New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

ISC2 CISSP Exam - Topic 1 Question 51 Discussion

Actual exam question for ISC2's CISSP exam
Question #: 51
Topic #: 1
[All CISSP Questions]

An information security professional is reviewing user access controls on a customer-facing application. The application must have multi-factor authentication (MFA) in place. The application currently requires a username and password to login. Which of the following options would BEST implement MFA?

Show Suggested Answer Hide Answer
Suggested Answer: C

Contribute your Thoughts:

0/2000 characters
Alita
3 months ago
Wait, secret questions? Aren't they easy to guess?
upvoted 0 times
...
Talia
3 months ago
Geolocation isn't reliable enough for MFA, so A is a no-go.
upvoted 0 times
...
Amber
3 months ago
I agree, D is the most secure method!
upvoted 0 times
...
Steffanie
4 months ago
Not sure if a hardware token is really necessary though.
upvoted 0 times
...
Reita
4 months ago
Option D is definitely the best choice for MFA!
upvoted 0 times
...
Mabel
4 months ago
Geolocation seems interesting, but I feel like it might not be reliable enough for MFA.
upvoted 0 times
...
Christiane
4 months ago
I practiced a similar question where they asked about different authentication methods, and I think secret questions aren’t very secure.
upvoted 0 times
...
Jamey
4 months ago
I’m not entirely sure, but I think option D with the hardware token sounds like the best choice for true MFA.
upvoted 0 times
...
Markus
5 months ago
I remember studying that MFA should involve something you have, something you know, or something you are.
upvoted 0 times
...
Vicky
5 months ago
Hmm, I'm not sure about the other options. I know OSPF has some advanced features, but I'll have to think this through carefully.
upvoted 0 times
...
Mira
5 months ago
Hmm, this is a tricky one. I'll need to think carefully about the Scrum principles and how they apply here.
upvoted 0 times
...
Devora
5 months ago
Hmm, I'm a bit unsure about this one. The options seem to cover different potential red flags, but I'll need to think through which ones are most indicative of auditor fraud specifically.
upvoted 0 times
...
Carma
5 months ago
I remember studying WCF connections but can't recall if NET Remoting is actually supported. I think I've seen practice questions on it before.
upvoted 0 times
...

Save Cancel