A new manager is configuring a shared place for sensitive logs. Unwanted access to these logs has been detected. Which approach helps prevent unauthorized reading and editing of these files?
Use role-based rules and encrypt the data used for storage to protect the logs from unintended readers and editors
Designate a single user account with global privileges to monitor any changes that occur
Switch to a group chat application and embed the logs for quick review by all participants
Store all logs on a public server so everyone with a link can review them
Controlling permissions through assigned groups and using encryption at rest limits who can open or change the files, and it helps shield them from unwanted review if the storage is accessed by unauthorized individuals. Approaches that allow open access or omit encryption can lead to unapproved users viewing or altering the data, compromising confidentiality and integrity.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is encryption at rest, and why is it important?
Open an interactive chat with Bash
How does role-based access control (RBAC) improve security?
Open an interactive chat with Bash
Why is a single user account with global privileges a poor security practice?
Open an interactive chat with Bash
CompTIA Cloud+ CV0-004
Security
Your Score:
Report Issue
Bash, the Crucial Exams Chat Bot
AI Bot
Loading...
Loading...
Loading...
IT & Cybersecurity Package Join Premium for Full Access