exam questions

Exam N10-008 All Questions

View all questions & answers for the N10-008 exam

Exam N10-008 topic 1 question 2 discussion

Actual exam question from CompTIA's N10-008
Question #: 2
Topic #: 1
[All N10-008 Questions]

Which of the following would be BEST to use to detect a MAC spoofing attack?

  • A. Internet Control Message Protocol
  • B. Reverse Address Resolution Protocol
  • C. Dynamic Host Configuration Protocol
  • D. Internet Message Access Protocol
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
AaronS1990
Highly Voted 2 years, 9 months ago
Selected Answer: B
My understanding (I'm new to this stuff so bear with me): A. ICMP- Used for testing connectivity with ping and such like with IP Adresses, not MAC Adresses. C. DHCP- Auto-assigns IP adresses on a network. Again, IP and not MAC. D. IMAP- Used for email servers, not MAC adresses Answer: B - Reverse Address Resolution Protocol . Can be used to ask what a machine's IP address is based on it's MAC address. If the adress has been spoofed it will obviously show a different IP than the one it is expecting to see
upvoted 31 times
...
BMETIIIK
Highly Voted 7 months, 2 weeks ago
The best option to use to detect a MAC spoofing attack would be B. Reverse Address Resolution Protocol (RARP). MAC spoofing is a technique in which an attacker changes the source MAC address of a device to pretend to be another device on the network. This can be used to conduct malicious activities like stealing data or launching further attacks. Reverse Address Resolution Protocol (RARP) is a protocol used to map a MAC address to an IP address. When a device needs to communicate with another device on the network, it sends an ARP request to get the MAC address of the destination device. Similarly, when a device needs to communicate with a device whose MAC address is known, it sends a RARP request to get the IP address of the device. In the case of a MAC spoofing attack, an attacker pretends to be another device on the network, so the IP address associated with that MAC address will be incorrect. By using RARP, the system can detect if the IP address returned in response to the MAC address is different than what is expected. This would indicate a possible MAC spoofing attack.
upvoted 15 times
...
brotheralameen
Most Recent 3 months, 3 weeks ago
Selected Answer: B
Obiously B because it's based on Address Resolution Protocol.
upvoted 1 times
...
ITEXAMSLAB_COM_Comptia1
8 months, 3 weeks ago
A MAC spoofing attack consists of changing the MAC address of a network device (network card). A client computer can use Revers Address Resolution Protocol to request its Internet Protocol (IPv4) address and MAC address from a computer network to check its accuracy. DHCP auto assigns a IP address so this is why this is not the answer.
upvoted 1 times
...
Calebdames
1 year, 4 months ago
Selected Answer: B
B. Read users BMETIIIK explanation it is very easy to understand
upvoted 1 times
...
fredrich12
1 year, 7 months ago
B. Rarp - Reverse Adress Resolution Protocol
upvoted 2 times
...
fiela1
1 year, 9 months ago
can anyone point to where Reverse Address Resolution Protocol is in the exam objectives? I've only found it from a google search, and it says RARP was replaced by DCHP. To defend against MAC spoofing DCHP-snooping or MAC filtering will generally be used, and these are covered in the network hardening portion of the objectives.
upvoted 2 times
...
JakeCharles
2 years, 3 months ago
Selected Answer: B
I guess B
upvoted 1 times
...
Bash33r
2 years, 5 months ago
to detect we need to reverse engineer
upvoted 1 times
...
Belayet
2 years, 7 months ago
Selected Answer: B
Reverse DNS
upvoted 1 times
...
cyberjesus49
3 years, 1 month ago
Tools that would facilitate the detection of MAC spoofing include traffic analyzers and bandwidth monitors.
upvoted 2 times
...
RobJob
3 years, 2 months ago
Selected Answer: B
A MAC spoofing attack consists of changing the MAC address of a network device (network card). A client computer can use Revers Address Resolution Protocol to request its Internet Protocol (IPv4) address and MAC address from a computer network to check its accuracy. DHCP auto assigns a IP address so this is why this is not the answer.
upvoted 5 times
...
waqdhiyo
3 years, 2 months ago
Selected Answer: B
Revers Address Resolution Protocol
upvoted 4 times
...
waqdhiyo
3 years, 2 months ago
Selected Answer: C
DHCP snooping
upvoted 2 times
rigisal986
3 years, 2 months ago
Question is not asking about DHCP.
upvoted 2 times
...
Jesse22
2 years, 7 months ago
DHCP operates at the application layer of tcp. Where arp operates of at the first layer (link layer, network interface layer). This also where the Ethernet, token ring and one other phsyical aspects of the network, including Mac addresse and bits of data (phsyical layer and data link layer of the OSI model). Reverse ARP is a networking protocol used by a client machine in a local area network to request its Internet Protocol address (IPv4) from the gateway-router's ARP table. The network administrator creates a table in gateway-router, which is used to map the MAC address to corresponding IP address. (https://www.google.com/search?q=reverse+address+resolution+protocol)
upvoted 1 times
...
...
waqdhiyo
3 years, 3 months ago
Reverse address Resolution prorotcol
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago