Get Unlimited Contributor Access to the all ExamTopics Exams!
Take advantage of PDF Files for 1000+ Exams along with community discussions and pass IT Certification Exams Easily.
A company has begun labeling all laptops with asset inventory stickers and associating them with employee IDs. Which of the following security benefits do these actions provide? (Choose two.)
A.
If a security incident occurs on the device, the correct employee can be notified.
B.
The security team will be able to send user awareness training to the appropriate device.
C.
Users can be mapped to their devices when configuring software MFA tokens.
D.
User-based firewall policies can be correctly targeted to the appropriate laptops.
E.
When conducting penetration testing, the security team will be able to target the desired laptops.
F.
Company data can be accounted for when the employee leaves the organization.
I choose C and F because it more relates aligns with data security more than the other options. If there is security beach, why would I notify the employee? Everyone is considered a suspect until proven otherwise, so choice A is out for me. The other options can be use as well but C & F fits to what this exam is all about.
A. If a security incident occurs on the device, the correct employee can be notified.
Associating devices with employee IDs allows the security team to quickly identify and notify the responsible employee in the event of a security incident. This helps in taking prompt action and mitigating potential risks.
C. Users can be mapped to their devices when configuring software MFA tokens.
By mapping devices to specific employees, it becomes easier to configure and manage software multi-factor authentication (MFA) tokens, ensuring that the correct tokens are assigned to the correct users and their associated devices.
Answer: A & C
A: In in the event of a security incident security team can quickly identify and notify the responsible employee.
C: With this ensures that MFA tokens are correctly assigned to the appropriate users and devices.
AC
A. If a security incident occurs on the device, the correct employee can be notified.
By associating devices with specific employees, the security team can quickly identify and notify the responsible employee in the event of a security incident. This helps in timely incident response and remediation.
C. Users can be mapped to their devices when configuring software MFA tokens.
Associating devices with employee IDs allows for accurate mapping of users to their devices. This is particularly important when setting up and managing multi-factor authentication (MFA) tokens, ensuring they are configured for the correct devices and users.
AF makes the most sense, since most of us agree on F I say A is correct because if an incident occurs knowing the proper person(s) is critical to mitigate the attack.
A. If a security incident occurs on the device, the correct employee can be notified.
F. Company data can be accounted for when the employee leaves the organization.
C. Users can be mapped to their devices when configuring software MFA tokens.
This is a potential benefit. Associating laptops with employee IDs can aid in the management of multi-factor authentication (MFA) tokens, ensuring that the right tokens are assigned to the correct users and devices.
D. User-based firewall policies can be correctly targeted to the appropriate laptops.
This is a valid benefit. By associating laptops with employee IDs, user-based firewall policies can be effectively applied to the appropriate devices, enhancing security by enforcing tailored policies for different users.
I’m not too sure about D because as opposed to device specific permissions you can give proper permission via Active Directory in turn it takes less work once hardware needs to be replaced.
I have some doubts on option F, as I understand C fits better: "Ownership: ... When assets are assigned to specific owners, it becomes easier to enforce accountability for their condition and usage. ... Access control mechanisms, such as user authentication and authorization are often tied to ownership to ensure that only authorized individuals can interact with the asset" . Ian Neil SY0-701 Cert. Guide
upvoted 3 times
...
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
Gigi42
5 hours, 1 minute agonoragami
2 days, 8 hours agocdsu
1 week, 6 days agoSHADTECH123
1 month, 1 week agoJimmy1017
1 month, 3 weeks agoshady23
1 month, 4 weeks agometzen227
2 months agoJimmy1017
1 month, 3 weeks agoe5c1bb5
2 months agopabloudemy1
2 months ago