ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 530 - 220-1101 discussion

Report
Export

A user keeps a company-provided camera's battery charger plugged into a docking station at a desk. Company policy requires that USB devices be identified and approved by installed peripheral security software. A technician is unable to add a unique identifier to the battery charger's security software. Which of the following should the technician do?

A.
Provide a USB to AC adapter for the battery charger.
Answers
A.
Provide a USB to AC adapter for the battery charger.
B.
Add a powered USB hub to the docking station.
Answers
B.
Add a powered USB hub to the docking station.
C.
Disable the peripheral security software for this user only.
Answers
C.
Disable the peripheral security software for this user only.
D.
Replace the battery charger with a USB device that has a unique identifier.
Answers
D.
Replace the battery charger with a USB device that has a unique identifier.
Suggested answer: A

Explanation:

The problem in this scenario is that the battery charger is not a USB device, but a device that plugs into a USB port to draw power. Therefore, it does not have a unique identifier that can be recognized by the peripheral security software, which is designed to prevent unauthorized USB devices from accessing the company's network or data. The security software cannot add the battery charger to its whitelist, and may block its power supply or generate alerts.

The best solution for this problem is to provide a USB to AC adapter for the battery charger, which is a device that converts the USB power output to an AC power input that can be plugged into a wall outlet. This way, the battery charger does not need to connect to the docking station or the computer, and does not trigger the peripheral security software. The user can still charge the camera's battery without compromising the company's security policy.

The other options are not advisable because they either do not solve the problem or create new risks. Option B, adding a powered USB hub to the docking station, may not work if the security software also monitors the hub's ports and detects the battery charger as an unknown device. Option C, disabling the peripheral security software for this user only, is a very bad idea because it exposes the user's computer and the company's network to potential attacks from malicious USB devices. Option D, replacing the battery charger with a USB device that has a unique identifier, is unnecessary and costly, and may not be compatible with the camera's battery.

CompTIA A+ Core 1 (220-1101) Certification Study Guide, Chapter 9: Security, Section 9.3: Device Security, Page 419

CompTIA A+ Core 1 (220-1101) and Core 2 (220-1102) Pearson uCertify Course and Labs and Textbook Bundle, Chapter 9: Security, Section 9.3: Device Security, Page 420

CompTIA A+ Core 1 (220-1101) and Core 2 (220-1102) Exam Cram, Chapter 9: Security, Section 9.3: Device Security, Page 402

asked 02/10/2024
Morris Djavaheri
29 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first