Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.

Unlimited Access

Get Unlimited Contributor Access to the all ExamTopics Exams!
Take advantage of PDF Files for 1000+ Exams along with community discussions and pass IT Certification Exams Easily.

Exam SY0-701 topic 1 question 35 discussion

Actual exam question from CompTIA's SY0-701
Question #: 35
Topic #: 1
[All SY0-701 Questions]

A company has begun labeling all laptops with asset inventory stickers and associating them with employee IDs. Which of the following security benefits do these actions provide? (Choose two.)

  • A. If a security incident occurs on the device, the correct employee can be notified.
  • B. The security team will be able to send user awareness training to the appropriate device.
  • C. Users can be mapped to their devices when configuring software MFA tokens.
  • D. User-based firewall policies can be correctly targeted to the appropriate laptops.
  • E. When conducting penetration testing, the security team will be able to target the desired laptops.
  • F. Company data can be accounted for when the employee leaves the organization.
Show Suggested Answer Hide Answer
Suggested Answer: AF 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
Gigi42
5 hours, 1 minute ago
Selected Answer: CF
I choose C and F because it more relates aligns with data security more than the other options. If there is security beach, why would I notify the employee? Everyone is considered a suspect until proven otherwise, so choice A is out for me. The other options can be use as well but C & F fits to what this exam is all about.
upvoted 1 times
...
noragami
2 days, 8 hours ago
Selected Answer: AC
A. If a security incident occurs on the device, the correct employee can be notified. Associating devices with employee IDs allows the security team to quickly identify and notify the responsible employee in the event of a security incident. This helps in taking prompt action and mitigating potential risks. C. Users can be mapped to their devices when configuring software MFA tokens. By mapping devices to specific employees, it becomes easier to configure and manage software multi-factor authentication (MFA) tokens, ensuring that the correct tokens are assigned to the correct users and their associated devices.
upvoted 1 times
...
cdsu
1 week, 6 days ago
Answer: A & C A: In in the event of a security incident security team can quickly identify and notify the responsible employee. C: With this ensures that MFA tokens are correctly assigned to the appropriate users and devices.
upvoted 1 times
...
SHADTECH123
1 month, 1 week ago
AC A. If a security incident occurs on the device, the correct employee can be notified. By associating devices with specific employees, the security team can quickly identify and notify the responsible employee in the event of a security incident. This helps in timely incident response and remediation. C. Users can be mapped to their devices when configuring software MFA tokens. Associating devices with employee IDs allows for accurate mapping of users to their devices. This is particularly important when setting up and managing multi-factor authentication (MFA) tokens, ensuring they are configured for the correct devices and users.
upvoted 2 times
...
Jimmy1017
1 month, 3 weeks ago
Selected Answer: AF
AF makes the most sense, since most of us agree on F I say A is correct because if an incident occurs knowing the proper person(s) is critical to mitigate the attack.
upvoted 1 times
...
shady23
1 month, 4 weeks ago
Selected Answer: AF
A. If a security incident occurs on the device, the correct employee can be notified. F. Company data can be accounted for when the employee leaves the organization.
upvoted 1 times
...
metzen227
2 months ago
C. Users can be mapped to their devices when configuring software MFA tokens. This is a potential benefit. Associating laptops with employee IDs can aid in the management of multi-factor authentication (MFA) tokens, ensuring that the right tokens are assigned to the correct users and devices. D. User-based firewall policies can be correctly targeted to the appropriate laptops. This is a valid benefit. By associating laptops with employee IDs, user-based firewall policies can be effectively applied to the appropriate devices, enhancing security by enforcing tailored policies for different users.
upvoted 3 times
Jimmy1017
1 month, 3 weeks ago
I’m not too sure about D because as opposed to device specific permissions you can give proper permission via Active Directory in turn it takes less work once hardware needs to be replaced.
upvoted 1 times
...
...
e5c1bb5
2 months ago
Selected Answer: AF
based on prof messer study guide i think AF are correct.
upvoted 2 times
...
pabloudemy1
2 months ago
I have some doubts on option F, as I understand C fits better: "Ownership: ... When assets are assigned to specific owners, it becomes easier to enforce accountability for their condition and usage. ... Access control mechanisms, such as user authentication and authorization are often tied to ownership to ensure that only authorized individuals can interact with the asset" . Ian Neil SY0-701 Cert. Guide
upvoted 3 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
ex Want to SAVE BIG on Certification Exam Prep?
close
ex Unlock All Exams with ExamTopics Pro 75% Off
  • arrow Choose From 1000+ Exams
  • arrow Access to 10 Exams per Month
  • arrow PDF Format Available
  • arrow Inline Discussions
  • arrow No Captcha/Robot Checks
Limited Time Offer
Ends in