Reside on routers to determine which packets are allowed to route through them based upon the requesting device’s source and destination IP addresses.
Vba
ACL Access Control list
Attack using multiple network tags
MdA
VLAN hopping
AAA Server that uses port 1812 and 1813
HsE
RADIUS
Layer of OSI mode l where encryption occurs
OsK
Presentation (6)
Normal size of a frame
KdW
1500
This Acronym defines an area between two firewalls separating the internet from an internal network for things such as public facing web servers
QoW
DMZ (Screened subnet)
Intercepts traffic between you and default gateway
Dse
MITM Man in the middle or On Path
Network authentication protocol designed for a client/server environment like Active Directory
LsG
Kerberos
Using IPsec this is what encrypts all the traffic
BdH
ESP Encapsulate Security Payload
Disable switch port based on wrong Mac address
LoP
Port Security
Protocol that maps IP to MAC addresses
ArT
ARP Address Resolution Protocol
DNS attack that sends user to entirely different website
XXs
DNS poisoning
AAA server that is Cisco proprietary
HSw
TACACS+
VLAN tagging mechanism
KFs
802.1q
Prevents rogue dhcp server on switch port
mSw
DHCP snooping
Prevents switching loops
Poz
STP Spanning Tree Protocol
Overflow of CAM table
EdS
Mac flooding
Supports multiple authentication mechanisms such as tokens, smart cards, certificates, and public key encryption authentication in wireless networks
MnM
EAP (Extensible Authentication Protocol)
How many bits is a MAC address
JJs
48
Protocol for the collective handling of multiple physical ports that can be seen as a single channel for network traffic purposes
JdQ
LACP Link Aggregation Control Protocol
Policy governing credit card transactions for ecommerce
PcG
PCI-DSS (Payment Card Industry Data Security Standard)
The abuse of electronic messaging systems such as email, broadcast media, and instant messaging.
PZq
SPAM
Term for using something you know, something you have , and something you are for authentication
FDc
MFA (Multifactor Authentication)
Only the minimal amount of access that is needed to meet business needs should be granted
HXn
Least privilege
Port on a switch connecting to another switch using a straight-through cable rather than an Ethernet crossover cable.
RfR
MDIX Medium Dependent Interface Crossover