exam questions

Exam N10-008 All Questions

View all questions & answers for the N10-008 exam

Exam N10-008 topic 1 question 235 discussion

Actual exam question from CompTIA's N10-008
Question #: 235
Topic #: 1
[All N10-008 Questions]

When accessing corporate network resources, users are required to authenticate to each application they try to access. Which of the following concepts does this
BEST represent?

  • A. SSO
  • B. Zero Trust
  • C. VPN
  • D. Role-based access control
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
K5875
Highly Voted 1 year, 10 months ago
Selected Answer: B
SSO is the complete opposite of what the question is asking. C and D do not apply and make 0 sense. Thus, B is the correct answer and based on a google search, it makes sense.
upvoted 6 times
...
MitchF
Most Recent 11 months, 2 weeks ago
GPT and Bing AI pick (D). This is GPT: "When accessing corporate network resources and being required to authenticate to each application individually, this concept BEST represents (D) Role-based access control (RBAC). Role-based access control (RBAC) is a security approach where access to network resources is determined by a user's role within an organization. Each user is assigned specific roles or permissions that grant access to certain applications, data, and resources based on their job responsibilities and needs. This helps in ensuring that users have access only to the resources relevant to their roles, reducing the risk of unauthorized access.
upvoted 1 times
MitchF
11 months, 2 weeks ago
The other options have different meanings: (A) Single Sign-On (SSO): SSO is a method where users authenticate once and gain access to multiple applications and services without needing to re-enter credentials for each application. This is the opposite of the scenario described. (B) Zero Trust: Zero Trust is a security model that assumes no implicit trust, requiring verification of all users and devices trying to access network resources. While related to security, it doesn't specifically address the requirement to authenticate to each application separately. (C) Virtual Private Network (VPN): A VPN is a secure connection used to access a private network over a public network. It doesn't directly relate to the scenario of requiring individual authentication for each application."
upvoted 1 times
...
...
TheFivePips
11 months, 2 weeks ago
Selected Answer: B
Nothing in the questions mentions roles at all. This is definitly Zero trust. Everyone must authenticate every time.
upvoted 4 times
...
famco
1 year, 3 months ago
After arguing with chatgpt on this: In summary, the concept that best represents the scenario described in the question is the Zero Trust security model, as it requires users to authenticate and verify their identity each time they attempt to access a resource, even if they have previously authenticated. But a bad question. In my opinion it is not RBAC because it can also be used with SSO and also separate authentication for each. But it all depends on the knowledge level of the question creator. I'm not convinced the person understands the nuances. Each application requires authentication does not rule out it is same authentication server (not separate identities) Zero Trust deals with authentication by requiring users and devices to authenticate themselves and verify their identity each time they attempt to access a resource, even if they have previously authenticated A separate authentication is a bad practice in my opinion. SSO with RBAC is better but
upvoted 1 times
famco
1 year, 3 months ago
A better wording would have been "users have to authenticate each time they try to access a resource" (instead of what it is now). Then it is clearly zero trust
upvoted 1 times
...
...
Doaa81
1 year, 4 months ago
Selected Answer: D
The concept described in the question, where users are required to authenticate to each application they try to access, BEST represents the concept of Role-based access control (RBAC).
upvoted 1 times
...
IT__noob
1 year, 4 months ago
Selected Answer: D
D. Role-based access control When users are required to authenticate to each application they try to access when accessing corporate network resources, this BEST represents the concept of D. Role-based access control (RBAC). RBAC is a method of restricting network and application access based on the roles of individual users within an organization. Each user is assigned a set of permissions or privileges that determine which network resources and applications they are allowed to access. This approach ensures that users only have access to the resources and applications they need to do their jobs, reducing the risk of unauthorized access or data breaches.
upvoted 2 times
loccodennis
1 year, 3 months ago
dont use chatgpt for everything. you can make any counterpoint and it will change its opinion
upvoted 3 times
AlbanAlla
1 year, 1 month ago
if you know how to ask then you get the right answer. I got this answer whiich states clear that is zero trust. In summary, Zero Trust and RBAC are complementary approaches to access control and security. Zero Trust focuses on continuously verifying users and devices and strictly controlling access, while RBAC provides a structured model for assigning and managing permissions based on predefined roles. Organizations can choose to implement one or both of these approaches based on their specific security requirements and risk tolerance.
upvoted 1 times
...
...
...
JakeCharles
1 year, 6 months ago
Selected Answer: B
i guess its zero trust B
upvoted 1 times
...
AlbinoBonobo
1 year, 8 months ago
Selected Answer: B
The Zero Trust security approach deems everything untrustworthy until authentication is successful. Security is implemented in redundant layers throughout the network. This is an example of the concept of 'defence in depth'. As K5875 notes, SSO is conceptually an approach that is opposed to Zero Trust.
upvoted 3 times
...
Dano000
1 year, 10 months ago
Any confirmation on this one?
upvoted 1 times
fouserd
1 year, 8 months ago
Its Zero Trust - you are basically making sure that the correct person is trying to use the application. Lameterms way to describe it.
upvoted 1 times
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...