1.4 Network Device Security Flashcards

1
Q

This network device replicates traffic onto all ports with minimal security.

A

Hub

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

This legacy network device maintains track of network addresses, segments traffic, and breaks up collision domains. It connects network segments.

A

Bridge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

this network device provides micro-segmentation with each port receiving traffic for the appropriate host using the MAC address.

A

Switch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

This network device connects networks together and determines the path a packet will take over a network.

A

Router

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

This network device makes its decisions by evaluating MAC addresses.

A

Switch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

This network device operates by evaluating IP addresses.

A

Router

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

This network device is often used to connect IoT devices to traditional IP based networks

A

Bridge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The physical hardware-based address of a network interface card. Used by switches to direct Network traffic.

A

MAC address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

This is the layer of the OSI model that Mac addresses operate on.

A

OSI layer 2. Data link layer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

This is the layer of the OSI model that IP addresses operate on.

A

OSI model layer 3. Network layer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The first half of a MAC address. 24 bits or six hexadecimal characters.

A

OUI - organizational unique identifier. The hardware manufacturer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

IP addresses consist of these two parts:

A

Network identifier and unique host identifier.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

This protocol is the method used by a host to determine the MAC address of another on a local network.

A

ARP - address resolution protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The location where an ARP reply is stored for a period of time before sending another ARP request.

A

ARP cache or ARP table

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The capability of observing, recording, and analysis of traffic as it transits a network.

A

Sniffing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

When a NIC is set to accept all traffic that it receives, regardless of whether the traffic is addressed to its MAC address or not.

A

Promiscuous mode

17
Q

A MiTMbattack that is an interception of an ARP request where an attacker gives their MAC address as the destination instead.

A

ARP cache poisoning

18
Q

The best method of sniffing on a switch, where all traffic is forwarded to a single physical port.

A

Port mirroring

19
Q

This option allows the sender of an IP packet to specify the routing path. This should be disabled at the router level.

A

Source routing

20
Q

A commonly supported option for secure remote administration

A

SSH

21
Q

Considered to be the strongest form of authentication, that utilizes public and private keys.

A

Certificate based authentication