Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

CompTIA Exam 220-1102 Topic 2 Question 44 Discussion

Actual exam question for CompTIA's 220-1102 exam
Question #: 44
Topic #: 2
[All 220-1102 Questions]

A company's help desk receives numerous calls from employees reporting issues related to a current security breach. Which of the following steps should the help desk team take to document the breach?

Show Suggested Answer Hide Answer
Suggested Answer: A

In the event of a security breach, documenting the incident is crucial for tracking, analysis, and resolution. The appropriate steps should ensure thorough documentation and communication:

Option A: Record the details in the ticketing system. Correct Answer. The ticketing system is the primary tool for IT support to track incidents. Recording the details in the ticketing system ensures that all relevant information is documented systematically, can be easily accessed, and tracked through the resolution process.

This aligns with best practices in incident documentation and support systems information management as outlined in the CompTIA A+ Core 2 (220-1102) Exam Objectives, Section 4.1.

Option B: Take screenshots and attach them to the root cause analysis. While screenshots can be useful, the first step should be to record the details in the ticketing system. Screenshots may be added later as supplementary information.

Option C: Discuss the incident with the company's legal team. Involving the legal team is important for certain aspects of a security breach, but the initial step should still be to document the incident in the ticketing system.


Contribute your Thoughts:

Youlanda
8 days ago
Hmm, the ticketing system, huh? That's like trying to put out a fire with a squirt gun. Let's get serious about this breach, people!
upvoted 0 times
...
Tammara
9 days ago
The knowledge base, eh? That's where all the juicy details go to die. Let's not bury this one, folks.
upvoted 0 times
...
Larae
12 days ago
Discuss it with the legal team? Sounds like a job for the big guns. Bring out the lawyers, it's about to get real!
upvoted 0 times
...
Georgiana
23 days ago
Screenshots are a must! I once had a security breach where the only evidence was a blurry photo taken on a potato. Let's not make that mistake again.
upvoted 0 times
Lorita
12 hours ago
Screenshots are definitely important to have as evidence in case of a security breach.
upvoted 0 times
...
Maurine
2 days ago
B) Take screenshots and attach them to the root cause analysis.
upvoted 0 times
...
Kent
16 days ago
A) Record the details in the ticketing system.
upvoted 0 times
...
...
Maira
1 months ago
Taking screenshots and attaching them to the root cause analysis could also be helpful for further investigation.
upvoted 0 times
...
Olive
1 months ago
I agree with Annelle, it's important to have a documented record of the breach.
upvoted 0 times
...
Verdell
1 months ago
Record the details in the ticketing system? Duh, that's a no-brainer! You gotta document everything for the auditors, am I right?
upvoted 0 times
Aleisha
15 days ago
D) List the details in the company's knowledge base.
upvoted 0 times
...
Nohemi
17 days ago
C) Discuss the incident with the company's legal team.
upvoted 0 times
...
Celeste
27 days ago
B) Take screenshots and attach them to the root cause analysis.
upvoted 0 times
...
Tawna
1 months ago
A) Record the details in the ticketing system.
upvoted 0 times
...
...
Annelle
1 months ago
I think we should record the details in the ticketing system.
upvoted 0 times
...

Save Cancel