A user can successfully connect to a database server from a home office but is unable to access it from a hotel room. Which of the following authentication methods is most likely
configured?
Scope-based authentication is a method of restricting access to resources based on the location, network, or device of the user. It can be used to prevent unauthorized access from outside the organization's network or from untrusted devices. In this case, the user can connect to the database server from the home office, which is likely within the scope of the authentication policy, but not from the hotel room, which is outside the scope.
CompTIA Server+ Certification Exam Objectives1, page 15
CompTIA Server+: Authentication & Authorization2
Lezlie
3 months agoFlo
3 months agoSharika
3 months agoMargot
4 months agoErick
4 months agoMiriam
4 months agoAshlee
4 months agoJolene
4 months agoFelice
5 months agoMicaela
5 months agoKatina
5 months agoLeeann
5 months agoLuisa
5 months agoOdelia
5 months agoAlyssa
5 months agoJestine
5 months agoMerilyn
2 years agoSabina
2 years agoIsaiah
2 years agoMalcolm
2 years agoMike
2 years agoSon
2 years agoHector
2 years agoSelma
2 years agoAide
2 years agoJaime
2 years agoBenton
2 years agoErnestine
2 years agoLettie
2 years agoVan
2 years agoCherelle
2 years ago