exam questions

Exam SY0-601 All Questions

View all questions & answers for the SY0-601 exam

Exam SY0-601 topic 1 question 247 discussion

Actual exam question from CompTIA's SY0-601
Question #: 247
Topic #: 1
[All SY0-601 Questions]

While reviewing the wireless router, a systems administrator of a small business determines someone is spoofing the MAC address of an authorized device. Given the table below:



Which of the following should be the administrator’s NEXT step to detect if there is a rogue system without impacting availability?

  • A. Conduct a ping sweep,
  • B. Physically check each system.
  • C. Deny internet access to the "UNKNOWN" hostname.
  • D. Apply MAC filtering.
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
passmemo
Highly Voted 2 years, 8 months ago
Selected Answer: A
NEED FOR PING SWEEP Ping sweep is used for various purposes, such as improving and maintaining network security. It can also be used to: Discover active IP addresses on the network Ensure IP addresses on the network match the documentation Detect rogue devices connected to the network
upvoted 29 times
BD69
1 year, 3 months ago
I thought about this again. A ping sweep will simply return IP addresses, which won't really help with anything, especially if DHCP is used (for small business, that's probably what they're using). No useful information concerning the correct MAC to IP address mapping can be gleaned (if a rogue device is spoofing a MAC address and you have a DHCP reservation, there's no way to tell if it's legit or not - the Host name is spoofed by an attacker as well, typically)
upvoted 4 times
...
Littlelarry123
2 years, 8 months ago
I agree with you plus it also says without impacting availability. You can just do a ping without affecting anyone work. Going to physical check is affecting availability. Looking at the people who pick B are drunk.
upvoted 3 times
...
NXPERT
2 years, 8 months ago
the "Unknown" device is already discovered, you don't need ping sweep to detect it again.
upvoted 14 times
Pharaoh301
2 years, 4 months ago
I'd argue that the fact that it is unknown doesn't necessarily make it rogue. Thus, a Ping Sweep would be necessary to detect if there IS a rogue device...?
upvoted 6 times
Kurt43
1 year, 9 months ago
the scenario says the administrator already determined someone is spoofing macs.
upvoted 4 times
...
...
Sandon
2 years, 5 months ago
"NEXT step to detect" The question is literally asking you to DETECT
upvoted 5 times
Kurt43
1 year, 9 months ago
answer is D. u already see an unknown host with its mac filter off. turn it on, easy
upvoted 2 times
...
...
...
...
Kashim
Highly Voted 2 years, 8 months ago
Selected Answer: B
If it is a small office "B. Physically check each system. " should be done, as it seems to be the most accurate.
upvoted 18 times
minx98
1 year, 9 months ago
how would you be able to physically check a rogue system if you don't know where it is
upvoted 11 times
BD69
1 year, 3 months ago
You don't need to physically check a rogue system, just get all your "knowns" (known MAC addresses for each, and put in DHCP reservations - this way, if a rogue machine tries to use a spoofed MAC, the router will generate an error and/or deny access because it's already assigned). A decent router should also have, not only the MAC address for a reservation, but also a HOST name (cheap ones only use a MAC address)
upvoted 2 times
...
...
...
Dapsie
Most Recent 1 year, 1 month ago
Selected Answer: C
Why is option "C" not obvious? I have an unknown device in my network, and I have already determined that something is wrong. My natural reaction will be to deny access to any device that is UNKNOWN. That's the sore thumb. The user will reach out to me if they can't work. That's better than going around to physically inspect systems or check their Mac addresses, and it is just safer. A ping sweep will just tell me that two devices are off. How does that help me detect which device's MAC address has been spoofed?
upvoted 1 times
...
Shouqq_examtopics
1 year, 1 month ago
hint "small business" = Physically check
upvoted 1 times
...
BD69
1 year, 3 months ago
Selected Answer: A
A (ping sweep) makes most sense for the FIRST thing to do. Both C&D would affect availability, right off. B would be the SECOND thing to do (it also affects availability - having to go to each machine).
upvoted 1 times
BD69
1 year, 3 months ago
I change my answer to B. A ping sweep won't give you any useful information, except what machines are on (and responding) to an ICMP request.
upvoted 1 times
...
...
jamiekji
1 year, 3 months ago
Selected Answer: B
why I need the ping sweep while the photo contain the mac and the IP
upvoted 1 times
...
Grumpy_Old_Coot
1 year, 5 months ago
Selected Answer: B
'D' is absolutely wrong. MAC Filtering doesn't do anything in a MAC Spoofing situation. SOHO is in the 4-10 machine range. And you'd find out right quick if Chuckle-Head George (the Office Clown) is the one who renamed his laptop while it offline.
upvoted 3 times
...
MortG7
1 year, 5 months ago
B. Physically check each system They provided a hint "small business..."
upvoted 2 times
...
JohanG23
1 year, 6 months ago
Selected Answer: B
Its definitely b
upvoted 1 times
...
ganymede
1 year, 7 months ago
Selected Answer: B
B. Physically check each system Running a ping sweep isn't actually going to help you resolve the problem. But if you verify the MAC address of each authorized device you can then apply Mac filtering to allow only the authorized devices. But in order to identify the MAC address for each device you need to physically check each device.
upvoted 2 times
...
DirtyDann
1 year, 7 months ago
Selected Answer: B
CompTIA doing CompTIA things. MAC address = physical address. Small business, very few devices. Go check each device physically...
upvoted 9 times
...
TheFivePips
1 year, 7 months ago
Selected Answer: B
While ping sweep would be effective at showing what devices are on the network, we already have that information. We already suspect someone is spoofing a MAC address. What would be the point of getting that information again? It's also a small office, physical inspection wouldnt take long and you could rule out which devices are which
upvoted 4 times
...
Soleandheel
1 year, 8 months ago
A is the correct answer and here is why: If MAC filtering has already been applied (which is the case on the image provided) and you suspect a rogue system is spoofing MAC addresses, the NEXT best step to further detect and address the issue without impacting availability is: B. Conduct a ping sweep. Conducting a ping sweep involves scanning the network to identify active devices by sending ICMP (Internet Control Message Protocol) ping requests to a range of IP addresses. This can help you identify devices that are currently active on the network, even if they are not authorized or if their MAC addresses have been spoofed. Therefore A is the best option.
upvoted 1 times
...
ComPCertOn
1 year, 8 months ago
Selected Answer: B
"small Business" is the key word
upvoted 1 times
...
Mahoni
1 year, 8 months ago
Selected Answer: A
Apparently this table is not the only info the admin has because this table doesn't give enough info about a mac spoofing or a rogue device on the network, let's do a ping sweep, it only takes 30 seconds and it will not hurt anything.
upvoted 1 times
...
Rowdy_47
1 year, 8 months ago
Selected Answer: D
5c time! a systems administrator of a small business determines(not suspects, he has determined, to me that implies he knows) someone (unknown device) is spoofing the MAC address of an authorized device (known device). A ping sweep will not give you more info than you already have, you know the know the IPs and MACs at play here (Identify - which has already been done) The next step is to contain which IMO would be apply mac filtering, this would block all comms on the unknown device, even if its IP changed I would then Physically check each system, there are only 4 so this is not a massive task Deny internet access to the "UNKNOWN" hostname - guessing this would be done via IP as Firewalls are layer 3 devices generally and dont work with MAC addresses, and could potentially impact availability... These questions are so stupid
upvoted 2 times
Mahoni
1 year, 8 months ago
I totaly agree that these questions are so stupid but Unknown device doesn't mean it is a rogue device, if Unknown device was the rogue then the admin could just block its MAC. Admin first needs to do a ping sweep to find out what devices are currently online (we don't even know what table is shown in the question) and go from there.
upvoted 1 times
...
...
Jacob75
1 year, 9 months ago
Selected Answer: C
Why Not C. If it shows as unknown I would just kick it off and if it is legitimate someone that works there will approach you and say this is not connecting. Mac filtering is already on or they wouldn't have to spoof the MAC
upvoted 1 times
Afel_Null
1 year, 8 months ago
"Without impacting availability".
upvoted 1 times
...
Mahoni
1 year, 8 months ago
unknown device means, the device has no netbios/hostname or ports 137, 138 are closed.
upvoted 1 times
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...