CAS-005 · Question #69
CAS-005 Question #69: Real Exam Question with Answer & Explanation
The correct answer is D: Context-based. Context-based authentication enhances traditional security methods by incorporating additional layers of information about the user's current environment and behavior. This can include factors such as the user's location, the time of access, the device used, and the behavior patt
Question
A company wants to implement hardware security key authentication for accessing sensitive information systems. The goal is to prevent unauthorized users from gaining access with a stolen password. Which of the following models should the company implement to solve this issue?
Options
- ARule based
- BTime-based
- CRole based
- DContext-based
Explanation
Context-based authentication enhances traditional security methods by incorporating additional layers of information about the user's current environment and behavior. This can include factors such as the user's location, the time of access, the device used, and the behavior patterns. It is particularly useful in preventing unauthorized access even if an attacker has obtained a valid
Community Discussion
No community discussion yet for this question.