exam questions

Exam CAS-005 All Questions

View all questions & answers for the CAS-005 exam

Exam CAS-005 topic 1 question 46 discussion

Actual exam question from CompTIA's CAS-005
Question #: 46
Topic #: 1
[All CAS-005 Questions]

A security officer is requiring all personnel working on a special project to obtain a security clearance requisite with the level of all information being accessed. Data on this network must be protected at the same level of each clearance holder. The need to know must be verified by the data owner. Which of the following should the security officer do to meet these requirements?

  • A. Create a rule to authorize personnel only from certain IPs to access the files.
  • B. Assign labels to the files and require formal access authorization.
  • C. Assign attributes to each file and allow authorized users to share the files.
  • D. Assign roles to users and authorize access to files based on the roles.
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
vicbersong
1 week, 1 day ago
Selected Answer: B
❌ Why the other options are less effective: A. Create a firewall rule to prevent those users from accessing sensitive data Overly broad — may block legitimate access and doesn’t stop exfiltration if access is already granted. C. Enable packet captures Good for investigation, but not mitigation — this is reactive, not preventive. D. Disable login activity for those users after business hours Might help reduce attack surface, but attackers can still operate within business hours or use compromised credentials at those times.
upvoted 1 times
...
vicbersong
1 week, 1 day ago
Selected Answer: B
❌ Why the others are incorrect: A. IP-based rules Only restrict where users connect from, not who they are or what data they're authorized to access. C. Attributes and sharing This sounds more like attribute-based access control (ABAC), and sharing by users doesn't align with the strict controls described. D. Role-based access control (RBAC) Assigns access based on job functions, but does not account for classification levels and need-to-know, which are crucial in this scenario.
upvoted 1 times
...
vicbersong
1 week, 1 day ago
Selected Answer: B
✅ B. Assign labels to the files and require formal access authorization. 🔐 Explanation: The scenario clearly describes a mandatory access control (MAC) environment where: Personnel must have security clearances matching the sensitivity of the data. Need-to-know access must be verified by a data owner. Access is based on formal authorization, not just technical capabilities. In a MAC system, files are labeled with classifications (e.g., Confidential, Secret), and users must have: A matching security clearance, and An explicit need-to-know, usually granted by a data custodian or owner.
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago