ISC2 CISSP Practice Question

A financial services company is implementing a new remote access solution for employees to access sensitive client data. The company's security policy requires a 'defense-in-depth' strategy for authentication to mitigate risks from credential theft. Which of the following access control strategies BEST addresses the threat of credential compromise through phishing attacks?

  • Implementing Multi-Factor Authentication (MFA) that requires a password and a one-time code from a registered device.

  • Enforcing a complex password policy with a 90-day rotation schedule.

  • Deploying a Network Access Control (NAC) solution to only allow connections from corporate-issued devices.

  • Using a risk-based access control system that analyzes user location and time of day.

ISC2 CISSP
Identity and Access Management (IAM)
Your Score:
Settings & Objectives
Random Mixed
Questions are selected randomly from all chosen topics, with a preference for those you haven’t seen before. You may see several questions from the same objective or domain in a row.
Rotate by Objective
Questions cycle through each objective or domain in turn, helping you avoid long streaks of questions from the same area. You may see some repeat questions, but the distribution will be more balanced across topics.

Check or uncheck an objective to set which questions you will receive.

Bash, the Crucial Exams Chat Bot
AI Bot