Security Switch Features
Implement Switch Security
Spanning Tree Protocol
Common Switch Attacks
Misc. Vocabulary
100

A logical grouping of computers based on switch ports.

Virtual LAN (VLAN)

100

VLANs are commonly used with this to distinguish voice traffic from data traffic. Traffic on this network can be given a higher priority to ensure timely delivery.

Voice over IP (VoIP)

100

To provide fault tolerance, many networks implement redundant paths between devices using multiple _____. 

Switches
100

Overloads the switch's MAC forwarding table to make the switch function like a hub.

MAC Flooding

100

This switch feature follows the 802.1x protocol to allow only authenticated devices to connect.

Port authentication

200

This is used to connect two switches together.

Trunk port

200

MAC filtering uses the this address of a device to drop or forward frames through the switch.

MAC

200

Providing redundant paths between segments causes packets to be passed between the redundant paths endlessly. This condition is known as:

A switching loop.

200

This type of spoofing is changing the source MAC address on frames.

MAC spoofing

200

When this attack occurs, the source MAC address is changed on frames sent by the attacker.

VLAN Hopping

300

Is a member of all VLANs defined on a switch and carries traffic between the switches.

Trunk port

300

Generally, all switch ports are enabled by default. To increase the security of the switch and network, you what should be done to individual ports that are not in use. 

They should be disabled.

300

This protocol runs on switches to prevent switching loops by making only a single path between switches active at a single time. 

Spanning Tree Protocol

300

This type of switch attack associates the attacker's MAC address with the IP address of victim's device.

ARP spoofing/poisoning

300

This unsecure protocol could allow unauthorized devices to modify a switch's configuration.

Dynamic Trunking
Protocol (DTP)

400

Is provided by the 802.1x protocol and allows only authenticated devices to connect to the LAN through the switch.

Port authentication

400

When you use switches to create VLANs, you still need routers to route data between _____.

VLANs

400

A type of ports used by the Spanning Tree Protocol, which are configured to communicate directly to the root switch.

Root ports

400

This protocol is not secure and allows unauthorized devices to possibly modify configuration information. You should disable the DTP services on the switch's end user (access) ports before implementing the switch configuration into the network.

Dynamic Trunking Protocol

400

This switch feature restricts connection to a given port based on the MAC address.

MAC filtering/port security

500

Ports in unauthorized states can be used only for this authentication traffic.

802.1x protocol

500

Creating VLANs with switches offers many administrative benefits such as being able to create virtual LANs based on criteria such as ______, protocol, or service.

Workgroup

500

Ports in the Spanning Tree Protocol exist in one of five states: Blocking, listening, learning, forwarding and ____. 

Disabled

500

With this particular switch attack, the source device sends frames to the attacker's MAC address instead of the correct device.

ARP spoofing/poisoning

500

This security feature on some switches filters out untrusted DHCP messages.

Dynamic Host Configuration protocol (DHCP) snooping

M
e
n
u