exam questions

Exam 220-1101 All Questions

View all questions & answers for the 220-1101 exam

Exam 220-1101 topic 1 question 580 discussion

Actual exam question from CompTIA's 220-1101
Question #: 580
Topic #: 1
[All 220-1101 Questions]

Following a security breach that revealed employee username and password information, an organization would like to implement additional security for users logging in to company devices. Which of the following would be the best solution for the organization to use?

  • A. Biometric authentication
  • B. Peer-reviewed log-ins
  • C. Log-in scripts
  • D. One-time tokens
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Nate_A
Highly Voted 5 months, 2 weeks ago
A. Biometric authentication Biometric authentication, such as fingerprint or facial recognition, adds an extra layer of security by verifying a user's identity based on unique physical characteristics. This makes it significantly harder for unauthorized individuals to gain access to company devices. The other options are not as effective: B. Peer-reviewed log-ins: This is not a standard security practice and is not effective in preventing unauthorized access. C. Log-in scripts: Log-in scripts can automate the login process but do not add additional security layers. D. One-time tokens: While one-time tokens can add an extra layer of security, biometric authentication is generally considered more secure and convenient. By implementing biometric authentication, the organization can significantly enhance the security of its devices and protect sensitive information. GG
upvoted 5 times
...
Microdust
Highly Voted 7 months, 3 weeks ago
Selected Answer: D
I am leaning towards D for this one. Not all the laptops (especially where BYOD is allowed) will have that finger sensor, therefore harder and expensive to implement quickly. For OTP, there are Apps already out there (e.g. RSA SecurID, Google, Windows Authenticator)
upvoted 5 times
...
Torrente
Most Recent 3 weeks, 3 days ago
Selected Answer: A
Biometric authentication provides a high level of security by using unique biological traits such as fingerprints, facial recognition, or iris scans. Since a security breach exposed usernames and passwords, implementing biometric authentication ensures that only authorized users can access company devices—even if their credentials have been compromised.
upvoted 1 times
...
JonHin
2 months, 1 week ago
A is incorrect D is the correct answer In response to a security breach involving compromised credentials, one-time tokens provide an effective method to enhance authentication security. These tokens are part of multi-factor authentication (MFA) and generate unique codes for each login attempt, ensuring that even if credentials are stolen, unauthorized access is prevented. Why One-time Tokens? One-time tokens are dynamic and expire after a single use, significantly reducing the risk of unauthorized access even if usernames and passwords are compromised. Often delivered through apps like Google Authenticator, hardware tokens, or SMS.
upvoted 1 times
JonHin
2 months, 1 week ago
Incorrect Options: A. Biometric authentication: While secure, it may not address all scenarios and requires additional hardware. B. Peer-reviewed log-ins: Not a valid security measure. C. Log-in scripts: Used for automating login configurations but do not enhance security directly. CompTIA A+ Exam Objectives References: 220-1102 (Core 2), Section 2.1 and 2.2: Discuss security measures, including multi-factor authentication and one-time token implementations
upvoted 1 times
...
...
Nickem10Times
2 months, 3 weeks ago
Selected Answer: D
This one is tough because it could be either A or D. I would think the company would go the less expensive route. So, I'm going with D.
upvoted 2 times
...
CloudChef
5 months, 2 weeks ago
Selected Answer: A
Biometric authentication provides an added layer of security by using unique biological traits (such as fingerprints, facial recognition, or iris scans) to verify user identity. Since the breach revealed usernames and passwords, adding biometrics ensures that even if a password is compromised, the attacker would still need to provide the user's biometric data to access the device, greatly enhancing security.
upvoted 3 times
...
dvdlau
8 months ago
A. Biometric authentication
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago