PrepAway - Latest Free Exam Questions & Answers

Which of the following should be the NEXT step to deter…

A user suspects someone has been accessing a home network without permission by spoofing the MAC address of an authorized system. While attempting to determine if an authorized user is logged into the home network, the user reviews the wireless router, which shows the following table for systems that are currently on the home network.

Which of the following should be the NEXT step to determine if there is an unauthorized user on the network?

PrepAway - Latest Free Exam Questions & Answers

A.
Apply MAC filtering and see if the router drops any of the systems.

B.
Physically check each of the authorized systems to determine if they are logged onto the network.

C.
Deny the “unknown” host because the hostname is not known and MAC filtering is not applied to this host.

D.
Conduct a ping sweep of each of the authorized systems and see if an echo response is received.

PrepAway - Latest Free Exam Questions & Answers

3 Comments on “Which of the following should be the NEXT step to deter…

  1. Naggers and juice says:

    B seems like the most reasonable answer.

    Can’t be A because the question suggests the mac address is spoofed which can bypass the filter.

    Can’t be C for the same reason as A.

    D would be pointless.




    7



    1
  2. meac says:

    As mentioned:
    (A) is out as the MAC is spoofed, so MAC filtering won’t help
    (D) Same rule applies
    Also note that all PCs are on 192.168.1.x, and JuniorPC is on 192.168.2.x (another subnet altogether, so not in the same Home network after all)
    So I agree that B is the only possible answer, as we would be able to confirm the IP address and the MAC address, to see if everything tallies, as well as checking whether they are connected or not.
    There are only x4 devices after all, so it would not take that long




    3



    0

Leave a Reply