Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

CompTIA Exam SK0-005 Topic 1 Question 47 Discussion

Actual exam question for CompTIA's SK0-005 exam
Question #: 47
Topic #: 1
[All SK0-005 Questions]

A user can successfully connect to a database server from a home office but is unable to access it from a hotel room. Which of the following authentication methods is most likely

configured?

Show Suggested Answer Hide Answer
Suggested Answer: D

Scope-based authentication is a method of restricting access to resources based on the location, network, or device of the user. It can be used to prevent unauthorized access from outside the organization's network or from untrusted devices. In this case, the user can connect to the database server from the home office, which is likely within the scope of the authentication policy, but not from the hotel room, which is outside the scope.


CompTIA Server+ Certification Exam Objectives1, page 15

CompTIA Server+: Authentication & Authorization2

Contribute your Thoughts:

Merilyn
6 months ago
I'm leaning towards role-based authentication. Different roles could have different access permissions.
upvoted 0 times
...
Sabina
6 months ago
I disagree, I think it could be scope-based. Maybe the hotel has restricted access.
upvoted 0 times
...
Isaiah
6 months ago
I agree with Malcolm, it makes sense that the hotel network has different rules.
upvoted 0 times
...
Malcolm
6 months ago
I think it might be a rule-based authentication method.
upvoted 0 times
...
Mike
7 months ago
Nah, I don't think it's that simple. It could be a delegation-based authentication, where the user's credentials are only valid when they're on the company network. Hotels might be considered 'untrusted' in that case.
upvoted 0 times
...
Son
7 months ago
Haha, scope-based authentication, really? I was thinking more like a rule-based system, where the admin has set up specific rules for hotel network access. You know, 'thou shalt not access the database from a hotel'.
upvoted 0 times
...
Hector
7 months ago
You know, I was thinking the same thing. My guess would be that it's a scope-based authentication method, where the user has access granted based on their location or network they're connecting from.
upvoted 0 times
Selma
6 months ago
G: Agreed. The user's inability to access from the hotel room points towards a location-based restriction.
upvoted 0 times
...
Aide
6 months ago
F: Scope-based authentication makes sense for controlling access based on location.
upvoted 0 times
...
Jaime
6 months ago
E: It seems like the only logical explanation for the access issue.
upvoted 0 times
...
Benton
6 months ago
D: So, scope-based authentication is the most likely configuration in this case.
upvoted 0 times
...
Ernestine
6 months ago
C: I think you're right. It would explain why the user can connect from home but not from a different network.
upvoted 0 times
...
Lettie
6 months ago
B: Yeah, I agree. It makes sense that access would be restricted based on the user's location.
upvoted 0 times
...
Van
6 months ago
A: Definitely sounds like a scope-based authentication method.
upvoted 0 times
...
...
Cherelle
7 months ago
Hmm, this question seems to be testing our understanding of network authentication methods. The fact that the user can connect from home but not from a hotel suggests some kind of location-based authentication is in place.
upvoted 0 times
...

Save Cancel