Home
66.
Which of the following cannot be accomplished using port security?
  • A.
    Set the minimum number of MAC addresses that can be seen on a port.
  • B.
    Take a specific action when a port violation occurs.
  • C.
    Define exactly which MAC addresses are allowed on the port.
  • D.
    Set the maximum number of MAC addresses that can be seen on a port.
  • Answer & Explanation
  • Report
Answer : [A]
Explanation :
It is not possible to specify a minimum number of MAC addresses allowed on a port.
Report
Name Email  
67.
Which standard describes centralized port-based access control?
  • A.
    802.11i
  • B.
    802.1x
  • C.
    802.12
  • D.
    802.10
  • Answer & Explanation
  • Report
Answer : [B]
Explanation :
The IEEE 802.1x security standard describes a method of centralizing the authentication, authorization, and accounting of users who connect either locally or remotely to the network. It is sometimes called port-based access control because in an 802.1x architecture, the user’s port to the network is not opened until the process is complete.
Report
Name Email  
68.
When discussing 802.1x, which of the following roles is played by the RADIUS server?
  • A.
    Supplicant
  • B.
    Authenticator
  • C.
    Authentication server
  • D.
    Imperative
  • Answer & Explanation
  • Report
Answer : [C]
Explanation : The role of the authentication server can be performed by a Remote Authentication Dial-in User Service (RADIUS) or a Terminal Access Controller Access Control System+ (TACACS+) server. Both of these server types centralize the authentication process on behalf of the multiple authenticators.
Report
Name Email  
69.
Which of the following is not an example of an authenticator in an 802.1x architecture?
  • A.
    802.1x capable switch
  • B.
    Access point
  • C.
    RADIUS server
  • D.
    VPN server
  • Answer & Explanation
  • Report
Answer : [C]
Explanation :
The role of the authenticator can be performed by a wide variety of network access devices, including remote access servers (both dial-up and VPN), switches, and wireless access points. The role of the authentication server can be performed by a RADIUS or TACACS+ server.
Report
Name Email  
70.
Which statement is false with respect to router ACLs?
  • A.
    The order of the rules is important.
  • B.
    An implied deny all rule is located at the end of all ACLs.
  • C.
    It is possible to log all traffic that meets any of the rules.
  • D.
    All rules in the list are considered before the traffic is allowed.
  • Answer & Explanation
  • Report
Answer : [D]
Explanation :
If traffic matches a rule, the action specified by the rule will be applied, and no other rules will be read.
Report
Name Email