JLV 2 8 1 POM

The active transaction log (known as the tail of the log) must be backed up under the full or bulk- logged recovery model before a DB can be restored in SSMS. Access to the certificate or asymmetric key that was used to encrypt the DB is needed to restore a DB that is encrypted. ................
................