AccessData Certified Examiner A30-327 Question # 29 Topic 2 Discussion

AccessData Certified Examiner A30-327 Question # 29 Topic 2 Discussion

A30-327 Exam Topic 2 Question 29 Discussion:
Question #: 29
Topic #: 2

When using PRTK to attack encrypted files exported from a case, which statement is true?


A.

PRTK will request the user access control list from FTK.


B.

PRTK will generate temporary copies of decrypted files for printing.


C.

FTK will stop all active jobs to allow PRTK to decrypt the exported files.


D.

File hash values will change when they are saved in their decrypted format.


E.

Additional interoperability between PRTK and NTAccess becomes available when files

begin decrypting.


Get Premium A30-327 Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.