Which capability helps to track who accessed and downloaded a sensitive file?

Prepare for the Microsoft Administering Information Security Exam with flashcards and multiple choice questions. Each question offers hints and explanations. Get ready to ace your exam!

Multiple Choice

Which capability helps to track who accessed and downloaded a sensitive file?

Explanation:
The ability to track who accessed and downloaded a sensitive file is specifically provided through audit logs. Audit logs are records that provide a detailed history of system events, including user access, file modifications, and any interactions with sensitive data. By reviewing these logs, administrators can identify which users accessed particular files, when they did so, and whether the files were downloaded or modified. This capability is essential for maintaining security and compliance, especially in environments where sensitive information is handled. In contrast, data classification is more about categorizing data based on its sensitivity rather than tracking access. Permission settings dictate who has access to files and at what level, but they do not record the actions taken by users. Retention management focuses on how long data should be kept and when it should be disposed of, rather than on monitoring user interactions with the data. Each of these other options plays a role in information security, but they do not provide the specific tracking capability offered by audit logs.

The ability to track who accessed and downloaded a sensitive file is specifically provided through audit logs. Audit logs are records that provide a detailed history of system events, including user access, file modifications, and any interactions with sensitive data. By reviewing these logs, administrators can identify which users accessed particular files, when they did so, and whether the files were downloaded or modified. This capability is essential for maintaining security and compliance, especially in environments where sensitive information is handled.

In contrast, data classification is more about categorizing data based on its sensitivity rather than tracking access. Permission settings dictate who has access to files and at what level, but they do not record the actions taken by users. Retention management focuses on how long data should be kept and when it should be disposed of, rather than on monitoring user interactions with the data. Each of these other options plays a role in information security, but they do not provide the specific tracking capability offered by audit logs.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy