exam questions

Exam N10-008 All Questions

View all questions & answers for the N10-008 exam

Exam N10-008 topic 1 question 399 discussion

Actual exam question from CompTIA's N10-008
Question #: 399
Topic #: 1
[All N10-008 Questions]

A client who shares office space and an IT closet with another company recently reported connectivity issues throughout the network. Multiple third-party vendors regularly perform on-site maintenance in the shared IT closet. Which of the following security techniques would BEST secure the physical networking equipment?

  • A. Disabling unneeded switchports
  • B. Implementing role-based access
  • C. Enable logging
  • D. Configuring an access control list
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
[Removed]
Highly Voted 2 years, 1 month ago
This question was already asked and it said the answer was B. They trying to jebait us now. Dont fall for it Kings.
upvoted 16 times
...
PatrickH
Highly Voted 2 years, 1 month ago
BEST secure the physical networking equipment. PHYSICAL NETWORKING EQUIPMENT. Its disabling unused ports. The other 3 answers are good ideas in general BUT wont help to secure physical equipment
upvoted 12 times
...
veggietron9000
Most Recent 9 months, 1 week ago
Selected Answer: A
Role based access doesn't really work because it's a shared closet. You can't deny the other parties access to that closet if it's a shared resource. Given that, I'd say disabling unneeded switchports.
upvoted 1 times
...
Los1994
1 year ago
Selected Answer: A
Option A, disabling unneeded switchports, is indeed related to physical security. By disabling switchports that are not in use, the network administrator can reduce the risk of unauthorized access or tampering with network devices through unused ports. This helps prevent potential security breaches or disruptions caused by unauthorized individuals gaining physical access to the network infrastructure. So, in the context of securing physical networking equipment in a shared IT closet, option A would indeed be a valid choice. Thank you for pointing out the distinction!
upvoted 3 times
...
13thFloor
1 year, 2 months ago
Selected Answer: A
Physical security
upvoted 1 times
...
shaneo007
1 year, 5 months ago
Would enabling Logging actually secure it. ? Or just give logging information. A or B would be a more logical answer.
upvoted 1 times
...
Kirby87
1 year, 5 months ago
B. Implementing role-based access Implementing role-based access is the best security technique to secure physical networking equipment in a shared IT closet. Role-based access control (RBAC) ensures that only authorized personnel have access to specific areas and equipment based on their roles and responsibilities. This helps prevent unauthorized individuals, including maintenance personnel from other companies, from accessing networking equipment. While other options such as disabling unneeded switchports (A), enabling logging (C), and configuring an access control list (D) are important security measures, implementing role-based access is specifically designed to control physical access to the networking equipment in a more granular and role-specific manner.
upvoted 3 times
...
IckyNicky
1 year, 5 months ago
Selected Answer: B
In a scenario where networking equipment is shared among multiple entities and various third-party vendors have access to the IT closet, B. Implementing role-based access would be the most effective security technique to secure the physical networking equipment. Role-based access control (RBAC) is a security approach that restricts network access based on the roles or responsibilities of individual users within an organization. By implementing RBAC, different access levels and permissions can be assigned to users or groups based on their job roles or responsibilities. This ensures that only authorized personnel have access to specific parts of the network infrastructure.
upvoted 1 times
Paula77
1 year, 4 months ago
Nothing to do with physical security
upvoted 1 times
...
...
Cherubael
1 year, 7 months ago
Selected Answer: A
Going against the grain on this one and saying it's A. NONE of those are Physical security. Role-Based Access Control is like group membership in active directory, which has nothing to do with securing your physical equipment.
upvoted 4 times
...
actingnurse1
1 year, 8 months ago
Selected Answer: A
The only physical security act in that is disabling the switchports.
upvoted 6 times
...
ja1092m
1 year, 8 months ago
There's no way it's RBAC, it said PHYSICAL, which has to be disabling unneeded switch ports.
upvoted 3 times
...
Juliana1017
1 year, 9 months ago
Selected Answer: B
role based access
upvoted 1 times
...
rah555
1 year, 11 months ago
Selected Answer: B
Role-based access control (RBAC) is a security technique that restricts access to resources based on the user's role in the organization. This is a more secure approach than simply granting access to all users, as it ensures that only authorized users have access to sensitive data.
upvoted 1 times
...
CookieChip
2 years ago
Selected Answer: B
B. Implementing role-based access
upvoted 1 times
...
famco
2 years ago
RBAC could be but the question used "physical" keyword and the question creator might be expecting "disabling switch ports" to avoid someone connecting to a port and do something malicious. That is what I will do personally. But who knows what experience the question creator got. Probably only reading books and strictly only the index pages
upvoted 1 times
famco
2 years ago
I will go for disabling switch ports. RBAC could be for physical access or otherwise. But disabling unused ports is mainly to stop someone physically connecting to a switch port illegally. If I could challenge the question I will do that
upvoted 3 times
...
...
PaytoPlay
2 years ago
Selected Answer: B
Agreed, RBAC.
upvoted 1 times
...
Cannnon
2 years, 1 month ago
Selected Answer: B
B. Implementing role-based access
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago