In reviewing service desk requests, management has requested that the security analyst investigate the requests submitted by the new human resources manager. The requests consist of "unlocking" files that belonged to the previous human manager. The security analyst has uncovered a tool that is used to display five-level passwords. This tool is being used by several members of the service desk to unlock files. The content of these particular files is highly sensitive information pertaining to personnel. Which of the following BEST describes this scenario?
A. Unauthorized data exfiltration
B. Unauthorized data masking
C. Unauthorized access
D. Unauthorized software
E. Unauthorized controls
CS0-002: CompTIA CySA+ ExamFULL Printable PDF and Software. VALID exam to help you PASS. |
C
This refers to the CIA triangle. The helpdesk workers do not have permission to view these files, if they did they would not have to use an illegal program to unlock them. They are accessing PII they should not have access to.