Security Fundamentals Flashcards
VLAN hopping
An attacker sends double-tagged 802.1Q frames over a trunk link
MAC flooding
An attacker sends traffic out every port on a switch
ARP poisoning
An attacker intercepts traffic intended for another recipient
MAC spoofing
An attacker identifies itself using the address of another host
DHCP spoofing
An attacker installs a rogue server on the network
Authentication
Process of verifying a user’s identity
Authorization
Process of giving individuals access to system objects based on their identity
Accounting
Process of keeping track of a user’s activity while accessing a network resources
AES
Advanced Encryption Standard is used by WPA2/WPA3 to protect confidentiality
Enable secret command
In Cisco IOS 15, this command stores an encrypted password in the device’s configuration file by using a Secure Hash Algorithm 256-bit hash
Native VLAN Mismatch
Occurs when each end of an 802.1Q trunk port is operating with a different native VLAN. It can cause a port to go into error-disabled state
Service password-encryption command
Configures global password encryption in a running configuration. Any passwords that were not previously encrypted will be encrypted alongside any passwords that are created in the future regardless of the commands used to create them
enable password command
Passwords configured using this command are not encrypted by default. You issue the enable password command to create a password that must be used to gain access to CLI enable mode
password command
Passwords configured by using the password command are not encrypted by default. The line console 0 command followed by the password command configures a password for accessing the router by using the console
CCKM key management
Cisco Centralized Key Management is a proprietary fast-rekeying method that enables a wireless client to roam from one access point to another without requiring intervention from the WLC