Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
9 Cards in this Set
- Front
- Back
Secure SHell (SSH) |
Encrypted, command-line protocol connecting to a remote device. Uses port 22, Telnet uses port 23. |
|
MAC Address Flooding |
Attack exploiting Switch behavior by sending frames with bogus MAC addresses. Switches will send traffic through all ports if a MAC address cannot be found. Causes frames to be forwarded to all ports due to full CAM table. |
|
DHCP attacks |
DHCP Spoofing DHCP Starvation |
|
Telnet |
Insecure protocol, vulnerable to Brute Force and Telnet DOS atks. |
|
Security Practices |
- Develop written security policy - Shutdown unused services and ports - Perform backups - Firewalls - Encryption |
|
Network Security Tools |
Allows admins to monitor the network/access times/error logs. Also mock attacks and penetration testing. |
|
Port Security: Operation |
Limits number of MAC address allowed on a port. Can be Static, Dynamic or Sticky. |
|
Port Security: Violation
|
Security violation occurs if: - An address tries to connect to an interface with a full CAM list. - An address tries to connect but is seen on another secure interface list |
|
NTP Network Time Protocol |
Synchronizes clocks of comuputer system data networks. Can get time from Atomic clock, local master or internet master. Can configure an NTP server or NTP client. |