FHRP
First Hop Redundancy Protocol
This type of Malware records the keystrokes of an individual and sends them to the attacker.
Keylogger
Name for when a device or OS is no longer made, but still receives support
EOL (End-Of-Life)
Type of Disaster Recovery Site that takes weeks to implement
Cold Site
Normal size of an MTU
1500 bytes
LACP
Link Aggregation Control Protocol (Used with NIC Teaming to cluster NIC's together)
Name for rogue WAP that has been put in place for malicious purposes
Evil Twin
Color (and name) of standardized template used to set up same configuration of all devices
Golden
Port used by LDAPS
636
Algorithm used by OSPF
Dijkstra's Algorithm
IPAM
Internet Protocol Address Management
Intercepts traffic during an active communication session
MITM (Man in the middle)(On-Path)
DNS Record type for either Mail Servers or other DNS Servers
MX-Mail Server
NS-DNS Server
Name of UDP's Protocol Data Unit
Datagram
Device IEEE standard used to track/Audit remote user work, while also accomplishing Authentication and Authorization
802.1X (RADIUS)
LLDP
Link Layer Discovery Protocol (Determine port status for troubleshooting connectivity issues)
Attack that changes IP Address info in DNS ARP Table to maliciously redirect users to a fraudulent website (Pharming)
DNS Poisoning
Name for IPv4 Class D, Range of 224-239
Multicast
Type of VPN that is used via a web browser and not the device
Clientless
Switch security feature that prevents rogue DHCP servers
DHCP snooping
VXLAN
Virtual Extensible Local Area Network
Disabling unused ports and changing default passwords is known as Device ___________
Hardening
Color of Testing Team who specializes in building secure systems and automating security processes
Green
Name (or Acronym) for how you set up routing in a virtual/hypervisor environment
Network Functions Virtualization (NFV)
Metric used to determine Root Bridge for STP if all switches have same Priority Value
Lowest MAC address