PrepAway - Latest Free Exam Questions & Answers

Which of the following attack mechanisms can the attack…

While performing surveillance activities an attacker determines that an organization is using 802.1X to secure LAN access. Which of the following attack
mechanisms can the attacker utilize to bypass the identified network security controls?

PrepAway - Latest Free Exam Questions & Answers

A.
MAC spoofing

B.
Pharming

C.
Xmas attack

D.
ARP poisoning

7 Comments on “Which of the following attack mechanisms can the attack…

  1. Nirmala says:

    Attacker is insider or outsider. MAC spoofing is done in switches(inside) and ARP poisoning at the router level(outside)!! Assuming attacker uses surveilance, so he is outsider. So correct answer is D




    0



    0
  2. GK says:

    For me, ARP spoofing is an insider attack: ARP requests and replies don’t go out of the local network. So, this is not suitable. MAC spoofing is also not possible, because 802.1x is much stronger than simple MAC address filtering and authenticates the device with a Radius server. It’s an odd question…




    1



    0
  3. Clindamycin says:

    That is very funny because 802.1x is one of the techniques that can prevent ARP poisoning and Mac Spoofing

    If I want to choose between these two which both are not right I would go with D

    By the way I hate CompTIA




    1



    0
  4. Mike says:

    ARP poisoning An attack that exploits Ethernet networks, and it may enable an attacker
    to sniff frames of information, modify that information, or stop it from getting to
    its intended destination.

    MAC spoofing is when an attacker
    disguises the MAC address of their network adapter with another number.The MAC address is the best way because it is unique and is the hardest to
    modify or spoof. IP addresses are often dynamically assigned on networks and
    are easily modified. Computer names (which are effectively NetBIOS names)
    can easily be changed as well.

    I chose A…




    1



    0
  5. ezspader says:

    Maybe it’s looking for MAB here? If some devices do not support 802.1X and MAB is enabled then MAC spoofing would work.
    When MAB is configured on a port, that port will first try to check if the connected device is 802.1X compliant, and if no reaction is received from the connected device, it will try to authenticate with the AAA server using the connected device’s MAC address as username and password.




    0



    0

Leave a Reply