An administrator has noticed mobile devices from an adjacent company on the corporate wireless network.
Malicious activity is being reported from those devices.
To add another layer of security in an enterprise environment, an administrator wants to add contextual authentication to allow users to access enterprise resources only while present in corporate buildings.
Which of the following technologies would accomplish this?
Click on the arrows to vote for the correct answer
A. B. C. D.D.
Out of the given options, the technology that would best accomplish the task of adding contextual authentication to allow access to enterprise resources only while present in corporate buildings is GPS (Global Positioning System).
GPS technology can be used to determine the location of a device and ensure that the device is within the range of the corporate buildings before allowing access to enterprise resources. This is a form of location-based access control (LBAC) and can be implemented using a number of different methods.
For example, one approach could be to require that users' mobile devices have GPS enabled and that the GPS data is shared with the enterprise network. This data could then be used to determine the location of the device and allow or deny access to enterprise resources based on whether the device is within the corporate buildings.
Alternatively, some enterprise networks may use wireless access points with built-in GPS technology to track the location of devices and enforce LBAC policies based on this information.
In contrast, the other options listed in the question (port security, rogue device detection, and Bluetooth) are not directly related to the task of adding contextual authentication based on location. Port security is a feature that can be used to control access to physical network ports on switches, while rogue device detection is used to identify unauthorized devices on a network. Bluetooth is a wireless technology that allows devices to communicate over short distances but is not suitable for location-based access control.