ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 285 - N10-008 discussion

Report
Export

A client who shares office space and an IT closet with another company recently reported connectivity issues throughout the network. Multiple third-party vendors regularly perform on-site maintenance in the shared IT closet. Which of the following security techniques would BEST secure the physical networking equipment?

A.
Disabling unneeded switchports
Answers
A.
Disabling unneeded switchports
B.
Implementing role-based access
Answers
B.
Implementing role-based access
C.
Changing the default passwords
Answers
C.
Changing the default passwords
D.
Configuring an access control list
Answers
D.
Configuring an access control list
Suggested answer: B

Explanation:

Role-based access is a security technique that assigns permissions and privileges to users or groups based on their roles or functions within an organization. Role-based access can help secure the physical networking equipment by limiting who can access, modify, or manage the devices in the shared IT closet. Only authorized personnel with a valid role and credentials should be able to access the networking equipment. Disabling unneeded switchports is a security technique that prevents unauthorized devices from connecting to the network by turning off unused ports on a switch. Changing the default passwords is a security technique that prevents unauthorized access to network devices by replacing the factory-set passwords with strong and unique ones. Configuring an access control list is a security technique that filters network traffic by allowing or denying packets based on criteria such as source and destination IP addresses, ports, or protocols.

Reference: CompTIA Network+ Certification Exam Objectives Version 7.0 (N10-007), Objective 3.2:

Given a scenario, use appropriate network hardening techniques.

asked 02/10/2024
Jendoubi moez
36 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first