NET-04-P1 Switch Security Flashcards

1
Q

is when attackers change their own physical PC address to conceal their true identity and pose as someone else. For example, an attacker may spoof a MAC address with a legitimate MAC address, to bypass an access control mechanism such as port security

A

MAC spoofing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

is an attack that targets a switch’s MAC table. The idea is to flood the table with a large number of fake addresses. When the list of addresses exceeds the maximum seize of the table, the switch will initiate its fallback mode and begin to act as a hub, meaning every frame will be forwarded to every host on the network

A

CAM Table Overflow

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The feature used to restrict input to an interface by limiting MAC addresses of workstations that are allowed to access a specific port

A

Port Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

the default violation mode

A

Shutdown

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Ethernet frames with unauthorized source MAC addresses are dropped. The switch provides notification of security violations and keeps count of the number of violations

A

Restrict

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Ethernet frames with unauthorized source MAC addresses are dropped. In this violation mode, the switch does not provide notification regarding this event

A

Protect

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

requires static configuration of each allowed MAC address and its assignment to an interface. Most secured method but is very time consuming and open to faulty configuration

A

Manual

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

allowed MAC addresses are learned dynamically and are limited to the maximum number configured for the interface. The switch learns the source address of the first few devices associated with the interface. providing a fast and scalable method of operation

A

Sticky

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

although the number of default MAC addresses allowed in Port Security is one, the number an be changed within the range of 1 to 3072

A

Max Allowed MAC address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

When a switch port is in Err-disabled mode, the port may have been disabled automatically by the switch operating system, due to port security shutdown mode violation

A

Err-disabled

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

This state occurs when two parties, set for point-to-point communication, are configured to use different duplex mode

A

Duplex Mismatch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A faulty network interface card with software or hardware issues may trigger the Err-disabled state

A

Bad NIC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

When there is a broadcast volume too large for processing in the broadcast domain

A

Broadcast Storms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

presenting the authorized MAC addresses associated with a port and the type (sticky or manually) is done with this command

A

show port-security address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

can be run for a quick overview of the configuration

A

show port-security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

to view specific interface, this command should be used, since it provides more information

A

show port-security interface [interface]

17
Q

defines the type of violation rule to be applied to the port

A

violation

18
Q

This command define sticky learning, up to maximum of five addresses

A

mac-address maximum

19
Q

was developed many years ago to allow users to manage devices from anywhere, via a simple and minimal configuration. however, using Telnet involves a potential security risk because usernames and passwords are sent in plain text on TCP port 23

A

Telnet

20
Q

Modern encryption relies heavily on the RSA algorithm since most methods use public and private encryption keys

A

RSA Encryption

21
Q

what does CIA stand for

A

Confidentiality, Integrity, Availability

22
Q

is when two different keys are used to encrypt and decrypt messages

A

Asymmetric Encryption

23
Q

is a command-line interface (CLI) in network devices used to create remote access connections

A

VTY - Virtual teletype

24
Q

The primary purpose of creating a computer network is to share resources and enable communication within the network. A router or Layer 3 can handle network segmentation and inter-VLAN communication

A

SVI - Switched Virtual Interface

25
Q

command: line vty & login local

A

Allow Remote Access

26
Q

Commands: interface vlan 1

ip address

A

IP Switch settings

27
Q

Command: crypto key generate rsa

A

Generate RSA keys

28
Q

command presents the active SSH sessions on the network advice

A

Show ssh

29
Q

displays the version definition, authentication timeout and retries

A

Show ip ssh