Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

CompTIA Exam SK0-005 Topic 1 Question 47 Discussion

Actual exam question for CompTIA's SK0-005 exam
Question #: 47
Topic #: 1
[All SK0-005 Questions]

A user can successfully connect to a database server from a home office but is unable to access it from a hotel room. Which of the following authentication methods is most likely

configured?

Show Suggested Answer Hide Answer
Suggested Answer: D

Scope-based authentication is a method of restricting access to resources based on the location, network, or device of the user. It can be used to prevent unauthorized access from outside the organization's network or from untrusted devices. In this case, the user can connect to the database server from the home office, which is likely within the scope of the authentication policy, but not from the hotel room, which is outside the scope.


CompTIA Server+ Certification Exam Objectives1, page 15

CompTIA Server+: Authentication & Authorization2

Contribute your Thoughts:

Merilyn
11 months ago
I'm leaning towards role-based authentication. Different roles could have different access permissions.
upvoted 0 times
...
Sabina
11 months ago
I disagree, I think it could be scope-based. Maybe the hotel has restricted access.
upvoted 0 times
...
Isaiah
11 months ago
I agree with Malcolm, it makes sense that the hotel network has different rules.
upvoted 0 times
...
Malcolm
11 months ago
I think it might be a rule-based authentication method.
upvoted 0 times
...
Mike
1 years ago
Nah, I don't think it's that simple. It could be a delegation-based authentication, where the user's credentials are only valid when they're on the company network. Hotels might be considered 'untrusted' in that case.
upvoted 0 times
...
Son
1 years ago
Haha, scope-based authentication, really? I was thinking more like a rule-based system, where the admin has set up specific rules for hotel network access. You know, 'thou shalt not access the database from a hotel'.
upvoted 0 times
...
Hector
1 years ago
You know, I was thinking the same thing. My guess would be that it's a scope-based authentication method, where the user has access granted based on their location or network they're connecting from.
upvoted 0 times
Selma
11 months ago
G: Agreed. The user's inability to access from the hotel room points towards a location-based restriction.
upvoted 0 times
...
Aide
12 months ago
F: Scope-based authentication makes sense for controlling access based on location.
upvoted 0 times
...
Jaime
12 months ago
E: It seems like the only logical explanation for the access issue.
upvoted 0 times
...
Benton
12 months ago
D: So, scope-based authentication is the most likely configuration in this case.
upvoted 0 times
...
Ernestine
12 months ago
C: I think you're right. It would explain why the user can connect from home but not from a different network.
upvoted 0 times
...
Lettie
12 months ago
B: Yeah, I agree. It makes sense that access would be restricted based on the user's location.
upvoted 0 times
...
Van
12 months ago
A: Definitely sounds like a scope-based authentication method.
upvoted 0 times
...
...
Cherelle
1 years ago
Hmm, this question seems to be testing our understanding of network authentication methods. The fact that the user can connect from home but not from a hotel suggests some kind of location-based authentication is in place.
upvoted 0 times
...

Save Cancel