A user can successfully connect to a database server from a home office but is unable to access it from a hotel room. Which of the following authentication methods is most likely
configured?
Scope-based authentication is a method of restricting access to resources based on the location, network, or device of the user. It can be used to prevent unauthorized access from outside the organization's network or from untrusted devices. In this case, the user can connect to the database server from the home office, which is likely within the scope of the authentication policy, but not from the hotel room, which is outside the scope.
CompTIA Server+ Certification Exam Objectives1, page 15
CompTIA Server+: Authentication & Authorization2
Merilyn
11 months agoSabina
11 months agoIsaiah
11 months agoMalcolm
11 months agoMike
1 years agoSon
1 years agoHector
1 years agoSelma
11 months agoAide
12 months agoJaime
12 months agoBenton
12 months agoErnestine
12 months agoLettie
12 months agoVan
12 months agoCherelle
1 years ago