• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/9

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

9 Cards in this Set

  • Front
  • Back

Secure SHell (SSH)

Encrypted, command-line protocol connecting to a remote device. Uses port 22, Telnet uses port 23.

MAC Address Flooding

Attack exploiting Switch behavior by sending frames with bogus MAC addresses. Switches will send traffic through all ports if a MAC address cannot be found. Causes frames to be forwarded to all ports due to full CAM table.

DHCP attacks

DHCP Spoofing


DHCP Starvation

Telnet

Insecure protocol, vulnerable to Brute Force and Telnet DOS atks.

Security Practices

- Develop written security policy


- Shutdown unused services and ports


- Perform backups


- Firewalls


- Encryption

Network Security Tools

Allows admins to monitor the network/access times/error logs. Also mock attacks and penetration testing.

Port Security: Operation

Limits number of MAC address allowed on a port.


Can be Static, Dynamic or Sticky.

Port Security: Violation

Security violation occurs if:


- An address tries to connect to an interface with a full CAM list.


- An address tries to connect but is seen on another secure interface list

NTP Network Time Protocol

Synchronizes clocks of comuputer system data networks. Can get time from Atomic clock, local master or internet master. Can configure an NTP server or NTP client.