EC-Council: Computer Hacking Forensic Investigator(CHFI-V10) |
||||
Module 6 : Windows Forensics |
||||
Questions available : 94 |
You are not logged in. Please Login for track your learning progress |
|||
Go to Question No. |
Question No 0
If you want to share the link of this question, please click here to "Copy Question Link" and share that generated link. Link from URL may change in future.
Comunity Comments:

Opted Answer: B
If the employee copied EFS-encrypted files to a floppy disk, the encryption behavior depends on how the files were transferred:
If the files were copied normally (drag-and-drop or standard copy-paste), EFS encryption is removed when transferring to a non-NTFS file system like a floppy disk. This means the files on the floppy disk are unencrypted and can be accessed.
If the files were moved within an NTFS environment, they would remain encrypted, requiring the original encryption key to access them.
EFS uses strong encryption (128-bit or higher), making it nearly impossible to break without the correct decryption key.
The EFS Recovery Agent can be used to decrypt files if the organization has configured one.
Since floppy disks use FAT file systems, the files were likely automatically decrypted when copied, meaning you should be able to access them