exam questions

Exam 200-301 All Questions

View all questions & answers for the 200-301 exam

Exam 200-301 topic 1 question 685 discussion

Actual exam question from Cisco's 200-301
Question #: 685
Topic #: 1
[All 200-301 Questions]

Which two practices are recommended for an acceptable security posture in a network? (Choose two.)

  • A. Use a cryptographic keychain to authenticate to network devices.
  • B. Place internal email and file servers in a designated DMZ.
  • C. Back up device configurations to encrypted USB drives for secure retrieval.
  • D. Disable unused or unnecessary ports, interfaces, and services.
  • E. Maintain network equipment in a secure location.
Show Suggested Answer Hide Answer
Suggested Answer: DE 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
alejandro12
Highly Voted 2 years, 5 months ago
A,D Use a cryptographic keychain to authenticate to network devices is correct, think Maintain network equipment in a secure location should be for physical not for security posture
upvoted 10 times
...
Joshua25
Most Recent 6 months, 2 weeks ago
Selected Answer: AD
AD are feasible. E is not realistic. You can't put network devices wherever you want. It's decided by many factors, like structure of the building, user location, cable length limitation, comms room location.
upvoted 1 times
...
[Removed]
1 year, 1 month ago
Selected Answer: DE
D & E are correct A is incorrect, while cryptographic keychains can enhance authentication security, they are not the only or primary recommended practice for securing a network.
upvoted 1 times
...
[Removed]
1 year, 4 months ago
Selected Answer: DE
The questions asks about an "acceptable security posture". Anything less than D and E is not acceptable; it's the bare minimum in regard to securing access to a network. The rest are nice to have, but in many cases may be unnecessarily complex or difficult to implement in non-enterprise scenarios.
upvoted 3 times
...
yeazas
1 year, 5 months ago
Selected Answer: DE
The two recommended practices for an acceptable security posture in a network are: D. Disable unused or unnecessary ports, interfaces, and services. E. Maintain network equipment in a secure location. Here's an explanation for each: D. Disable unused or unnecessary ports, interfaces, and services: By disabling any ports, interfaces, or services that are not actively needed, you reduce the potential attack surface of your network. Unused components may have vulnerabilities that could be exploited, so disabling them enhances security. E. Maintain network equipment in a secure location: Physical security is crucial for network equipment. Placing network devices in a secure location helps prevent unauthorized access, tampering, or theft. Physical security complements other security measures and is an integral part of an overall security strategy.
upvoted 2 times
...
NewJeans
1 year, 6 months ago
Selected Answer: DE
Answer: D and E Physical security is also a part of security posture. Cryptographic keychain is manly about data encryption, not authentication.
upvoted 3 times
...
Yinxs
1 year, 8 months ago
Selected Answer: DE
E is about physical security.
upvoted 3 times
...
Shun5566
1 year, 11 months ago
Selected Answer: AD
Agree alejandro
upvoted 2 times
...
bisiyemo1
2 years ago
Selected Answer: AD
A and D is the correct answers
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago