Acronyms
Attacks
Authentication
Misc
Switching
100

Reside on routers to determine which packets are allowed to route through them based upon the requesting device’s source and destination IP addresses.


Vba

ACL Access Control list

100

Attack using multiple network tags



MdA

VLAN hopping

100

AAA Server that uses port 1812 and 1813



HsE

RADIUS

100

Layer of OSI mode l where encryption occurs



OsK

Presentation (6)

100

Normal size of a frame



KdW

1500

200

This Acronym defines an area between two firewalls separating the internet from an internal network for things such as public facing web servers


QoW

DMZ (Screened subnet)

200

Intercepts traffic between you and default gateway



Dse

MITM  Man in the middle or On Path

200

Network authentication protocol designed for a client/server environment like Active Directory



LsG

Kerberos

200

Using IPsec this is what encrypts all the traffic 



BdH

ESP Encapsulate Security Payload

200

Disable switch port based on wrong Mac address



LoP

Port Security

300

Protocol that maps IP to MAC addresses



ArT

ARP Address Resolution Protocol

300

DNS attack that sends user to entirely different website



XXs

DNS poisoning

300

AAA server that is Cisco proprietary



HSw

TACACS+

300

VLAN tagging mechanism 



KFs

802.1q

300

Prevents rogue dhcp server on switch port



mSw

DHCP snooping

400

Prevents switching loops



Poz

STP Spanning Tree Protocol

400

Overflow of CAM table



EdS

Mac flooding

400

Supports multiple authentication mechanisms such as tokens, smart cards, certificates, and public key encryption authentication in wireless networks


MnM

EAP (Extensible Authentication Protocol)

400

How many bits is a MAC address



JJs

48

400

Protocol for the collective handling of multiple physical ports that can be seen as a single channel for network traffic purposes



JdQ

LACP Link Aggregation Control Protocol

500

Policy governing credit card transactions for ecommerce 



PcG

PCI-DSS   (Payment Card Industry Data Security Standard)

500

The abuse of electronic messaging systems such as email, broadcast media, and instant messaging.



PZq

SPAM

500

Term for using something you know, something you have , and something you are for authentication



FDc

MFA (Multifactor Authentication)

500

Only the minimal amount of access that is needed to meet business needs should be granted



HXn

Least privilege

500

Port on a switch connecting to another switch using a straight-through cable rather than an Ethernet crossover cable.


RfR

MDIX Medium Dependent Interface Crossover 

M
e
n
u