exam questions

Exam 300-715 All Questions

View all questions & answers for the 300-715 exam

Exam 300-715 topic 1 question 16 discussion

Actual exam question from Cisco's 300-715
Question #: 16
Topic #: 1
[All 300-715 Questions]

An engineer is configuring 802.1X and wants it to be transparent from the users' point of view. The implementation should provide open authentication on the switch ports while providing strong levels of security for non-authenticated devices.
Which deployment mode should be used to achieve this?

  • A. closed
  • B. high-impact
  • C. low-impact
  • D. open
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
THEODORABLE
7 months, 3 weeks ago
Selected Answer: C
C is correct--Low Impact mode deployment phase allows for suspension of the controlled port behavior (authentication open command) allowing for 802.1X auth to occur but no restriction due to the normal "closed mode" restriction of EAP only packets. It further allows for a Pre-authentication ACL to be used that can be customized to permit or deny any specific traffic--during the pre-authentication status. Once authenticated, this Pre-auth ACL will continue to apply restriction unless augmented with a DACL bearing the approved access permission as per policy.
upvoted 3 times
...
Hurley
1 year, 10 months ago
C is correct as in low impact mode the aim is to allow limited network access without authentication then authorize to the network authenticated devices
upvoted 3 times
...
rhylos
1 year, 11 months ago
is not A - Formerly known as high-security mode, closed mode allows only EAPOL traffic until the authentication process completes, which is the default behavior of an 802.1X- enabled switch port.
upvoted 1 times
...
YmerG
2 years, 3 months ago
The answer is correct, refer to the following phrases mentioned in the official book: 1. Remember that the goal of low-impact mode is to provide very limited network access to devices without authentication and then provide very specific access to those that have been authorized; this is the least privilege security principle. 2. Low-impact mode uses authentication open but adds security on top of the framework was built in monitor mode. It uses a PACL on the switch port to permit critical traffic of certain endpoints, such as thin clients, to function prior to an attempted authentication. After the authentication, the authorization should provide specific access, unlike monitor mode, which is the same before and after authentication.
upvoted 3 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago