Following a security breach that revealed employee username and password information, an organization would like to implement additional security for users logging in to company devices. Which of the following would be the best solution for the organization to use?
Correct Answer: D
In response to a security breach involving compromised credentials, one-time tokens provide an effective method to enhance authentication security. These tokens are part of multi-factor authentication (MFA) and generate unique codes for each login attempt, ensuring that even if credentials are stolen, unauthorized access is prevented.
* Why One-time Tokens?
* One-time tokens are dynamic and expire after a single use, significantly reducing the risk of unauthorized access even if usernames and passwords are compromised.
* Often delivered through apps like Google Authenticator, hardware tokens, or SMS.
* Incorrect Options:
* A. Biometric authentication: While secure, it may not address all scenarios and requires additional hardware.
* B. Peer-reviewed log-ins: Not a valid security measure.
* C. Log-in scripts: Used for automating login configurations but do not enhance security directly.
CompTIA A+ Exam Objectives References:
* 220-1102 (Core 2), Section 2.1 and 2.2: Discuss security measures, including multi-factor authentication and one-time token implementations.