Questions: When users log on to the domain, in addition to being given access to domain file resources, they are given access to a Microsoft SQL Server database server and an internal website through Windows integrated authentication. This is an example of which authentication model? Choose the correct answer DAC SSO Three-factor authentication Two-factor authentication

When users log on to the domain, in addition to being given access to domain file resources, they are given access to a Microsoft SQL Server database server and an internal website through Windows integrated authentication.

This is an example of which authentication model?
Choose the correct answer
DAC
SSO
Three-factor authentication
Two-factor authentication
Transcript text: When users log on to the domain, in addition to being given access to domain file resources, they are given access to a Microsoft SQL Server database server and an internal website through Windows integrated authentication. This is an example of which authentication model? Choose the correct answer DAC SSO Three-factor authentication Two-factor authentication
failed

Solution

failed
failed

The answer is the second one (SSO): Single Sign-On.

Explanation for each option:

  1. DAC (Discretionary Access Control): This is a type of access control where the owner of the resource decides who can access it. It is not directly related to the authentication process described in the question.

  2. SSO (Single Sign-On): This is a model where a user logs in once and gains access to multiple systems without being prompted to log in again for each of them. The scenario described in the question, where users log on to the domain and gain access to multiple resources (SQL Server database and an internal website) through Windows integrated authentication, is an example of SSO.

  3. Three-factor authentication: This involves three different types of authentication factors, such as something you know (password), something you have (security token), and something you are (biometric verification). The scenario does not describe the use of three factors.

  4. Two-factor authentication: This involves two different types of authentication factors. The scenario does not describe the use of two factors; it describes a single sign-on process.

In summary, the scenario described is an example of Single Sign-On (SSO).

Was this solution helpful?
failed
Unhelpful
failed
Helpful