exam questions

Exam CV0-003 All Questions

View all questions & answers for the CV0-003 exam

Exam CV0-003 topic 1 question 268 discussion

Actual exam question from CompTIA's CV0-003
Question #: 268
Topic #: 1
[All CV0-003 Questions]

A cloud administrator recently noticed that a number of files stored at a SaaS provider’s file-sharing service were deleted. As part of the root cause analysis, the administrator noticed the parent folder permissions were modified last week. The administrator then used a test user account and determined the permissions on the files allowed everyone to have write access. Which of the following is the best step for the administrator to take NEXT?

  • A. Identify the changes to the file-sharing service and document.
  • B. Acquire a third-party DLP solution to implement and manage access.
  • C. Test the current access permissions to the file-sharing service.
  • D. Define and configure the proper permissions for the file-sharing service.
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
PatrickH
7 months, 2 weeks ago
Selected Answer: D
The goal of RCA is to identify the root cause of the problem with the intent to stop the problem from recurring or worsening. The next step is to trigger long-term corrective actions to address the root cause identified during RCA, and make sure that the problem does not resurface. Correcting a problem is not formally part of RCA, however; these are different steps in a problem-solving process known as fault management in IT and telecommunications, repair in engineering, remediation in aviation, environmental remediation in ecology, therapy in medicine, etc. I think D is correct
upvoted 2 times
...
Pongsathorn
1 year, 1 month ago
Selected Answer: D
D. Define and configure the proper permissions for the file-sharing service. Given that the administrator has identified that the parent folder permissions were modified, and the permissions on the files allowed everyone to have write access, the next best step is to correct this issue by defining and configuring the proper permissions for the file-sharing service. This will involve setting up the access controls, permissions, and policies to ensure that only authorized users or groups have the appropriate level of access, preventing unauthorized changes or deletions of files. Additionally, it's important to review and audit the changes made to permissions to ensure that they align with the organization's security policies and requirements.
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago