This a tricky questions. As long as you duplicate your files they should have same protection (encryption key) as your first database that you duplicated and would work the same.
Yes, you have it correct. From FMI:
"A protected file retains its list of authorized files if the file is cloned or included in a runtime solution, so you don’t have to repeat this process."