A cybersecurity team wants employees restricted to recognized hardware, from an approved location, and within a specific work schedule. Which measure best addresses this need?
Rely on passcode-based authentication, skipping device or region validation
Deploy a script that modifies passcodes daily and logs network addresses for later auditing
Implement a policy that enforces hardware validation, location checks, and designated login hours
Enable single sign-on with a second factor that does not confirm exact hardware or usage timeframe
A policy that enforces hardware checks, location rules, and allotted login times covers all parts of the scenario. Scripts that modify passwords or log addresses do not confirm specific devices or time windows. Single sign-on with a second factor may validate user identity but misses hardware and schedule constraints. Passcode-based login lacks device and region verifications.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is hardware validation in cybersecurity?
Open an interactive chat with Bash
How does location-based access control enhance security?
Open an interactive chat with Bash
What are the benefits of enforcing designated login hours?