easymultiple choiceObjective-mapped

A manager can access the HR portal normally from a managed laptop, but if they sign in from an unmanaged tablet, the system should require extra verification before granting access. Which control best fits?

Question 1easymultiple choice
Full question →

A manager can access the HR portal normally from a managed laptop, but if they sign in from an unmanaged tablet, the system should require extra verification before granting access. Which control best fits?

Answer choices

Why each option matters

Good practice is not just finding the correct option. The wrong answers often show the exact trap the exam wants you to fall into.

A

Best answer

Conditional access based on device trust or risk.

This is the best answer because conditional access can change authentication requirements depending on the device or sign-in context. A managed laptop can be allowed normally, while an unmanaged tablet can trigger extra verification such as MFA or access restrictions. That lets the organization balance usability and security instead of using the same rule for every login.

B

Distractor review

A longer password expiration interval.

Password aging does not make access adaptive based on the device being used or the location of the login attempt.

C

Distractor review

A separate VLAN for each manager.

Network segmentation can help isolate systems, but it does not enforce adaptive sign-in checks for different device types.

D

Distractor review

Data encryption at rest on the HR database.

Encryption protects stored data, but it does not decide whether an unmanaged device should be challenged during login.

Common exam trap

Common exam trap: an active trunk can still block the VLAN you need

A trunk being up does not prove every VLAN is crossing it. Check allowed VLAN lists, native VLAN mismatch, VLAN existence and access-port assignment.

Technical deep dive

How to think about this question

VLAN questions usually combine access-port and trunking clues. The key is to identify whether the issue is local to one switchport, caused by the trunk, or caused by the VLAN not existing where it needs to exist.

KKey Concepts to Remember

  • Access ports place end devices into a single VLAN.
  • Trunk ports carry multiple VLANs between switches.
  • Allowed VLAN lists decide which VLANs can cross a trunk.
  • Native VLAN mismatch can create confusing symptoms.

TExam Day Tips

  • Use show vlan brief to verify access VLANs.
  • Use show interfaces trunk to verify trunk state and allowed VLANs.
  • Do not treat every same-VLAN issue as a routing problem.

Related practice questions

Related SY0-701 practice-question pages

Use these pages to review the topic behind this question. This is how one missed question becomes focused revision.

More questions from this exam

Keep practising from the same exam bank, or move into a focused topic page if this question exposed a weak area.

FAQ

Questions learners often ask

What does this SY0-701 question test?

Access ports place end devices into a single VLAN.

What is the correct answer to this question?

The correct answer is: Conditional access based on device trust or risk. — Conditional access is the right control because it evaluates context before granting access. In this case, the organization wants normal access from managed devices but extra verification from unmanaged devices. That is exactly what conditional access is designed to do. It improves security by increasing protection only when risk is higher, which keeps the process usable for everyday work. Why others are wrong: Password changes are not context aware. VLANs isolate network segments but do not inspect sign-in trust. Encryption at rest protects stored records, not the login decision itself.

What should I do if I get this SY0-701 question wrong?

Then try more questions from the same exam bank and focus on understanding why the wrong options are tempting.

Discussion

Loading comments…

Sign in to join the discussion.