A user can successfully connect to a database server from a home office but is unable to access it from a hotel room. Which of the following authentication methods is most likely
configured?
Scope-based authentication is a method of restricting access to resources based on the location, network, or device of the user. It can be used to prevent unauthorized access from outside the organization's network or from untrusted devices. In this case, the user can connect to the database server from the home office, which is likely within the scope of the authentication policy, but not from the hotel room, which is outside the scope.
CompTIA Server+ Certification Exam Objectives1, page 15
CompTIA Server+: Authentication & Authorization2
Merilyn
11 months agoSabina
12 months agoIsaiah
12 months agoMalcolm
12 months agoMike
1 years agoSon
1 years agoHector
1 years agoSelma
12 months agoAide
12 months agoJaime
12 months agoBenton
12 months agoErnestine
12 months agoLettie
1 years agoVan
1 years agoCherelle
1 years ago