オフィス スペースと IT クローゼットを別の会社と共有しているクライアントが最近、ネットワーク全体の接続の問題を報告しました。複数のサードパーティ ベンダーが、共有 IT クローゼットで定期的にオンサイト メンテナンスを実施しています。次のセキュリティ技術のうち、物理的なネットワーク機器を保護するのに最も適しているのはどれですか?
正解:B
Explanation Role-based access is a security technique that assigns permissions and privileges to users or groups based on their roles or functions within an organization. Role-based access can help secure the physical networking equipment by limiting who can access, modify, or manage the devices in the shared IT closet. Only authorized personnel with a valid role and credentials should be able to access the networking equipment. Disabling unneeded switchports is a security technique that prevents unauthorized devices from connecting to the network by turning off unused ports on a switch. Changing the default passwords is a security technique that prevents unauthorized access to network devices by replacing the factory-set passwords with strong and unique ones. Configuring an access control list is a security technique that filters network traffic by allowing or denying packets based on criteria such as source and destination IP addresses, ports, or protocols. References: CompTIA Network+ Certification Exam Objectives Version 7.0 (N10-007), Objective 3.2: Given a scenario, use appropriate network hardening techniques.