B seems right.
A. is a wifi extension protocol
C. is a means of bypassing 802.1x which is the opposite of what we want.
D. is when an attacker uses the same IP as the client. But the question states client devices as a given.
The correct answer is B. 802.1x.
Explanation:
802.1x is a port-based authentication protocol that prevents unauthorized devices from gaining access to the network. It requires clients to authenticate before being granted access. This technology is commonly used for controlling access to wireless and wired networks.
Explanation for other options:
A. 802.11n: 802.11n is a wireless standard and not specifically designed for preventing unauthorized access to the network.
C. MAC Authentication Bypass: MAC Authentication Bypass allows devices with specific MAC addresses to bypass 802.1x authentication. While it provides a level of control, it does not offer the same level of security as 802.1x.
D. IP Source Guard: IP Source Guard is a feature that helps prevent IP address spoofing attacks but is not primarily designed for controlling access to the network based on device authenticatio
MS Switch Access Policies (802.1X) - Cisco Meraki
"...
Access Policy Types
There are three options available for an access policy in Dashboard:
802.1X (Default)
When an 802.1X access policy is enabled on a switchport, a client that connects to that switchport will be prompted to provide their domain credentials. If the RADIUS server accepts these credentials as valid, their device will be granted access to the network and get an IP configuration. If no authentication is attempted, they will be put on a "guest" VLAN, if one is defined.
...
Other RADIUS Features
...
Failed Authentication VLAN
A client device connecting to a switchport controlled by an access-policy can be placed in the failed authentication VLAN if the RADIUS server denies its access request.
Client devices may fail RADIUS authentication because they do not comply with the network's security requirements. The failed authentication VLAN provides such clients with limited access to network for remediation purposes.
..."
802.1x is a security standard that prevents client devices from arbitrarily connecting to the network without state remediation. It provides a framework for authenticating devices that are attempting to access a LAN or WLAN.
802.1x uses a supplicant (client device) and an authenticator (network access device) to establish a secure connection. The supplicant sends an authentication request to the authenticator, which then forwards the request to an authentication server. If the authentication server approves the request, the supplicant is allowed to access the network. If the request is denied, the supplicant is not allowed to access the network.
B is correct!
802.1X is a network authentication protocol that opens ports for network access when an organization authenticates a user's identity and authorizes them for access to the network. The user's identity is determined based on their credentials or certificate, which is confirmed by the RADIUS server
The source link would be in the CCNA 200-301 OCG Volume 1. Page 658, 2nd paragraph, 2nd sentence. Start with page 657, the subject "802.1x/EAP" will give more information.
EEE 802.1X is an IEEE Standard for port-based Network Access Control (PNAC). It is part of the IEEE 802.1 group of networking protocols. It provides an authentication mechanism to devices wishing to attach to a LAN or WLAN
upvoted 5 times
...
...
This section is not available anymore. Please use the main Exam Page.200-301 Exam Questions
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
xbololi
Highly Voted 1 year, 5 months agosdokmak
Highly Voted 3 years, 5 months agoThaier
Most Recent 6 months, 2 weeks ago[Removed]
8 months, 1 week agoCyber15
1 year ago[Removed]
1 year, 4 months agoAlizadeh
1 year, 11 months agoZUMY
2 years, 5 months agoBlankNothing1
2 years, 5 months agoSSESSE2021
3 years agolaurvy36
2 years, 11 months ago