How does the IP access control functionality work?
A.
Users logging in from one of the IP addresses from an allowlist can log in using the registered phone number only. All other IPs are fully restricted.
B.
Users logging in from one of the IP addresses from an allowlist can log in with their user name and password only. Users logging in from all other IP addresses must confirm their identity via two-step authentication.
C.
Users logging in from one of the IP addresses from an allowlist can log in using the registered phone number only. All other users will need to confirm their identity via user name, password, and two-step authentication.
D.
Users logging in from one of the IP addresses from an allowlist can log in with their user name and password only. All other IPs are fully restricted.
The Answer Is:
B
This question includes an explanation.
Explanation:
IP access control in SAP Emarsys enhances security:
Option B:Correct. Users from allowlisted IPs can log in with username and password, while others require two-step authentication (e.g., via email or SMS) for added verification.
Option A:Incorrect. Phone number login isn’t a feature; it’s username/password-based.
Option C:Incorrect. It misrepresents the authentication process for non-allowlisted IPs.
Option D:Incorrect. Non-allowlisted IPs aren’t fully restricted; they require 2FA.The SAP Emarsys Help Portal under "Security Settings" describes this IP control logic.References:SAP Emarsys Help Portal - "Security Settings" (https://help.emarsys.com/ ).
C_C4H22_2411 PDF/Engine
Printable Format
Value of Money
100% Pass Assurance
Verified Answers
Researched by Industry Experts
Based on Real Exams Scenarios
100% Real Questions
Get 65% Discount on All Products,
Use Coupon: "ac4s65"