exam questions

Exam SY0-601 All Questions

View all questions & answers for the SY0-601 exam

Exam SY0-601 topic 1 question 45 discussion

Actual exam question from CompTIA's SY0-601
Question #: 45
Topic #: 1
[All SY0-601 Questions]

A company suspects that some corporate accounts were compromised. The number of suspicious logins from locations not recognized by the users is increasing.
Employees who travel need their accounts protected without the risk of blocking legitimate login requests that may be made over new sign-in properties. Which of the following security controls can be implemented?

  • A. Enforce MFA when an account request reaches a risk threshold.
  • B. Implement geofencing to only allow access from headquarters.
  • C. Enforce time-based login requests that align with business hours.
  • D. Shift the access control scheme to a discretionary access control.
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
stoneface
Highly Voted 2 years, 10 months ago
Selected Answer: A
Enforce MFA is the most convenient way
upvoted 16 times
varun0
2 years, 10 months ago
Agreed
upvoted 5 times
...
...
rodwave
Highly Voted 2 years, 7 months ago
Selected Answer: A
Answer: Enforce MFA when an account request reaches a risk threshold. This is likely the most convenient implementation that would work for all employees as an additional element(s) would need to be needed for authentication/authorization. ======================== (B) - Implementing geofencing to only allow access from headquarters might stop the suspicious logins, however, it would be inconvenient for employees not physically located near headquarters such as the traveling employees. (C) Enforcing time-based login requests to align with business hours could also be inconvenient for traveling/global employees that work in different times compared the business's normal business hours. (D) With Discretionary access control, the owner of a resource can decide who can have access to the resource and you can modify the access at anytime. The option to shift the access control scheme to a discretionary access control wouldn't really address the login issue either if the account of someone who is authorized to access a resource was compromised. The attacker can still access the resource using their credentials.
upvoted 15 times
...
MortG7
Most Recent 1 year, 8 months ago
A is the correct answer, however, any security admin worth their salt would have it enforced already..it is a no brainer...why wait for a damn threshold.
upvoted 6 times
JarnBarn
1 year, 7 months ago
LOLZ. Was hoping to find this comment verbatim.
upvoted 1 times
...
GenerativeAI
1 year, 5 months ago
True. I agree with you brother. 🤝
upvoted 2 times
...
...
Protract8593
1 year, 11 months ago
Selected Answer: A
Enforcing Multi-Factor Authentication (MFA) when an account request reaches a risk threshold is an appropriate security control in this scenario. MFA adds an extra layer of security by requiring users to provide additional authentication factors, such as a one-time code sent to their mobile device, in addition to their password. By setting a risk threshold and triggering MFA when suspicious logins from unrecognized locations are detected, the company can protect corporate accounts without unnecessarily blocking legitimate login requests made from new sign-in locations during employee travel.
upvoted 3 times
...
Selected Answer: A
Implementing MFA adds an extra layer of security to the authentication process by requiring users to provide multiple forms of verification, such as a password and a one-time code generated on their mobile device or a biometric factor like a fingerprint. By setting a risk threshold, such as detecting suspicious login activity from unrecognized locations, the system can automatically trigger the enforcement of MFA. This helps to mitigate the risk of unauthorized access even if the credentials have been compromised.
upvoted 1 times
...
ronniehaang
2 years, 5 months ago
Selected Answer: A
A. Enforce MFA when an account request reaches a risk threshold. Multi-Factor Authentication (MFA) is an effective security control to mitigate the risk of unauthorized access to corporate accounts. By requiring an additional factor of authentication, such as a one-time code sent to a user's phone or a fingerprint scan, MFA can help prevent attackers from accessing an account even if they have stolen a password. By implementing MFA only when an account request reaches a risk threshold, the company can ensure that employees who travel and need their accounts protected will not be negatively impacted by the security control, while still providing an extra layer of security for those accounts that are at higher risk of being compromised.
upvoted 1 times
...
KingDrew
2 years, 5 months ago
Selected Answer: A
MFA increases security because even if one credential becomes compromised, unauthorized users will be unable to meet the second authentication requirement and will not be able to access the targeted physical space, computing device, network, or database.
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...