A company has begun labeling all laptops with asset inventory stickers and associating them with employee IDs. Which of the following security benefits do these actions provide? (Choose two.)
A.
If a security incident occurs on the device, the correct employee can be notified.
B.
The security team will be able to send user awareness training to the appropriate device.
C.
Users can be mapped to their devices when configuring software MFA tokens.
D.
User-based firewall policies can be correctly targeted to the appropriate laptops.
E.
When conducting penetration testing, the security team will be able to target the desired laptops.
F.
Company data can be accounted for when the employee leaves the organization.
AC
A. If a security incident occurs on the device, the correct employee can be notified.
By associating devices with specific employees, the security team can quickly identify and notify the responsible employee in the event of a security incident. This helps in timely incident response and remediation.
C. Users can be mapped to their devices when configuring software MFA tokens.
Associating devices with employee IDs allows for accurate mapping of users to their devices. This is particularly important when setting up and managing multi-factor authentication (MFA) tokens, ensuring they are configured for the correct devices and users.
AC, I think everyone can agree with A. I’m choosing C over F because when they had us set up MFA pins at work they said it was more secure than passwords because it validated our device to our identity and the pin would only work on our specific laptops
F. Company data can be accounted for when the employee leaves the organization.: While asset tracking helps manage hardware, accounting for data is a broader process involving data access and permissions, not just inventory stickers.
Explanation:
A. If a security incident occurs on the device, the correct employee can be notified:
C. Users can be mapped to their devices when configuring software MFA tokens:
Multi-Factor Authentication (MFA) tokens are often linked to specific devices. By mapping employee IDs to laptops, administrators can ensure MFA configurations are correctly associated with the right users and their devices.
Why not the F?
F. Company data can be accounted for when the employee leaves the organization:
While asset tagging helps track physical assets, it does not inherently account for company data stored on those devices.
A. If a security incident occurs on the device, the correct employee can be notified.
F. Company data can be accounted for when the employee leaves the organization.
It cannot be F because "asset" management does not account for "data". C makes more sense because asset management includes internal assets, which may map network printers and other internal LAN assets.
A.) If laptops are associated with employee IDs, it makes sense that in the event of a security incident (e.g., malware detection, suspicious activity), the security team will know which employee is responsible for that device. They can notify the correct person and take action.
C.) Associating a device with a user ID can make it easier to set up software Multi-Factor Authentication (MFA) tokens. Knowing which device is linked to which employee ensures the MFA configuration is tied to the correct person and device
A and C correct because F , because labeling laptops with asset inventory stickers and associating them with employee id primary help track physical devices and identify the user of the device ut doesn't directly ensure the company data is accounted for
Mapping users to devices for MFA purposes might be helpful, but the main goal of labeling is inventory and asset management. MFA typically involves software or mobile applications associated with a user's account rather than being device-dependent.
I choose C and F because it more relates aligns with data security more than the other options. If there is security beach, why would I notify the employee? Everyone is considered a suspect until proven otherwise, so choice A is out for me. The other options can be use as well but C & F fits to what this exam is all about.
A. If a security incident occurs on the device, the correct employee can be notified.
Associating devices with employee IDs allows the security team to quickly identify and notify the responsible employee in the event of a security incident. This helps in taking prompt action and mitigating potential risks.
C. Users can be mapped to their devices when configuring software MFA tokens.
By mapping devices to specific employees, it becomes easier to configure and manage software multi-factor authentication (MFA) tokens, ensuring that the correct tokens are assigned to the correct users and their associated devices.
Answer: A & C
A: In in the event of a security incident security team can quickly identify and notify the responsible employee.
C: With this ensures that MFA tokens are correctly assigned to the appropriate users and devices.
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
SHADTECH123
Highly Voted 7 months, 2 weeks agoAces155
Most Recent 3 days, 17 hours agoTmNvrWts
3 weeks, 3 days agodarpanne
3 weeks, 4 days agoFagann
1 month, 1 week agoDamique
1 month, 3 weeks agochalaka
2 months, 1 week agoBito808
2 months, 3 weeks agoMurtuza
2 months, 3 weeks agoQFox
2 months, 3 weeks agoNONS3c
4 months, 1 week agotamdod
4 months, 3 weeks agodbrowndiver
5 months, 1 week ago4d110ce
5 months, 3 weeks agoGigi42
6 months, 1 week agonoragami
6 months, 1 week agocdsu
6 months, 3 weeks ago