Which implementation mode is similar to the industry 802.1x behavior?
A. Low-impact mode
B. Close mode
C. Monitor mode
D. Device profiling
Which implementation mode is similar to the industry 802.1x behavior?
A. Low-impact mode
B. Close mode
C. Monitor mode
D. Device profiling
Correct answer is B.
The typical authentication procedure consists of:
Initialization On detection of a new supplicant, the port on the switch (authenticator) is enabled and set to the “unauthorized” state. In this state, only 802.1X traffic is allowed; other traffic, such as the Internet Protocol (and with that TCP and UDP), is dropped.
Reference :https://en.wikipedia.org/wiki/IEEE_802.1X