OD41

7 November 2025

CompTIA Network+: Common Network Attack Types


 

Question:

Which method of protecting against a MAC flooding attack implements a list of known and acceptable MAC addresses?

Answer A.

  • MAC address filtering

Question
:

Which entity should be the focus of attack if the goal is to directly poison DNS entries on a client system?

  • HOSTS file


Question

:

VLAN hopping is typically accomplished by which methods?

  • Double tagging

  • Answer B.
  • Switch spoofing

Question
:

Which protection method can help to ensure that even if an evil-twin attack initially succeeds, the attacker will not be able to later access the online services you use?

  • Using multi-factor authentication


Question

:

Which type of DoS attack is categorized as a fragmentation attack?

Answer E.

  • Teardrop

Question
:

Social engineering attacks rely on which attribute of the attacker?

  • Dishonesty


Question

:

Which methodology or implementation has made the threat of rogue devices and services more prevalent?

  • BYOD


Question

:

Which type of malware is able to propagate throughout an environment on its own?

  • Worm


Question

:

What is the main result of a system whose ARP cache has been poisoned?'

  • The packets it transmits will be redirected


Question

:

An on-path attack most closely resembles which other type of attack?

Answer C.

  • Man-in-the-middle