A company has begun labeling all laptops with asset inventory stickers and associating them with employee IDs. Which of the following security benefits do these actions provide? (Choose two.)
A company has begun labeling all laptops with asset inventory stickers and associating them with employee IDs. Which of the following security benefits do these actions provide? (Choose two.)
Labeling laptops with asset inventory stickers and associating them with employee IDs provides strong security benefits. First, it ensures that if a security incident occurs on the device, the correct employee can be notified promptly, enabling quick communication and response to the incident. Secondly, it allows users to be mapped to their devices when configuring software MFA tokens. By accurately mapping employees to their devices, MFA tokens can be managed and assigned correctly, enhancing the security by ensuring proper authorization and authentication.
AC A. If a security incident occurs on the device, the correct employee can be notified. By associating devices with specific employees, the security team can quickly identify and notify the responsible employee in the event of a security incident. This helps in timely incident response and remediation. C. Users can be mapped to their devices when configuring software MFA tokens. Associating devices with employee IDs allows for accurate mapping of users to their devices. This is particularly important when setting up and managing multi-factor authentication (MFA) tokens, ensuring they are configured for the correct devices and users.
C. Users can be mapped to their devices when configuring software MFA tokens. This is a potential benefit. Associating laptops with employee IDs can aid in the management of multi-factor authentication (MFA) tokens, ensuring that the right tokens are assigned to the correct users and devices. D. User-based firewall policies can be correctly targeted to the appropriate laptops. This is a valid benefit. By associating laptops with employee IDs, user-based firewall policies can be effectively applied to the appropriate devices, enhancing security by enforcing tailored policies for different users.
I’m not too sure about D because as opposed to device specific permissions you can give proper permission via Active Directory in turn it takes less work once hardware needs to be replaced.
I have some doubts on option F, as I understand C fits better: "Ownership: ... When assets are assigned to specific owners, it becomes easier to enforce accountability for their condition and usage. ... Access control mechanisms, such as user authentication and authorization are often tied to ownership to ensure that only authorized individuals can interact with the asset" . Ian Neil SY0-701 Cert. Guide
based on prof messer study guide i think AF are correct.
A. This ensures timely response and accountability. C. ensures that the tokens are issued to and used by the correct devices.
I choose C and F because it more relates aligns with data security more than the other options. If there is security beach, why would I notify the employee? Everyone is considered a suspect until proven otherwise, so choice A is out for me. The other options can be use as well but C & F fits to what this exam is all about.
A. If a security incident occurs on the device, the correct employee can be notified. Associating devices with employee IDs allows the security team to quickly identify and notify the responsible employee in the event of a security incident. This helps in taking prompt action and mitigating potential risks. C. Users can be mapped to their devices when configuring software MFA tokens. By mapping devices to specific employees, it becomes easier to configure and manage software multi-factor authentication (MFA) tokens, ensuring that the correct tokens are assigned to the correct users and their associated devices.
Answer: A & C A: In in the event of a security incident security team can quickly identify and notify the responsible employee. C: With this ensures that MFA tokens are correctly assigned to the appropriate users and devices.
AF makes the most sense, since most of us agree on F I say A is correct because if an incident occurs knowing the proper person(s) is critical to mitigate the attack.
A. If a security incident occurs on the device, the correct employee can be notified. F. Company data can be accounted for when the employee leaves the organization.