You are on page 1of 2

Windows 2003 Server

Lesson: Configuring File Encryption


Question: You are responsible for configuring a series of laptops that will be used by four sales
people for demonstrations at client sites. Due to security concerns that confidential information may
be exposed if the laptops are lost or stolen, you have decided to use Encrypting File System (EFS) to
encrypt the data on the demonstration laptops. You configure the first 32 laptops with EFS and allow
all four users access to the encrypted data. On two of the laptops, however, either the encryption
option is unavailable or, when selected, changes the data size for the data in that folder.
Which of the following options are probable causes of these problems? Choose all that apply.
a. Volume is formatted as FAT32.
b. Volume is formatted with NTFS.
c. Folder is not compressed.
d. Folder is compressed.

Answer: a, d
Answer a is correct, because file encryption requires NTFS
Answer b is incorrect, because NTFS is required for encryption.
Answer c is incorrect, because uncompressed folders can be encrypted.
Answer d is correct, because compressed files and folders cannot be encrypted.

Lesson: Configuring an EFS Recovery Agent


Question: Some of the sales people on your organization have been using EFS encryption on their
laptops to protect files in case the laptop is stolen. All laptops are part of the corporate domain, and
users log on with their domain accounts. Recently one of the salespeople was fired, and now his
manager wants access to the files on the former salesperson's laptop.
How can you recover these files? Choose all that apply.
a. Reset the password of the salesperson and log on as the salesperson and decrypt the files.
b. Log on as any user that is a member of Domain Admins and decrypt the files.
c. Log on to the laptop as the domain administrator and decrypt the files.
d. Log on to the laptop as the local administrator and decrypt the files.

Answer: a, c
Answer a is correct, because after a domain account password is reset, the files are still
available to the user.
Answer c is correct, because the domain administrator is the default recovery agent in a
domain.
Answer b is incorrect, because the Domain Admins group has no special privileges to decrypt
files.
Answer d is incorrect, because the local administrator does not have any special privileges to
decrypt files if the laptop is a member of the domain.
6-8 Introduction to SQL Databases

Question: You want to create a database object to encapsulate Transact-SQL statements in a


database to
ensure consistency and make it easier for users to access data without having to write complex
Transact-
SQL statements. The Transact-SQL in the database object that you create will reference multiple
tables,
must accept input parameters, and will be referenced by users in the FROM clause of SELECT
statements.
What type of database object should you create?
( ) An inline user-defined table-valued function.
( ) A stored procedure.
( ) A view.
( ) An indexed view.
( ) A multistatement user-defined table-valued function.
Answer:
( ) An inline user-defined table-valued function.
( ) A stored procedure.
( ) A view.
( ) An indexed view.
() A multistatement user-defined table-valued function.

You might also like