What type of remediation policy is implemented if users cannot copy files but can read them?

Prepare for the WGU ITAS6291 D488 Cybersecurity Architecture and Engineering exam. Use flashcards and multiple-choice questions, each with explanations and guidance. Master your knowledge and excel in your exam!

The appropriate remediation policy in this scenario is one that restricts users from copying files while still allowing them to read them. This suggests a security measure that is designed to safeguard sensitive information by preventing the unauthorized dissemination of data, which aligns with the notion of limiting access to sensitive content.

In this context, the term "block" is fitting because it implies that the system actively intervenes to prevent file copying—essentially restricting the user's ability to move or duplicate the file to another location. However, by permitting users to read the files, it allows for legitimate access to the content without compromising security by enabling data exfiltration.

Other options, such as quarantine, generally involve isolating potential threats and would not allow any access to the files, including reading them. An alert policy typically refers to notifying administrators of certain actions or events but does not impose any direct restrictions on user actions. Similarly, a tombstone policy usually pertains to data management or deletion scenarios and is not relevant in this context.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy