A user can successfully connect to a database server from a home office but is unable to access it from a hotel room. Which of the following authentication methods is most likely
configured?
Scope-based authentication is a method of restricting access to resources based on the location, network, or device of the user. It can be used to prevent unauthorized access from outside the organization's network or from untrusted devices. In this case, the user can connect to the database server from the home office, which is likely within the scope of the authentication policy, but not from the hotel room, which is outside the scope.
CompTIA Server+ Certification Exam Objectives1, page 15
CompTIA Server+: Authentication & Authorization2
Merilyn
6 months agoSabina
6 months agoIsaiah
6 months agoMalcolm
6 months agoMike
7 months agoSon
7 months agoHector
7 months agoSelma
6 months agoAide
6 months agoJaime
6 months agoBenton
6 months agoErnestine
6 months agoLettie
6 months agoVan
6 months agoCherelle
7 months ago