exam questions

Exam CS0-002 All Questions

View all questions & answers for the CS0-002 exam

Exam CS0-002 topic 1 question 169 discussion

Actual exam question from CompTIA's CS0-002
Question #: 169
Topic #: 1
[All CS0-002 Questions]

The majority of a company's employees have stated they are unable to perform their job duties due to outdated workstations, so the company has decided to institute BYOD. Which of the following would a security analyst MOST likely recommend for securing the proposed solution?

  • A. A Linux-based system and mandatory training on Linux for all BYOD users
  • B. A firewalled environment for client devices and a secure VDI for BYOD users
  • C. A standardized anti-malware platform and a unified operating system vendor
  • D. 802.1X to enforce company policy on BYOD user hardware
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
IanRogerStewart
Highly Voted 2 years, 3 months ago
Selected Answer: D
VDI from the BYOD device onto the company hardware isn't going to help the performance problems. NAC (802.1X) will allow the company to ensure only compliant equipment connects although in the real world it would just be simpler to buy new workstations!!!
upvoted 11 times
2Fish
2 years, 1 month ago
Agree. If the device is non-compliant, it may be denied access to the network or placed in a quarantined or restricted network segment where it can be remediated before being granted full access to the network. This can help to ensure that devices connecting to the network meet the organization's security requirements.
upvoted 1 times
...
novolyus
1 year, 5 months ago
No, you cannot reach this with only 802.1X.
upvoted 1 times
...
uday1985
1 year, 7 months ago
How its not going to help? where they using VDI earlier ? VDI confirm that the devices used by employee are up to standards and the traffic is monitored by using the firewall. How d oyou plan to achieve that using 802.1X
upvoted 1 times
...
heinzelrumpel
1 year, 9 months ago
Don't agree. The company cannot control whats on the BYOD devices nor can the company force user to install a company software on personally owned devices. What if a device is not compliant due to policies? The employee gets to go home an chill?
upvoted 3 times
heinzelrumpel
1 year, 9 months ago
NAC, as mentioned above, in this scenario is only 802.1x. Nothing more, just simple Authentication checking. It is not able to enforce any other policies which might be implied ont the BYOD
upvoted 6 times
...
...
...
Sepu
Highly Voted 2 years ago
Selected Answer: D
What is the point of BYOD if you are going to use a VDI anyway? The answer is D. NAC will do the job.
upvoted 5 times
kiduuu
2 years ago
That make sense !
upvoted 1 times
...
uday1985
1 year, 7 months ago
Maybe use VDI to control and secure the work environment that the user access? did you hear about Amazon Workspace before?
upvoted 1 times
...
...
ChopSNap
Most Recent 5 months, 2 weeks ago
Selected Answer: B
802.1x is only for authentication, both users and devices. VDI will provide a controlled environment with dedicated hardware that meets performance benchmarks for the BYOD devices to connect to. Users could use the same form-factor workstations that are causing the performance issues to run VDI, and get improved performance - if the VDI is hosted on upscaled hardware.
upvoted 1 times
...
RobV
1 year, 4 months ago
Selected Answer: B
Option D, which mentions 802.1X to enforce company policy on BYOD user hardware, is a valid security measure, and it may be part of an overall security strategy. 802.1X is a network access control (NAC) standard that provides a mechanism for authenticating devices trying to connect to a network. However, it alone may not be sufficient to address all security concerns related to BYOD. The reason Option B may be a stronger choice is that it incorporates both a firewalled environment for client devices and a secure Virtual Desktop Infrastructure (VDI) for BYOD users. This combination offers a more comprehensive approach to security. The firewalled environment adds a layer of protection for client devices, and VDI allows for centralized control and management of the virtual desktops, reducing the potential risks associated with diverse and potentially less-secure BYOD hardware.
upvoted 1 times
...
32d799a
1 year, 5 months ago
Selected Answer: B
B. A firewalled environment for client devices and a secure VDI for BYOD users This option suggests implementing a firewalled environment for client devices, which helps protect against unauthorized access and potential security threats. Additionally, using a secure Virtual Desktop Infrastructure (VDI) for BYOD users can provide a controlled and secure environment for accessing company resources, minimizing the risk of compromising sensitive data.
upvoted 1 times
...
novolyus
1 year, 5 months ago
Selected Answer: B
VDI acts like a jumphost where only applications and services required are enabled. 802.1X is nothing more than authentication. How do you control an endpoint with ramsonware, worms, RATs, outdated software,... You cannot check if a device is compliant only with 802.1X
upvoted 1 times
...
d8viey
1 year, 6 months ago
Selected Answer: B
Here’s why this is the best option: A VDI environment allows the company to control the operating system and applications that the employees use for their work, regardless of the employee’s personal device. This setup keeps company data within the company’s controlled environment and does not store sensitive data on the employee’s personal device. A firewalled environment helps to protect the network by managing traffic to and from the VDI and the client devices, thus reducing the risk of malware or data exfiltration. 802.1X provides network port-based access control which is useful for authenticating devices that connect to the network. However, it does not address the security of the data on the devices themselves and how the devices are used outside of the network's environment.
upvoted 1 times
...
skibby16
1 year, 6 months ago
Selected Answer: B
A firewalled environment for client devices and a secure VDI (Virtual Desktop Infrastructure) for BYOD users would be the most likely recommendation for securing the proposed solution. A firewalled environment can help isolate and protect the client devices from unauthorized network access or attacks. A secure VDI can provide a virtualized desktop environment for BYOD users that can be centrally managed and controlled by the organization. A VDI can also prevent data leakage or malware infection from BYOD devices, as the data and applications are stored on the server side rather than on the device itself
upvoted 1 times
...
heinzelrumpel
1 year, 9 months ago
Selected Answer: B
B only seems logical to me. Using VDI makes the BYOD a dump device that does not need to have much power. Seprating the BYOD devices is always a good idea. On th eother hand the old Workstation could function as ThinClient to the VDI infrastructure. Tough choice here.
upvoted 2 times
...
kiduuu
2 years ago
Selected Answer: D
The answer is in the question put by Sepu !!!
upvoted 1 times
...
chuck165
2 years, 3 months ago
D. There is no point to for BYOD if you’re to force users into VDIs anyway, just use the outdated workstations. The firewall would also not protect the BYOD machine from infecting each other. 802.1x supplicants can absolutely be used to force devices to be updated before allowing them on the network.
upvoted 4 times
...
absabs
2 years, 3 months ago
Selected Answer: B
802.1X protect network, question focus on hardware security so i going with B.
upvoted 2 times
...
mrodmv
2 years, 4 months ago
Selected Answer: B
legally you can't enforce policies on devices that aren't yours...
upvoted 2 times
josephconer1
2 years, 1 month ago
Yeah but you can enforce policies on your own network that have set conditions for devices. D is still valid
upvoted 1 times
...
...
TryingOverHrere
2 years, 5 months ago
Selected Answer: B
802.1X is an authentication framework, and to my knowledge does nothing to prevent infected devices from connecting to the network nor does enforcing company policy on user hardware is in any way better than having BYOD users connect to the company resources through secure VDIs from their personal device. in addition 802.1X does nothing for remote users.
upvoted 2 times
...
CatoFong
2 years, 5 months ago
Selected Answer: B
Correct Answer is B 802.1x has nothing to do with the question.
upvoted 1 times
...
MrRobotJ
2 years, 5 months ago
Selected Answer: D
it is D
upvoted 1 times
...
JustinRG
2 years, 5 months ago
Selected Answer: D
After reviewing 802.1x, it can keep infected machines from connecting to the network.
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago