Acronyms
Attacks
Authentication
Misc
Switching
100

A firewall ACL is comprised of AC________

E (Entries)

100

This type of Malware records the keystrokes of an individual and sends them to the attacker.

Keylogger

100

Authentication Server that uses port 1812 and 1813

RADIUS

100

Layer of OSI mode l where encryption occurs

Presentation (6)

100

Normal size of an MTU

1500 bytes

200

The area between two firewalls, in front of your network, that contains your public-facing devices 

DMZ (Screened Subnet)

200

Intercepts traffic during an active communication session

MITM  (Man in the middle)(On-Path)

200

AAA server that is Cisco proprietary

TACACS+

200

Network topology where every device is connected to every other device

Full Mesh

200

Disables switch port based on wrong Mac address

Port Security

300

Prevents switching loops

STP Spanning Tree Protocol

300

The sending of unauthorized or unsolicited messages to a mobile device using Bluetooth

BlueJacking

300

Windows network security protocol designed for a client/server environment like Active Directory

Kerberos

300

Only the minimal amount of access that is needed to meet business needs should be granted

Principal of Least privilege

300

Protocol used along with NIC Teaming to combine multiple NIC's into a single interface

LACP Link Aggregation Control Protocol

400

What protocol can be used to detect a spoofed MAC address?

RARP (Reverse Address resolution Protocol)

400

Malware that allows remote commands to be executed on your device

RAT (Remote Access Trojan)

400

Supports multiple authentication mechanisms such as tokens, smart cards, certificates, and public key encryption authentication in wireless networks

EAP (Extensible Authentication Protocol)

400

How many bits is a MAC address

48

400

Port technology that allows you to connect 2 switches with a straight-thru cable rather than a crossover cable

MDI-X (Medium Dependent Interface Crossover)

500

Policy governing credit card transactions for ecommerce 

PCI-DSS   (Payment Card Industry Data Security Standard)

500

Name for rogue WAP that has been put in place for malicious purposes

Evil Twin

500

Secure authentication protocol where the password is never sent to the server

MS-CHAPv2 (Challenge Handshake Authentication Protocol)

500

IEEE standard for VLAN tagging and management

802.1q

500

Switch security feature that prevents rogue DHCP servers

DHCP snooping

M
e
n
u