ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 61 - SY0-601 discussion

Report
Export

A cybersecurity administrator needs to allow mobile BYOD devices to access network resources. As the devices are not enrolled to the domain and do not have policies applied to them, which of the following are best practices for authentication and infrastructure security? (Select TWO).

A.
Create a new network for the mobile devices and block the communication to the internal network and servers
Answers
A.
Create a new network for the mobile devices and block the communication to the internal network and servers
B.
Use a captive portal for user authentication.
Answers
B.
Use a captive portal for user authentication.
C.
Authenticate users using OAuth for more resiliency
Answers
C.
Authenticate users using OAuth for more resiliency
D.
Implement SSO and allow communication to the internal network
Answers
D.
Implement SSO and allow communication to the internal network
E.
Use the existing network and allow communication to the internal network and servers.
Answers
E.
Use the existing network and allow communication to the internal network and servers.
F.
Use a new and updated RADIUS server to maintain the best solution
Answers
F.
Use a new and updated RADIUS server to maintain the best solution
Suggested answer: B, C

Explanation:

When allowing mobile BYOD devices to access network resources, using a captive portal for user authentication and authenticating users using OAuth are both best practices for authentication and infrastructure security. A captive portal requires users to authenticate before accessing the network and can be used to enforce policies and restrictions. OAuth allows users to authenticate using third- party providers, reducing the risk of password reuse and credential theft. Reference: CompTIA Security+ Study Guide, pages 217-218, 225-226

asked 02/10/2024
om Kumar
42 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first