Computer A is separated from all other machines, meaning this is a one off. So no group policy additions. I agree, answer is B based on the linked explanation and considering airgap.
C would be right but with the system being air gapped it wouldn’t make sense to use policy...
It seems like the answer must be C. According to the instructions literally laid out by the Exam Ref Book. You run Cipher.exe to create the files, and then install the DRA via: Security Settings\Public Key Policies\Encrypting File System > Right-Click "Add Data Recovery Agent" In the Local Policy settings.
not sure...
what speaks agains local computer certificate store?
I have a doubt about local GP, because:
- the computer is on an isolated NW + "Helpdesk users must be able to troubleshoot Group Policy object (GPO) processing on the Windows 10 computers. The helpdesk users must be able to identify which Group Policies are applied to the computers."
After a day studing this subject, I have got the whole situation here, since it was new to me.
The correct answer is letter C.
It is impossible (there is no other option) to have a recovery agent attached without the Group Policy (in this case the Local GPO), because when you create new files the recovery agent will be attached to those files and then be able to an admin (or a help desk) to retrieve access to the file after installing the .PFX (private key).
The best source of knowledge you will find is in this video: https://www.youtube.com/watch?v=51v_vuoMp9I
If you double click a certificate, you will be prompted to install it to a certificate store, otherwise the purpose of add it to a policy means that you will use a local computer configuration and that is critical because of security reasons or domain policy that is even more.
After a day studing this subject, I have got the whole situation here, since it was new to me.
The correct answer is letter C.
It is impossible (there is no other option) to have a recovery agent attached without the Group Policy (in this case the Local GPO), because when you create new files the recovery agent will be attached to those files and then be able to an admin (or a help desk) to retrieve access to the file after installing the .PFX (private key).
The best source of knowledge you will find is in this video: https://www.youtube.com/watch?v=51v_vuoMp9I
After you run the cipher/ r on the DRA account, "We must import these files that we just created into the Add a Data Recovery Agent to the Encrypting File System policy within Group Policy."- Testout PC Pro
In the meantime, check out these links and tell me what you think. :3
CREATE AND VERIFY AN ENCRYPTING FILE SYSTEM (EFS) DATA RECOVEY AGENT (DRA) CERTIFICATE: https://docs.microsoft.com/en-us/windows/security/information-protection/windows-information-protection/create-and-verify-an-efs-dra-certificate
WINDOWS CIPHER COMMAND: https://docs.microsoft.com/en-us/windows-server/administration/windows-commands/cipher
Oooohkay. I am going to have to back track on what I said... even though I got that info from PC Pro Testout... I am sticking to the given answer. Why? Because I took a practice exam from my school (no I am not going to tell you what school I attend) and the answer they have is: Run Cipher.exe, And Then Add A Certificate To The Local Computer Certificate Store.
I would rather take my chances with the answer that my school provided. If ANYONE can give hard fact evidence as to why this is then PLEASE HELP /.\
The only thing I can see that points to original answer being correct is the following statement
"Find or create a file that's encrypted using Windows Information Protection. For example, you could open an app on your allowed app list, and then create and save a file so it's encrypted by WIP."
To me it does seem correct, I dont see the point of using local group policy for it. I guess no reason not too but just seems a simpler way to do it without local policy.
Best answer is C :
In a domain environment, you can import the EFS Recovery Agent's certificate into the Computer Configuration\Windows Settings\Security Settings\PubHc Key Policies\Encrypting File System policy of a GPO. The GPO must be linked to the organizational unit (OU) where the user's computer account, not the user account, exists. The certificate can be imported from either a Base-64 or DER-encoded certificate file, or from Active Directory if the certificate template enables publication of the certificate file.
■ In a workgroup environment, you can import the EFS Recovery Agent's certificate into the Computer Configuration\Windows Settings\Security Settings \Public Key Policies\Encrypting File System policy (of the local computer). In this scenario, the EFS Recovery Agent certificate must be imported from a file.
In local group policy you are specifically adding a Data Recovery Agent.
What about the fact that the Helpldesk users are "domain" users and have no access to this machine from the Domain since the device is in a workgroup ? Using domain GPOs will not work in this context, answer has to be B.
Answer should be C. See reference, and look for workgroup section. You need to use gpedit to import the cert. https://www.serverbrain.org/certificate-security-2003/defining-efs-recovery-agents.html
Cipher.exe is used to encrypt files, not create certs. That's reserved for Certutil.exe, then the cert has to be loaded into the GPO under Public Key Policies. The answer is D.
upvoted 2 times
...
This section is not available anymore. Please use the main Exam Page.MD-100 Exam Questions
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
jarl_0424
Highly Voted 5 years, 5 months agoJohn1
5 years, 5 months agoCsig
5 years, 3 months agoGump
4 years, 9 months agohappyantlerman
Highly Voted 5 years, 2 months agoTimmi
4 years, 7 months agoRstilekar
4 years, 2 months agoJCkD4Ni3L
2 years, 8 months agoDeezal
2 years, 4 months agoflabezerra
Most Recent 2 years, 4 months agoflabezerra
2 years, 4 months agoflabezerra
2 years, 4 months agoflabezerra
2 years, 4 months agoPChi
3 years, 1 month agoPChi
3 years, 1 month agoMR_Eliot
3 years, 5 months agoCisco
4 years agohokieman91
4 years, 5 months agoAnthony_2770
4 years, 6 months agoJCkD4Ni3L
2 years, 8 months agoAK311
4 years, 11 months agoTomtom11
4 years, 11 months agoTomtom11
4 years, 11 months agoAchiel
5 years, 3 months agoJohn1
5 years, 5 months ago