MAC Flooding - Vocabulary

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall with Kai
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/15

flashcard set

Earn XP

Description and Tags

Vocabulary flashcards covering MAC flooding concepts, definitions, and mitigation techniques discussed in the lesson.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

16 Terms

1
New cards

MAC flooding

An attack that overflows a switch's MAC address table, causing the switch to broadcast frames to all ports and potentially degrade security and performance.

2
New cards

MAC address table

The switch's mapping of MAC addresses to switch ports used to forward frames efficiently.

3
New cards

MAC address

A unique hardware identifier assigned to a network interface used for addressing on a local network.

4
New cards

Promiscuous mode

A network interface mode in which the device captures all network traffic, not just frames addressed to it.

5
New cards

Fail-safe mode

A switch state reached when the MAC address table is full, causing it to flood traffic like a hub.

6
New cards

Broadcast traffic

Frames sent to all devices on the network segment.

7
New cards

Data snooping

Unauthorized interception of network data by listening to traffic on a flooded switch.

8
New cards

Denial of Service (DoS)

Disruption of network services caused by overwhelming the network with traffic during a MAC flooding attack.

9
New cards

MAC-based access control (MAC filtering)

Security that allows or denies network access based on device MAC addresses.

10
New cards

Port security

A switch feature that limits the number of MAC addresses learned on a port to prevent floods.

11
New cards

VLAN (Virtual Local Area Network)

A technique to segment network traffic into separate broadcast domains to limit attack impact.

12
New cards

Anomaly-based IDS

An intrusion detection system that flags unusual patterns, such as spikes in MAC address entries or broadcast traffic.

13
New cards

Network monitoring tools

Tools that alert administrators to unusual traffic patterns and metric changes.

14
New cards

MAC flood attack method

Technique using tools to generate many random MAC addresses and rapidly send frames to overflow the switch.

15
New cards

Port security limit on MAC addresses per port

Configuration that restricts how many MAC addresses a switch port will learn to prevent flooding.

16
New cards

MAC-based access control bypass

Situation where a flooded switch cannot enforce MAC allow/deny lists, permitting unauthorized devices to connect.