SlideShare a Scribd company logo
You get a call from a customer who reinstalled Windows on his computer after a crash.
Fortunately, he had recently backed up all this data to an external USB drive and was able to
restore everything on his NTFS-formatted file system. However, he had a number of encrypted
files that he had backed up along with the rest of his data that he can no longer access. What
happened?
A. NTFS-encrypted files cannot be backed up, and when the computer crashed, those files were
lost forever. When the customer tried to restore these files, only corrupted versions were
restored.
B. NTFS-encrypted files are not restored with the original encryption key used before the backup
process and thus become inaccessible.
C. When the customer reinstalled Windows, even though he used his old username, the computer
assigned him a completely different security identifier (SID). The restored NTFS-encrypted files
are looking for his original SID.
D. When the customer reinstalled Windows, he didn’t use his original username. The restored
NTFS-encrypted files are looking for the original username.
Solution
C. NTFS encryption used the customer’s SID to associate with the encrypted file. Now that the
customer reinstalled Windows, a completely new SID was assigned to the customer. Without the
original SID, he can’t access the encrypted files. A third-party decryption application may help
him access his encrypted data.

More Related Content

PDF
Describe 3 functions of the cellular membrane and how are these func.pdf
PDF
Discuss the three main types of intellectual capitalSolutionth.pdf
PDF
Describer in detail the innate immune response to both an intercellu.pdf
PDF
Describe the difference between tropic and non-tropic hormones.S.pdf
PDF
C++ ProgrammingGivenWrite a closest Pair FunctionDeliverable.pdf
PDF
Can someone explain to me what the learning curve equation (Tn=T1n^.pdf
PDF
Both influenza virus and (IFV), and Measles Virus (MV) are envel.pdf
PDF
All of the following are characteristic to fatigue fracture surfaces.pdf
Describe 3 functions of the cellular membrane and how are these func.pdf
Discuss the three main types of intellectual capitalSolutionth.pdf
Describer in detail the innate immune response to both an intercellu.pdf
Describe the difference between tropic and non-tropic hormones.S.pdf
C++ ProgrammingGivenWrite a closest Pair FunctionDeliverable.pdf
Can someone explain to me what the learning curve equation (Tn=T1n^.pdf
Both influenza virus and (IFV), and Measles Virus (MV) are envel.pdf
All of the following are characteristic to fatigue fracture surfaces.pdf

More from footworld1 (20)

PDF
A cancer biology topic Describte how ChIP (chromatin immunoprecipit.pdf
PDF
You are running the Windows installation setup for Windows 7 on a co.pdf
PDF
Write a program to decipher messages encoded using a prefix code, gi.pdf
PDF
With the biological species concept, the process of speciation is fre.pdf
PDF
Write a class ArrayList that represents an array of integers. Init.pdf
PDF
what is the relationship between lnx and 1xSolutionThe relat.pdf
PDF
Which of these conclusions is supported by plant phylogenies (evolut.pdf
PDF
Who are some other individuals who might want to use the informa.pdf
PDF
Which account below is not a subdivision of owners equityAccumu.pdf
PDF
What is the nucleoid region of a prokaryotic cell a membrane bound .pdf
PDF
What is heartwood What is sapwood What is the most abundant tissu.pdf
PDF
Use arrays to store data for analysis. Use functions to perform the .pdf
PDF
Using a telephone survey, a team of sociologists collect data on edu.pdf
PDF
The “Tripwire” system calculates all the hashes for all executable f.pdf
PDF
The archaeal RNA viruses described in the introduction were single-s.pdf
PDF
propose 3 key word centered on the topic which will make the basis o.pdf
PDF
Molecular clock studies by Sarich and Wilson have suggested that .pdf
PDF
Limestone rocks, coral reefs, and forests are examples of Select one.pdf
PDF
I have the first program completed (not how request, but it works) a.pdf
PDF
How does chemotherapy function as a cancer treatmentA.It kills ce.pdf
A cancer biology topic Describte how ChIP (chromatin immunoprecipit.pdf
You are running the Windows installation setup for Windows 7 on a co.pdf
Write a program to decipher messages encoded using a prefix code, gi.pdf
With the biological species concept, the process of speciation is fre.pdf
Write a class ArrayList that represents an array of integers. Init.pdf
what is the relationship between lnx and 1xSolutionThe relat.pdf
Which of these conclusions is supported by plant phylogenies (evolut.pdf
Who are some other individuals who might want to use the informa.pdf
Which account below is not a subdivision of owners equityAccumu.pdf
What is the nucleoid region of a prokaryotic cell a membrane bound .pdf
What is heartwood What is sapwood What is the most abundant tissu.pdf
Use arrays to store data for analysis. Use functions to perform the .pdf
Using a telephone survey, a team of sociologists collect data on edu.pdf
The “Tripwire” system calculates all the hashes for all executable f.pdf
The archaeal RNA viruses described in the introduction were single-s.pdf
propose 3 key word centered on the topic which will make the basis o.pdf
Molecular clock studies by Sarich and Wilson have suggested that .pdf
Limestone rocks, coral reefs, and forests are examples of Select one.pdf
I have the first program completed (not how request, but it works) a.pdf
How does chemotherapy function as a cancer treatmentA.It kills ce.pdf

Recently uploaded (20)

PDF
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
PDF
102 student loan defaulters named and shamed – Is someone you know on the list?
PDF
GENETICS IN BIOLOGY IN SECONDARY LEVEL FORM 3
PPTX
human mycosis Human fungal infections are called human mycosis..pptx
PPTX
Tissue processing ( HISTOPATHOLOGICAL TECHNIQUE
PDF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
PPTX
Institutional Correction lecture only . . .
PDF
RMMM.pdf make it easy to upload and study
PDF
Anesthesia in Laparoscopic Surgery in India
PPTX
Lesson notes of climatology university.
PDF
O5-L3 Freight Transport Ops (International) V1.pdf
PPTX
GDM (1) (1).pptx small presentation for students
PPTX
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
PPTX
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
PDF
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
PDF
Classroom Observation Tools for Teachers
PDF
Chinmaya Tiranga quiz Grand Finale.pdf
PDF
Microbial disease of the cardiovascular and lymphatic systems
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
102 student loan defaulters named and shamed – Is someone you know on the list?
GENETICS IN BIOLOGY IN SECONDARY LEVEL FORM 3
human mycosis Human fungal infections are called human mycosis..pptx
Tissue processing ( HISTOPATHOLOGICAL TECHNIQUE
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
Institutional Correction lecture only . . .
RMMM.pdf make it easy to upload and study
Anesthesia in Laparoscopic Surgery in India
Lesson notes of climatology university.
O5-L3 Freight Transport Ops (International) V1.pdf
GDM (1) (1).pptx small presentation for students
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
2.FourierTransform-ShortQuestionswithAnswers.pdf
Classroom Observation Tools for Teachers
Chinmaya Tiranga quiz Grand Finale.pdf
Microbial disease of the cardiovascular and lymphatic systems

You get a call from a customer who reinstalled Windows on his comput.pdf

  • 1. You get a call from a customer who reinstalled Windows on his computer after a crash. Fortunately, he had recently backed up all this data to an external USB drive and was able to restore everything on his NTFS-formatted file system. However, he had a number of encrypted files that he had backed up along with the rest of his data that he can no longer access. What happened? A. NTFS-encrypted files cannot be backed up, and when the computer crashed, those files were lost forever. When the customer tried to restore these files, only corrupted versions were restored. B. NTFS-encrypted files are not restored with the original encryption key used before the backup process and thus become inaccessible. C. When the customer reinstalled Windows, even though he used his old username, the computer assigned him a completely different security identifier (SID). The restored NTFS-encrypted files are looking for his original SID. D. When the customer reinstalled Windows, he didn’t use his original username. The restored NTFS-encrypted files are looking for the original username. Solution C. NTFS encryption used the customer’s SID to associate with the encrypted file. Now that the customer reinstalled Windows, a completely new SID was assigned to the customer. Without the original SID, he can’t access the encrypted files. A third-party decryption application may help him access his encrypted data.