ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 405 - N10-008 discussion

Report
Export

The lack of a formal process to grant network permissions to different profiles of employees and contractors is leading to an increasing number of security incidents Non-uniform and overly permissive network accesses are being granted. Which of the following would be the MOST appropriate method to improve the security of the environment?

A.
Change the default permissions to implicit deny
Answers
A.
Change the default permissions to implicit deny
B.
Configure uniform ACLs to employees and NAC for contractors.
Answers
B.
Configure uniform ACLs to employees and NAC for contractors.
C.
Deploy an RDP server to centralize the access to the network
Answers
C.
Deploy an RDP server to centralize the access to the network
D.
Implement role-based access control
Answers
D.
Implement role-based access control
Suggested answer: D

Explanation:

The most appropriate method to improve the security of the environment would be to implement role-based access control (RBAC). With RBAC, users are granted access to the network based on their role within the organization. This allows for more granular access control, as different roles may require different levels of access. Additionally, this ensures that users only have access to the resources they need and no more. This helps to reduce the risk of unauthorized access or misuse of the network. Reference and further information can be found in the CompTIA Network+ Study Manual, Chapter 8, Access Control.

RBAC is a method of restricting network access based on the roles of individual users within the organization. With RBAC, users are granted access only to the resources they need to perform their specific job functions. This approach reduces the risk of unauthorized access, provides greater visibility into user activity, and simplifies network management. Changing the default permissions to implicit deny may improve security, but it could also cause issues for legitimate users who require access to specific resources. Configuring uniform ACLs and NAC for contractors is a step in the right direction, but it may not be enough to address the overall lack of a formal process for granting network permissions. Deploying an RDP server to centralize access to the network is not a viable solution, as it would not address the root cause of the security incidents.

Therefore, the most appropriate option is to implement role-based access control. Reference:

CompTIA Network+ Study Guide, Fourth Edition, Chapter 7, section 7.4.

asked 02/10/2024
Farshin Golpad
38 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first