Which standard is used for port-based authorization on both wired and wireless networks?

Study for the CompTIA SecurityX Test. Equip yourself with comprehensive flashcards and multiple choice questions that include hints and explanations. Gear up for your certification exam!

Multiple Choice

Which standard is used for port-based authorization on both wired and wireless networks?

Explanation:
Port-based authorization on wired and wireless networks is provided by IEEE 802.1X. It sets up a per-port access control mechanism where a switch or wireless access point (the authenticator) blocks traffic until the connected client (the supplicant) proves its identity to an authentication server (typically via a RADIUS server). The actual authentication uses EAP methods (like EAP-TLS, PEAP, etc.) within this framework, but the overarching standard that gates access at the port is 802.1X. Once the client authenticates successfully, the port is opened for normal network traffic; if authentication fails, access remains restricted. In contrast, EAP is just the authentication framework used inside 802.1X, while Kerberos and LDAP are directory/authentication mechanisms not designed to handle port-based access control at the network edge.

Port-based authorization on wired and wireless networks is provided by IEEE 802.1X. It sets up a per-port access control mechanism where a switch or wireless access point (the authenticator) blocks traffic until the connected client (the supplicant) proves its identity to an authentication server (typically via a RADIUS server). The actual authentication uses EAP methods (like EAP-TLS, PEAP, etc.) within this framework, but the overarching standard that gates access at the port is 802.1X. Once the client authenticates successfully, the port is opened for normal network traffic; if authentication fails, access remains restricted. In contrast, EAP is just the authentication framework used inside 802.1X, while Kerberos and LDAP are directory/authentication mechanisms not designed to handle port-based access control at the network edge.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy