Which selection represents the best practice for an 802…

The information security policy of your organization requires that ports should remain
administratively Up. Which selection represents the best practice for an 802.1X-enabled

port that is configured to allow only one host to authenticate on the port?

The information security policy of your organization requires that ports should remain
administratively Up. Which selection represents the best practice for an 802.1X-enabled

port that is configured to allow only one host to authenticate on the port?

A.
The 3k-access(config-if)# authentication violation shutdown command can be used to
prevent a second MAC address from authenticating on the port.

B.
The 3k-access(config-if)# authentication violation restrict command can be used to
prevent any MAC address from authenticating on the port.

C.
The 3k-access(config-if)# authentication violation ignore command can be used to
prevent any MAC address from authenticating on the port.

D.
The 3k-access(config-if)# authentication violation shutdown command can be used to
prevent a second MAC address from authenticating on the port.



Leave a Reply 0

Your email address will not be published. Required fields are marked *