This type of memory table in a switch tracks which devices are connected to which physical ports.
CAM Table
his occurs when a device uses software to disguise its original MAC address, potentially receiving unintended network traffic.
MAC spoofing
This standard network protocol uses ports 20 and 21 for transferring files between a client and a server.
FTP
This cable is used to connect a computer to a switch’s management console.
console cable
These two sections of an IPv4 address are determined by the subnet mask to direct network traffic.
network and host
These network features improve performance by segmenting a network into smaller logical LANs, reducing competition for bandwidth.
VLAN
This type of attack floods a switch's CAM table with enough different MAC addresses to cause it to overflow, leading to broadcast traffic.
MAC Flooding
This secure version of FTP uses encryption to transfer files and operates on port 22.
This practice can help prevent IP address conflicts and ensure higher availability of network resources.
statically setting IP address
This type of notation uses a forward slash followed by the number of 1 bits in a subnet mask.
CIDR
This layer of the OSI model does most of a switch's operations, including looking up destination MAC addresses and forwarding frames.
Data Link Layer
This feature on a switch can be set to "up" or "down" and controls whether a device can send or receive network traffic through that port.
port status
This protocol is used to exchange emails between servers and operates on port 25.
SMTP
To prevent unauthorized access to network devices, these settings should be changed, and strong passwords should be enforced.
default login credentials
There are two reserved IP addresses...what are they called?
Network and broadcast addresses
This is the result when a MAC address is not found in a switch's CAM table, causing the switch to send the frame out of all physical ports.
Broadcast
This is a method of preventing unauthorized devices from accessing the network by limiting the number of MAC addresses associated with a switch port.
MAC address limiting
This protocol retrieves email messages from a mail server to a client and uses port 110.
POP3
This network utility uses ICMP to test host-to-host connectivity and can help isolate network problems.
ping
When a host sends data to a host on a different network, this device is required to forward the data.
router
This is the primary benefit of using VLANs in a network, which reduces unnecessary traffic and improves security.
network segmentation
This is the result of a switch when its CAM table is overflowed, which causes all traffic to be broadcast to all network nodes.
Fail open state
This protocol synchronizes the clocks on networked devices and uses port 123.
NTP
To pass traffic in a LAN, a switch must have these settings configured. (3 things)
switch’s access password, IP address, and subnet mask
This protocol is used by a host to resolve the MAC address of a target device when the MAC address is unknown.
ARP