exam questions

Exam N10-008 All Questions

View all questions & answers for the N10-008 exam

Exam N10-008 topic 1 question 344 discussion

Actual exam question from CompTIA's N10-008
Question #: 344
Topic #: 1
[All N10-008 Questions]

A client who shares office space and an IT closet with another company recently reported connectivity issues throughout the network. Multiple third-party vendors regularly perform on-site maintenance in the shared IT closet. Which of the following security techniques would BEST secure the physical networking equipment?

  • A. Disabling unneeded switchports
  • B. Implementing role-based access
  • C. Changing the default passwords
  • D. Configuring an access control list
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
TomSawyer
Highly Voted 2 years ago
I think it's 'A'. Here is my thought process: A security technique is needed that best secures physical networkink equipments. so...'B' 'C' 'D' answers are not gonna work since a person still is able to walk up to a device and cause harm, however out of the options given...option 'A' would best secure the physical devices.
upvoted 14 times
[Removed]
1 year, 9 months ago
Same thoughts too
upvoted 3 times
...
Katzze
1 year, 10 months ago
same thoughts
upvoted 3 times
...
...
badgerino
Highly Voted 1 year, 2 months ago
Selected Answer: A
Guys, I don't get why we're so mixed up on this one. The keywords are 'Secure PHYSICAL networking equipment'. The only one that would secure it PHYSICALLY would be disabling unneeded switch ports.
upvoted 6 times
...
JWrites
Most Recent 3 weeks, 6 days ago
Selected Answer: A
Gotta disable those switch ports. I'm a sysadmin, and recently had a PACS vendor showed up to install cameras, alarms, and magnetic locks at our site, and the first thing they did was plug their NVR into one of our switches without ever asking. Luckily, I'd disabled those ports because all the ACLs and password changes in the world wouldn't have stopped that.
upvoted 1 times
...
theficik
2 months, 3 weeks ago
B. Implementing role-based access Explanation: Role-based access control (RBAC) ensures that only authorized individuals can access certain parts of the IT closet and networking equipment. By assigning access based on roles (such as network admin, technician, etc.), only the appropriate personnel can perform maintenance or make changes to the network, reducing the risk of unauthorized changes or tampering by third-party vendors or other individuals who may have physical access to the shared space.
upvoted 1 times
...
Bracebg
10 months, 2 weeks ago
Vendor have access to the shared closet , so its not very hard to just use the same port as the switch is , so cant be A
upvoted 1 times
...
Mehsotopes
1 year, 1 month ago
Selected Answer: B
RBAC ensures better security throughout the network based on roles deciding where users are allowed & disallowed. Trying to instead disable switchports would force you to hop between different switches & ports individually for access control which would be an administrative nightmare.
upvoted 3 times
ETQ
3 months ago
You're clueless, I pity the person who will ever employ you. 1. It's a shared closet, you can't just use RBAC for random other people, it's not how it works "Role-based access control (RBAC) restricts network access based on a person's role within an organization" 2. They say PHYSICAL. RBAC is not physical and then that last sentence of yours is absolute nonsense, "hop between different switches & ports individually for access control which would be an administrative nightmare " wtf. Disabling UNUSED switchports is a well known way to protect access
upvoted 2 times
...
...
jeanj
1 year, 2 months ago
Selected Answer: A
the key word is physical
upvoted 2 times
...
comeragh
1 year, 2 months ago
Selected Answer: A
"secure the physical networking equipment" For me securing the physical network equipment is A - disabling unneeded switchports"
upvoted 4 times
...
Evernite
1 year, 2 months ago
Selected Answer: A
The only option here that is related to physically touching the device is Option A.
upvoted 2 times
...
Cherubael
1 year, 3 months ago
Can't be role based access since that doesn't physically secure networking equipment.
upvoted 1 times
...
StrawberryTechie
1 year, 4 months ago
Selected Answer: A
Disabling unused ports can stop a bad guy from plugging a malicious device into an unused port and getting unauthorized access to the network. "secure the physical networking equipment"
upvoted 3 times
...
WinEH
1 year, 5 months ago
Selected Answer: A
I am leaning more towards "A". Though I would implement steps "C" & "A" together in practical. In the question it says the "Secure the physical networking equipment". I will start with Disabling the unneeded Switch ports and then I will change the default passwords. What I am thinking is, implementing option "C" alone will not secure it, because unused enabled switch ports can still be used/exploited. But if you implement option "A" alone will mostly secures the device I guess, I would still implement option "C" anyway. Aarghh... what a frustrating question is this ? or Am I overthinking???????? I am open/happy to see others' thought processes... but guys, CHATGPT or GPT3.5/4 or AI's thought process, thats just full of shit. I believe that we are better than AI.
upvoted 3 times
...
brewersmurf
1 year, 7 months ago
Selected Answer: B
But it is a shared closet, so you do not have complete control. A would be more logical than B
upvoted 1 times
...
Aamm033
1 year, 7 months ago
Selected Answer: A
it says secure the pyshical networking equipment. for me it would be A.
upvoted 2 times
...
Cannnon
1 year, 9 months ago
Selected Answer: B
B. Implementing role-based access correct
upvoted 2 times
...
Cannnon
1 year, 9 months ago
B. Implementing role-based access is correct
upvoted 2 times
...
RobV
1 year, 9 months ago
Selected Answer: B
B. Implementing role-based access
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago