which actions are performed on dial-in access users in the SAFE SMR midsize network design corporate Internet module?

You are the security administrator at Certkiller Inc and you need to authenticate users to the network. After being authenticated, which actions are performed on dial-in access users in the SAFE SMR midsize network design corporate Internet module?

You are the security administrator at Certkiller Inc and you need to authenticate users to the network. After being authenticated, which actions are performed on dial-in access users in the SAFE SMR midsize network design corporate Internet module?

A.
After being authenticated, CHAP is used to authenticate the user.

B.
After being authenticated, traffic is sent through a Layer 3 switch.

C.
After being authenticated, users are provided with IP addresses from an IP pool.

D.
After being authenticated, traffic is sent through a router.

Explanation:
Last sentence of the paragraph states: When authenticated, the users are provided with IP addresses from an IP pool.
However it also states that CHAP is used to authenticate the user (Answer A) But the keyword is ‘After being authenticated’ not ‘During or When’. Reference: Cisco SAFE Implementation Courseware version 1.1 Page 6-17



Leave a Reply 0

Your email address will not be published. Required fields are marked *