Network Attacks
Wireless Security
Protecting Networks (Managerial Controls)
Firewalls & ACLs
Defenses & Prevention
100

Redirects users to a fake website even when they typed the correct URL.

DNS poisoning

100

This protocol should be used instead of HTTP to securely manage routers.

HTTPS

100

A firewall that filters ONLY using IP, port, and protocol.

What is a stateless firewall?

200

An attacker repeatedly guesses passwords until one works.

brute-force attack

200

Switch ports that are not in use should be ________

Disabled (shutdown)

200

This firewall tracks active connections.

stateful firewall

200

This tool protects against Man-in-the-Middle attacks.

VPN

300

This attack injects malicious code into a website form to access private data.

SQL injection

300

A fake Wi-Fi network with the same SSID as a real one.

Evil Twin

300

DAI and DHCP Snooping protect against this attack.

What is ARP poisoning?

300

NGFWs add this advanced filtering ability.

application-based filtering?

300

The best way to prevent brute-force attacks.

What is limiting login attempts and using strong passwords?


400

An attacker overwhelms a server with traffic until it becomes unavailable.

Denial-of-Service (DoS) attack

400

This attack forces devices off Wi-Fi by sending disconnect frames.

What is a deauthentication attack?

400

A policy that gives users access based only on their job needs.

RBAC (Role-Based Access Control)

400

This rule must always appear last on an ACL.

implicit deny

400

Encrypts remote connections to keep data safe on public Wi-Fi.

VPN

500

An attacker sends fake ARP messages so the switch broadcasts all traffic to every port.

What is MAC flooding?

500

This outdated wireless security protocol is easily cracked and should not be used.

WEP

500

Creating a separate guest Wi-Fi network uses this principle.

What is network segmentation?

500

Why rule order matters in an ACL.

Because firewalls stop at the first match.

500

A security practice requiring routers to use SNMPv3 instead of SNMPv1.

What is encrypting management traffic?

M
e
n
u