mediummultiple choiceObjective-mapped

Which statement best describes why layered controls are preferred for administrative access instead of relying on only one mechanism?

Question 1mediummultiple choice
Full question →

Which statement best describes why layered controls are preferred for administrative access instead of relying on only one mechanism?

Answer choices

Why each option matters

Good practice is not just finding the correct option. The wrong answers often show the exact trap the exam wants you to fall into.

A

Best answer

Because different controls address different risks, and using them together reduces security gaps.

This is correct because layered controls provide broader protection than any one control alone.

B

Distractor review

Because one control can never work in networking at all.

This is wrong because single controls can help, but they are usually not sufficient by themselves.

C

Distractor review

Because layered access always removes the need for troubleshooting.

This is wrong because layered security does not eliminate operational troubleshooting.

D

Distractor review

Because layered controls convert all dynamic routes into static routes.

This is wrong because access-control layers do not change routing methods.

Common exam trap

Common exam trap: answer the scenario, not the keyword

A frequent exam trap is believing that a single security mechanism, like authentication or encryption, fully secures administrative access. Candidates might select options implying that one control is sufficient or that layered controls eliminate troubleshooting. However, relying on only one mechanism leaves gaps that attackers can exploit. The exam tests understanding that layered controls address different risks and work together to reduce vulnerabilities. Misinterpreting this can lead to incorrect answers that underestimate the need for defense-in-depth in device administration.

Technical deep dive

How to think about this question

Layered controls in administrative access refer to the use of multiple security mechanisms working together to protect network devices. These layers typically include secure transport protocols like SSH to encrypt sessions, authentication methods such as username/password or multifactor authentication to verify user identity, authorization controls to limit user privileges, and logging to track user actions. Each layer addresses a different aspect of security, reducing the chance that a single vulnerability can be exploited. The decision to implement layered controls follows the defense-in-depth principle, which states that relying on a single security mechanism is insufficient because each control has its own limitations. For example, authentication alone does not prevent session hijacking, and encryption alone does not verify user identity. Combining these controls ensures that if one layer fails or is bypassed, others still provide protection, thereby reducing security gaps in administrative access. A common exam trap is to assume that one strong control, such as authentication or encryption, is enough to secure administrative access. In practice, Cisco devices require multiple layers to ensure comprehensive protection. For instance, enabling SSH without proper authorization or logging leaves the network vulnerable to misuse and undetected breaches. Understanding how these layers complement each other helps avoid this mistake and aligns with CCNA’s emphasis on secure device management.

KKey Concepts to Remember

  • Layered security controls combine multiple mechanisms to protect different aspects of administrative access, reducing overall security risks.
  • Authentication verifies the identity of users attempting to access network devices, forming the first line of defense.
  • Secure transport protocols like SSH encrypt administrative sessions to prevent interception and eavesdropping.
  • Authorization restricts what authenticated users can do on a device, limiting potential damage from compromised accounts.
  • Logging records administrative actions to provide accountability and support forensic analysis after security incidents.
  • Relying on a single security control leaves gaps that attackers can exploit, making layered controls essential for defense-in-depth.
  • Cisco’s device management best practices recommend combining authentication, encryption, authorization, and logging for secure administrative access.
  • Layered controls do not eliminate troubleshooting needs but improve security by addressing multiple attack vectors simultaneously.

TExam Day Tips

  • Watch for words such as best, first, most likely and least administrative effort.
  • Review why wrong options are wrong, not only why the correct option is correct.

Related practice questions

Related 200-301 practice-question pages

Use these pages to review the topic behind this question. This is how one missed question becomes focused revision.

More questions from this exam

Keep practising from the same exam bank, or move into a focused topic page if this question exposed a weak area.

FAQ

Questions learners often ask

What does this 200-301 question test?

Layered security controls combine multiple mechanisms to protect different aspects of administrative access, reducing overall security risks.

What is the correct answer to this question?

The correct answer is: Because different controls address different risks, and using them together reduces security gaps. — Layered controls are preferred because different mechanisms protect different parts of the administrative-access problem. In practical terms, secure transport protects the session, authentication verifies identity, authorization limits what can be done, and logging provides accountability. Relying on only one of those leaves gaps. This is a defense-in-depth principle applied to device administration.

What should I do if I get this 200-301 question wrong?

Then try more questions from the same exam bank and focus on understanding why the wrong options are tempting.

Discussion

Loading comments…

Sign in to join the discussion.