Recognize common network attacks, spoofing behaviors, rogue services, wireless attacks, and social-engineering paths that appear in Network+ scenarios.
Attack questions are classification questions first and response questions second. CompTIA wants to know whether you can identify the actual path the adversary is using before you choose a control. If you misclassify the attack, the mitigation answer usually drifts to the wrong layer.
On-path attack: An attack where the adversary positions themselves in the communication path to observe or manipulate traffic.
DoS: Denial of service, an attack that tries to make a service unavailable or degraded.
Rogue AP: Rogue access point, an unauthorized wireless device that can create an untrusted entry point into the environment.
The strongest answers usually depend on classifying whether the scenario is about:
| Attack class | Typical clue |
|---|---|
| DoS / DDoS | legitimate users cannot access the service because it is overwhelmed |
| spoofing | traffic or identity appears to come from a trusted source but does not |
| rogue service | an unauthorized DHCP, DNS, or AP device appears on the network |
| wireless attack | evil twin, deauth, or weak encryption leads to wireless compromise |
| social engineering | the initial foothold comes from human trust rather than protocol weakness |
1ARP reply: 10.10.10.1 is-at aa:bb:cc:dd:ee:99
2ARP reply: 10.10.10.1 is-at aa:bb:cc:dd:ee:99
3Gateway MAC on switchport record: 00:11:22:33:44:55
What to notice:
Network+ often tests whether you notice that the attacker is changing the access path itself:
Those are not the same as ordinary routing or signal problems. They are security problems using network behavior as the entry path.
Continue with 4.8 Hardening, NAC, ACLs & Defensive Controls to keep the domain flow intact.