I think usually it is better to focus on Comptia resources than wikipedia etc when studying for these exams. Nevertheless, we know from the question this has to do with file permissions.
From Meyers
"The file system on a hard drive matters a lot when it comes to
security. On modern systems, the file system on the boot drive has support
for an access control list (ACL), a rich form of user and groups permissions.
But this security only extends to drives/cards formatted with modern file
systems such as NTFS, HFS+, and ext3/4."
DLP (again from Meyers)
"any security appliances include a context-based set of rules called
Data Loss Prevention (DLP) to help companies avoid accidental leakage of
data. DLP works by scanning packets flowing out of the network, stopping
the flow when something triggers."
The correct answer is C for sure.
What is ACL:An access control list (ACL) is a table that tells a computer operating system which access rights each user has to a particular system object, such as a file directory or individual file. Each object has a security attribute that identifies its access control list. The list has an entry for each system user with access privileges. The most common privileges include the ability to read a file (or all the files in a directory), to write to the file or files, and to execute the file (if it is an executable file, or program). Microsoft Windows NT/2000, Novell's NetWare, Digital's OpenVMS, and UNIX-based systems are among the operating systems that use access control lists. The list is implemented differently by each operating system
What us DLP?Data loss prevention (DLP) makes sure that users do not send sensitive or critical information outside the corporate network. The term describes software products that help a network administrator control the data that users can transfer.
https://bus206.pressbooks.com/chapter/chapter-6-information-systems-security/
Access Control
Once a user has been authenticated, the next step is to ensure that they can only access the information resources that are appropriate. This is done through the use of access control. Access control determines which users are authorized to read, modify, add, and/or delete information. Several different access control models exist. Here we will discuss two: the access control list (ACL) and role-based access control (RBAC).
C. ACL is the right answer
Answer is C without a doubt. if you look up Access Control List on Wikipedia, the first few sentences will tell you why this is the correct answer
upvoted 6 times
...
This section is not available anymore. Please use the main Exam Page.220-1002 Exam Questions
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
giftedhands
Highly Voted 3 years, 10 months agoAbrasive123
Highly Voted 3 years, 10 months agoZioPier
Most Recent 1 year, 10 months agoZ_186
2 years, 10 months agoZ_186
2 years, 10 months agoTripeV
3 years, 3 months agoSamsonite363
3 years, 3 months agoHisFave
3 years, 4 months agoAASA79
3 years, 5 months agoNebulise
3 years, 8 months ago