A company experiences an incident involving a user who connects an unmanaged switch to the network. Which of the following technologies should the company implement to help avoid similar incidents without conducting an asset inventory?
Port security is a Layer 2 security feature that restricts the number of devices connecting to a network switch port. It helps prevent unauthorized devices, such as an unmanaged switch, from being connected to the network.
How Port Security Works:
Limits the number of MAC addresses that can connect to a port.
Can shut down or restrict the port if an unauthorized device is detected.
Prevents users from plugging in unauthorized networking equipment (e.g., unmanaged switches, hubs).
Incorrect Options:
A. Screened Subnet: A screened subnet (DMZ) is used for isolating external-facing servers, not for controlling unauthorized network connections.
B. 802.1X: Provides authentication for devices but requires a RADIUS server, which is a more complex solution than port security.
C. MAC Filtering: Controls which MAC addresses can connect but is difficult to manage and can be spoofed.
[Reference:, CompTIA Network+ N10-009 Official Study Guide – Chapter on Network Security Controls, , , ]
Contribute your Thoughts:
Chosen Answer:
This is a voting comment (?). You can switch to a simple comment. It is better to Upvote an existing comment if you don't have anything to add.
Submit