exam questions

Exam N10-008 All Questions

View all questions & answers for the N10-008 exam

Exam N10-008 topic 1 question 575 discussion

Actual exam question from CompTIA's N10-008
Question #: 575
Topic #: 1
[All N10-008 Questions]

A network engineer is concerned about VLAN hopping happening on the network. Which of the following should the engineer do to address this concern?

  • A. Configure private VLANs.
  • B. Change the default VLAN.
  • C. Implement ACLs on the VLAN.
  • D. Enable dynamic ARP inspection.
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
maggie22
Highly Voted 1 year ago
Selected Answer: B
By changing the native VLAN, the attacker would not be able to deceive the switch by sending double tagging frame, because in that case the switch would drop the frame since its outer tag would have a VLAN ID (native VLAN ID) that is not the same as the access VLAN configured on the attacker port. Source: https://learningnetwork.cisco.com/s/blogs/a0D3i000002SKPREA4/vlan1-and-vlan-hopping-attack
upvoted 12 times
...
Hchfyvggjg
Highly Voted 1 year, 3 months ago
Selected Answer: A
A. Configure private VLANs. Private VLANs (PVLANs) segregate devices within the same VLAN, restricting their communication to enhance network security and isolation. To address concerns about VLAN hopping, configuring private VLANs (PVLANs) is an effective security measure. PVLANs restrict communication between devices within the same VLAN, preventing one device from "hopping" to another device's traffic within the same VLAN.
upvoted 5 times
cyberbaby
10 months, 1 week ago
Changing the default VLAN remains a more effective measure for preventing VLAN hopping compared to configuring private VLANs because it directly mitigates the risk of unauthorized access between VLANs caused by potential vulnerabilities or misconfigurations, providing a proactive defense strategy for overall network security. Plus due to the vague question, how do we know that the VLANs aren't already private? Answer is B.
upvoted 2 times
...
...
kinny4000
Most Recent 7 months, 3 weeks ago
Private VLANs were designed to mitigate these attacks, changing the default VLAN is a good practice but this seems more secure.
upvoted 1 times
...
f534052
10 months, 1 week ago
Default and Native VLAN are not the same. Default VLAN is VLAN 1 and that can't be changed.
upvoted 1 times
...
PatrickH
10 months, 1 week ago
Selected Answer: B
Double Tagging can only be exploited on switch ports configured to use native VLANs.[2]: 162  Trunk ports configured with a native VLAN don't apply a VLAN tag when sending these frames. This allows an attacker's fake VLAN tag to be read by the next switch. So its B. Change the Native/Default VLAN
upvoted 2 times
...
[Removed]
1 year ago
Selected Answer: B
Changing default VLAN means default attacks won't happen.
upvoted 2 times
...
chuckf
1 year ago
Selected Answer: B
if the admin is worried about vlan hopping, private vland have already been configured. B
upvoted 2 times
...
mcmillanje
1 year ago
Selected Answer: B
The question is about vlan hopping, not communication within vlans. PVLANS segregate devices within a VLAN. This is not the threat vector the question is asking about. Option B is correct.
upvoted 2 times
...
karokeksa
1 year ago
Selected Answer: D
option D
upvoted 1 times
...
salah112
1 year ago
Selected Answer: A
A. Configure private VLANs. Private VLANs (PVLANs) are designed to enhance security by isolating ports within the same VLAN from each other, thus preventing VLAN hopping attacks. This configuration restricts communication between devices within the same VLAN, reducing the risk of unauthorized access or interference.
upvoted 1 times
...
Jimenybilly
1 year, 1 month ago
Selected Answer: D
D. Enable dynamic ARP inspection. Dynamic ARP Inspection (DAI) is a security feature that helps prevent ARP spoofing attacks and VLAN hopping. VLAN hopping occurs when an attacker sends frames from one VLAN to another VLAN, exploiting the lack of proper VLAN separation. Dynamic ARP Inspection helps mitigate VLAN hopping by inspecting ARP packets and ensuring that ARP requests and responses are valid within the associated VLANs. It builds a binding table that maps IP addresses to MAC addresses and VLANs, and it drops ARP packets that are inconsistent with this table. While other options like configuring private VLANs (Option A), changing the default VLAN (Option B), and implementing ACLs (Option C) can contribute to network security, they may not specifically address VLAN hopping concerns. Enabling dynamic ARP inspection is a more targeted solution for preventing this specific type of attack.
upvoted 1 times
...
Db_m
1 year, 1 month ago
Selected Answer: A
ChatGPT says A
upvoted 1 times
...
Cbcyber
1 year, 2 months ago
Selected Answer: D
D. Enable dynamic ARP inspection. Dynamic ARP inspection (DAI) is a security feature that can help address VLAN hopping concerns. VLAN hopping occurs when an attacker sends packets with a false VLAN ID to gain unauthorized access to frames belonging to a different VLAN. By enabling dynamic ARP inspection, the network switches can validate ARP packets to ensure that the source MAC address and IP address match. If an ARP reply is received on an interface belonging to a different VLAN than what is expected, the switch can drop or block the packet, thus preventing potential VLAN hopping attacks.
upvoted 3 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...