- Home
- Server Administration
- Comptia
- Server+
66.
Which of the following cannot be accomplished using port security?
- A.Set the minimum number of MAC addresses that can be seen on a port.
- B.Take a specific action when a port violation occurs.
- C.Define exactly which MAC addresses are allowed on the port.
- D.Set the maximum number of MAC addresses that can be seen on a port.
- Answer & Explanation
- Report
Answer : [A]
Explanation :
Explanation :
It is not possible to specify a minimum number of MAC addresses allowed on a port. |
67.
Which standard describes centralized port-based access control?
- A.802.11i
- B.802.1x
- C.802.12
- D.802.10
- Answer & Explanation
- Report
Answer : [B]
Explanation :
Explanation :
The IEEE 802.1x security standard describes a method of centralizing the authentication, authorization, and accounting of users who connect either locally or remotely to the network. It is sometimes called port-based access control because in an 802.1x architecture, the user’s port to the network is not opened until the process is complete. |
68.
When discussing 802.1x, which of the following roles is played by the RADIUS server?
- A.Supplicant
- B.Authenticator
- C.Authentication server
- D.Imperative
- Answer & Explanation
- Report
Answer : [C]
Explanation :
Explanation :
69.
Which of the following is not an example of an authenticator in an 802.1x architecture?
- A.802.1x capable switch
- B.Access point
- C.RADIUS server
- D.VPN server
- Answer & Explanation
- Report
Answer : [C]
Explanation :
Explanation :
The role of the authenticator can be performed by a wide variety of network access devices, including remote access servers (both dial-up and VPN), switches, and wireless access points. The role of the authentication server can be performed by a RADIUS or TACACS+ server. |
70.
Which statement is false with respect to router ACLs?
- A.The order of the rules is important.
- B.An implied deny all rule is located at the end of all ACLs.
- C.It is possible to log all traffic that meets any of the rules.
- D.All rules in the list are considered before the traffic is allowed.
- Answer & Explanation
- Report
Answer : [D]
Explanation :
Explanation :
If traffic matches a rule, the action specified by the rule will be applied, and no other rules will be read. |