Comp TIA Security + Certification Questions Part 1

© examsiri.com
Question : 18 of 60
 
Marks: +1, -0
A user suspects someone has been accessing a home network without permission by spoofing the MAC address of an authorized system. While attempting to determine if an authorized user is logged into the home network, the user reviews the wireless router, which shows the following table for systems that are currently on the home network.
  Hostname   IP address   MAC   MAC filter
  DadPC   192.168 .1 .10   00:1D:1A:44:17:B5   on
  MomPC   192.168 .1 .15   21:13:D6:C5:42:A2   off
  JuniorPC   192.168 .1 .16   42:A7:D1:26:11:52   on
  Unknown   192.168 .1 .18   10:B3:22:1A:FF:21   Off
Which of the following should be the NEXT step to determine if there is an unauthorized user on the network?
Go to Question: