Independence Day Deal! Unlock 25% OFF Today – Limited-Time Offer - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Cisco Exam 300-430 Topic 5 Question 78 Discussion

Actual exam question for Cisco's 300-430 exam
Question #: 78
Topic #: 5
[All 300-430 Questions]

WPA2 Enterprise with 802.1X is being used for clients to authenticate to a wireless network through a Cisco ISE server. For security reasons, the network engineer wants to ensure that only PEAP authentication is used. The engineer sent instructions to clients on how to configure the supplicants, but the ISE logs still show users authenticating using EAP-FAST. Which action ensures that access to the network is restricted for these users unless the correct authentication mechanism is configured?

Show Suggested Answer Hide Answer
Suggested Answer: A

Contribute your Thoughts:

Keshia
1 months ago
Hold up, are we sure the users aren't just trying to sneak in some EAP-FAST action? Maybe they're just feeling nostalgic for the good old days. Either way, D is the answer, and I'm not going to judge their authentication preferences.
upvoted 0 times
Bernadine
14 days ago
User 1: Maybe they just miss EAP-FAST, who knows.
upvoted 0 times
...
...
Amos
1 months ago
Yeah, D is definitely the way to go. No need to get all Big Brother on those users. Just set it up so they can only connect with PEAP, and let them figure it out. Easy peasy!
upvoted 0 times
Beula
12 days ago
User 2: Yeah, that way they'll have to configure it correctly to connect.
upvoted 0 times
...
Altha
1 months ago
User 1: I agree, D is the best option. Just make it so they can only use PEAP.
upvoted 0 times
...
...
Kiley
2 months ago
Haha, I like the way you think! Denying access based on MAC addresses is a clever idea, but I bet those users would just start spoofing their MACs. D is probably the better long-term solution.
upvoted 0 times
Myra
4 hours ago
User 3: D seems like the most secure option in the long run.
upvoted 0 times
...
Cherilyn
1 days ago
User 2: Yeah, it's a constant cat-and-mouse game with security.
upvoted 0 times
...
Kassandra
1 months ago
User 1: I agree, MAC address spoofing is a real concern.
upvoted 0 times
...
...
Tonette
2 months ago
I'm not sure, but A also sounds like a good option to gather usernames and disable accounts until they are correctly configured.
upvoted 0 times
...
France
2 months ago
Hmm, I'm not sure about that. Disabling RADIUS accounts or configuring an ACL on the WLC based on IP addresses seems a bit too heavy-handed. D looks like the more targeted and secure approach.
upvoted 0 times
Timmy
28 days ago
User 2: Yeah, it seems like the most secure option to ensure only PEAP authentication is used.
upvoted 0 times
...
Corrina
1 months ago
User 1: I think option D is the way to go.
upvoted 0 times
...
...
Billy
2 months ago
I agree with Gail, D seems like the most logical choice to ensure only PEAP authentication is used.
upvoted 0 times
...
Dominque
2 months ago
I think the correct answer is D. Enabling AAA override and configuring an access policy in Cisco ISE to allow access only when the EAP authentication method is PEAP seems like the most straightforward way to ensure that users can only use the desired authentication mechanism.
upvoted 0 times
...
Gail
2 months ago
I think the answer is D, because it specifically mentions restricting access based on the authentication method.
upvoted 0 times
...

Save Cancel
az-700  pass4success  az-104  200-301  200-201  cissp  350-401  350-201  350-501  350-601  350-801  350-901  az-720  az-305  pl-300  

Warning: Cannot modify header information - headers already sent by (output started at /pass.php:70) in /pass.php on line 77