Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Juniper JN0-650 Exam - Topic 2 Question 6 Discussion

Actual exam question for Juniper's JN0-650 exam
Question #: 6
Topic #: 2
[All JN0-650 Questions]

You are asked to establish authentication for users connecting to the corporate network. You must ensure that only corporate devices that are identified by MAC addresses are allowed to authenticate and connect Authentication must be handled by a centralized database.

Which authentication method would you implement in this scenario?

Show Suggested Answer Hide Answer
Suggested Answer: A

Contribute your Thoughts:

0/2000 characters
Leota
3 days ago
Wait, can MAC addresses really be trusted? Seems risky.
upvoted 0 times
...
Ryann
8 days ago
Totally agree, it’s the most secure option here.
upvoted 0 times
...
Velda
13 days ago
I think MAC RADIUS is the way to go for device authentication.
upvoted 0 times
...
Katy
18 days ago
I recall that single supplicant mode is usually for simpler setups, so it might not fit this scenario with the need for centralized authentication.
upvoted 0 times
...
Novella
23 days ago
I practiced a question similar to this, and I feel like single-secure supplicant mode could be relevant, but I'm not confident about it.
upvoted 0 times
...
Evangelina
29 days ago
I'm not entirely sure, but I remember something about captive portals being more for guest access rather than corporate devices.
upvoted 0 times
...
Victor
1 month ago
I think MAC RADIUS might be the right choice since it involves MAC address filtering and centralized authentication.
upvoted 0 times
...

Save Cancel