View all questions & answers for the NSE 5 - FortiSwitch 7.6 Administrator Exam Materials exam
Question 60 Discussion
Comments
Selected Answers: B
A use case for this scenario could be an access point (AP). After the AP authenticates against the switch, any of its connected devices can access the network, despite them using a different MAC address from the one used by the AP during authentication. In addition, all devices are granted the same access level assigned to the AP. However, if you want to authenticate each device behind a port, and optionally, grant each device a different access level based on the credentials provided, then MAC-based is required. Security-wise, MAC-based is preferred because each host (or MAC address) behind the port must authenticate to access the network. Performance-wise, port-based is better because only a single host is required to authenticate.
PAGE: 215 | FORTISWITCH 7.6 ADMIN GUIDE
Which statement about 802.1X security profiles using MAC-based authentication mode is true? (Choose one answer)
Brave-Dump Clients Votes