exam questions

Exam 220-1002 All Questions

View all questions & answers for the 220-1002 exam

Exam 220-1002 topic 1 question 419 discussion

Actual exam question from CompTIA's 220-1002
Question #: 419
Topic #: 1
[All 220-1002 Questions]

Which of the following security principles help to prevent employees from changing files they are intended only to view?

  • A. DLP
  • B. MDM
  • C. ACL
  • D. MFA
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️
Reference:
https://searchinform.com/infosec-blog/2019/04/14/dlp-systems-what-is-a-dlp-system-and-how-does-it-work/

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
giftedhands
Highly Voted 3 years, 10 months ago
DLP prevents leaks of sensitive data. ACL controls or limits what a user can do with a file...
upvoted 13 times
...
Abrasive123
Highly Voted 3 years, 10 months ago
Isn't ACL applicable to files? DLP prevents data leakage of sensitive files.
upvoted 11 times
...
ZioPier
Most Recent 1 year, 10 months ago
Selected Answer: C
The reference article explains even more specifically that the right answer is C
upvoted 1 times
...
Z_186
2 years, 10 months ago
I think usually it is better to focus on Comptia resources than wikipedia etc when studying for these exams. Nevertheless, we know from the question this has to do with file permissions. From Meyers "The file system on a hard drive matters a lot when it comes to security. On modern systems, the file system on the boot drive has support for an access control list (ACL), a rich form of user and groups permissions. But this security only extends to drives/cards formatted with modern file systems such as NTFS, HFS+, and ext3/4." DLP (again from Meyers) "any security appliances include a context-based set of rules called Data Loss Prevention (DLP) to help companies avoid accidental leakage of data. DLP works by scanning packets flowing out of the network, stopping the flow when something triggers."
upvoted 3 times
Z_186
2 years, 10 months ago
Whoops forgot to mention, definitely C is correct here
upvoted 3 times
...
...
TripeV
3 years, 3 months ago
The correct answer is C for sure. What is ACL:An access control list (ACL) is a table that tells a computer operating system which access rights each user has to a particular system object, such as a file directory or individual file. Each object has a security attribute that identifies its access control list. The list has an entry for each system user with access privileges. The most common privileges include the ability to read a file (or all the files in a directory), to write to the file or files, and to execute the file (if it is an executable file, or program). Microsoft Windows NT/2000, Novell's NetWare, Digital's OpenVMS, and UNIX-based systems are among the operating systems that use access control lists. The list is implemented differently by each operating system What us DLP?Data loss prevention (DLP) makes sure that users do not send sensitive or critical information outside the corporate network. The term describes software products that help a network administrator control the data that users can transfer.
upvoted 3 times
...
Samsonite363
3 years, 3 months ago
Good lord the divisiveness in this discussion makes me wanna flip my desk.
upvoted 2 times
...
HisFave
3 years, 4 months ago
IT IS DLP! Look up the definitions on Google....it is NOT ACL! NO!!!
upvoted 1 times
...
AASA79
3 years, 5 months ago
https://bus206.pressbooks.com/chapter/chapter-6-information-systems-security/ Access Control Once a user has been authenticated, the next step is to ensure that they can only access the information resources that are appropriate. This is done through the use of access control. Access control determines which users are authorized to read, modify, add, and/or delete information. Several different access control models exist. Here we will discuss two: the access control list (ACL) and role-based access control (RBAC). C. ACL is the right answer
upvoted 1 times
...
Nebulise
3 years, 8 months ago
Answer is C without a doubt. if you look up Access Control List on Wikipedia, the first few sentences will tell you why this is the correct answer
upvoted 6 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago