New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

ISC2 SSCP Exam - Topic 7 Question 3 Discussion

Actual exam question for ISC2's SSCP exam
Question #: 3
Topic #: 7
[All SSCP Questions]

Which one of the following authentication mechanisms creates a problem for mobile users?

Show Suggested Answer Hide Answer
Suggested Answer: A

Anything based on a fixed IP address would be a problem for mobile users because their location and its associated IP address can change from one time to the next. Many providers will assign a new IP every time the device would be restarted. For example an insurance adjuster using a laptop to file claims online. He goes to a different client each time and the address changes every time he connects to the ISP.

NOTE FROM CLEMENT:

The term MOBILE in this case is synonymous with Road Warriors where a user is contantly traveling and changing location. With smartphone today that may not be an issue but it would be an issue for laptops or WIFI tablets. Within a carrier network the IP will tend to be the same and would change rarely. So this question is more applicable to devices that are not cellular devices but in some cases this issue could affect cellular devices as well.

The following answers are incorrect:

mechanism with reusable password. This is incorrect because reusable password mechanism would not present a problem for mobile users. They are the least secure and change only at specific interval.

one-time password mechanism. This is incorrect because a one-time password mechanism would not present a problem for mobile users. Many are based on a clock and not on the IP address of the user.

challenge response mechanism. This is incorrect because challenge response mechanism would not present a problem for mobile users.


Contribute your Thoughts:

0/2000 characters
Stephaine
4 months ago
Wait, IP-based mechanisms are still a thing? Really?
upvoted 0 times
...
Eric
4 months ago
Challenge response? Not sure how that affects mobility.
upvoted 0 times
...
Ardella
4 months ago
One-time passwords can be tricky on the go.
upvoted 0 times
...
Toi
4 months ago
I disagree, reusable passwords are worse!
upvoted 0 times
...
Albert
5 months ago
A is definitely a problem for mobile users.
upvoted 0 times
...
Tiara
5 months ago
Challenge response mechanisms might be tricky too, but I can't recall exactly why they would be a problem for mobile users.
upvoted 0 times
...
Ashleigh
5 months ago
I practiced a question similar to this, and I feel like the one-time password mechanism is actually pretty secure for mobile users.
upvoted 0 times
...
Ivette
5 months ago
I'm not entirely sure, but I remember something about reusable passwords being less secure, though I don't know if that specifically affects mobile users.
upvoted 0 times
...
Vincent
5 months ago
I think mechanisms based on IP addresses could be problematic for mobile users since their IP can change frequently.
upvoted 0 times
...
Ling
5 months ago
Okay, let's see. The cash conversion cycle is shorter for Comp Systems, which suggests they are more liquid. But the defense interval ratio is lower for Big Tables, which implies they manage their cash better. I'm a bit confused on how to reconcile these two indicators.
upvoted 0 times
...
Carmelina
5 months ago
This one seems pretty straightforward. I think the answer is C - using Enterprise Manager or WLST to add the virtualize=true property to the domain level Identity Store Configuration.
upvoted 0 times
...
Wilda
5 months ago
Hmm, this is tricky. I'm a bit confused about how to handle the gift of stock and the lottery winnings. I'll need to make sure I understand the tax implications of those items as well.
upvoted 0 times
...
Charlette
5 months ago
I think the right principle here might be Service Reusability, since standardizing policies could involve reusing existing services. But I'm not entirely sure.
upvoted 0 times
...
Huey
5 months ago
Hmm, I'm a bit stumped on this one. I know the referrer exceptions feature in the Cisco WSA has to do with how the system handles certain types of HTTP requests, but I'm not sure exactly which part of the request is used to determine that. I'll have to think it through carefully.
upvoted 0 times
...

Save Cancel