コンサルタントは、断続的な接続の問題が報告された後、次の出力を確認しています。 ? (192.168.1.1) at 0a:d1:fa:b1:01:67 on en0 ifscope [イーサネット] ? (192.168.1.12) at 34:a4:be:09:44:f4 on en0 ifscope [イーサネット] ? (192.168.1.17) at 92:60:29:12:ac:d2 on en0 ifscope [イーサネット] ? (192.168.1.34) at 88:de:a9:12:ce:fb on en0 ifscope [イーサネット] ? (192.168.1.136) at 0a:d1:fa:b1:01:67 on en0 ifscope [イーサネット] ? (192.168.1.255) at ff:ff:ff:ff:ff:ff on en0 ifscope [イーサネット] ? (224.0.0.251) at 01:02:5e:7f:ff:fa on en0 ifscope パーマネント [イーサネット] ? (239.255.255.250) at ff:ff:ff:ff:ff:ff on en0 ifscope パーマネント [イーサネット] コンサルタントから報告される可能性が最も高いのは、次のうちどれですか?
正解:D
The gateway for the network (192.168.1.1) is at 0a:d1:fa:b1:01:67, and then, another machine (192.168.1.136) also claims to be on the same MAC address. With this on the same network, intermittent connectivity will be inevitable as along as the gateway remains unreachable on the IP known by the others machines on the network, and given that the new machine claiming to be the gateway has not been configured to route traffic. The output shows an ARP table that contains entries for IP addresses and their corresponding MAC addresses on a local network interface (en0). ARP stands for Address Resolution Protocol and is used to map IP addresses to MAC addresses on a network. However, one entry in the table is suspicious: ? (192.168.1.136) at 0a:d1:fa:b1:01:67 on en0 ifscope [ethernet] This entry has the same MAC address as another entry: ? (192.168.1.1) at 0a:d1:fa:b1:01:67 on en0 ifscope [ethernet] This indicates that a device on the network has poisoned the ARP cache by sending false ARP replies that associate its MAC address with multiple IP addresses, including 192.168.1.136 and 192.168.1.1 (which is likely the gateway address). This allows the device to intercept or redirect traffic intended for those IP addresses.