A logistics provider wants certain employees using unknown devices to perform extra checks when they sign in to a tracking system. Staff using approved devices in approved locations do not need additional prompts. Which solution meets these requirements?
Configuring rules that react to sign-in attributes for device or location
Setting a password expiration policy for all users
Requiring biometric scans from users at login
Implementing a monitoring solution for network traffic patterns
Configuring rules based on attributes, such as device compliance or network region, fits the scenario because it can place extra checks on unknown devices while allowing valid devices a simpler login. A password expiration policy handles passwords but does not adjust checks based on devices or locations. Monitoring network traffic patterns helps detect anomalies but does not selectively enforce additional prompts. Biometric scans add an extra factor, but they do not dynamically decide access based on the device being used or its network region.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are sign-in attributes and how are they used for authentication?
Open an interactive chat with Bash
How do conditional access rules improve security?
Open an interactive chat with Bash
Why are methods like password expiration policies or biometric scans insufficient in this scenario?