A company has begun labeling all laptops with asset inventory stickers and associating them with employee IDs. Which of the following security benefits do these actions provide? (Choose two.)
A.
If a security incident occurs on the device, the correct employee can be notified.
B.
The security team will be able to send user awareness training to the appropriate device.
C.
Users can be mapped to their devices when configuring software MFA tokens.
D.
User-based firewall policies can be correctly targeted to the appropriate laptops.
E.
When conducting penetration testing, the security team will be able to target the desired laptops.
F.
Company data can be accounted for when the employee leaves the organization.
AC
A. If a security incident occurs on the device, the correct employee can be notified.
By associating devices with specific employees, the security team can quickly identify and notify the responsible employee in the event of a security incident. This helps in timely incident response and remediation.
C. Users can be mapped to their devices when configuring software MFA tokens.
Associating devices with employee IDs allows for accurate mapping of users to their devices. This is particularly important when setting up and managing multi-factor authentication (MFA) tokens, ensuring they are configured for the correct devices and users.
AF.
Asset tags help identify ownership, not authentication credentials. MFA is tied to user identity (employee ID) rather than a specific device. A user can log in from multiple devices, and MFA will still work because it verifies the user's credentials, not the physical device. You said it best: "Associating devices with employee IDs allows for accurate mapping of users to their devices." From this, we can see that MFA plays no role in identifying a device.
F directly aligns with the primary priority of cybersecurity professionals: protecting company data.
I asked the AI god after it said A and F, and this is the response I got (ChatGPT o3 advanced reasoning model):
Is C plausible?
Not really.
Software-based MFA tokens (TOTP apps, push agents, etc.) are almost always tied to the user account, not to a specific workstation. Whether or not a laptop carries an inventory sticker has no bearing on enrolling or mapping that token—the enrolment happens in the identity platform and follows the user wherever they log in. Asset tagging is great for ownership, incident response, and off-boarding (A, F), but it doesn’t materially simplify MFA token provisioning, so C isn’t considered a core security benefit here.
AF
There are no doubts about A.
C or F is the question. While both are reasonable, there is no reference to MFA in the CompTIA Student Guide nor their WBT related to Asset Management.
The strongest reference is "Assigning asset ownership involves designating specific individuals or teams within the organization as responsible for particular assets to establish a clear chain of accountability for asset security, maintenance, and ongoing management". This means, F is more likely excepted in the exam, in my opinion.
The answer is not A and F because of the specific nature of the security benefits related to inventory stickers and employee IDs. Let's break down why:
A. If a security incident occurs on the device, the correct employee can be notified.
This option makes sense as a benefit because labeling and associating devices with employee IDs allow for the effective tracking and notification of the relevant employee in case of a security incident on their device.
F. Company data can be accounted for when the employee leaves the organization.
While this seems relevant, the actual process of accounting for company data when an employee leaves is broader and involves policy and process beyond simply labeling a device. Although asset tracking helps with inventory management, the label itself doesn't directly manage or account for the data on the device when an employee departs.
Instead, the more direct security benefits from labeling devices would be:
C. Users can be mapped to their devices when configuring software MFA tokens.
Every one agrees A:
I say F because when employees leave the company, their assigned device can be tracked, retrieved, and properly wiped to ensure company data is not lost or leaked.
Most MFAs are configured per user not per device.
It should be A and F, although option A isn't 100% realistic. Why? The question mentioned only that they are adding asset stickers, but simply having a sticker doesn't mean that the asset ID matches with the computer name
A. If a security incident occurs on the device, the correct employee can be notified.
Asset inventory stickers and association with employee IDs help identify the user responsible for a device, making it possible to notify them if a security incident occurs.
C. Users can be mapped to their devices when configuring software MFA tokens.
Associating devices with employee IDs ensures that software Multi-Factor Authentication (MFA) tokens can be correctly configured for the right user on the right device.
AC, I think everyone can agree with A. I’m choosing C over F because when they had us set up MFA pins at work they said it was more secure than passwords because it validated our device to our identity and the pin would only work on our specific laptops
F. Company data can be accounted for when the employee leaves the organization.: While asset tracking helps manage hardware, accounting for data is a broader process involving data access and permissions, not just inventory stickers.
This section is not available anymore. Please use the main Exam Page.SY0-701 Exam Questions
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
SHADTECH123
Highly Voted 1 year, 1 month agoshootweb
3 months, 2 weeks ago1chung
Most Recent 1 week, 2 days ago0e6bd20
2 weeks ago1chung
1 month, 2 weeks agoKonversation
3 months, 1 week agokalmax5400
4 months agoprabh1251
4 months agoOluwatobi4880
4 months, 2 weeks agoRussell15
4 months, 3 weeks agogavin1776
4 months, 4 weeks agoInnana
5 months, 1 week agoagp2684
5 months, 1 week agoITExperts
5 months, 2 weeks agoBFG_Nick
5 months, 3 weeks agobabujiju
5 months, 3 weeks agoAces155
5 months, 4 weeks agoTmNvrWts
6 months, 2 weeks ago