A firewall ACL is comprised of AC________
E (Entries)
This type of Malware records the keystrokes of an individual and sends them to the attacker.
Keylogger
Authentication Server that uses port 1812 and 1813
RADIUS
Layer of OSI mode l where encryption occurs
Presentation (6)
Normal size of an MTU
1500 bytes
The area between two firewalls, in front of your network, that contains your public-facing devices
DMZ (Screened Subnet)
Intercepts traffic during an active communication session
MITM (Man in the middle)(On-Path)
AAA server that is Cisco proprietary
TACACS+
Network topology where every device is connected to every other device
Full Mesh
Disables switch port based on wrong Mac address
Port Security
Prevents switching loops
STP Spanning Tree Protocol
The sending of unauthorized or unsolicited messages to a mobile device using Bluetooth
BlueJacking
Windows network security protocol designed for a client/server environment like Active Directory
Kerberos
Only the minimal amount of access that is needed to meet business needs should be granted
Principal of Least privilege
Protocol used along with NIC Teaming to combine multiple NIC's into a single interface
LACP Link Aggregation Control Protocol
What protocol can be used to detect a spoofed MAC address?
RARP (Reverse Address resolution Protocol)
Malware that allows remote commands to be executed on your device
RAT (Remote Access Trojan)
Supports multiple authentication mechanisms such as tokens, smart cards, certificates, and public key encryption authentication in wireless networks
EAP (Extensible Authentication Protocol)
How many bits is a MAC address
48
Port technology that allows you to connect 2 switches with a straight-thru cable rather than a crossover cable
MDI-X (Medium Dependent Interface Crossover)
Policy governing credit card transactions for ecommerce
PCI-DSS (Payment Card Industry Data Security Standard)
Name for rogue WAP that has been put in place for malicious purposes
Evil Twin
Secure authentication protocol where the password is never sent to the server
MS-CHAPv2 (Challenge Handshake Authentication Protocol)
IEEE standard for VLAN tagging and management
802.1q
Switch security feature that prevents rogue DHCP servers
DHCP snooping