1. Encrypt email, security software, content checking tool, anti-spam tool, and secure firewall configurations.
2. Certificate Authority or Certification Authority (CA) is an entity, which is core to many PKI (Public Key Infrastructure) schemes, whose purpose is to issue digital certificates to use by other parties. It implies a trusted third party.
3. An attacker can create a certificate for any domain. This certificate will appear to be signed by a trusted CA. Thus, you will see that the site’s cert is trusted and you will never get any notification to the contrary.
5. Once a file has been initially encrypted, file sharing is enabled through a new button in the user interface (UI). A file must be encrypted first and then saved before additional users may be added. After selecting the Advanced Properties of an encrypted file, a user may be added by selecting the Details button. Individual users may add other users from the local machine or from the Active Directory, provided the user has a valid certificate for EFS.
6. DES Data Encryption Standard.
7. The Secure Hash Algorithm 1 (SHA-1) is a well-known and currently secure cryptographic hash function designed by the NSA. SHA1 and Triple DES are the same, they both use algorithms.
8. symmetric-key: It only needs one key to encrypt the message. And both user only need the same key to decode the message. And the in order to create the key is by moving the bit. asymmetric-key: It needs two different keys- public key and private key. Everyone can see the public key and only the person who has private key can decode the message.