mediummultiple choiceObjective-mapped

A company wants all corporate laptops to authenticate to Wi-Fi using device certificates instead of shared passwords. It also wants to deny network access to systems that do not meet the baseline requirement for disk encryption and current endpoint protection. Which approach best satisfies both goals?

Question 1mediummultiple choice
Full question →

A company wants all corporate laptops to authenticate to Wi-Fi using device certificates instead of shared passwords. It also wants to deny network access to systems that do not meet the baseline requirement for disk encryption and current endpoint protection. Which approach best satisfies both goals?

Answer choices

Why each option matters

Good practice is not just finding the correct option. The wrong answers often show the exact trap the exam wants you to fall into.

A

Distractor review

Use a single WPA2-Personal passphrase and email it to all employees.

A shared passphrase cannot validate device identity or enforce device compliance requirements.

B

Best answer

Deploy 802.1X with certificate-based authentication and network access control posture checks.

802.1X with certificates verifies device identity, and NAC posture assessment can block noncompliant endpoints.

C

Distractor review

Allow any device to join and rely on antivirus scans after users log in.

Post-login scans are reactive and do not prevent noncompliant devices from joining the network.

D

Distractor review

Use MAC address filtering and a captive portal for all internal Wi-Fi users.

MAC filtering is weak against spoofing and captive portals do not provide strong device authentication or compliance enforcement.

Common exam trap

Common exam trap: ACLs stop at the first match

ACLs are processed top to bottom. The first matching entry wins, and an implicit deny usually exists at the end.

Technical deep dive

How to think about this question

ACL questions test precision: source, destination, protocol, port and direction. A generally correct ACL can still fail if it is applied on the wrong interface or in the wrong direction.

KKey Concepts to Remember

  • Standard ACLs match source addresses.
  • Extended ACLs can match source, destination, protocol and ports.
  • The first matching ACL entry is used.
  • There is usually an implicit deny at the end.

TExam Day Tips

  • Check inbound versus outbound direction.
  • Read the ACL from top to bottom.
  • Look for a broader permit or deny above the intended line.

Related practice questions

Related SY0-701 practice-question pages

Use these pages to review the topic behind this question. This is how one missed question becomes focused revision.

More questions from this exam

Keep practising from the same exam bank, or move into a focused topic page if this question exposed a weak area.

FAQ

Questions learners often ask

What does this SY0-701 question test?

Standard ACLs match source addresses.

What is the correct answer to this question?

The correct answer is: Deploy 802.1X with certificate-based authentication and network access control posture checks. — 802.1X with certificate-based authentication is the strongest fit because it validates the device rather than relying on a shared secret that can be copied or leaked. When paired with network access control posture checks, the organization can require encryption, EDR, and other baseline settings before granting access. This approach supports secure wireless access and ties connectivity to endpoint health instead of assuming every connected device is trustworthy. Why others are wrong: A shared Wi-Fi password is easy to reuse or expose and does not identify a device. Post-login antivirus scans happen too late to prevent risky access. MAC filtering and captive portals are weak controls compared with certificate-based authentication and posture-aware access enforcement.

What should I do if I get this SY0-701 question wrong?

Then try more questions from the same exam bank and focus on understanding why the wrong options are tempting.

Discussion

Loading comments…

Sign in to join the discussion.