1.7 Flashcards
What is PortFast?
Cisco’s name for BPDU Guard.
How does STP determine which switch is the root bridge?
STP configures the root bridge automatically, but you can also configure it manually by setting a “root bridge priority.”
The switch with the lowest root bridge priority will be set as the root. (0 is the lowest priority option.)
If more than one switch has the same root bridge priority, STP will give priority to the one with the lowest MAC address.
What is Root Guard?
A feature of Cisco switches, designed to prevent a rogue root bridge.
If you manually configured your root bridge, and it receives a superior BPDU on a root guard port, then root guard will change that interface to listening-only status, and show a “root-inconsistent” message, effectively disabling any inbound traffic from the rogue root interface.
How can a network be segmented?
It can be segmented:
- Physically (using separate, disconnected devices),
- Logically (using VLANs),
- or Virtually (using virtual networks).
What is an SOW?
Statement of Work
A document that outlines all the work that is to be performed, as well as the agreed-upon deliverables and timelines.
What is a “legal hold”?
A legal hold is a process that an organization uses to preserve all forms of relevant information when litigation is anticipated.
For example: If a legal hold notice has been given to a backup service provider, the provider will not destroy old backups until the hold is lifted.
What is LACP?
Link Aggregation Control Protocol
Configured on a switch to allow port aggregation.
What is a Man Trap?
A man trap, like an air lock, is a physical security access control system comprising a small space with two sets of interlocking doors, such that the first set of doors must close before the second set opens.
In a manual man trap, a guard locks and unlocks each door in sequence.
What is SHA-1?
Secure Hash Algorithm
a hashing function used for checking data integrity
What is MD5?
Message Digest
a hashing function used for checking data integrity
What are the most popular file hashing functions?
Secure Hash Algorithm (SHA) and Message Digest (MD) are a series of hashing functions used for checking data integrity (SHA-1 and MD5 are the most popular versions).