CompTIA SecurityX Certification Exam CAS-005 Question # 54 Topic 6 Discussion

CompTIA SecurityX Certification Exam CAS-005 Question # 54 Topic 6 Discussion

CAS-005 Exam Topic 6 Question 54 Discussion:
Question #: 54
Topic #: 6

A company wants to implement hardware security key authentication for accessing sensitive information systems The goal is to prevent unauthorized users from gaining access with a stolen password Which of the following models should the company implement to b«st solve this issue?


A.

Rule based


B.

Time-based


C.

Role based


D.

Context-based


Get Premium CAS-005 Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.