A technician wants to prevent an unauthorized host from connecting to the network via Ethernet.
Which of the following is a Layer 2 access control the technician should implement?
A.
Access control lists B.
Captive portal C.
WPA2 D.
Port security.
D.
A technician wants to prevent an unauthorized host from connecting to the network via Ethernet.
Which of the following is a Layer 2 access control the technician should implement?
A.
Access control lists
B.
Captive portal
C.
WPA2
D.
Port security.
D.
The correct answer is D. Port security.
Layer 2 access controls are implemented at the Data Link Layer of the OSI model, which is responsible for the reliable transmission of data over a physical link. One way to control access at this layer is by using port security.
Port security is a feature that allows network administrators to restrict the number of devices that can connect to a switch port. When port security is enabled on a switch port, only authorized devices are allowed to connect to that port, while unauthorized devices are prevented from accessing the network.
To implement port security, the network administrator must configure the switch to allow only certain MAC addresses to connect to a specific port. The MAC addresses of the authorized devices are stored in a secure address table on the switch. If an unauthorized device attempts to connect to the port, it will be blocked from accessing the network.
Port security is an effective way to prevent unauthorized hosts from connecting to a network via Ethernet. It is commonly used in environments where security is a high priority, such as in government or financial institutions.