When using PRTK to attack encrypted files exported from a case, which statement is true?
PRTK will request the user access control list from FTK.
PRTK will generate temporary copies of decrypted files for printing.
FTK will stop all active jobs to allow PRTK to decrypt the exported files.
File hash values will change when they are saved in their decrypted format.
Additional interoperability between PRTK and NTAccess becomes available when files
begin decrypting.
Submit