A company wants to prevent unauthorized devices from connecting to the wired network by authenticating users or devices before granting network access. Which of the following technologies should be implemented on the switch ports to achieve this?
Answer choices
Why each option matters
Good practice is not just finding the correct option. The wrong answers often show the exact trap the exam wants you to fall into.
Best answer
A: 802.1X
802.1X provides port-based authentication, blocking access until credentials are verified.
Distractor review
B: Port security with MAC address sticky
Port security limits the number of MAC addresses on a port and can be used to restrict devices, but it does not authenticate users.
Distractor review
C: Access control lists (ACLs)
ACLs filter traffic based on IP addresses or protocols but do not authenticate before granting network access.
Distractor review
D: DHCP snooping
DHCP snooping prevents rogue DHCP servers but does not authenticate devices trying to connect to the network.
Common exam trap
Common exam trap: ACLs stop at the first match
ACLs are processed top to bottom. The first matching entry wins, and an implicit deny usually exists at the end.
Technical deep dive
How to think about this question
ACL questions test precision: source, destination, protocol, port and direction. A generally correct ACL can still fail if it is applied on the wrong interface or in the wrong direction.
KKey Concepts to Remember
- Standard ACLs match source addresses.
- Extended ACLs can match source, destination, protocol and ports.
- The first matching ACL entry is used.
- There is usually an implicit deny at the end.
TExam Day Tips
- Check inbound versus outbound direction.
- Read the ACL from top to bottom.
- Look for a broader permit or deny above the intended line.
Related practice questions
Related N10-009 practice-question pages
Use these pages to review the topic behind this question. This is how one missed question becomes focused revision.
Network+ network fundamentals practice questions
Practise N10-009 questions linked to Network+ network fundamentals.
Network+ implementation practice questions
Practise N10-009 questions linked to Network+ implementation.
Network+ operations practice questions
Practise N10-009 questions linked to Network+ operations.
Network+ security practice questions
Practise N10-009 questions linked to Network+ security.
Network+ troubleshooting practice questions
Practise N10-009 questions linked to Network+ troubleshooting.
More questions from this exam
Keep practising from the same exam bank, or move into a focused topic page if this question exposed a weak area.
Question 1
A network engineer needs to connect two switches located 400 meters apart. The cable run includes high electromagnetic interference from nearby machinery. The engineer decides to use fiber optic cabling. Which transceiver type and fiber combination should be used to ensure the link reaches 400 meters while remaining cost-effective?
Question 2
A network engineer is designing a new switched network and needs to ensure that broadcast traffic from one department does not reach another department's workstations. The engineer plans to use VLANs. Which of the following must be configured on the switches to isolate broadcast domains as intended?
Question 3
A security engineer is configuring a site-to-site VPN between two branch offices. The requirement is to encrypt all traffic between the two networks using IPsec. Which IPsec mode should be used to encrypt the entire IP packet including the original header?
Question 4
A network administrator is connecting two switches to increase bandwidth and provide redundancy. Which technology should be used to combine multiple physical links into a single logical link?
Question 5
A network administrator is experiencing issues where unauthorized devices are offering IP addresses to clients, causing connectivity problems. Which security feature should be enabled on switches to prevent this?
Question 6
A network administrator is troubleshooting a connectivity issue and suspects the problem is related to the physical cabling. At which layer of the OSI model should the administrator begin their investigation?
FAQ
Questions learners often ask
What does this N10-009 question test?
Standard ACLs match source addresses.
What is the correct answer to this question?
The correct answer is: A: 802.1X — 802.1X is a port-based authentication mechanism that requires devices (or users) to authenticate before the switch port becomes active. It is commonly used to control access to wired networks.
What should I do if I get this N10-009 question wrong?
Then try more questions from the same exam bank and focus on understanding why the wrong options are tempting.
Discussion
Sign in to join the discussion.