Which control is used to deter theft by anchoring devices to a fixed object?

Prepare for the CompTIA Tech+ (FC0-U71) Exam. Study with flashcards, multiple-choice questions, hints, and explanations to increase your exam readiness and confidence.

Multiple Choice

Which control is used to deter theft by anchoring devices to a fixed object?

Explanation:
In physical security, deterring theft of portable equipment is achieved by anchoring the item to a fixed object using a cable lock. A cable lock wraps around the device and a sturdy, immovable anchor, then locks, making it very difficult to remove quickly. This increases the time and effort required for a would-be thief and raises the chances they’ll be noticed or abandon the attempt. It’s a common safeguard for laptops, projectors, and other portable gear in offices and classrooms. The other options focus on digital security or access control rather than physically securing equipment: USB locks relate to port access, while password practices and length pertain to authentication. Anchoring devices with a cable lock directly addresses theft deterrence by keeping the device attached to a fixed object.

In physical security, deterring theft of portable equipment is achieved by anchoring the item to a fixed object using a cable lock. A cable lock wraps around the device and a sturdy, immovable anchor, then locks, making it very difficult to remove quickly. This increases the time and effort required for a would-be thief and raises the chances they’ll be noticed or abandon the attempt. It’s a common safeguard for laptops, projectors, and other portable gear in offices and classrooms. The other options focus on digital security or access control rather than physically securing equipment: USB locks relate to port access, while password practices and length pertain to authentication. Anchoring devices with a cable lock directly addresses theft deterrence by keeping the device attached to a fixed object.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy