Least privilege network access: This principle ensures that users only have the minimum level of access needed to perform their job, minimizing the potential damage if their account is compromised.
Central policy management: This allows for consistent application of security policies across the entire network, making it easier to manage and enforce rules related to access control, authentication, and other security measures.
Why the other options are not as ideal:
Dynamic inventories: While useful for managing network devices and assets, it is not a direct security measure to prevent breaches.
Zero-touch provisioning: This simplifies device setup but does not address underlying security vulnerabilities.
Configuration drift prevention: This helps maintain consistent configurations on devices, but it is not a primary security measure.
Subnet range limits: This can help with network segmentation and control, but it is not a comprehensive security solution on its own.
A. Least privilege network access – This principle ensures that users and systems only have the minimum level of access required to perform their tasks, reducing the potential impact of a breach.
C. Central policy management – Centralized policy management helps enforce consistent security policies across the entire network, ensuring all systems are compliant and reducing vulnerabilities.
A: Least privilege network access as that's an efficient way to reduce unnecessary permissions being used on the network, and reduces the likelihood of an inside threat or social engineer gaining elevated credentials.
E: Configuration drift prevention as that can mean configurations not matching or updated to the baseline or golden configuration, which should be the most secure within the organization.
A: Least Privilege
C: Central Policy Management
These two answers best align with what the question is asking: "overall security". All other options are more specific than these two.
A: Least privilege network access as that's an efficient way to reduce unnecessary permissions being used on the network, and reduces the likelihood of an inside threat or social engineer gaining elevated credentials.
E: Configuration drift prevention as that can mean configurations not matching or updated to the baseline or golden configuration, which should be the most secure within the organization.
A. Least privilege network access
C. Central policy management
upvoted 3 times
...
This section is not available anymore. Please use the main Exam Page.N10-009 Exam Questions
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
Trouble_Magnet
1 week, 5 days agoTazah
3 months, 1 week agoCISUMPATR
5 months agokinkistyle
5 months, 3 weeks agoCoburn
5 months, 4 weeks agommmpeanutbuttercrunch
6 months, 3 weeks agoParshman
6 months, 3 weeks agochupapi_001
8 months, 2 weeks ago