Module 14: Layer Two Considerations Flashcards

1
Q

What is Layer 2 on the OSI Model

A

Data Link (ethernet frames) - If layer 2 is compromised all layers above are too.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the weakest link in the OSI Model

A

Layer 2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are some types of Layer 2 Attacks

A
Mac Table Attacks
VLAN Attacks
DHCP Attacks
ARP Attacks
Address Spoofing Attacks
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How to mitigate MAC Table Attacks

A

Port Security to limit the number of Valid MAC addresses allowed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How to secure unused ports?

A

Disable all unused ports

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is VLAN hopping?

A

a attacking host can gain access to all traffic on a VLAN that would not normally be accessible.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How to mitigate VLAN hopping?

A

Disable DTP (autotrunking)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is DHCP Starvation Attack?

A

is to DOS connecting clients to the DHCP server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a DHCP Spoofing Attack

A

when a rouge DHCP server is connected to the network and provides false IP configs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How to mitigate DHCP attacks

A

Enable DHCP snooping on trusted ports. Or limit the rate of the number of DHCP discovery messages a untrusted port can recieve.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How to mitigate a ARP attack

A

Enable DAI (dynamic ARP inspection)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly