exam questions

Exam SY0-601 All Questions

View all questions & answers for the SY0-601 exam

Exam SY0-601 topic 1 question 118 discussion

Actual exam question from CompTIA's SY0-601
Question #: 118
Topic #: 1
[All SY0-601 Questions]

A security proposal was set up to track requests for remote access by creating a baseline of the users' common sign-in properties. When a baseline deviation is detected, an MFA challenge will be triggered. Which of the following should be configured in order to deploy the proposal?

  • A. Context-aware authentication
  • B. Simultaneous authentication of equals
  • C. Extensive authentication protocol
  • D. Agentless network access control
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
stoneface
Highly Voted 2 years, 10 months ago
Selected Answer: A
Context-Aware authentication -> An access control scheme that verifies an object's identity based on various environmental factors, like time, location, and behavior.
upvoted 61 times
J_Ark1
2 years, 7 months ago
yes i agree
upvoted 1 times
...
...
Protract8593
Highly Voted 1 year, 11 months ago
Selected Answer: A
Context-aware authentication is a form of authentication that takes into account various factors or context information when determining whether to grant access to a user. In the given scenario, the security proposal aims to track requests for remote access by creating a baseline of the users' common sign-in properties. When a deviation from this baseline is detected, an MFA (Multi-Factor Authentication) challenge will be triggered. Context-aware authentication fits this scenario well as it can analyze multiple contextual factors such as user behavior, location, time, device, and more to make an informed decision about whether additional authentication steps are required.
upvoted 7 times
...
LordJaraxxus
Most Recent 1 year, 4 months ago
Selected Answer: A
Context-aware authentication uses multiple elements to authenticate a user and a mobile device. It can include the user’s identity, geolocation, verification that the device is within a geofence, time of day, and type of device. These elements help prevent unauthorized users from accessing apps or data.
upvoted 1 times
...
ApplebeesWaiter1122
1 year, 11 months ago
Selected Answer: A
Context-aware authentication is the appropriate choice for the security proposal described. Context-aware authentication takes into consideration various factors or context elements, such as user behavior, location, device, time of access, and more, to assess the risk associated with a specific authentication attempt. In this scenario, the proposal aims to track requests for remote access and create a baseline of users' common sign-in properties. When a deviation from the baseline is detected, an MFA challenge is triggered. Context-aware authentication allows for the evaluation of various contextual factors to determine whether the sign-in properties match the expected baseline or not. If a deviation is detected, the system can enforce the MFA challenge to provide an additional layer of security for remote access.
upvoted 4 times
...
Gravoc
2 years, 9 months ago
Context: "The circumstances that form the setting for an event, statement, or idea, and in terms of which it can be fully understood and assessed." CAA is likely correct, as the context is that the login attempt deviates from the baseline, triggering an additional authentication layer.
upvoted 4 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...