Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Eccouncil Exam 512-50 Topic 3 Question 32 Discussion

Actual exam question for Eccouncil's 512-50 exam
Question #: 32
Topic #: 3
[All 512-50 Questions]

Creating a secondary authentication process for network access would be an example of?

Show Suggested Answer Hide Answer
Suggested Answer: B

Contribute your Thoughts:

Evangelina
6 hours ago
I think creating a secondary authentication process for network access would fall under system hardening and patching requirements.
upvoted 0 times
...
Roslyn
7 hours ago
D? Really? Anti-virus for mobile devices? That's like using a paper bag to protect yourself from a nuclear blast. This question is a no-brainer - it's B all the way!
upvoted 0 times
...
Maile
1 days ago
I'm leaning towards C. Hardening and patching systems is crucial, but a secondary authentication process goes beyond that to add an extra layer of protection.
upvoted 0 times
...
Ozell
2 days ago
I believe it could also be considered as defense in depth cost enumerated costs, as it adds an additional cost to the overall security strategy.
upvoted 0 times
...
Margurite
6 days ago
I agree with Daniel. It's important to have multiple layers of security to protect against unauthorized access.
upvoted 0 times
...
Cecil
10 days ago
Definitely not A, that's just confusing jargon. I think the correct answer is B - adding a secondary authentication process is a key part of the defense-in-depth strategy to enhance security.
upvoted 0 times
...
Daniel
14 days ago
I think creating a secondary authentication process for network access would fall under system hardening and patching requirements.
upvoted 0 times
...

Save Cancel