exam questions

Exam SY0-601 All Questions

View all questions & answers for the SY0-601 exam

Exam SY0-601 topic 1 question 149 discussion

Actual exam question from CompTIA's SY0-601
Question #: 149
Topic #: 1
[All SY0-601 Questions]

Security analysts are conducting an investigation of an attack that occurred inside the organization's network. An attacker was able to collect network traffic between workstations throughout the network. The analysts review the following logs:

The Layer 2 address table has hundreds of entries similar to the ones above. Which of the following attacks has MOST likely occurred?

  • A. SQL injection
  • B. DNS spoofing
  • C. MAC flooding
  • D. ARP poisoning
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
rodwave
Highly Voted 2 years, 4 months ago
Selected Answer: C
Answer: MAC flooding The question mentions that the table is on Layer 2 which is the Data link layer. The data-link layer is where switches operates on to move traffic. Switches will use MAC addresses to find the physical address of the device. This is because the Layer 2 address(MAC Address) will be unique on the local network. MAC flooding is a cyber attack that overflows the MAC Table (Layer 2 Table) of switches by sending out invalid MAC addresses. When a MAC Address table is full, the switch is no longer able to save new addresses, so it will enter into fail-open mode and begin broadcasting data (like a hub) to all ports. This will allow an attacker to get data packets intended for another computer and be able to steal sensitive information.
upvoted 33 times
...
Mumbo
Highly Voted 1 year, 4 months ago
Took the exam today and passed with a 775. About 90% of the questions are from this dump. This question is in the exam.
upvoted 10 times
Kheeze1
1 year, 3 months ago
About which numbers from this dump is on there ? The majority or the first 100?
upvoted 4 times
Pesos
1 year ago
I'd assume its the majority of the 800+ considering the first 100 don't even cover all of topic 1
upvoted 3 times
...
...
...
slackbot
Most Recent 5 days, 5 hours ago
Selected Answer: D
while the question leads you to MAC flood (because of hundreeds of records), the question says - attacher was able to capture traffic between endpoints. MAC flooding will not allow you to do that. MAC flood is a DoS attack. while arp poisoning is exactly the method allowing an attacker to capture traffic (spoof an IP). this again utilises L2 (where ARP resides) not quite clear if the question is asking us what type of attack allows us to pretent and catpure traffic, or what type of attach creates hundreds of records in the arp table on a switch
upvoted 1 times
...
Protract8593
1 year, 7 months ago
Selected Answer: C
In MAC flooding (also known as MAC address table overflow attack), an attacker sends a large number of frames to a network switch with fake source MAC addresses, causing the switch's MAC address table to become full. When the MAC address table is full, the switch will operate in "fail-open" mode and start broadcasting traffic to all ports instead of sending it only to the appropriate port, effectively turning it into a hub-like behavior. This allows the attacker to capture network traffic from multiple workstations on the network, as mentioned in the scenario.
upvoted 3 times
...
Yawannawanka
1 year, 10 months ago
Based on the provided information, the attack that MOST likely occurred is MAC flooding, as the Layer 2 address table has hundreds of entries that are overwhelming the switch's ability to forward frames efficiently. This is a common technique used in denial-of-service (DoS) attacks, where the attacker floods the switch's MAC address table with fake addresses, causing it to slow down or stop forwarding frames altogether. SQL injection and DNS spoofing are application layer attacks, while ARP poisoning involves modifying ARP tables to redirect network traffic.
upvoted 1 times
...
fouserd
1 year, 11 months ago
Selected Answer: C
The attack that has most likely occurred is MAC flooding. MAC flooding is a type of network attack that involves sending a large number of frames with different source MAC addresses to a switch. This causes the switch to flood its address table and forward all traffic to all ports, allowing an attacker to collect network traffic between workstations throughout the network.
upvoted 1 times
...
RonWonkers
2 years, 5 months ago
Selected Answer: C
Hundreds of entries, I would assume its flooding
upvoted 4 times
...
_Tyler_
2 years, 6 months ago
Selected Answer: C
All the other answers involve an attack that changes data that is already present this question states that there are hundreds of entries indicating flooding.
upvoted 4 times
ScottT
2 years, 6 months ago
and Layer 2 ruling out SQL and DNS
upvoted 2 times
...
...
Yuyuyakuza
2 years, 6 months ago
Mac Flooding "Layer 2.."
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago