Describe 802.1X and explain what was used before 802.1X and the issues associated with it.

What will be an ideal response?


802.1X is a port-based authentication network access control mechanism for networks. In other words, it's a complete authentication standard designed to force devices to go through a full AAA process to get anywhere past the interface on a gateway system. Before 802.1X, a system on a wired network could always access another system's port. Granted, an attacker wouldn't be able to do much until he gave a user name/password or certificate, but he could still send packets to any computer on the network. This wasn't good because it enabled attackers to get to the systems to try to do evil things. 802.1X prevented them from even getting in the door until they were authenticated and authorized.
 

Computer Science & Information Technology

You might also like to view...

A stack is the ideal collection to use when _______________________

a) implementing a radix sort b) evaluating a postfix expression c) modeling customers standing in line at the checkout of a grocery store d) finding the largest number in an array e) none of the above

Computer Science & Information Technology

Answer the following statements true (T) or false (F)

The pipe (|) character redirects the output of the command preceding it.

Computer Science & Information Technology

In a stacked layout, labels and text boxes are arranged:

A) in rows and columns like a table. B) vertically in one column with a label below each text box. C) vertically in one column with a label above each text box. D) vertically with a label to left of each text box.

Computer Science & Information Technology

The solid circle located at the top of a UML activity diagram represents a(n) ________.

a) action state b) final state c) transition d) initial state

Computer Science & Information Technology