Preview

Lab 3 Lab Assessment Questions Answers

Satisfactory Essays
Open Document
Open Document
496 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Lab 3 Lab Assessment Questions Answers
Assessment Worksheet

Configuring BitLocker and Windows Encryption

Course Name and Number: _Operating Systems: Hardening and Security - ISSC342_____
Student Name: ___________ Benson Kungu_______________________________________
Instructor Name: __________ Mylonakos, Peter______________________________________
Lab Due Date: ____________June 21, 2015__________________________________________
Overview

In this lab, you used the Microsoft Encrypting File System (EFS) to encrypt files and folders on a Windows Server 2012 machine. You documented the success or failure of your encryption efforts. You also installed Microsoft BitLocker Drive Encryption, a data protection feature that is used to resist data theft and the risk of exposure from lost, stolen, or decommissioned computers. You encrypted a data drive on the remote server and decrypt it using a recovery key.
Lab Assessment Questions & Answers

1. Within a Microsoft Windows Server 2012 environment, who has access rights to the EFS features and functions in the server?
The user who creates the file because the encryption will be based on the password of the account.
2. What are some best practices you can implement when encrypting BitLocker drives and the use of BitLocker recovery passwords?
With BitLocker you can have all the data encrypted at once, when you access the data and enter the decryption key you will have access until the encryption is activated again by a user or a restart of the system.
3. What was the recovery key generated by BitLocker in this lab?
097889-293733-129327-110748-261129-223003-123838-665907
4. How would you grant additional users access rights to your EFS encrypted folders and data files?
Using the data/folder properties it can be added the users that the creator users is allowing to access the data.
5. What are the main differences between EFS and BitLocker?
ETS is used for securing files and folders and relies on the logged on user certificate details to encrypt on decrypt files

You May Also Find These Documents Helpful

  • Good Essays

    In this lab, you used Nmap commands within the Zenmap application to scan the virtual network…

    • 652 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Hollis IS3230 Unit 3 Lab3

    • 766 Words
    • 4 Pages

    3. What permissions are necessary to allow an Active Directory Group called AD_Group to read and write files in a sensitive directory such as C:\ERPdocuments\HRfiles?…

    • 766 Words
    • 4 Pages
    Good Essays
  • Good Essays

    If multiple people need access to one file, this is commonly done by placing the users into groups, and assigning the groups and users various levels of permission access. There is a hierarchy where groups are on top and access control lists are underneath. The groups are owner class, group class, and other class. The other privileges are read, write, and execute. When a user creates a file, they are automatically made the owner. They can grant others into the group class and other class. Directory lists have 10 spaces or bits on the left hand side. The first space on the left is either a ‘-‘ for file, or a ‘D’ for directory. Stallings (2012) stated,“ Nine of the protection bits specify read (r), write (w), and execute (x) permission for the owner of the file, other members of the group to which this file belongs, and all other users” (p.558). The first three are for owner, next three are for group and last three are for other.…

    • 680 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    5. Defining will have to be documented whenever anyone needs a change. Levels of access can be done through the administrator for object level changes by setting different levels of permissions such as read-write-full access or no access.…

    • 257 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Another option is a BitLocker , which is a security feature that allows a user or network administrator to lock hard drives. If Kudler Fine Foods has sensitive corporate data on any hard drives, the user or admin can lock the hard drive with a password so that it cannot be accessed. This adds another layer of protection and ensures that the hard drive simply cannot be pulled out of the computer and attempted to be read as a secondary hard drive on another computer. This is a good feature for protecting data, especially for laptops that will be traveling and could potentially be…

    • 268 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    Access Control Lists

    • 3039 Words
    • 13 Pages

    This report will look at various access control methods used by Operating Systems (OS) to control user access to files on a computer and what they can do once they have gained access. In this first section I will look at methods such as Access Control Lists(ACL’s), Capabilities and Encrypting file systems(EFS) and which Operating Systems use these as well as the advantages and disadvantages they have over each other. The second part of my report will focus on one OS and explain in detail the methods it uses to control file access and how it works.…

    • 3039 Words
    • 13 Pages
    Powerful Essays
  • Good Essays

    NT2580 Unit 5 assignment

    • 340 Words
    • 2 Pages

    BitLocker lets you encrypt the hard drive(s) on your Windows 7 and Vista Enterprise, Windows 7 and Vista Ultimate or Windows Server 2008 and R2. BitLocker will not encrypt hard drives for Windows XP, Windows 2000 or Windows 2003. Only Windows 7, Vista and Server 2008 include BitLocker. BitLocker drives can be encrypted with 128 bit or 256 bit encryption, this is plenty strong to protect your data in the event the computer is lost or stolen.…

    • 340 Words
    • 2 Pages
    Good Essays
  • Good Essays

    lab 8 Access Controls

    • 943 Words
    • 4 Pages

    A- Windows Server 2003, Standard Edition; Windows Server 2003, Enterprise Edition; and Windows Server 2003, Datacenter Edition, store a certificate locally on the computer or device that requested it or, in the case of a user, on the computer or device that the user used to request it. The storage location is called the certificate store. A certificate store will often have numerous certificates, possibly issued from a number of different certification authorities.…

    • 943 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    In the workstation domain, we need to make sure that each of the workstations, whether desktop or laptop, has antivirus and malware protection installed on them. Laptops are very vulnerable for loss or theft, so all company laptops should have an encrypted hard drive so that if they are stolen, the data contained on them is not recovered by anyone but the owner.…

    • 512 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Task B 307

    • 338 Words
    • 1 Page

    To ensure security you would have you computer network encrypted, and multiple passwords for computers you should never use the same password they should always be different, when using filing cupboards you would should have locks on them and different locks with different keys for each cupboard..…

    • 338 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Lesson 2

    • 959 Words
    • 4 Pages

    6. The combination of permissions assigned to a file, plus the permissions inherited from parent folders and group memberships, is called the file’s effective permissions.…

    • 959 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    The technology enables files to be transparently encrypted to protect confidential data from attackers with physical access to the computer. EFS is available in all versions of Windows developed for business environments from Windows 2000 onwards .By default, no files are encrypted, but encryption can be enabled by users on a per-file, per-directory, or per-drive basis. Some EFS settings can also be mandated via Group Policy in Windows domain environments. Cryptographic file system implementations for other operating systems are available, but the Microsoft EFS is not compatible with any of…

    • 462 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    I learned how to add a domain controller to an Active Directory domain, back up and restore Active Directory, and recognize and respond to Active Directory replication issues.…

    • 1334 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    Based on the security objectives in the following table, design an enterprise encryption strategy-a public key infrastructure (PKI) that supports internal employees, external business partners, and clients. Include the design and reasoning for using the selected encryption strategy.…

    • 385 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    A secure and efficient protocol is used, ECC elliptic curve cryptography a public key cryptography…

    • 470 Words
    • 2 Pages
    Good Essays