A user keeps a company-provided camera's battery charger plugged into a docking station at a desk. Company policy requires that USB devices be identified and approved by installed peripheral security software. A technician is unable to add a unique identifier to the battery charger's security software. Which of the following should the technician do?
Correct Answer: A
Explanation
The problem in this scenario is that the battery charger is not a USB device, but a device that plugs into a USB port to draw power. Therefore, it does not have a unique identifier that can be recognized by the peripheral security software, which is designed to prevent unauthorized USB devices from accessing the company's network or data. The security software cannot add the battery charger to its whitelist, and may block its power supply or generate alerts.
The best solution for this problem is to provide a USB to AC adapter for the battery charger, which is a device that converts the USB power output to an AC power input that can be plugged into a wall outlet. This way, the battery charger does not need to connect to the docking station or the computer, and does not trigger the peripheral security software. The user can still charge the camera's battery without compromising the company's security policy.
The other options are not advisable because they either do not solve the problem or create new risks. Option B, adding a powered USB hub to the docking station, may not work if the security software also monitors the hub's ports and detects the battery charger as an unknown device. Option C, disabling the peripheral security software for this user only, is a very bad idea because it exposes the user's computer and the company's network to potential attacks from malicious USB devices. Option D, replacing the battery charger with a USB device that has a unique identifier, is unnecessary and costly, and may not be compatible with the camera's battery.
References:
CompTIA A+ Core 1 (220-1101) Certification Study Guide, Chapter 9: Security, Section 9.3: Device Security, Page 419 CompTIA A+ Core 1 (220-1101) and Core 2 (220-1102) Pearson uCertify Course and Labs and Textbook Bundle, Chapter 9: Security, Section 9.3: Device Security, Page 420 CompTIA A+ Core 1 (220-1101) and Core 2 (220-1102) Exam Cram, Chapter 9: Security, Section 9.3:
Device Security, Page 402