Term
|
Definition
What is the type of product that checks a user for authentication and checks a device for compliance with OS and applications standards prior to allowing it on the network |
|
|
Term
|
Definition
What is the name of the Cisco product that runs VoIP phones and svcs |
|
|
Term
|
Definition
Attacker assumes the MAC address of another device |
|
|
Term
MAC address table overflow |
|
Definition
Attacker floods the switch with MAC addresses |
|
|
Term
|
Definition
Attacker becomes the root bridge |
|
|
Term
|
Definition
Packets are flooded on all ports of one VLAN |
|
|
Term
|
Definition
A packet is double-tagged |
|
|
Term
|
Definition
Statically Assign a MAC address |
|
|
Term
MAC address table overflow mitigation |
|
Definition
Permit a limited number of MAC addresses to be learned from a port |
|
|
Term
|
Definition
Enable root guard on all root ports Enable portfast and bpduguard on all non-trunking ports |
|
|
Term
|
Definition
|
|
Term
|
Definition
Disable auto trunking and manually enable trunking on appropriate ports Disable trunking on all access ports |
|
|
Term
What is the best security technique to use when using a WiFi hostpot for business |
|
Definition
|
|
Term
What is a useful mitigation technique to protect VoIP at layer 2? |
|
Definition
Create a separate Voice VLAN |
|
|
Term
Popular SAN transport protocols |
|
Definition
|
|