CertNova
Menu
← Back to PBQ types

Log Analysis PBQs: CompTIA Network+ (N10-009)

easy

Question 1 of 3

You are a network administrator who just received an alert from the managed switch on VLAN 10. Multiple workstations are reporting intermittent connectivity issues. The switch management console is showing ARP table warnings about duplicate IP-to-MAC mappings. Review the network logs, flag all entries related to the ARP anomaly, and classify the incident.

Objectives

  • Review switch and IDS logs for ARP anomalies on VLAN 10
  • Flag all log entries related to the ARP spoofing activity
  • Classify the type of network security incident
  • Identify the attacker's MAC address
  • Recommend the most appropriate immediate response action

Security Event Log

FlagTimeSeveritySourceMessage
13:00:00INFOsystemSwitch SW-CORE-01 VLAN 10: port Gi0/1 link up -- workstation 192.168.10.20 (MAC: aa:bb:cc:11:22:33)
13:02:00INFOsystemDHCP lease renewed: 192.168.10.20 to MAC aa:bb:cc:11:22:33 -- lease time 8 hours
13:05:30WARNsystemARP table conflict on SW-CORE-01: IP 192.168.10.1 (gateway) mapped to MAC dd:ee:ff:44:55:66 -- expected MAC: 00:11:22:33:44:55
13:05:35ALERTidsARP spoofing detected: gratuitous ARP from MAC dd:ee:ff:44:55:66 claiming IP 192.168.10.1 on VLAN 10
13:06:00WARNsystemARP table conflict on SW-CORE-01: IP 192.168.10.1 flapping between MAC 00:11:22:33:44:55 and dd:ee:ff:44:55:66
13:06:30INFOsystemUplink check: SW-CORE-01 trunk port to router R1 operating normally
13:07:15WARNfirewallTraffic redirection detected: packets from 192.168.10.20 to 10.0.0.5 being routed through 192.168.10.50 (MAC dd:ee:ff:44:55:66)
13:08:00INFOsystemSpanning tree: SW-CORE-01 VLAN 10 root bridge stable, no topology changes
13:09:00ALERTidsMan-in-the-middle risk: ARP spoof from MAC dd:ee:ff:44:55:66 (port Gi0/5) impersonating gateway 192.168.10.1
13:10:30INFOsystemNTP sync completed: SW-CORE-01 synchronized to 10.0.0.2
13:11:00WARNsystemClient 192.168.10.35 reporting DNS resolution failures -- default gateway MAC mismatch
13:13:00INFOsystemPort Gi0/8 link up: printer 192.168.10.100 (MAC: 11:22:33:aa:bb:cc) online
13:15:00INFOsystemSNMP polling: SW-CORE-01 CPU 12%, memory 45% -- within normal parameters

13 total entries. Click a row or use checkboxes to flag suspicious events.

Incident Analysis

Progress

0 of 7 items correct

Flag suspicious entries and answer the incident questions

0 of 3 marked complete