Multifactor Authentication Techniques: Best Practices for Enterprise Network Security

Implementing Multifactor Authentication in Your Enterprise Network Architecture

Prev Question Next Question

Question

An organization plans to implement multifactor authentication techniques within the enterprise network architecture.

Each authentication factor is expected to be a unique control.

Which of the following BEST describes the proper employment of multifactor authentication?

Answers

Explanations

Click on the arrows to vote for the correct answer

A. B. C. D.

A.

Multifactor authentication (MFA) involves using two or more authentication factors to verify the identity of a user. Each factor is expected to be a unique control, meaning that if one factor is compromised, the others will still provide protection.

Let's examine each of the answer choices to see which one is the best implementation of MFA:

A. Proximity card, fingerprint scanner, PIN: This answer choice includes three factors: something the user has (proximity card), something the user is (fingerprint), and something the user knows (PIN). This is a valid implementation of MFA and could provide good protection against unauthorized access.

B. Fingerprint scanner, voice recognition, proximity card: This answer choice includes three factors: something the user is (fingerprint and voice), and something the user has (proximity card). This is also a valid implementation of MFA and could provide good protection against unauthorized access.

C. Smart card, user PKI certificate, privileged user certificate: This answer choice includes three factors: something the user has (smart card), something the user knows (user PKI certificate), and something the user is (privileged user certificate). This is another valid implementation of MFA and could provide good protection against unauthorized access.

D. Voice recognition, smart card, proximity card: This answer choice includes three factors: something the user is (voice), something the user has (smart card and proximity card). While this is still a valid implementation of MFA, it may not provide as strong of protection as the other answer choices.

Therefore, based on the analysis above, the best implementation of MFA would be answer choice A, which includes a combination of something the user has, something the user is, and something the user knows.