Which of the following actions should a security engineer take to implement Active Directory authentication on Layer 2 switches and ensure local fallback?

Prepare for the CompTIA Security+ SY0-601 exam. Explore comprehensive flashcards and diverse multiple-choice questions with hints and explanations. Get exam-ready now!

To implement Active Directory authentication on Layer 2 switches while ensuring local fallback, configuring AAA (Authentication, Authorization, and Accounting) on the switch with local login as secondary is the most appropriate action. This setup allows the switch to first authenticate users against the Active Directory via an authentication protocol like RADIUS. If this primary authentication method fails—perhaps due to network issues or if the Active Directory server is inaccessible—the switch can revert to local authentication, ensuring that users can still log in.

Implementing RADIUS is a strong option for centralized authentication and would support Active Directory authentication, but it wouldn't specifically address the need for local fallback without additional configuration. TACACS+ is another protocol that provides similar capabilities to RADIUS, however, it is not typically used in conjunction with Active Directory as commonly as RADIUS is. Enabling the local firewall on the Active Directory server is not relevant to supporting direct authentication or fallback procedures for Layer 2 switches.

In summary, the best approach here is configuring AAA with local login as secondary, which effectively creates a robust authentication strategy that accommodates both primary and fallback methods.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy