exam questions

Exam SY0-701 All Questions

View all questions & answers for the SY0-701 exam

Exam SY0-701 topic 1 question 35 discussion

Actual exam question from CompTIA's SY0-701
Question #: 35
Topic #: 1
[All SY0-701 Questions]

A company has begun labeling all laptops with asset inventory stickers and associating them with employee IDs. Which of the following security benefits do these actions provide? (Choose two.)

  • A. If a security incident occurs on the device, the correct employee can be notified.
  • B. The security team will be able to send user awareness training to the appropriate device.
  • C. Users can be mapped to their devices when configuring software MFA tokens.
  • D. User-based firewall policies can be correctly targeted to the appropriate laptops.
  • E. When conducting penetration testing, the security team will be able to target the desired laptops.
  • F. Company data can be accounted for when the employee leaves the organization.
Show Suggested Answer Hide Answer
Suggested Answer: AF 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
SHADTECH123
Highly Voted 7 months, 2 weeks ago
AC A. If a security incident occurs on the device, the correct employee can be notified. By associating devices with specific employees, the security team can quickly identify and notify the responsible employee in the event of a security incident. This helps in timely incident response and remediation. C. Users can be mapped to their devices when configuring software MFA tokens. Associating devices with employee IDs allows for accurate mapping of users to their devices. This is particularly important when setting up and managing multi-factor authentication (MFA) tokens, ensuring they are configured for the correct devices and users.
upvoted 6 times
...
Aces155
Most Recent 3 days, 17 hours ago
Selected Answer: AC
AC, I think everyone can agree with A. I’m choosing C over F because when they had us set up MFA pins at work they said it was more secure than passwords because it validated our device to our identity and the pin would only work on our specific laptops
upvoted 1 times
...
TmNvrWts
3 weeks, 3 days ago
Selected Answer: AC
F. Company data can be accounted for when the employee leaves the organization.: While asset tracking helps manage hardware, accounting for data is a broader process involving data access and permissions, not just inventory stickers.
upvoted 2 times
...
darpanne
3 weeks, 4 days ago
Selected Answer: AC
Explanation: A. If a security incident occurs on the device, the correct employee can be notified: C. Users can be mapped to their devices when configuring software MFA tokens: Multi-Factor Authentication (MFA) tokens are often linked to specific devices. By mapping employee IDs to laptops, administrators can ensure MFA configurations are correctly associated with the right users and their devices. Why not the F? F. Company data can be accounted for when the employee leaves the organization: While asset tagging helps track physical assets, it does not inherently account for company data stored on those devices.
upvoted 1 times
...
Fagann
1 month, 1 week ago
Selected Answer: AF
The correct answer is AF
upvoted 3 times
...
Damique
1 month, 3 weeks ago
Selected Answer: AC
Although asset tagging helps track hardware, it does not directly account for ensuring data is removed or preserved when employees leave.
upvoted 3 times
...
chalaka
2 months, 1 week ago
Selected Answer: AF
A. If a security incident occurs on the device, the correct employee can be notified. F. Company data can be accounted for when the employee leaves the organization.
upvoted 3 times
...
Bito808
2 months, 3 weeks ago
It cannot be F because "asset" management does not account for "data". C makes more sense because asset management includes internal assets, which may map network printers and other internal LAN assets.
upvoted 2 times
...
Murtuza
2 months, 3 weeks ago
Selected Answer: AF
AF is the correct answer
upvoted 2 times
...
QFox
2 months, 3 weeks ago
Selected Answer: AC
A.) If laptops are associated with employee IDs, it makes sense that in the event of a security incident (e.g., malware detection, suspicious activity), the security team will know which employee is responsible for that device. They can notify the correct person and take action. C.) Associating a device with a user ID can make it easier to set up software Multi-Factor Authentication (MFA) tokens. Knowing which device is linked to which employee ensures the MFA configuration is tied to the correct person and device
upvoted 2 times
...
NONS3c
4 months, 1 week ago
A and C correct because F , because labeling laptops with asset inventory stickers and associating them with employee id primary help track physical devices and identify the user of the device ut doesn't directly ensure the company data is accounted for
upvoted 2 times
...
tamdod
4 months, 3 weeks ago
A, F my token can be used on multiple devices so it isn't C.
upvoted 1 times
...
dbrowndiver
5 months, 1 week ago
Selected Answer: AF
Mapping users to devices for MFA purposes might be helpful, but the main goal of labeling is inventory and asset management. MFA typically involves software or mobile applications associated with a user's account rather than being device-dependent.
upvoted 4 times
...
4d110ce
5 months, 3 weeks ago
Selected Answer: AC
A. This ensures timely response and accountability. C. ensures that the tokens are issued to and used by the correct devices.
upvoted 2 times
...
Gigi42
6 months, 1 week ago
Selected Answer: CF
I choose C and F because it more relates aligns with data security more than the other options. If there is security beach, why would I notify the employee? Everyone is considered a suspect until proven otherwise, so choice A is out for me. The other options can be use as well but C & F fits to what this exam is all about.
upvoted 1 times
...
noragami
6 months, 1 week ago
Selected Answer: AC
A. If a security incident occurs on the device, the correct employee can be notified. Associating devices with employee IDs allows the security team to quickly identify and notify the responsible employee in the event of a security incident. This helps in taking prompt action and mitigating potential risks. C. Users can be mapped to their devices when configuring software MFA tokens. By mapping devices to specific employees, it becomes easier to configure and manage software multi-factor authentication (MFA) tokens, ensuring that the correct tokens are assigned to the correct users and their associated devices.
upvoted 3 times
...
cdsu
6 months, 3 weeks ago
Answer: A & C A: In in the event of a security incident security team can quickly identify and notify the responsible employee. C: With this ensures that MFA tokens are correctly assigned to the appropriate users and devices.
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago