exam questions

Exam SY0-601 All Questions

View all questions & answers for the SY0-601 exam

Exam SY0-601 topic 1 question 447 discussion

Actual exam question from CompTIA's SY0-601
Question #: 447
Topic #: 1
[All SY0-601 Questions]

A systems administrator is required to enforce MFA for corporate email account access, relying on the possession factor. Which of the following authentication methods should the systems administrator choose? (Choose two.)

  • A. Passphrase
  • B. Time-based one-time password
  • C. Facial recognition
  • D. Retina scan
  • E. Hardware token
  • F. Fingerprints
Show Suggested Answer Hide Answer
Suggested Answer: BE 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Atlstorageguy
1 year, 3 months ago
This question is not realistic and made up just to confuse everyone. MFA means multiple factors but they only ask about something you possess which I assume means something you have but we also possess fingerprints and a face. This question was specifically designed to confuse and is not realistic in a real cybersecurity situa
upvoted 3 times
SecNoob27639
1 year, 1 month ago
Except that the fingerprints and face more fall into the "Something You Are" category. I think of something I have as a physical item I can lose. I can't lose my face, and I can't really lose my fingerprints (I mean, yes, burns to the fingers severe enough could remove them, but I can't lose them the same way I lose my keys.) A hardware token, like a YubiKey, is a second auth factor. There are also OTP tokens that display a OTP code when you press a button on them. Either one is an effective second factor in a MFA setting.
upvoted 2 times
...
...
slapster
1 year, 4 months ago
Selected Answer: BE
The question only specifies "possession," so we should be thinking about 'something you have.' Answers C, D, and F are all 'something you are,' so those are out. B and E are both 'something you have.' Even though the question specifies that MFA is being implemented, we are not asked to determine the scope of the MFA -- it only mentions possession. The question doesn't mention 'something you know' just like it doesn't mention 'something you are.' Based on that deduction, I am inclined to rule out A on the same basis for ruling out C, D, and E. If i am wrong and we are supposed to outline the full scope of the MFA, why would we select 'something you know' (answer A) over 'something you are' (C, D, F) when there is no mention of either in the question?
upvoted 4 times
...
david124
1 year, 5 months ago
Selected Answer: AE
Its It's MFA so there must be at least two different factors used it cannot possibly be BE. I say AE
upvoted 4 times
...
cyberPunk28
1 year, 6 months ago
Selected Answer: BE
B. Time-based one-time password E. Hardware token
upvoted 1 times
...
ganymede
1 year, 6 months ago
Selected Answer: AB
A. Passphrase B. Time-based one-time password It's MFA so there must be at least two different factors used. One of them must be a possession Factor (something you have). Passphrase: Something you know TOTP: Something you have (smart phone)
upvoted 3 times
...
Ilginz
1 year, 7 months ago
My answer is also BE but in the book they say that when both factors are 'something you have,' it doesn't count as multi-factor authentication. I have solved all the questions according to this until now. :(
upvoted 2 times
...
sujon_london
1 year, 9 months ago
Selected Answer: BE
The possession factor refers to something the user has, such as a physical device. Time-based one-time passwords (TOTP) are generated by an app or a dedicated device and are valid only for a short period of time. Hardware tokens are physical devices, such as smart cards or USB tokens, that generate or store unique authentication information. Fingerprints, rational scan n facial recognition would not be an appropriate choice in this case, as they rely on the inherence factor (something the user is) rather than the possession factor.
upvoted 4 times
...
Gamsje
1 year, 11 months ago
Selected Answer: BE
B. Time-based one-time password E. Hardware token
upvoted 2 times
...
fouserd
2 years, 1 month ago
Selected Answer: BE
The systems administrator should choose Time-based one-time password (Option B) and Hardware token (Option E) as authentication methods to enforce MFA for corporate email account access. Both of these methods rely on the possession factor, which means that the user must have a specific device or object in their possession to authenticate. A passphrase (Option A) is a knowledge factor, while facial recognition (Option C), retina scan (Option D), and fingerprints (Option F) are all inherence factors.
upvoted 4 times
...
mouettespaghetti
2 years, 1 month ago
-BE is correct The following authentication methods are not possession factors, and therefore are not suitable for the scenario described: A. Passphrase: A passphrase is a sequence of words or other text used to authenticate a user. While it can be a strong authentication factor, it is not a possession factor as the user does not need to physically possess anything to enter their passphrase. C. Facial recognition and F. Fingerprints: Facial recognition and fingerprints are examples of biometric authentication factors, which rely on unique physical characteristics to authenticate a user. While they can be secure, they are not possession factors as the user does not need to physically possess anything to use them. D. Retina scan: A retina scan is also an example of a biometric authentication factor, and is not a possession factor for the same reasons as facial recognition and fingerprints.
upvoted 3 times
workhard
2 years, 1 month ago
Completely agree. Just to add, while B and E are possession factors (something you have), A is a knowledge factor (something you know) and CDF are inherence factor (something you are).
upvoted 4 times
david124
1 year, 5 months ago
I am sorry to say, you're both wrong. It's MFA "Multi Factor Authentication"...."Multi" You can't have two of the same factor, one has to be different
upvoted 2 times
klinkklonk
1 year, 5 months ago
Your logic is sound, but remember that this is CompTIA
upvoted 2 times
...
...
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...