Network Topology: Preventing Unauthorized Access | N10-007 Exam | CompTIA Network+

Preventing Unauthorized Access

Prev Question Next Question

Question

A network topology requires a switch to be placed in an unsecured location.

Which of the following techniques should be used to prevent unauthorized access? (Choose two.)

A.

Disabling unused ports B.

Upgrading firmware C.

Using secure protocols D.

File hashing E.

MAC filtering F.

Configuring a honeypot.

AE.

Explanations

A network topology requires a switch to be placed in an unsecured location.

Which of the following techniques should be used to prevent unauthorized access? (Choose two.)

A.

Disabling unused ports

B.

Upgrading firmware

C.

Using secure protocols

D.

File hashing

E.

MAC filtering

F.

Configuring a honeypot.

AE.

The question asks for techniques that can be used to prevent unauthorized access to a switch that is placed in an unsecured location. Two techniques that can be used are:

A. Disabling unused ports: Unused ports on the switch should be disabled to prevent unauthorized access. This helps to limit the number of entry points for attackers to exploit.

E. MAC filtering: MAC filtering is a technique used to restrict access to a network based on the MAC address of the device. Only devices with authorized MAC addresses are allowed to access the network, while others are denied access.

B. Upgrading firmware: Firmware upgrades can improve security by fixing known vulnerabilities and adding new security features to the switch. This should be done regularly to ensure that the switch is protected against the latest threats.

C. Using secure protocols: The use of secure protocols such as HTTPS, SSH, and SNMPv3 can help to encrypt data and prevent unauthorized access to the switch.

D. File hashing: File hashing can be used to ensure the integrity of files on the switch. Hashes can be generated for the files and compared with the known good hashes to detect any changes that may have been made.

F. Configuring a honeypot: A honeypot is a decoy system that is used to attract attackers. By configuring a honeypot on the switch, an organization can gain valuable information about the tactics and techniques used by attackers, which can be used to improve security.

In summary, the two techniques that can be used to prevent unauthorized access to a switch placed in an unsecured location are disabling unused ports and MAC filtering.