What should you include in the recommendation?

You have a client computer named Computer1 that runs Windows 8 Enterprise. Computer1
has a Trusted Platform Module (TPM) chip installed and the operating system volume is
encrypted by using BitLocker Drive Encryption (BitLocker).
You plan to upgrade the BIOS of Computer1.
You need to recommend a solution that meets the following requirements:
Ensures that the drive remains encrypted
Avoids the need to perform a BitLocker recovery
Ensures that Windows can start after the BIOS is upgraded
Minimizes the time required to complete the BIOS upgrade
What should you include in the recommendation?

You have a client computer named Computer1 that runs Windows 8 Enterprise. Computer1
has a Trusted Platform Module (TPM) chip installed and the operating system volume is
encrypted by using BitLocker Drive Encryption (BitLocker).
You plan to upgrade the BIOS of Computer1.
You need to recommend a solution that meets the following requirements:
Ensures that the drive remains encrypted
Avoids the need to perform a BitLocker recovery
Ensures that Windows can start after the BIOS is upgraded
Minimizes the time required to complete the BIOS upgrade
What should you include in the recommendation?

A.
From the command prompt, run manage-bde and specify the -protectors parameter and
the -disable parameter.

B.
From the command prompt, run manage-bde and specify the -protectors parameter and
the -delete parameter.

C.
From the Trusted Platform Module (TPM) Management console, click Turn TPM Off from
the Actions menu.

D.
From the command prompt, run tpmvscmgr.exe and specify the destroy parameter.

Explanation:
* For mass BIOS updates, create a script that disables BitLocker, installs the
update, reboots the system and then re-enables BitLocker.
Manage-bde -autounlock {-enable | -disable | -ClearAllKeys} Volume [-ComputerName
Name] disable Disables automatic unlocking for a data drive.
The Disable-BitLocker cmdlet disables BitLocker Drive Encryption for a BitLocker volume.
When you run this cmdlet, it removes all key protectors and begins decrypting the content of
the volume.



Leave a Reply 0

Your email address will not be published. Required fields are marked *