27 Jun Practice Test Question – Authentication Mechanisms
Preparing for your next security certification exam? After trying your hand at this practice test question, join the FREE CertMike Study Group for the CISSP, Security+, CySA+, PenTest+, CISM+ or SSCP certification to receive new questions each week. You’ll also receive free access to my customized study strategies.
Bruce would like to implement an authentication mechanism that requires that users connecting via mobile devices use a second authentication factor when they are connecting from an unfamiliar IP address. What term best describes this technique?
A. Rule-based authentication
B. Device-based authentication
C. Context-based authentication
D. Role-based authentication
Correct Answer: C
The use of different authentication requirements depending upon the circumstances of the user’s request is known as context-based authentication. In this scenario, authentication requirements are changing based upon the user’s IP address, making it an example of context-based authentication.