A security proposal was set up to track requests for remote access by creating a baseline of the users'
common sign-in properties. When a baseline deviation is detected, an MFA challenge will be triggered. Which
of the following should be configured in order to deploy the proposal?
A. Context-aware authentication
B. Simultaneous authentication of equals
C. Extensive authentication protocol
D. Agentless network access control
common sign-in properties. When a baseline deviation is detected, an MFA challenge will be triggered. Which
of the following should be configured in order to deploy the proposal?
A. Context-aware authentication
B. Simultaneous authentication of equals
C. Extensive authentication protocol
D. Agentless network access control