Comp TIA Security + Certification Questions Part 6

© examsiri.com
Question : 6 of 68
 
Marks: +1, -0
During a lessons learned meeting regarding a previous incident, the security team receives a follow-up action item with the following requirements:
● Allow authentication from within the United States anytime
● Allow authentication if the user is accessing email or a shared file system
● Do not allow authentication if the AV program is two days out of date
● Do not allow authentication if the location of the device is in two specific countries
Given the requirements, which of the following mobile deployment authentication types is being utilized?
Go to Question: