exam questions

Exam SY0-501 All Questions

View all questions & answers for the SY0-501 exam

Exam SY0-501 topic 1 question 893 discussion

Actual exam question from CompTIA's SY0-501
Question #: 893
Topic #: 1
[All SY0-501 Questions]

While reviewing the wireless router, the systems administrator of a small business determines someone is spoofing the MAC address of an authorized device.
Given the table below:

Which of the following should be the administrator's NEXT step to detect if there is a rogue system without impacting availability?

  • A. Conduct a ping sweep.
  • B. Physically check each system.
  • C. Deny Internet access to the ג€UNKNOWNג€ hostname.
  • D. Apply MAC filtering.
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
jfkqobum
Highly Voted 3 years, 11 months ago
B. Physically check each system.
upvoted 10 times
...
SophyQueenCR82
Most Recent 2 years, 1 month ago
A. Conduct a ping sweep. Conducting a ping sweep is a non-intrusive method to detect if there is a rogue system on the network. It involves sending ICMP echo requests to a range of IP addresses and waiting for responses. If a system responds that has an unknown or spoofed MAC address, it may be a rogue system. This method is less likely to impact availability compared to the other options listed.
upvoted 1 times
...
fonka
3 years, 9 months ago
ING VS. PING SWEEP While the ping command is used to ping a single host device to identify its existence, ping sweep helps to ping multiple IP addresses simultaneously. It’s a basic network scanning technique used to determine the range of active and inactive IP addresses available on the network. It’s also used to diagnose potential network issues, downtime, and dead hosts. If the host devices are alive, they respond to ping sweep by sending an ICMP Echo reply. A healthy device should respond within a narrow time frame. If it doesn’t comply with this trend, it’s a sign there are certain issues (overloaded or damaged device) needing to be addressed. NEED FOR PING SWEEP Ping sweep is used for various purposes, such as improving and maintaining network security. It can also be used to: Discover active IP addresses on the network Ensure IP addresses on the network match the documentation Detect rogue devices connected to the network
upvoted 2 times
...
Dion79
3 years, 10 months ago
"Some problems with depending on ping sweeps to find out which hosts are live is that a computer might be shutdown at the time of the sweep and indicate that the IP address doesn't belong to a live host. Another problem with ping sweep is that many network administrators configure nodes to not to respond tcp ICMP echo request and reply." I agree with JFKQOBUM, I would physically check, plus seems like they've done some type of scan or used a command to display the provided network information.
upvoted 1 times
...
Samwell21
3 years, 11 months ago
I think this is correct. I had to look it up but a ping sweep will populate arp tables.
upvoted 3 times
troxel
3 years, 10 months ago
All it would do it populate the arp tables with a spoofed mac
upvoted 1 times
...
...
Mistermiyagi
3 years, 11 months ago
Is the provided answer correct?
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago