exam questions

Exam 200-301 All Questions

View all questions & answers for the 200-301 exam

Exam 200-301 topic 1 question 251 discussion

Actual exam question from Cisco's 200-301
Question #: 251
Topic #: 1
[All 200-301 Questions]

Which technology prevents client devices from arbitrarily connecting to the network without state remediation?

  • A. 802.11n
  • B. 802.1x
  • C. MAC Authentication Bypass
  • D. IP Source Guard
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
xbololi
Highly Voted 1 year, 5 months ago
"arbitrarily" yeah i use this word everyday... nice one cisco...
upvoted 24 times
...
sdokmak
Highly Voted 3 years, 5 months ago
B seems right. A. is a wifi extension protocol C. is a means of bypassing 802.1x which is the opposite of what we want. D. is when an attacker uses the same IP as the client. But the question states client devices as a given.
upvoted 17 times
...
Thaier
Most Recent 6 months, 2 weeks ago
state remediation? Really!!
upvoted 1 times
...
[Removed]
8 months, 1 week ago
Selected Answer: B
B is correct
upvoted 2 times
...
Cyber15
1 year ago
Selected Answer: B
The correct answer is B. 802.1x. Explanation: 802.1x is a port-based authentication protocol that prevents unauthorized devices from gaining access to the network. It requires clients to authenticate before being granted access. This technology is commonly used for controlling access to wireless and wired networks. Explanation for other options: A. 802.11n: 802.11n is a wireless standard and not specifically designed for preventing unauthorized access to the network. C. MAC Authentication Bypass: MAC Authentication Bypass allows devices with specific MAC addresses to bypass 802.1x authentication. While it provides a level of control, it does not offer the same level of security as 802.1x. D. IP Source Guard: IP Source Guard is a feature that helps prevent IP address spoofing attacks but is not primarily designed for controlling access to the network based on device authenticatio
upvoted 11 times
...
[Removed]
1 year, 4 months ago
Selected Answer: B
MS Switch Access Policies (802.1X) - Cisco Meraki "... Access Policy Types There are three options available for an access policy in Dashboard: 802.1X (Default) When an 802.1X access policy is enabled on a switchport, a client that connects to that switchport will be prompted to provide their domain credentials. If the RADIUS server accepts these credentials as valid, their device will be granted access to the network and get an IP configuration. If no authentication is attempted, they will be put on a "guest" VLAN, if one is defined. ... Other RADIUS Features ... Failed Authentication VLAN A client device connecting to a switchport controlled by an access-policy can be placed in the failed authentication VLAN if the RADIUS server denies its access request. Client devices may fail RADIUS authentication because they do not comply with the network's security requirements. The failed authentication VLAN provides such clients with limited access to network for remediation purposes. ..."
upvoted 4 times
...
Alizadeh
1 year, 11 months ago
Selected Answer: B
802.1x is a security standard that prevents client devices from arbitrarily connecting to the network without state remediation. It provides a framework for authenticating devices that are attempting to access a LAN or WLAN. 802.1x uses a supplicant (client device) and an authenticator (network access device) to establish a secure connection. The supplicant sends an authentication request to the authenticator, which then forwards the request to an authentication server. If the authentication server approves the request, the supplicant is allowed to access the network. If the request is denied, the supplicant is not allowed to access the network.
upvoted 4 times
...
ZUMY
2 years, 5 months ago
B is correct! 802.1X is a network authentication protocol that opens ports for network access when an organization authenticates a user's identity and authorizes them for access to the network. The user's identity is determined based on their credentials or certificate, which is confirmed by the RADIUS server
upvoted 4 times
...
BlankNothing1
2 years, 5 months ago
The source link would be in the CCNA 200-301 OCG Volume 1. Page 658, 2nd paragraph, 2nd sentence. Start with page 657, the subject "802.1x/EAP" will give more information.
upvoted 4 times
...
SSESSE2021
3 years ago
Any source link for this?
upvoted 1 times
laurvy36
2 years, 11 months ago
EEE 802.1X is an IEEE Standard for port-based Network Access Control (PNAC). It is part of the IEEE 802.1 group of networking protocols. It provides an authentication mechanism to devices wishing to attach to a LAN or WLAN
upvoted 5 times
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...