AP Networking Unit 3

0.0(0)
studied byStudied by 0 people
0.0(0)
call with kaiCall with Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/49

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No study sessions yet.

50 Terms

1
New cards

What does the CIA triad stand for?

Confidentiality (protection of private information), Integrity (authenticity of data), Availability (reliable accessibility of data and services)

2
New cards

What is MAC spoofing?

When a device uses software to mask its original MAC address to impersonate another device on the network, potentially bypassing access controls or intercepting traffic

3
New cards

What is MAC flooding?

Sending many frames with different source MAC addresses to overflow the switch's CAM table, causing it to enter fail-open state and broadcast all traffic to all ports

4
New cards

What are four signs of MAC spoofing or MAC flooding?

1) Duplicate IP addresses, 2) Unknown MAC addresses, 3) Multiple MAC addresses on a single port, 4) Frequent MAC address changes on a port

5
New cards

How does port security prevent MAC flooding?

Limits the number of MAC addresses allowed on a physical port or specifies exactly which MAC addresses are permitted; traffic from unauthorized addresses is dropped

6
New cards

What happens when you set an unused switch port to "down"?

All traffic from that port is dropped, preventing unauthorized devices from physically connecting to the network through unused ports

7
New cards

What is a VLAN?

Virtual Local Area Network - segments devices connected to a switch into separate logical LANs for improved security and performance

8
New cards

What are three benefits of VLANs?

1) Increased security by isolating sensitive data, 2) Increased performance by reducing broadcast traffic, 3) Simplified network management and troubleshooting

9
New cards

How do VLANs improve network performance?

Broadcast messages are limited to specific VLANs rather than the entire network, reducing broadcast traffic and network congestion

10
New cards

What are the three steps to create and configure VLANs?

1) Determine segmentation plan (which devices belong together), 2) Create VLANs on the switch, 3) Assign devices to designated switch ports

11
New cards

What is the principle of least privilege?

A security principle that restricts user access to only the minimum levels necessary for their job function

12
New cards

What are the three categories of security controls?

Physical controls (locks, cameras, fencing), Managerial controls (policies, procedures, training), Technical controls (firewalls, encryption, network segmentation)

13
New cards

What is the difference between preventative, detective, and corrective controls?

Preventative stops attacks before they happen (firewalls), Detective identifies when attacks occur (IDS/IPS), Corrective addresses impacts after incidents (backups, patches)

14
New cards

Give three examples of preventative controls

1) Firewalls, 2) Card readers, 3) Password requirements, 4) Locks

15
New cards

Give three examples of detective controls

1) Intrusion Detection Systems (IDS), 2) Intrusion Prevention Systems (IPS), 3) Security Information and Event Management (SIEM), 4) Security cameras

16
New cards

Give two examples of corrective controls

1) Backups, 2) Software patches

17
New cards

What is a firewall?

A barrier between devices and networks that monitors and controls network traffic, admitting or denying traffic entry into a network or host

18
New cards

What is the difference between host-based and network-based firewalls?

Host-based protects a single device, Network-based protects an entire network

19
New cards

What is the difference between stateless and stateful firewalls?

Stateless filters based on packet headers (IP, ports, protocols), Stateful tracks connection states and makes decisions based on session context

20
New cards

What additional features does a Next-Generation Firewall (NGFW) provide?

Intrusion prevention, deep packet inspection, and traffic filtering by application type (in addition to stateless/stateful capabilities)

21
New cards

What is network segmentation?

Dividing a network into smaller segments/subnets to isolate devices and data, limit traffic, and create different security zones

22
New cards

What environmental threats should network security address?

Loss of power, extreme temperatures, humidity, fire, earthquakes, floods, natural disasters

23
New cards

What controls mitigate power loss threats?

UPS (Uninterruptible Power Supply) and backup generators

24
New cards

What controls mitigate fire threats?

Fire suppression systems

25
New cards

What controls mitigate temperature and humidity threats?

Ventilation, climate control, and humidity control systems

26
New cards

Name three external physical security controls

1) Fencing, 2) Security cameras, 3) Security guards

27
New cards

Name three internal physical security controls

1) Locks on doors, 2) Server cabinet locks, 3) Card readers, 4) Access control vestibules

28
New cards

What is a rogue DHCP server attack?

An unauthorized DHCP server on the network that assigns malicious IP configurations to clients, potentially redirecting traffic or causing DoS

29
New cards

What information can an attacker control with a rogue DHCP server?

Default gateway (MitM), DNS servers (traffic redirection), IP addresses (DoS), subnet masks

30
New cards

What is ARP spoofing?

Sending fraudulent ARP messages to associate the attacker's MAC address with another device's IP address (like the gateway) to intercept traffic

31
New cards

What is ARP poisoning?

Corrupting the ARP cache with false MAC-to-IP mappings, redirecting traffic to the attacker

32
New cards

What is the difference between spoofing and poisoning?

Spoofing is impersonation (pretending to be someone else), Poisoning is corrupting cached/stored data with false information

33
New cards

What is DNS poisoning?

Corrupting a DNS cache with false domain-to-IP mappings, redirecting users to malicious sites

34
New cards

What is OSPF?

Open Shortest Path First - a link-state routing protocol that uses cost metric based on bandwidth and supports hierarchical design with areas

35
New cards

What is EIGRP?

Enhanced Interior Gateway Routing Protocol - an advanced distance-vector protocol that uses composite metrics (bandwidth, delay, reliability, load)

36
New cards

What type of routing protocol is OSPF?

Link-state protocol

37
New cards

What type of routing protocol is EIGRP?

Advanced distance-vector protocol

38
New cards

Is EIGRP proprietary?

Originally Cisco proprietary, but became an open standard in 2013

39
New cards

What metric does OSPF use?

Cost metric based on bandwidth

40
New cards

What metrics does EIGRP use?

Composite metric using bandwidth, delay, reliability, and load (configurable weights)

41
New cards

What is RBAC?

Role-Based Access Control - assigns permissions to roles rather than individuals; users inherit permissions from their assigned role

42
New cards

Why should default credentials be changed on network devices?

Default credentials are often publicly known or standardized, making devices vulnerable to unauthorized access

43
New cards

Why is keeping firmware and software updated important?

Updates often include performance fixes and patches for known vulnerabilities

44
New cards

What is a virtual machine sandbox?

An isolated environment used to safely test new software or open suspicious files without risking the physical device or other virtual instances

45
New cards

What does setting a switch port to "up" vs "down" mean?

Up = device can pass network traffic through that port, Down = all traffic from that port is dropped

46
New cards

What is port security on a switch?

Feature that limits the number of MAC addresses on a port or specifies which specific MAC addresses are allowed

47
New cards

What is the CAM table on a switch?

Content Addressable Memory table that stores MAC address to port mappings for forwarding decisions

48
New cards

What happens when a switch's CAM table is full (fail-open state)?

The switch broadcasts all traffic to all ports like a hub, allowing potential traffic interception

49
New cards

What is an access control vestibule?

A security feature with two sets of doors where the first must close before the second opens, ensuring only authorized personnel enter sensitive areas

50
New cards

What are strong password requirements an example of?

Managerial control (also preventative control)