Term
|
Definition
| What is the type of product that checks a user for authentication and checks a device for compliance with OS and applications standards prior to allowing it on the network |
|
|
Term
|
Definition
| What is the name of the Cisco product that runs VoIP phones and svcs |
|
|
Term
|
Definition
| Attacker assumes the MAC address of another device |
|
|
Term
| MAC address table overflow |
|
Definition
| Attacker floods the switch with MAC addresses |
|
|
Term
|
Definition
Attacker becomes the root bridge |
|
|
Term
|
Definition
| Packets are flooded on all ports of one VLAN |
|
|
Term
|
Definition
| A packet is double-tagged |
|
|
Term
|
Definition
| Statically Assign a MAC address |
|
|
Term
| MAC address table overflow mitigation |
|
Definition
| Permit a limited number of MAC addresses to be learned from a port |
|
|
Term
|
Definition
Enable root guard on all root ports Enable portfast and bpduguard on all non-trunking ports |
|
|
Term
|
Definition
|
|
Term
|
Definition
Disable auto trunking and manually enable trunking on appropriate ports Disable trunking on all access ports |
|
|
Term
| What is the best security technique to use when using a WiFi hostpot for business |
|
Definition
|
|
Term
| What is a useful mitigation technique to protect VoIP at layer 2? |
|
Definition
| Create a separate Voice VLAN |
|
|
Term
| Popular SAN transport protocols |
|
Definition
|
|