A company determines a need for additional protection from rogue devices plugging into physical
ports around the building.
Which of the following provides the highest degree of protection from unauthorized wired network
access?

A.
Intrusion Prevention Systems
B.
MAC filtering
C.
Flood guards
D.
802.1x
Explanation:
IEEE 802.1x is an IEEE Standard for Port-based Network Access Control (PNAC). It is part of the
IEEE 802.1 group of networking protocols and provides an authentication mechanism to wireless
devices connecting to a LAN or WLAN.
Is the key word not wired? I think it should be B. Mac filtering.
0
0
I was thinking the same. The key Phrase is “wired network access”.
#but that’s none of my business
0
0
I think the answer here is wrong. the correct Answer should be B
0
0
802.1X provides an authentication mechanism to devices wishing to attach to a LAN or WLAN.
0
0
802.1x is for port security, ie; physical (wired!) access, no?
Question is HIGHEST degree of protection. A MAC address can always be spoofed.
0
0
BTW, NEW SY0-401 PDF Dumps from Google Drive for Free: https://drive.google.com/open?id=0B-ob6L_QjGLpcG9CWHp3bXlNTTg
0
0
Another one of “those” question which does not make much sense and one must veer towards the best possible answer.
The key word in here is “WIRED”, and the crux of the matter is “which option offers the highest degree of protection from unauthorized wired network access?
A- Intrusion Prevention Systems. This is not the best answer to achieve this as IPS does not care which port the transit is coming from. It focuses on content.
B – MAC filtering is typically used for WIRELESS connections
C – Flood Guards are for FLOODS, and not rogue connections – flood guards serve as preventive control against denial-of-service (DoS) or distributed denial-of-service (DDoS) attacks
So it really only leaves: “D – 802.1x” as a possible answer.
Having said that, 802.1x is an IEEE Standard for Port-based Network Access Control (PNAC).
It is part of the IEEE 802.1 group of networking protocols and provides an authentication mechanism to wireless devices connecting to a LAN or WLAN.
So we are using a wireless standard as an answer for a question which specifically requires the highest degree of protection from unauthorized wired network access. Go figure.
0
0