exam questions

Exam 200-301 All Questions

View all questions & answers for the 200-301 exam

Exam 200-301 topic 1 question 640 discussion

Actual exam question from Cisco's 200-301
Question #: 640
Topic #: 1
[All 200-301 Questions]

What are two recommendations for protecting network ports from being exploited when located in an office space outside of an IT closet? (Choose two.)

  • A. enable the PortFast feature on ports
  • B. configure static ARP entries
  • C. configure ports to a fixed speed
  • D. implement port-based authentication
  • E. shut down unused ports
Show Suggested Answer Hide Answer
Suggested Answer: DE 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
ProgSnob
Highly Voted 3 years, 5 months ago
I was thinking static ARP entries would also prevent ports from being exploited but I guess the other two are actually better choices.
upvoted 10 times
[Removed]
1 year, 4 months ago
Yeah MAC addresses are easily spoofed, so D and E are much better alternatives.
upvoted 1 times
...
...
Eyan
Highly Voted 3 years, 7 months ago
checked and it is correct answers DE
upvoted 7 times
...
Joshua25
Most Recent 6 months, 2 weeks ago
Selected Answer: BE
B and E are the best options. D is secure but unrealistic. It's not that you want it and you can have it. Port-based authentication means implementing 802.1x using a RADIUS or TACACS server. It really depends on your existing infrastructure and budget. Applying 802.1x for every endpoint in an organisation requires enormous work, and reduces flexibility in everyday operation. If a network already has port-based authentication, very good, keep using it. If it doesn't have yet, no need to force yourself use it. You would need to set up an AAA server, install certificates on endpoints, configure the switch, and every time when a device is moved or changed you have to reconfigure it. B can effectively stop most unauthorised devices connecting to the network. E cuts off the connectivity from the root. These are feasible methods in real work.
upvoted 1 times
...
[Removed]
1 year, 1 month ago
Selected Answer: DE
D & E are correct
upvoted 1 times
...
RODCCN
1 year, 9 months ago
Selected Answer: DE
Port-based authentication = 802.1x (RADIUS/TACACS+) - IEEE 802.1X port-based authentication is configured on a device to prevent unauthorized devices (supplicants) from gaining access to the network. The device can combine the function of a router, switch, and access point, depending on the fixed configuration or installed modules. The switch functions are provided by either built-in switch ports or a plug-in module with switch ports. This feature supports both access ports and trunk ports. LINK: https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/sec_usr_8021x/configuration/xe-3se/3850/sec-user-8021x-xe-3se-3850-book/config-ieee-802x-pba.html
upvoted 1 times
...
raydel92
3 years, 5 months ago
Selected Answer: DE
This might help: https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/sec_usr_8021x/configuration/xe-3se/3850/sec-user-8021x-xe-3se-3850-book/config-ieee-802x-pba.html
upvoted 3 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago