exam questions

Exam N10-008 All Questions

View all questions & answers for the N10-008 exam

Exam N10-008 topic 1 question 433 discussion

Actual exam question from CompTIA's N10-008
Question #: 433
Topic #: 1
[All N10-008 Questions]

A computer engineer needs to ensure that only a specific workstation can connect to port 1 on a switch. Which of the following features should the engineer configure on the switch interface?

  • A. Port tagging
  • B. Port security
  • C. Port mirroring
  • D. Port aggregation
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Mehsotopes
5 months ago
Selected Answer: B
Port security, also known as persistent MAC learning or Sticky MAC, is a security feature that enables an interface to retain dynamically learned MAC addresses when the switch is restarted or if the interface goes down and is brought back online. This is a security feature that can be used to prevent someone from unplugging their office computer and connecting their own laptop to the network jack without permission since the switch port connected to that network jack would only allow the computer with the original MAC address to gain connectivity. Prevents unauthorized access to a switchport by identifying & limiting the MAC addresses of the hosts that are allowed. Port security refers to blocking unauthorized access to the physical switchport that's being used to allow the host to communicate on the LAN & mitigate MAC flooding by allowing only specific MAC addresses to communicate over a given switchport. This makes sure that only packets with a permitted source MAC address can send traffic through the switchport.
upvoted 1 times
...
salah112
5 months ago
Selected Answer: B
To ensure that only a specific workstation can connect to port 1 on a switch, the computer engineer should configure: B. Port security Port security is a feature that allows the restriction of access to a switch port based on the MAC address of the connected device. By configuring port security, the engineer can specify which MAC address is allowed to connect to the designated port, thereby controlling access to that port. Options A (Port tagging), C (Port mirroring), and D (Port aggregation) are different features used for various purposes: - A. Port tagging is related to VLANs (Virtual Local Area Networks). - C. Port mirroring is used for traffic analysis and monitoring by copying traffic from one port to another. - D. Port aggregation involves combining multiple physical ports into a single logical port for increased bandwidth and redundancy.
upvoted 3 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago