You are the global administrator of a company with a Microsoft 365 Subscription, and your users are on Win 10 devices.
Some of your users occasionally visit a remote branch that provides limited or no cell phone coverage.
Which authentication method should you configure for these users?
Click on the arrows to vote for the correct answer
A. B. C. D.Correct Answer: A
FIDO2 security keys are typically stored on USB devices, and therefore not depended on cell phone coverage.
FIDO2 security keys are an unphishable standards-based passwordless authentication method.
Option B is incorrect.
This authentication method needs cell phone coverage to work.
Option C is incorrect.
This is not a valid authentication method for sign-ins.
It can be used for password reset authentication only.
Option D is incorrect.
This authentication method needs cell phone coverage to work.
Reference:
To know more about FIDO2 security keys, please refer to the link below:
Given the scenario, where some users occasionally visit a remote branch that provides limited or no cell phone coverage, the most suitable authentication method to configure for these users would be the FIDO2 security key.
The FIDO2 security key is a physical hardware device that provides secure authentication to online services, including Microsoft 365. It is designed to be highly resistant to phishing attacks and other forms of cyber threats. It can be used as a primary authentication factor or as a second-factor authentication alongside a password.
Compared to other authentication methods such as Voice, Email, or SMS, the FIDO2 security key does not rely on an internet or cellular connection to authenticate users. This makes it ideal for users who are in locations with limited or no network coverage. Additionally, the FIDO2 security key does not require users to enter any personal information such as passwords or verification codes, which reduces the risk of password theft or phishing attacks.
In summary, FIDO2 security keys are a secure and reliable authentication method for users in remote locations with limited or no network coverage. It eliminates the need for passwords, reduces the risk of phishing attacks, and does not rely on an internet or cellular connection. Therefore, it is the most suitable authentication method to configure for users in the scenario described above.