Implementing and Administering Cisco Solutions: Access Layer Threat-Mitigation Techniques for Identity-Based Security

Access Layer Threat-Mitigation Techniques for Identity-Based Security


Which access layer threat-mitigation technique provides security based on identity?



Click on the arrows to vote for the correct answer

A. B. C. D.


The access layer of a network is the layer closest to end devices, such as PCs, printers, and servers. This layer provides connectivity to the rest of the network and is often the first line of defense against network threats.

In this context, access layer threat-mitigation techniques refer to security measures that can be implemented at the access layer to prevent or mitigate network threats. One such technique is providing security based on identity, which can be achieved through the use of the 802.1x protocol.

802.1x is an IEEE standard that provides port-based network access control. It allows a network to authenticate the identity of a device or user attempting to connect to the network before allowing access. This is done through a process of authentication, authorization, and accounting (AAA).

Authentication involves verifying the identity of the device or user by requesting a set of credentials, such as a username and password or a digital certificate. Authorization involves determining what level of access the device or user is allowed based on their identity. Accounting involves tracking and logging network usage for auditing purposes.

By implementing 802.1x, network administrators can ensure that only authorized devices or users are allowed access to the network, which can significantly reduce the risk of network threats, such as unauthorized access, data breaches, and malware infections.

In contrast, Dynamic ARP Inspection and DHCP snooping are techniques used to prevent certain types of network attacks, such as ARP spoofing and DHCP spoofing. These techniques do not provide security based on identity.

Using a non-default native VLAN is a technique used to prevent VLAN hopping attacks, where an attacker attempts to send malicious traffic between VLANs. While this technique can provide some level of security, it does not provide security based on identity.