Prepare for the CompTIA Cloud+ Exam with our interactive tests. Access diverse question formats with detailed explanations for each answer. Ace your exam!

Each practice test/flash card set has 50 randomly selected questions from a bank of over 500. You'll get a new set of questions each time!

Practice this question and more.


When configuring access to cloud resources, which practice is considered best for maintaining granular permissions?

  1. Role-based access control

  2. Group policy management

  3. Access control lists

  4. Data leakage prevention

The correct answer is: Access control lists

The practice that is considered best for maintaining granular permissions is access control lists (ACLs). ACLs allow administrators to define specific permissions for individual users or groups of users for particular resources. This granularity enables precise control over who can access what resources and in what manner, whether it be read, write, or execute permissions. By utilizing ACLs, organizations can implement strict control measures, ensuring that users only have the access necessary for their job functions, thus minimizing the risk of unauthorized access and potential data breaches. This is especially crucial in cloud environments where resources are shared and can be accessed remotely. Role-based access control (RBAC) is another important method, but it is more focused on roles, which can lead to broader access levels for users assigned to certain roles. Group policy management pertains more to configuring policies on systems rather than providing granular resource access. Data leakage prevention is primarily concerned with protecting data from being sent outside an organization rather than managing access permissions. Therefore, while all these practices play vital roles in access control management in different ways, ACLs stand out for their emphasis on fine-tuning permissions at a very detailed level.