Which of the following risks is the data still subject?

A company stores highly sensitive data files used by the accounting system on a server file share.
The accounting system uses a service account named accounting-svc to access the file share. The data is protected will a full disk encryption, and the permissions are set as follows:
File system permissions: Users = Read Only
Share permission: accounting-svc = Read Only
Given the listed protections are in place and unchanged, to which of the following risks is the data still subject?
A. Exploitation of local console access and removal of data
B. Theft of physical hard drives and a breach of confidentiality
C. Remote exfiltration of data using domain credentials
D. Disclosure of sensitive data to third parties due to excessive share permissions

How To Pass SY0-601 Exam?

CompTIA SY0-601 PDF dumps.

High quality SY0-601 pdf and software. VALID exam to help you pass.

comptia-exams

5 thoughts on “Which of the following risks is the data still subject?

  1. From remote access perspective, the share is open for only one service account assigned to the accounting system. No any user can gain access to the folder remotely. Therefore answers C and D are wrong. Answer B is also wrong because the hard disk is encrypted.
    Answer A also looks weird. But if to imagine that a malicious actor could exploit local console access he potentially could gain local admin rights and do everything he needs. So by my feeling the answer A is better than others.

  2. Not D. Users have read “file” permissions and D options states “due to excessive SHARE permissions”
    It must be C.

  3. I think the answer is D.
    The data cannot be “Removed” because the share is Read Only.
    C is possible but unless I am missing something “any” user can copy the data or simply read some sensitive info and do what they like with it…

    1. No, not B… Question mentioned full disk encryption.

      I’m thinking A or C… leaning C cause A mentions removal of data instead of just copying. Should only be able to see data cause of the read only permissions. So theoretically any one that could access this machine would have read access of these files… C would be my final answer

Leave a Reply

Your email address will not be published. Required fields are marked *


The reCAPTCHA verification period has expired. Please reload the page.