A security engineer was assigned to implement a solution to prevent attackers from gaining access by pretending to be authorized users. Which of the following technologies meets the requirement?
answer is B:
Asymmetric key algorithms use a public
key for encryption and a private key for
decryption. Examples include the RSA,
Diffie-Hellman, El Gamal, and elliptic curve
cryptography standards
TPM may be used in practical scenarios at it helps in device attestation which is a form of phishing resistant passwordless authentication. But with regards to the exam, its MFA.
The attackers are trying to get in by pretending to be someone who is allowed right? SSO doesnt help to prevent attackers from fooling the system. SSO is just using username and password often in a federation setting. MFA makes the attacker have two different things to sign on (such as password and fingerprint). So MFA would be the answer
Multi-Factor Authentication (MFA) is a security mechanism that requires users to provide two or more forms of identification before gaining access to a system. It is designed to prevent attackers from gaining access by pretending to be authorized users because they would need to provide multiple pieces of evidence to prove their identity.
MFA adds an extra layer of security by requiring users to provide multiple forms of identification or verification before accessing a system or application. It typically combines something the user knows (such as a password), something the user has (such as a physical token or mobile device), or something the user is (such as biometric data) to authenticate their identity.
By implementing MFA, even if an attacker manages to obtain or guess a user's password, they would still need the additional factor (such as a physical token or biometric data) to successfully authenticate as the authorized user.
YEs MFA is a technology. Multifactor authentication (MFA) is a security technology that requires multiple methods of authentication from independent categories of credentials to verify a user's identity for a login or other transaction.
upvoted 2 times
...
...
...
This section is not available anymore. Please use the main Exam Page.SY0-601 Exam Questions
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
VEE224
1 year, 6 months agoNetworkTester1235
1 year, 3 months agor57ah__
1 year, 7 months agoProCoder101
1 year, 3 months agomm777
1 year, 10 months agoCopmp
1 year, 10 months agoProtract8593
1 year, 11 months agoApplebeesWaiter1122
1 year, 12 months agoDALLASCOWBOYS
2 years, 5 months agocomeragh
2 years, 10 months agoJosh_Feng
2 years, 10 months agoPapee
2 years, 8 months agoEubertT
2 years, 7 months ago