exam questions

Exam 350-401 All Questions

View all questions & answers for the 350-401 exam

Exam 350-401 topic 1 question 871 discussion

Actual exam question from Cisco's 350-401
Question #: 871
Topic #: 1
[All 350-401 Questions]

Which two methods are used to assign security group tags to the user in a Cisco TrustSec. architecture? (Choose two.)

  • A. web authentication
  • B. IEEE 802.1x
  • C. DHCP
  • D. modular QoS
  • E. policy routing
Show Suggested Answer Hide Answer
Suggested Answer: AB 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Exam12559
Highly Voted 1 year, 2 months ago
Selected Answer: AB
A. Web authentication Used when a user logs in using a web browser. When a user accesses the network using this method, web authentication authenticates the user and assigns a security group tag. This is an effective authentication method when the client terminal does not have an 802.1X supplicant function. B. IEEE 802.1x A network access control protocol that provides authentication and authorization. It consists of three elements: an authentication server, an authenticator, and a supplicant. When a user connects to a network, they are authenticated using 802.1x and are granted permission to access the network. Through this authentication process, users are assigned the appropriate security group tag.
upvoted 10 times
...
Abbribas
Most Recent 1 month ago
Selected Answer: AB
Cisco TrustSec is a software-defined network security solution designed to simplify access control, segmentation, and policy enforcement in enterprise networks. It helps organizations protect their networks and data by using security group tags (SGTs) instead of traditional, complex methods like IP-based access control lists (ACLs). TrustSec is part of Cisco’s broader intent-based networking (IBN) architecture.
upvoted 1 times
...
chiacche
4 months ago
Selected Answer: AB
802.1x, MAB (MAC Authentication Bypass), or WebAuth.
upvoted 2 times
...
[Removed]
7 months, 1 week ago
Selected Answer: AB
A and B are correct
upvoted 1 times
...
[Removed]
7 months, 4 weeks ago
A and B are correct
upvoted 1 times
...
teems5uk
12 months ago
Selected Answer: AB
TrustSec uses SGT tags to perform ingress tagging and egress filtering to enforce access control policy. Cisco ISE assigns the SGT tags to users or devices that are successfully authenticated and authorized through 802.1x, MAB, or WebAuth. The SGT tag assignment is delivered to the authenticator as an authorization option (in the same way as a dACL). After the SGT tag is assigned, an access enforcement policy (allow or drop) based on the SGT tag can be applied at any egress point of the TrustSec network.
upvoted 4 times
...
NikosTsironis
1 year, 1 month ago
Selected Answer: AB
AB is the correct, the rest make no sense for authentication
upvoted 4 times
...
shefo1
1 year, 2 months ago
Selected Answer: AB
Admin please fix from OCG p.735 Cisco ISE assigns the SGT tags to users or devices that are successfully authenticated and authorized through 802.1x, MAB, or WebAuth.
upvoted 4 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago