exam questions

Exam SY0-601 All Questions

View all questions & answers for the SY0-601 exam

Exam SY0-601 topic 1 question 823 discussion

Actual exam question from CompTIA's SY0-601
Question #: 823
Topic #: 1
[All SY0-601 Questions]

A security analyst finds a rogue device during a monthly audit of current endpoint assets that are connected to the network. The corporate network utilizes 802.1 X for access control. To be allowed on the network, a device must have a known hardware address, and a valid username and password must be entered in a captive portal. The following is the audit report:



Which of the following is the most likely way a rogue device was allowed to connect?

  • A. A user performed a MAC cloning attack with a personal device.
  • B. A DHCP failure caused an incorrect IP address to be distributed
  • C. An administrator bypassed the security controls for testing.
  • D. DNS hijacking let an attacker intercept the captive portal traffic.
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
shady23
1 year, 3 months ago
Selected Answer: A
A. A user performed a MAC cloning attack with a personal device.
upvoted 1 times
...
MortG7
1 year, 3 months ago
A PC-CA & WIN10 have the same MAC...cloning or spoofing.
upvoted 1 times
...
7308365
1 year, 5 months ago
A. MAC Cloning Host Naming Conventions and PC-CA and WIN 10 having the exact same MAC gives it away
upvoted 3 times
...
johnabayot
1 year, 6 months ago
Selected Answer: A
Mac cloning
upvoted 1 times
...
licks0re
1 year, 6 months ago
Selected Answer: A
The win10 machine is the personnal device.
upvoted 3 times
Dapsie
1 year, 1 month ago
Yeah. It is not using the organisational naming convention.
upvoted 1 times
...
...
Securityguy42
1 year, 6 months ago
Selected Answer: A
"A" is the only answer that makes sense in this pic.
upvoted 1 times
...
Hs1208
1 year, 6 months ago
Selected Answer: A
. A user performed a MAC cloning attack with a personal device.
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...