Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.

Unlimited Access

Get Unlimited Contributor Access to the all ExamTopics Exams!
Take advantage of PDF Files for 1000+ Exams along with community discussions and pass IT Certification Exams Easily.

Exam SY0-601 topic 1 question 638 discussion

Actual exam question from CompTIA's SY0-601
Question #: 638
Topic #: 1
[All SY0-601 Questions]

A company recently moved sensitive videos between on-premises, company-owned websites. The company then learned the videos had been uploaded and shared to the Internet. Which of the following would MOST likely allow the company to find the cause?

  • A. Checksums
  • B. Watermarks
  • C. Order of volatility
  • D. A log analysis
  • E. A right-to-audit clause
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
JT4
Highly Voted 7 months, 4 weeks ago
Selected Answer: D
Log analysis is the correct answer here. The video was moved in their on premises internal environment. The only way to find out how/when the video was leaked is to review log entries. It could not possible be right to audit here because there is no 3rd party or any contract in the scenario.
upvoted 11 times
...
wolekraft
Highly Voted 3 months, 3 weeks ago
The wordings of this question is terrible. what cause are they looking for? very confusing indeed.
upvoted 5 times
...
Stevennson
Most Recent 1 week, 5 days ago
Clearly E. The company is allowed to find the cause of data breach on the vender side according to right-to-audit clause.
upvoted 1 times
...
shady23
2 weeks, 2 days ago
Selected Answer: D
D. A log analysis
upvoted 1 times
...
Geronemo
3 weeks, 2 days ago
Selected Answer: D
The option that would most likely allow the company to find the cause of the sensitive videos being uploaded and shared to the Internet is: D. A log analysis. Log analysis involves reviewing and analyzing various logs generated by systems, applications, and network devices to identify events and activities that may have contributed to the unauthorized upload and sharing of sensitive videos. By examining logs such as web server logs, file transfer logs, access logs, and authentication logs, the company can trace the actions taken by users or systems involved in the incident. This can help identify the source of the unauthorized activity, such as unauthorized access or misuse of credentials, allowing the company to take appropriate remedial actions and prevent similar incidents in the future.
upvoted 1 times
...
[Removed]
6 months, 3 weeks ago
Selected Answer: D
A log analysis can provide detailed information about who accessed the videos, when they were accessed, and what actions were taken. This could potentially reveal if there was unauthorized access or if a specific user account was responsible for the upload and sharing of the videos.
upvoted 2 times
...
addcomptia
8 months ago
Selected Answer: E
right to audit clause to me
upvoted 1 times
david124
4 months ago
The right to audit clause is something exercised/invoked in contracts with cloud service provides. Its between the customer and the cloud service provider. In this scenario there is no mention of anything cloud related let alone a cloud service provider. It specifically said "on-premises"
upvoted 3 times
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...