Description
- Discuss procedures for configuring and using Encrypting File System (EFS)
- Discuss procedures for configuring and implementing Advanced Audit Policies.
- Discuss DNS and procedures for configuring DNS Zones.
- Discuss the different types of DNS records and and how they are configured.
- Discuss the concept of Virtual Private Networks (VPN) and how that concept works
Explanation & Answer
Attached.
Running Head: CONFIGURATION
1
Configuration
Institution affiliation
Date:
CONFIGURATION
2
1.
Encrypting file system (EFS) allows computer users to encrypt their data or files such
that external individuals cannot access the information contained in the encrypted files. The EFS
makes use of an encryption key that enables the individual or owner of a computer to encrypt
files and data (Zacker, 2014). The procedure for configuration requires that a user have a publicprivate key and another public key certificate that is used in encryption. An individual can thus
configure the EFS with the help of the encryption keys and certificates. On the other hand, to
decrypt data or files in the system, a user will require the EFS to decrypt the file encryption key
with the help of the private key, and in turn, the data or file is decrypted by the file encryption
key.
2.
The procedure for c...
Review
Review
24/7 Homework Help
Stuck on a homework question? Our verified tutors can answer all questions, from basic math to advanced rocket science!
Similar Content
Related Tags
Cat on a Hot Tin Roof
by Tennessee Williams
Death on the Nile
by Agatha Christie
Moby Dick
by Herman Melville
The Call of the Wild
by Jack London
To the Lighthouse
by Virginia Woolf
Twilight
by Stephenie Meyer
The 48 Laws of Power
by Robert Greene
The Glass Palace
by Amitav Ghosh
All the Kings Men
by Robert Penn Warren