



Leave a Reply 0

Your email address will not be published. Required fields are marked *