ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 293 - SY0-701 discussion

Report
Export

A security analyst finds a rogue device during a monthly audit of current endpoint assets that are connected to the network. The corporate network utilizes 002.1X for access control. To be allowed on the network, a device must have a Known hardware address, and a valid user name and password must be entered in a captive portal. The following is the audit report:

Which of the following is the most likely way a rogue device was allowed to connect?

A.
A user performed a MAC cloning attack with a personal device.
Answers
A.
A user performed a MAC cloning attack with a personal device.
B.
A DMCP failure caused an incorrect IP address to be distributed
Answers
B.
A DMCP failure caused an incorrect IP address to be distributed
C.
An administrator bypassed the security controls for testing.
Answers
C.
An administrator bypassed the security controls for testing.
D.
DNS hijacking let an attacker intercept the captive portal traffic.
Answers
D.
DNS hijacking let an attacker intercept the captive portal traffic.
Suggested answer: A

Explanation:

The most likely way a rogue device was able to connect to the network is through a MAC cloning attack. In this attack, a personal device copies the MAC address of an authorized device, bypassing the 802.1X access control that relies on known hardware addresses for network access. The matching MAC addresses in the audit report suggest that this technique was used to gain unauthorized network access.

Reference =

CompTIA Security+ SY0-701 Course Content: Domain 03 Security Architecture.

CompTIA Security+ SY0-601 Study Guide: Chapter on Network Security and MAC Address Spoofing.

asked 02/10/2024
Neha Kumari
50 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first