mediummulti selectObjective-mapped

Users on one VLAN report that their traffic to the default gateway is intermittently slow and sometimes reaches the wrong device. A packet capture shows unsolicited ARP replies claiming to be the gateway. Which two actions are the best mitigations on managed switches? Select two.

Question 1mediummulti select
Full question →

Users on one VLAN report that their traffic to the default gateway is intermittently slow and sometimes reaches the wrong device. A packet capture shows unsolicited ARP replies claiming to be the gateway. Which two actions are the best mitigations on managed switches? Select two.

Answer choices

Why each option matters

Good practice is not just finding the correct option. The wrong answers often show the exact trap the exam wants you to fall into.

A

Best answer

enable DHCP snooping so trusted IP-to-MAC bindings can be validated

DHCP snooping builds a trusted binding table that helps security controls distinguish valid host mappings from forged ones. On many managed switches, that table is used to support protections against spoofed layer 2 traffic. It is a standard companion control for preventing local network poisoning attacks.

B

Best answer

enable dynamic ARP inspection to block forged ARP replies

Dynamic ARP inspection checks ARP traffic against trusted bindings and drops replies that do not match expected IP-to-MAC associations. That makes it one of the most effective mitigations for ARP spoofing or poisoning on managed switches. It directly addresses the bad ARP replies described in the capture.

C

Distractor review

change the default gateway IP address on the subnet

Changing the gateway address does not stop an attacker from forging ARP responses on the local segment. The poisoning issue is about false layer 2 mappings, not the specific gateway IP value. This would create administrative work without addressing the root cause.

D

Distractor review

disable spanning tree protocol to reduce switching delays

Spanning tree is unrelated to ARP poisoning and should not be disabled as a response to spoofed ARP traffic. Turning it off can actually create loops and instability on the network. This option addresses the wrong problem and could make the environment less reliable.

E

Distractor review

replace private addressing with NAT on every endpoint

Network address translation does not prevent layer 2 spoofing on a local subnet. The attack happens before traffic leaves the segment, so NAT is not the right mitigation. This would not stop forged ARP replies from redirecting traffic.

Common exam trap

Common exam trap: an active trunk can still block the VLAN you need

A trunk being up does not prove every VLAN is crossing it. Check allowed VLAN lists, native VLAN mismatch, VLAN existence and access-port assignment.

Technical deep dive

How to think about this question

VLAN questions usually combine access-port and trunking clues. The key is to identify whether the issue is local to one switchport, caused by the trunk, or caused by the VLAN not existing where it needs to exist.

KKey Concepts to Remember

  • Access ports place end devices into a single VLAN.
  • Trunk ports carry multiple VLANs between switches.
  • Allowed VLAN lists decide which VLANs can cross a trunk.
  • Native VLAN mismatch can create confusing symptoms.

TExam Day Tips

  • Use show vlan brief to verify access VLANs.
  • Use show interfaces trunk to verify trunk state and allowed VLANs.
  • Do not treat every same-VLAN issue as a routing problem.

Related practice questions

Related SY0-701 practice-question pages

Use these pages to review the topic behind this question. This is how one missed question becomes focused revision.

More questions from this exam

Keep practising from the same exam bank, or move into a focused topic page if this question exposed a weak area.

FAQ

Questions learners often ask

What does this SY0-701 question test?

Access ports place end devices into a single VLAN.

What is the correct answer to this question?

The correct answer is: enable DHCP snooping so trusted IP-to-MAC bindings can be validated — The symptoms point to ARP spoofing or poisoning on a local broadcast domain. DHCP snooping helps create trusted address bindings, and dynamic ARP inspection uses those bindings to block forged ARP replies. Together, these are the standard managed-switch mitigations for preventing attackers from impersonating the gateway and intercepting or disrupting local traffic. Why others are wrong: Changing the gateway IP does not stop an attacker from sending fake ARP replies. Disabling spanning tree is unrelated to the attack and could destabilize the network. NAT also does not address the layer 2 poisoning problem because the malicious traffic happens inside the local segment before any translation occurs. The best fixes are switch-level anti-spoofing controls.

What should I do if I get this SY0-701 question wrong?

Then try more questions from the same exam bank and focus on understanding why the wrong options are tempting.

Discussion

Loading comments…

Sign in to join the discussion.