Switches
Switch Security
More on Protocols
LAN Configuration and Troubleshooting
IPv4 Addressing
100

This type of memory table in a switch tracks which devices are connected to which physical ports.

CAM Table

100

his occurs when a device uses software to disguise its original MAC address, potentially receiving unintended network traffic.

MAC spoofing


100

This standard network protocol uses ports 20 and 21 for transferring files between a client and a server.

FTP

100

This cable is used to connect a computer to a switch’s management console.

console cable


100

These two sections of an IPv4 address are determined by the subnet mask to direct network traffic.

network and host

200

These network features improve performance by segmenting a network into smaller logical LANs, reducing competition for bandwidth.

VLAN

200

This type of attack floods a switch's CAM table with enough different MAC addresses to cause it to overflow, leading to broadcast traffic.

MAC Flooding

200

This secure version of FTP uses encryption to transfer files and operates on port 22.

SFTP
200

This practice can help prevent IP address conflicts and ensure higher availability of network resources.

statically setting IP address

200

This type of notation uses a forward slash followed by the number of 1 bits in a subnet mask.

CIDR

300

This layer of the OSI model does most of a switch's operations, including looking up destination MAC addresses and forwarding frames.

Data Link Layer

300

This feature on a switch can be set to "up" or "down" and controls whether a device can send or receive network traffic through that port.

port status


300

This protocol is used to exchange emails between servers and operates on port 25.

SMTP

300

To prevent unauthorized access to network devices, these settings should be changed, and strong passwords should be enforced.

default login credentials

300

There are two reserved IP addresses...what are they called?

Network and broadcast addresses

400

This is the result when a MAC address is not found in a switch's CAM table, causing the switch to send the frame out of all physical ports.

Broadcast

400

This is a method of preventing unauthorized devices from accessing the network by limiting the number of MAC addresses associated with a switch port.

MAC address limiting

400

This protocol retrieves email messages from a mail server to a client and uses port 110.

POP3

400

This network utility uses ICMP to test host-to-host connectivity and can help isolate network problems.

ping

400

When a host sends data to a host on a different network, this device is required to forward the data.

router

500

This is the primary benefit of using VLANs in a network, which reduces unnecessary traffic and improves security.

network segmentation

500

This is the result of a switch when its CAM table is overflowed, which causes all traffic to be broadcast to all network nodes.

Fail open state

500

This protocol synchronizes the clocks on networked devices and uses port 123.

NTP

500

To pass traffic in a LAN, a switch must have these settings configured. (3 things)

switch’s access password, IP address, and subnet mask

500

This protocol is used by a host to resolve the MAC address of a target device when the MAC address is unknown.

ARP