An organization secures its network with multi-factor authentication using an authenticator app on employee smartphones. How is the application secured in the case of a user's smartphone being lost or stolen?
A.
The application requires the user to enter a PIN before it provides the second factor
B.
The application requires an administrator password to reactivate after a configured interval
C.
The application verifies that the user is in a specific location before it provides the second factor
D.
The application challenges a user by requiring an administrator password to reactivate when the smartphone is rebooted
That's what happens in GooglePay where you first enter a PIN and after entering the app, and before making the transaction you have to provide the password as a second factor.
That is not MFA. PIN is something you know Password is also something you know. For it to be multi-factor you must have more than 1 factor. In this case you have only demonstrated the use of 1 factor. The 3 categories are something you know, something you have, and something you are. Something you have is like an authentication app or device. Something you are is biometric such as finger printing.
Definitely A, the user is not likely to know the admin pass and a location is not a secure factor, but a pin is a typical factor that a user would know/have.
Must be: A
Because B asks for (Administrator Password) which I'm not sure if in this case will be different from: "User Password" and what's more important than that is that B, doesn't mention anything about the "second-factor Authentication"
Personally, I think the answer is 'B' due to the question stating "how is the application secure after the smartphone is stolen or lost?" The Answer (A) given here does not answer this question.
Not very realistic as you would need someone who knows the admin password to type it it to employees' phones from time to time. Not very scalable, might work for small businesses though.
If the admin password is entered and the phone is stolen before the time interval ends, it is not secure for that time interval
upvoted 2 times
...
...
This section is not available anymore. Please use the main Exam Page.200-301 Exam Questions
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
cormorant
Highly Voted 2 years, 1 month agoDunedrifter
1 year, 5 months agoDunedrifter
1 year, 5 months ago[Removed]
Most Recent 8 months, 4 weeks agoac89l
1 year, 7 months agocreaguy
2 years, 2 months agodipanjana1990
2 years, 4 months agoRougePotatoe
2 years, 1 month agoBraveBadger
2 years, 7 months agoRob2000
3 years, 2 months agoperrilos
3 years, 2 months agoRougePotatoe
2 years, 1 month agoNicocisco
2 years, 10 months ago