exam questions

Exam 220-1002 All Questions

View all questions & answers for the 220-1002 exam

Exam 220-1002 topic 1 question 254 discussion

Actual exam question from CompTIA's 220-1002
Question #: 254
Topic #: 1
[All 220-1002 Questions]

A user has changed the MAC address of a laptop to gain access to a network. This is an instance of:

  • A. spoofing
  • B. brute force
  • C. man-in-the-middle
  • D. a botnet
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Students
2 years, 8 months ago
Selected Answer: C
How can you change the Mac Address on a PC or Laptop? I understand that Mac Address is a physical and unique address for a network card, it cannot be changed, it comes from the factory and is unique, it is the identity of the network device.
upvoted 2 times
ciola89
2 years, 2 months ago
You can change it with some free tools like this: https://technitium.com/tmac/
upvoted 1 times
...
...
mali5211
3 years, 1 month ago
"a spoofing attack is a situation in which a person or program successfully identifies as another by falsifying data, to gain an illegitimate advantage." MITM attacker secretly relays and possibly alters the communications between two parties who believe that they are directly communicating with each other, as the attacker has inserted themselves between the two parties. The answer is correct.
upvoted 3 times
...
past94
3 years, 1 month ago
Man in the middle is literally changing an IP address packet. The answer is Spoofing. Man in the middle is specific to IP
upvoted 1 times
...
TripeV
3 years, 3 months ago
I also think this is Man in the middle. but got confused when I look-up 6 google searches on google and all of them pointed to Spoofing as the correct answer with no justification. can some please tell me what is the correct answer with justification
upvoted 1 times
lance12
3 years, 3 months ago
IMO, Spoofing is the correct answer, Man-in-the-middle is more of a active eavesdropping approach, in this scenario you are only connecting to the network and you are not doing the "eavesdropping" part
upvoted 3 times
...
...
[Removed]
3 years, 3 months ago
its more like man in the middle.
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago