exam questions

Exam N10-008 All Questions

View all questions & answers for the N10-008 exam

Exam N10-008 topic 1 question 652 discussion

Actual exam question from CompTIA's N10-008
Question #: 652
Topic #: 1
[All N10-008 Questions]

A client wants to increase overall security after a recent breach. Which of the following would be best to implement? (Choose two.)

  • A. Least privilege network access
  • B. Dynamic inventories
  • C. Central policy management
  • D. Zero-touch provisioning
  • E. Configuration drift prevention
  • F. Subnet range limits
Show Suggested Answer Hide Answer
Suggested Answer: AC 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
lauren2wright
Highly Voted 5 months, 3 weeks ago
A. Least privilege network access: Implementing the principle of least privilege ensures that users and systems have only the minimum levels of access or permissions necessary to perform their functions. This helps to limit the potential impact of security breaches. C. Central policy management: Centralized policy management allows for consistent application of security policies across the entire network. This ensures that security settings are centrally configured, monitored, and enforced, reducing the likelihood of misconfigurations or oversights that could lead to security vulnerabilities. While all the options listed can contribute to overall security, the two mentioned above are particularly effective in controlling access and managing security policies, which are crucial aspects of post-breach security measures.
upvoted 8 times
...
salah112
Most Recent 5 months ago
Selected Answer: AC
A. Least privilege network access C. Central policy management To increase overall security after a recent breach, implementing the following measures would be beneficial: A. Least privilege network access: Enforcing the principle of least privilege ensures that users, systems, and processes have only the minimum level of access necessary to perform their functions. This reduces the potential impact of a security breach and limits lateral movement within the network. C. Central policy management: Centralized policy management allows the client to define and enforce security policies consistently across the organization. This includes access controls, authentication requirements, and other security configurations. Centralized management enhances consistency and makes it easier to update and enforce security policies.
upvoted 3 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago