Network Security Measures to Restrict Personal Device Access | CompTIA N10-007 Exam Answer

Best Solution for Banning Personal Device Connections to Network

Prev Question Next Question

Question

In the past, users brought personal laptops to the office to bypass some of the security protocols on their desktops.

Due to new security initiatives, management has asked that users not be allowed to attach personal devices to the network.

Which of the following should a technician use to BEST meet this goal?

A.

Shut down unused ports on switches B.

Upgrade firmware on network devices C.

Allow only secure protocols on the network D.

Disable unnecessary services.

C.

Explanations

In the past, users brought personal laptops to the office to bypass some of the security protocols on their desktops.

Due to new security initiatives, management has asked that users not be allowed to attach personal devices to the network.

Which of the following should a technician use to BEST meet this goal?

A.

Shut down unused ports on switches

B.

Upgrade firmware on network devices

C.

Allow only secure protocols on the network

D.

Disable unnecessary services.

C.

The BEST approach for a technician to meet the goal of not allowing personal devices on the network is to use option C: Allow only secure protocols on the network.

Explanation:

Option A: Shut down unused ports on switches - This option can help to reduce the number of available network ports, but it will not address the issue of personal devices connecting to the network. Personal devices can still be connected to the available ports, defeating the purpose of this solution.

Option B: Upgrade firmware on network devices - Upgrading firmware on network devices can help to improve security and fix known vulnerabilities. However, it will not address the issue of personal devices connecting to the network.

Option C: Allow only secure protocols on the network - This option is the BEST approach to address the issue of personal devices on the network. By allowing only secure protocols on the network, users will not be able to bypass security protocols by using their personal laptops.

Option D: Disable unnecessary services - This option can help to reduce the attack surface of the network, but it will not address the issue of personal devices connecting to the network. Personal devices can still be connected to the network, even with unnecessary services disabled.

In summary, the BEST approach for a technician to meet the goal of not allowing personal devices on the network is to use option C: Allow only secure protocols on the network.