Free CompTIA Security+ SY0-701 Practice Question

An organization's security audit revealed that unauthorized access was obtained through the manipulation of previously authenticated interactions for cloud services. The threat actors could leverage a successfully authenticated communication to access protected resources without authorization. To enhance security and prevent this type during identity federation, which strategy should the organization consider implementing?

  • Inclusion of audience restrictions within identity assertions.

  • Enforcing strict claims-based access controls for resource requests.

  • Timestamp validation for all identity assertions.

  • Selective enabling of service endpoints based on session activity.

This question's topic:
CompTIA Security+ SY0-701 / 
Security Operations
Your Score:

Check or uncheck an objective to set which questions you will receive.