exam questions

Exam SY0-601 All Questions

View all questions & answers for the SY0-601 exam

Exam SY0-601 topic 1 question 431 discussion

Actual exam question from CompTIA's SY0-601
Question #: 431
Topic #: 1
[All SY0-601 Questions]

Cloud security engineers are planning to allow and deny access to specific features in order to increase data security. Which of the following cloud features is the most appropriate to ensure access is granted properly?

  • A. API integrations
  • B. Auditing
  • C. Resource policies
  • D. Virtual networks
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
mouettespaghetti
Highly Voted 2 years, 1 month ago
-C The most appropriate cloud feature to ensure access is granted properly is resource policies. Resource policies are a powerful tool for managing access to cloud resources. They allow cloud security engineers to specify permissions and restrictions at a granular level, controlling access to specific resources or actions within the cloud environment. By using resource policies, cloud security engineers can implement a fine-grained access control system that can help prevent unauthorized access to sensitive data. API integrations (option A) are used to connect different cloud services and applications, but they are not directly related to managing access to cloud resources. Auditing (option B) is used to track changes and access to cloud resources, but it does not directly control access to those resources. Virtual networks (option D) are used to isolate and secure network traffic within the cloud environment, but they are not directly related to managing access to cloud resources.
upvoted 16 times
...
ApplebeesWaiter1122
Highly Voted 2 years, 1 month ago
Selected Answer: C
Resource policies in cloud security are used to govern access and permissions for specific cloud resources, such as virtual machines, storage accounts, and databases. These policies allow cloud security engineers to define rules that control access and actions on these resources, ensuring that only authorized users and systems can interact with them. Resource policies are commonly used in cloud environments to enforce security controls and compliance requirements, such as restricting access to sensitive data, enforcing encryption, or enforcing geographic data residency rules. These policies are enforced at the cloud provider level, meaning that the access controls and permissions are managed by the cloud provider rather than by individual users or organizations.
upvoted 5 times
je123
1 year, 10 months ago
" These policies are enforced at the cloud provider level, meaning that the access controls and permissions are managed by the cloud provider rather than by individual users or organizations." is wrong. Resource policies are typically defined and managed by the cloud customer (user or organization) to control access to their own resources within the cloud environment. Cloud providers offer mechanisms for customers to set and manage these policies. These policies define who can access the resources, what actions they can perform on those resources, and under what conditions. For example, in Amazon Web Services (AWS), customers can use AWS Identity and Access Management (IAM) policies to control access to their resources. Similarly, in Microsoft Azure, customers can use Azure Role-Based Access Control (RBAC) policies, and in Google Cloud, customers can use Google Cloud Identity and Access Management (IAM) policies.
upvoted 1 times
...
...
isha_a
Most Recent 1 year, 7 months ago
Selected Answer: C
for me, the keyword here is, specific features.
upvoted 2 times
...
LeonardSnart
1 year, 12 months ago
Selected Answer: C
Cloud storage services require permissions just like any resource. File servers need permissions. Mail servers need permissions. You get the idea. Cloud service providers—let’s just say AWS, as Amazon invented this term—call their permissions resource policies. A policy is an object in AWS that defines the permissions to an identity or resource. AWS defines two types of resource policies: identity-based policies and resource-based policies. Identity-based policies are assigned to users, groups, or roles. Resource-based policies are attached to a resource." -Mike Meyers' Security+ Certification Guide Third Edition SY0-601
upvoted 4 times
...
cablebox
2 years ago
Selected Answer: C
c. Auditing (option B) is used to track changes and access to cloud resources, but it does not directly control access to those resources.
upvoted 1 times
...
staoic
2 years, 1 month ago
Selected Answer: C
Resource policies would be the most appropriate feature to ensure access is granted properly. Resource policies allow you to specify who has access to your resources and what actions they can perform on those resources.
upvoted 1 times
...
KnifeClown1
2 years, 1 month ago
Selected Answer: C
C. Resource policies
upvoted 1 times
...
fouserd
2 years, 1 month ago
Selected Answer: C
Resource policies would be the most appropriate cloud feature to ensure that access is granted properly. Resource policies are used to define who can access specific resources and what actions they can perform on those resources. By configuring resource policies, cloud security engineers can control access to specific features and increase data security.
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...