nerdexam
(ISC)2(ISC)2

CERTIFIED-IN-CYBERSECURITY · Question #339

CERTIFIED-IN-CYBERSECURITY Question #339: Real Exam Question with Answer & Explanation

The correct answer is C: 802.1x. The best technology for port-based authentication to ensure network clients authenticate before use is 802.1x. 802.1x is a standard for port-based network access control that provides a mechanism for authenticating devices before granting them access to the network. This technolo

Network Security Concepts

Question

Which technology is BEST for port-based authentication to ensure that network clients authenticate before use?

Options

  • A802.3
  • B802.15.1
  • C802.1x
  • D802.11g

Explanation

The best technology for port-based authentication to ensure network clients authenticate before use is 802.1x. 802.1x is a standard for port-based network access control that provides a mechanism for authenticating devices before granting them access to the network. This technology is commonly used to secure wired and wireless networks. It ensures that only authenticated devices are allowed to access the network (see ISC2 Study Guide, Module 3, under Network Access Control). While 802.11g is a wireless networking standard, 802.3 is an Ethernet standard, and 802.15.1 is a Bluetooth standard, none is specifically designed for port- based authentication.

Topics

#Network Access Control#802.1X#Port Authentication#Network Security

Community Discussion

No community discussion yet for this question.

Full CERTIFIED-IN-CYBERSECURITY PracticeBrowse All CERTIFIED-IN-CYBERSECURITY Questions