exam questions

Exam SY0-501 All Questions

View all questions & answers for the SY0-501 exam

Exam SY0-501 topic 1 question 144 discussion

Actual exam question from CompTIA's SY0-501
Question #: 144
Topic #: 1
[All SY0-501 Questions]

A workstation puts out a network request to locate another system. Joe, a hacker on the network, responds before the real system does, and he tricks the workstation into communicating with him. Which of the following BEST describes what occurred?

  • A. The hacker used a race condition.
  • B. The hacker used a pass-the-hash attack.
  • C. The hacker-exploited improper key management.
  • D. The hacker exploited weak switch configuration.
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
DigitalJunkie
Highly Voted 5 years, 8 months ago
This is most likely a MAC spoofing attack to prevent this you should use a managed switches and configure snmp on the switches so you can poll/monitor them remotely. Weak switches can be intercepted by an attacker via a MITM.
upvoted 32 times
redondo310
5 years, 4 months ago
thanks for your explanation, that would make sense!
upvoted 1 times
...
...
MelvinJohn
Highly Voted 5 years, 1 month ago
Not A. A race condition attack happens when a computing system that's designed to handle tasks in a specific sequence is forced to perform two or more operations simultaneously. This technique takes advantage of a time gap between the moment a service is initiated and the moment a security control takes effect. The question doesn't say that two or more requests were submitted simultaneously.
upvoted 8 times
...
who__cares123456789___
Most Recent 4 years, 3 months ago
NOT RACE CONDITION...these race conditions occur in application injection attacks!! This is a dam ARP poison or spoof attack executing MITM
upvoted 3 times
...
Hanzero
4 years, 7 months ago
D is correct. Can't be race condition because no two operations are being performed at the same time
upvoted 2 times
...
DookyBoots
4 years, 7 months ago
Possibly broadcasting/ARP request. The workstation doesn't have an ARP entry in the table yet. So no entry for that "system". Switches handle MAC addresses resolution to IP addresses. Without Port Security or 802.1x there isn't any authentication or validation.
upvoted 1 times
...
Diogenes_td
4 years, 9 months ago
"network request to locate another system" ARP request Layer 2
upvoted 6 times
...
vaxakaw829
4 years, 9 months ago
When two or more modules of an application, or two or more applications, attempt to access a resource at the same time, it can cause a conflict known as a race condition (Darril Gibson’s Get Certified Get Ahead p. 516-517). Here, a workstation puts out a network request to locate another system and waits response from that system. However, a hacker on the network responds before the real system does, most probably because of a weak switch configuration.
upvoted 2 times
...
Jasonbelt
4 years, 9 months ago
This is a link about race conditions and shows how this is NOT a Race Condition. The switch is just going too slowly, hence the answer would be D. https://searchstorage.techtarget.com/definition/race-condition#:~:text=A%20race%20condition%20is%20an,sequence%20to%20be%20done%20correctly.
upvoted 1 times
...
callmethefuz
4 years, 10 months ago
This is a classic man in the middle attack performed by using spoofing tactics which cause info to be sent to him so that he can copy it and then he can fwd it on
upvoted 1 times
Jasonbelt
4 years, 9 months ago
This is in no way a MITM attack, he isn't sitting between the two systems, the is impersonating the system.
upvoted 1 times
...
...
kdce
4 years, 10 months ago
D, weak switch
upvoted 1 times
...
CYBRSEC20
4 years, 10 months ago
A race condition exists when changes to the order of two or more events can cause a change in behavior. If the correct order of execution is required for the proper functioning of the program, this is a bug. If an attacker can take advantage of the situation to insert malicious code, change a filename, or otherwise interfere with the normal operation of the program, the race condition is a security vulnerability. Attackers can sometimes take advantage of small time gaps in the processing of code to interfere with the sequence of operations, which they then exploit.(https://developer.apple.com/library/archive/documentation/Security/Conceptual/SecureCodingGuide/Articles/RaceConditions.html). Based on that definition, I think that probably the question is looking for an answer related to a MAC spoofing attack since the attacker's goal is to trick the workstation into revealing information that might help him/her to pivot or escalate the attack.
upvoted 2 times
...
Vissini
4 years, 11 months ago
a race condition is a coding issue not network issue
upvoted 2 times
...
xiaoyi
4 years, 11 months ago
it could put out an arp request to find sth. however,a workstation cannot locate a host.a switch can do.so this is not a good question.
upvoted 1 times
...
M3rlin
5 years, 1 month ago
A. The attacker has taken advantage of a race condition by responding to the system before the other remote system. The attacker is using the mac address of the other system to perform a mitm attack.
upvoted 2 times
Jasonbelt
4 years, 9 months ago
Race Condition isn't about answering faster than another system, it is about two processes needing to be done but they have to be done in a correct order. This is NOT a race condition.
upvoted 3 times
FNavarro
4 years, 1 month ago
Your understanding of a "Race Condition" is incorrect. A race condition or race hazard is the condition of an electronics, software, or other system where the system's substantive behavior is dependent on the sequence or timing of other uncontrollable events. The question is referring to an ARP poisoning attack. "When the victim host broadcasts a request for the IP address [of a valid host], the malicious host takes advantage of the race condition inherent to ARP's statelessness." Encyclopedia of Cryptography and Security See pg. 48, ARP Spoofing - Theory https://books.google.com/books?id=UGyUUK9LUhUC&pg=PA48#v=onepage&q&f=false
upvoted 1 times
...
...
...
frededel
5 years, 1 month ago
MAC spoofing is the same thing as causing a race condition, having two of the same MACs on the network at the same time.
upvoted 3 times
...
NeGaTiVeOnE
5 years, 2 months ago
D: The attacker is ON the network, i.e., he is able to spoof a MAC address, etc.
upvoted 2 times
...
GMO
5 years, 3 months ago
Ans A: What Happens During a Race Condition Attack? Web applications, file systems, and networking environments are all vulnerable to a race condition attack. Attackers might target an access control list (ACL), a payroll or human resources database, a transactional system, a financial ledger, or some other data repository. Although race condition attacks don’t happen frequently — because they’re relatively difficult to engineer and attackers must exploit a very brief window of opportunity — when they do happen, they can lead to serious repercussions, including a system granting unauthorized privileges. What’s more, race condition attacks are inherently difficult to detect.
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago