hardmultiple choiceObjective-mapped

Exhibit

Data handling procedure:
- Managers may approve external sharing exceptions verbally.
- Staff record exceptions in email threads.
- No retention period is defined for exception evidence.

Audit note: multiple exceptions could not be traced to an approver.

Based on the exhibit, what is the best governance improvement?

Data handling procedure: - Managers may approve external sharing exceptions verbally. - Staff record exceptions in email threads. - No retention period is defined for exception evidence.

Audit note: multiple exceptions could not be traced to an approver.

Question 1hardmultiple choice
Full question →

Based on the exhibit, what is the best governance improvement?

Data handling procedure: - Managers may approve external sharing exceptions verbally. - Staff record exceptions in email threads. - No retention period is defined for exception evidence.

Audit note: multiple exceptions could not be traced to an approver.

Answer choices

Why each option matters

Good practice is not just finding the correct option. The wrong answers often show the exact trap the exam wants you to fall into.

A

Best answer

Replace verbal and email exceptions with a documented approval workflow and retained exception records.

A formal workflow creates traceable approvals, preserves evidence, and makes exception handling auditable later.

B

Distractor review

Allow each team to decide its own exception format to increase flexibility.

Local flexibility would make evidence even harder to compare, retain, and audit consistently across the organization.

C

Distractor review

Remove exception handling entirely so no external sharing can ever occur.

That may be unrealistic for business operations and does not address the underlying governance deficiency directly.

D

Distractor review

Keep the procedure unchanged and rely on additional awareness training alone.

Training helps, but it does not create durable evidence or formal approval records for exceptions.

Common exam trap

Common exam trap: authentication is not authorization

Logging in proves the user can authenticate. It does not automatically mean the user is allowed to enter privileged or configuration mode. Watch for AAA authorization, privilege level and command authorization details.

Technical deep dive

How to think about this question

This kind of question is testing the difference between identity and permission. A user may successfully log in to a router because authentication is working, but still fail to enter configuration mode because authorization is missing, misconfigured or mapped to a lower privilege level.

KKey Concepts to Remember

  • Authentication checks who the user is.
  • Authorization controls what the user is allowed to do after login.
  • Privilege levels affect access to EXEC and configuration commands.
  • AAA, TACACS+ and RADIUS can separate login success from command access.

TExam Day Tips

  • Do not assume successful login means full administrative access.
  • Look for words such as cannot enter configuration mode, privilege level, authorization or command access.
  • Separate login problems from permission problems before choosing the answer.

Related practice questions

Related SY0-701 practice-question pages

Use these pages to review the topic behind this question. This is how one missed question becomes focused revision.

More questions from this exam

Keep practising from the same exam bank, or move into a focused topic page if this question exposed a weak area.

FAQ

Questions learners often ask

What does this SY0-701 question test?

Authentication checks who the user is.

What is the correct answer to this question?

The correct answer is: Replace verbal and email exceptions with a documented approval workflow and retained exception records. — The audit finding shows weak governance: approvals are informal, inconsistent, and poorly evidenced. The best improvement is a documented exception workflow with retained records, which clearly defines who can approve, what evidence must be kept, and how long it must be retained. That creates traceability and supports later audit review. Training alone cannot prove authorization, and informal email or verbal approvals are too fragile for governance and compliance needs. Why others are wrong: Allowing each team to invent its own format would worsen inconsistency and make audit evidence harder to verify. Removing exception handling entirely may not be practical for real business operations and does not solve the need for authorized exceptions. Training by itself can improve behavior, but it does not create the formal approval trail or retention that auditors need. The answer must strengthen the process, not just tell people to do better.

What should I do if I get this SY0-701 question wrong?

Then try more questions from the same exam bank and focus on understanding why the wrong options are tempting.

Discussion

Loading comments…

Sign in to join the discussion.