exam questions

Exam JN0-647 All Questions

View all questions & answers for the JN0-647 exam

Exam JN0-647 topic 1 question 47 discussion

Actual exam question from Juniper's JN0-647
Question #: 47
Topic #: 1
[All JN0-647 Questions]

Click the Exhibit.

You have configured 802.1X single supplicant mode on the access switch. The VoIP phone does not support 802.1X authentication.
Referring to the exhibit, which statement is true?

  • A. MAC bypass must be configured for the VoIP phone for this solution to work.
  • B. Authentication must be changed to multiple supplicant mode for this solution to work.
  • C. The VoIP phone will be able to communicate over the network after the workstation authenticates.
  • D. The VoIP phone will not be able to communicate over the network.
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Zeke9
4 years, 7 months ago
"If an IP phone and a user’s PC are connected to the same switch port and only one of the two devices is 802.1X capable, use single supplicant mode. Single supplicant mode authenticates the 802.1X-capable device and freely permits traffic from other devices without further authentication."
upvoted 1 times
...
Theker
4 years, 8 months ago
should be C...Single Supplicant mode need only one node to be authenticated in order to give acces to all the others nodes
upvoted 2 times
...
boyseven777
4 years, 9 months ago
should be A https://www.juniper.net/documentation/en_US/junos/topics/topic-map/802-1x-and-voip-on-switches.html
upvoted 2 times
Rowdy_47
4 years, 9 months ago
in that link you sent above If an 802.1X-compatible IP telephone does not have an 802.1X host but has another 802.1X-compatible device connected to its data port, you can connect the phone to an interface in single supplicant mode. In single supplicant mode, the 802.1X process authenticates only the first supplicant. All other supplicants who connect later to the interface are allowed full access without any further authentication. They effectively “piggyback” on the first supplicant’s authentication. so the answer is C?
upvoted 1 times
Rowdy_47
4 years, 8 months ago
I think boyseven777 is actually right If an IP telephone does not support 802.1X, you can configure VoIP to bypass 802.1X and LLDP-MED and have the packets forwarded to a VoIP VLAN. To configure VoIP on an EX Series switch to support an IP phone that does not support 802.1X authentication, you must either add the MAC address of the phone to the static MAC bypass list or enable MAC RADIUS authentication on the switch.
upvoted 1 times
...
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago