Redirects users to a fake website even when they typed the correct URL.
DNS poisoning
This protocol should be used instead of HTTP to securely manage routers.
HTTPS
A firewall that filters ONLY using IP, port, and protocol.
What is a stateless firewall?
An attacker repeatedly guesses passwords until one works.
brute-force attack
Switch ports that are not in use should be ________
Disabled (shutdown)
This firewall tracks active connections.
stateful firewall
This tool protects against Man-in-the-Middle attacks.
VPN
This attack injects malicious code into a website form to access private data.
SQL injection
A fake Wi-Fi network with the same SSID as a real one.
Evil Twin
DAI and DHCP Snooping protect against this attack.
What is ARP poisoning?
NGFWs add this advanced filtering ability.
application-based filtering?
The best way to prevent brute-force attacks.
What is limiting login attempts and using strong passwords?
An attacker overwhelms a server with traffic until it becomes unavailable.
Denial-of-Service (DoS) attack
This attack forces devices off Wi-Fi by sending disconnect frames.
What is a deauthentication attack?
A policy that gives users access based only on their job needs.
RBAC (Role-Based Access Control)
This rule must always appear last on an ACL.
implicit deny
Encrypts remote connections to keep data safe on public Wi-Fi.
VPN
An attacker sends fake ARP messages so the switch broadcasts all traffic to every port.
What is MAC flooding?
This outdated wireless security protocol is easily cracked and should not be used.
WEP
Creating a separate guest Wi-Fi network uses this principle.
What is network segmentation?
Why rule order matters in an ACL.
Because firewalls stop at the first match.
A security practice requiring routers to use SNMPv3 instead of SNMPv1.
What is encrypting management traffic?