exam questions

Exam 220-1102 All Questions

View all questions & answers for the 220-1102 exam

Exam 220-1102 topic 1 question 122 discussion

Actual exam question from CompTIA's 220-1102
Question #: 122
Topic #: 1
[All 220-1102 Questions]

A technician receives a call from a user who is on vacation. The user provides the necessary credentials and asks the technician to log in to the user's account and read a critical email that the user has been expecting. The technician refuses because this is a violation of the:

  • A. acceptable use policy.
  • B. regulatory compliance requirements.
  • C. non-disclosure agreement.
  • D. incident response procedures.
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
NotAHackerJustYet
Highly Voted 2 years, 3 months ago
The correct answer is A. acceptable use policy. Acceptable use policies are designed to protect the security and privacy of user accounts and data, and it is a violation of these policies for a technician to log in to a user’s account without the user’s explicit permission. Regulatory compliance requirements are not related to this issue, as they generally refer to specific laws and regulations that a company must follow, such as those related to data privacy and security. Non-disclosure agreements typically refer to contracts that are signed between two or more parties, and may not apply in this situation. Incident response procedures generally refer to steps that a company takes in response to a security incident, such as a data breach, and do not apply here.
upvoted 10 times
[Removed]
2 years ago
You stated the tech did not have permission, but the question states the user gave his credentials and made a request for the tech to log into his account- sounds like permission was given to me.
upvoted 8 times
anis_01
2 months, 1 week ago
even with the user’s permission, using their credentials violates the AUP
upvoted 1 times
...
...
...
newbytechy
Highly Voted 1 year, 1 month ago
I'm leaning towards B. My reasoning is that the question states "critical email". We don't necessarily know what type of information could be in that email. It can range from PII, Health Care information esc. Since those fall within the category of Common compliance requirements which are EU GDPR (General Data Protection Regulation) GLBA (Gramm-Leach-Bliley Act) HIPAA (Health Insurance Portability and Accountability Act) PIPEDA (Personal Information Protection and Electronic Documents Act) CCPA (California Consumer Privacy Act). These are all Regulatory Compliance Requirements. Even though the user gave the technician permission to log on, this isn't something the technician should do. Which falls under the "least privilege access rule". This isn't something the technician is required to do his/her job so the technician should not be engaging and that's why the technician refused.
upvoted 5 times
...
CorneliusFidelius
Most Recent 2 weeks, 5 days ago
Selected Answer: A
Policy Enforcement: An Acceptable Use Policy is a clearly defined internal policy that explicitly dictates how accounts, credentials, and access rights are managed. It commonly covers the scenario described: technicians should never log into another user's account, regardless of the user's permission, because it undermines individual accountability. Explicitness of the scenario: The situation described ("technician receives credentials from the user and refuses to log in") directly aligns with a classic acceptable-use violation scenario. Most organizations have explicit AUP terms covering credential-sharing, prohibiting precisely this action, which aligns perfectly with option A.
upvoted 1 times
CorneliusFidelius
2 weeks, 5 days ago
Moreover, someone could have brute forced the credentials of this persons account and be pretending to be the user. Unless you have some sort of verification and they're right in front of you it's probably better to not assist in this case. That critical information could be abused in the wrong hands.
upvoted 1 times
...
...
user9999999
3 weeks, 2 days ago
Selected Answer: A
The correct answer is A. acceptable use policy. Acceptable use policies are designed to protect the security and privacy of user accounts and data, and it is a violation of these policies for a technician to log in to a user’s account without the user’s explicit permission. Regulatory compliance requirements are not related to this issue, as they generally refer to specific laws and regulations that a company must follow, such as those related to data privacy and security. Non-disclosure agreements typically refer to contracts that are signed between two or more parties, and may not apply in this situation. Incident response procedures generally refer to steps that a company takes in response to a security incident, such as a data breach, and do not apply here.
upvoted 1 times
...
dickchappy
6 months, 4 weeks ago
Selected Answer: B
This is definitely regulatory compliance since there could be data contained on the users account and email which the technician is not supposed to have access to. Acceptable use policies typically give guidelines for what users are allowed to do with their devices. For instance, it might mention the user performing some illicit activity on their work laptop like crypto mining. This isn't a question about someone misusing a device.
upvoted 4 times
...
AnnoyingIAGuy
2 years, 1 month ago
Selected Answer: A
A is the answer
upvoted 3 times
...
Rafid51
2 years, 2 months ago
Selected Answer: A
(AUP) Acceptable use policy is the answer.
upvoted 2 times
...
LeeRoy616
2 years, 2 months ago
Selected Answer: A
The Answer is A, Acceptibale use policy (AUP). Regulatory compliance involves following external legal mandates set forth by state, federal, or international government.
upvoted 3 times
...
sigidy
2 years, 3 months ago
B is the answer
upvoted 1 times
...
examreviewer
2 years, 3 months ago
Selected Answer: B
B should be the Answer
upvoted 3 times
...
PatrickH
2 years, 4 months ago
Selected Answer: B
Thats a compliance issue. Complying to HIPAA, GDPR etc... Not an acceptable Usage issue
upvoted 4 times
Ralf_G
1 year, 3 months ago
The "definition", from Google, of: regulatory compliance states: Organizational efforts to comply with relevant laws, policies, and regulations. This has more to do with data protection and money laundering etc. than with security in a network
upvoted 1 times
Patriciabin
6 months, 3 weeks ago
How Many Questions Are on the CompTIA A+ Exams? Each of the two CompTIA A+ exams has no more than 90 questions. The combination of the two exams required for certification will have no more than 180 questions.CompTIA A+ 220-1101 covers mobile devices, networking technology, hardware, virtualization and cloud computing. CompTIA A+ 220-1102 covers operating systems, security, software and operational procedures.
upvoted 1 times
...
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago