10.3_Layer 2 Security Threats Flashcards

1
Q

Switch Attack Categories
Security is only as strong as the weakest link in the system, and Layer___ is considered to be that weak link.

A

2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

LAYER 2 ATTACKS
Includes MAC address flooding attacks.

A

MAC Table Attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

LAYER 2 ATTACKS
Includes VLAN hopping and VLAN double-tagging attacks. It also includes attacks between devices on a common VLAN.

A

VLAN attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

LAYER 2 ATTACKS
Includes VLAN hopping and VLAN double-tagging attacks. It also includes attacks between devices on a common VLAN.

A

DHCP Attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

LAYER 2 ATTACKS
ARP Attacks includes ___

A

ARP spoofing and ARP poisoning attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

LAYER 2 ATTACKS
Includes MAC address and IP address spoofing attacks.

A

Address Spoofing Attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

LAYER 2 ATTACKS
STP Attacks includes Spanning Tree Protocol ___.

A

manipulation attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Layer 2 Attack Mitigation
Prevents many types of attacks including MAC address flooding attacks and DHCP starvation attacks.

A

Port Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Layer 2 Attack Mitigation
Prevents DHCP starvation and DHCP spoofing attacks.

A

DHCP Snooping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Layer 2 Attack Mitigation
Prevents ARP spoofing and ARP poisoning attacks.

A

Dynamic ARP Inspection (DAI)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Layer 2 Attack Mitigation
Prevents MAC and IP address spoofing attacks.

A

IP Source Guard (IPSG)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

These Layer 2 solutions will not be effective if the management protocols are not secured. For example:

A

the management protocols Syslog, Simple Network Management Protocol (SNMP), Trivial File Transfer Protocol (TFTP), telnet, File Transfer Protocol (FTP) and most other common protocols are insecure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

These Layer 2 solutions will not be effective if the management protocols are not secured. For example:

A

the management protocols Syslog, Simple Network Management Protocol (SNMP), Trivial File Transfer Protocol (TFTP), telnet, File Transfer Protocol (FTP) and most other common protocols are insecure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly