AccessData A30-327 Question Answer
When using PRTK to attack encrypted files exported from a case, which statement is true?
PRTK will request the user access control list from FTK.
PRTK will generate temporary copies of decrypted files for printing.
FTK will stop all active jobs to allow PRTK to decrypt the exported files.
File hash values will change when they are saved in their decrypted format.
Additional interoperability between PRTK and NTAccess becomes available when files
begin decrypting.
TESTED 15 Jul 2025
Copyright © 2014-2025 ACE4Sure. All Rights Reserved