Deck 7: Administering a Secure Network

Full screen (f)
exit full mode
Question
A ____ forwards packets across computer networks.

A) bridge
B) router
C) switch
D) hub
Use Space or
up arrow
down arrow
to flip the card.
Question
The most common protocol suite used today for local area networks (LANs) as well as the Internet is ____.

A) UDP
B) ASN.1
C) TCP/IP
D) BER
Question
____ can be used to determine whether new IP addresses are attempting to probe the network.

A) DNS logs
B) Firewall logs
C) DHCP logs
D) Proxy logs
Question
SNMP agents are protected with a password known as a(n) ____ in order to prevent unauthorized users from taking control over a device.

A) entity
B) community string
C) MIB
D) OID
Question
It is possible to segment a network by physical devices grouped into logical units through a(n) ____.

A) VLAN
B) subnets
C) IP address
D) MAC address
Question
Despite its promise to dramatically impact IT, cloud computing raises significant security concerns.
Question
TCP/IP uses its own five-layer architecture that includes Network Interface, Internet, Control, Transport, and Application.
Question
A ____ can create entries in a log for all queries that are received.

A) network log
B) DHCP log
C) DNS log
D) proxy log
Question
IEEE 802.1x is commonly used on wireless networks.
Question
IP telephony and Voice over IP (VoIP) are identical.
Question
____ is used to relay query messages.

A) ICMP
B) FTP
C) UDP
D) TCP
Question
TCP is responsible for addressing packets and sending them on the correct route to the destination, while IP is responsible for reliable packet transmission.
Question
Routers operate at the ____ Layer.

A) Transport
B) Application
C) Presentation
D) Network
Question
IP is the protocol that functions primarily at the Open Systems Interconnection (OSI) ____.

A) Transport Layer
B) Network Layer
C) Data link Layer
D) Presentation Layer
Question
The ____ is a database, organized as a hierarchy or tree, of the name of each site on the Internet and its corresponding IP number.

A) WINS
B) NIS
C) TACACS+
D) DNS
Question
Broadcast storms can be prevented with ____.

A) spanning tree
B) Dijkstra's algorithm
C) 802.11x
D) loop protection
Question
TCP is the main ____ protocol that is responsible for establishing connections and the reliable data transport between devices.

A) Application Layer
B) Presentation Layer
C) Network Layer
D) Transport Layer
Question
TCP port ____ is the FTP control port used for passing FTP commands.

A) 19
B) 20
C) 21
D) 22
Question
A ____ is a feature that controls a device's tolerance for unanswered service requests and helps to prevent a DoS attack.

A) flood guard
B) protocol guard
C) link guard
D) frame guard
Question
DNS poisoning can be prevented by using the latest editions of the DNS software known as ____.

A) BIND
B) DHCP
C) WINS
D) finger
Question
In the ____ cloud computing model, the customer has the highest level of control.

A) Cloud Application as a Service
B) Cloud Infrastructure as a Service
C) Cloud Software as a Service
D) Cloud System as a Service
Question
____ is a pay-per-use computing model in which customers pay only for the computing resources they need.

A) Cloud computing
B) Virtualization
C) Cloud Software as a Service
D) Infrastructure as a Service
Question
Server virtualization typically relies on the ____, which is software that runs on a physical computer to manage one or more virtual machine operating systems.

A) kernel
B) supervisor
C) hypercard
D) hypervisor
Question
List and describe the three fields that each ICMP message contains.
Question
Describe one way to use FTP on a local host computer.
Question
In the ____ model, the cloud computing vendor provides access to the vendor's software applications running on a cloud infrastructure.

A) Cloud Application as a Service
B) Cloud Infrastructure as a Service
C) Cloud Software as a Service
D) Cloud System as a Service
Question
Why is the Physical Layer omitted in the TCP/IP model?
Question
Discuss one security advantage to hosts running virtualization.
Question
What are the two types of community strings?
Question
____ is a means of managing and presenting computer resources by function without regard to their physical layout or location.

A) Portability
B) Virtualization
C) Availability
D) Migration assistance
Question
____ provides a greater degree of security by implementing port-based authentication.

A) IEEE 802.3ad
B) IEEE 802.11n
C) IEEE 802.1x
D) IEEE 802.1z
Question
The ____________________ Layer is omitted in the TCP/IP model.
Question
List the steps of a DNS lookup.
Question
With operating system virtualization, a(n) ____________________ system is the native operating system to the hardware.
Question
____________________ servers are intermediate hosts through which Web sites are accessed.
Question
List the steps in an 802.1x authentication procedure.
Question
Discuss the problems associated with storing the entire database of names and IP addresses in one location.
Question
____________________ computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort or service provider interaction.
Question
A(n) ____________________ is a record of events that occur.
Question
List and describe the three service models of cloud computing.
Question
List and describe three benefits offered by IP telephony.
Question
Match between columns
A malformed ping using ICMP is sent to the victim's computer that exceeds the size of an IP packet
DNS
A malformed ping using ICMP is sent to the victim's computer that exceeds the size of an IP packet
ICMP
A malformed ping using ICMP is sent to the victim's computer that exceeds the size of an IP packet
Network discovery
A malformed ping using ICMP is sent to the victim's computer that exceeds the size of an IP packet
Smurf DoS attack
A malformed ping using ICMP is sent to the victim's computer that exceeds the size of an IP packet
Ping of Death
A malformed ping using ICMP is sent to the victim's computer that exceeds the size of an IP packet
SNMP
A malformed ping using ICMP is sent to the victim's computer that exceeds the size of an IP packet
DNS poisoning
A malformed ping using ICMP is sent to the victim's computer that exceeds the size of an IP packet
STA
A malformed ping using ICMP is sent to the victim's computer that exceeds the size of an IP packet
IP telephony
Functions by exchanging management information between networked devices
DNS
Functions by exchanging management information between networked devices
ICMP
Functions by exchanging management information between networked devices
Network discovery
Functions by exchanging management information between networked devices
Smurf DoS attack
Functions by exchanging management information between networked devices
Ping of Death
Functions by exchanging management information between networked devices
SNMP
Functions by exchanging management information between networked devices
DNS poisoning
Functions by exchanging management information between networked devices
STA
Functions by exchanging management information between networked devices
IP telephony
An attacker can use ICMP messages as one of the first steps in reconnaissance to discover information about the hosts that are part of the network
DNS
An attacker can use ICMP messages as one of the first steps in reconnaissance to discover information about the hosts that are part of the network
ICMP
An attacker can use ICMP messages as one of the first steps in reconnaissance to discover information about the hosts that are part of the network
Network discovery
An attacker can use ICMP messages as one of the first steps in reconnaissance to discover information about the hosts that are part of the network
Smurf DoS attack
An attacker can use ICMP messages as one of the first steps in reconnaissance to discover information about the hosts that are part of the network
Ping of Death
An attacker can use ICMP messages as one of the first steps in reconnaissance to discover information about the hosts that are part of the network
SNMP
An attacker can use ICMP messages as one of the first steps in reconnaissance to discover information about the hosts that are part of the network
DNS poisoning
An attacker can use ICMP messages as one of the first steps in reconnaissance to discover information about the hosts that are part of the network
STA
An attacker can use ICMP messages as one of the first steps in reconnaissance to discover information about the hosts that are part of the network
IP telephony
Substitutes addresses so that the computer is automatically redirected to another device
DNS
Substitutes addresses so that the computer is automatically redirected to another device
ICMP
Substitutes addresses so that the computer is automatically redirected to another device
Network discovery
Substitutes addresses so that the computer is automatically redirected to another device
Smurf DoS attack
Substitutes addresses so that the computer is automatically redirected to another device
Ping of Death
Substitutes addresses so that the computer is automatically redirected to another device
SNMP
Substitutes addresses so that the computer is automatically redirected to another device
DNS poisoning
Substitutes addresses so that the computer is automatically redirected to another device
STA
Substitutes addresses so that the computer is automatically redirected to another device
IP telephony
Attackers can broadcast a ping request to all computers on the network but change the address from which the request came to that of the target
DNS
Attackers can broadcast a ping request to all computers on the network but change the address from which the request came to that of the target
ICMP
Attackers can broadcast a ping request to all computers on the network but change the address from which the request came to that of the target
Network discovery
Attackers can broadcast a ping request to all computers on the network but change the address from which the request came to that of the target
Smurf DoS attack
Attackers can broadcast a ping request to all computers on the network but change the address from which the request came to that of the target
Ping of Death
Attackers can broadcast a ping request to all computers on the network but change the address from which the request came to that of the target
SNMP
Attackers can broadcast a ping request to all computers on the network but change the address from which the request came to that of the target
DNS poisoning
Attackers can broadcast a ping request to all computers on the network but change the address from which the request came to that of the target
STA
Attackers can broadcast a ping request to all computers on the network but change the address from which the request came to that of the target
IP telephony
Using a data-based OP network to add digital voice clients and new voice applications onto the IP network
DNS
Using a data-based OP network to add digital voice clients and new voice applications onto the IP network
ICMP
Using a data-based OP network to add digital voice clients and new voice applications onto the IP network
Network discovery
Using a data-based OP network to add digital voice clients and new voice applications onto the IP network
Smurf DoS attack
Using a data-based OP network to add digital voice clients and new voice applications onto the IP network
Ping of Death
Using a data-based OP network to add digital voice clients and new voice applications onto the IP network
SNMP
Using a data-based OP network to add digital voice clients and new voice applications onto the IP network
DNS poisoning
Using a data-based OP network to add digital voice clients and new voice applications onto the IP network
STA
Using a data-based OP network to add digital voice clients and new voice applications onto the IP network
IP telephony
Used by devices to communicate updates or error information to other devices
DNS
Used by devices to communicate updates or error information to other devices
ICMP
Used by devices to communicate updates or error information to other devices
Network discovery
Used by devices to communicate updates or error information to other devices
Smurf DoS attack
Used by devices to communicate updates or error information to other devices
Ping of Death
Used by devices to communicate updates or error information to other devices
SNMP
Used by devices to communicate updates or error information to other devices
DNS poisoning
Used by devices to communicate updates or error information to other devices
STA
Used by devices to communicate updates or error information to other devices
IP telephony
Can determine that a switch has multiple ways to communicate with a host and then determine the best path while blocking out other paths
DNS
Can determine that a switch has multiple ways to communicate with a host and then determine the best path while blocking out other paths
ICMP
Can determine that a switch has multiple ways to communicate with a host and then determine the best path while blocking out other paths
Network discovery
Can determine that a switch has multiple ways to communicate with a host and then determine the best path while blocking out other paths
Smurf DoS attack
Can determine that a switch has multiple ways to communicate with a host and then determine the best path while blocking out other paths
Ping of Death
Can determine that a switch has multiple ways to communicate with a host and then determine the best path while blocking out other paths
SNMP
Can determine that a switch has multiple ways to communicate with a host and then determine the best path while blocking out other paths
DNS poisoning
Can determine that a switch has multiple ways to communicate with a host and then determine the best path while blocking out other paths
STA
Can determine that a switch has multiple ways to communicate with a host and then determine the best path while blocking out other paths
IP telephony
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/42
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 7: Administering a Secure Network
1
A ____ forwards packets across computer networks.

A) bridge
B) router
C) switch
D) hub
B
2
The most common protocol suite used today for local area networks (LANs) as well as the Internet is ____.

A) UDP
B) ASN.1
C) TCP/IP
D) BER
C
3
____ can be used to determine whether new IP addresses are attempting to probe the network.

A) DNS logs
B) Firewall logs
C) DHCP logs
D) Proxy logs
B
4
SNMP agents are protected with a password known as a(n) ____ in order to prevent unauthorized users from taking control over a device.

A) entity
B) community string
C) MIB
D) OID
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
5
It is possible to segment a network by physical devices grouped into logical units through a(n) ____.

A) VLAN
B) subnets
C) IP address
D) MAC address
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
6
Despite its promise to dramatically impact IT, cloud computing raises significant security concerns.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
7
TCP/IP uses its own five-layer architecture that includes Network Interface, Internet, Control, Transport, and Application.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
8
A ____ can create entries in a log for all queries that are received.

A) network log
B) DHCP log
C) DNS log
D) proxy log
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
9
IEEE 802.1x is commonly used on wireless networks.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
10
IP telephony and Voice over IP (VoIP) are identical.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
11
____ is used to relay query messages.

A) ICMP
B) FTP
C) UDP
D) TCP
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
12
TCP is responsible for addressing packets and sending them on the correct route to the destination, while IP is responsible for reliable packet transmission.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
13
Routers operate at the ____ Layer.

A) Transport
B) Application
C) Presentation
D) Network
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
14
IP is the protocol that functions primarily at the Open Systems Interconnection (OSI) ____.

A) Transport Layer
B) Network Layer
C) Data link Layer
D) Presentation Layer
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
15
The ____ is a database, organized as a hierarchy or tree, of the name of each site on the Internet and its corresponding IP number.

A) WINS
B) NIS
C) TACACS+
D) DNS
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
16
Broadcast storms can be prevented with ____.

A) spanning tree
B) Dijkstra's algorithm
C) 802.11x
D) loop protection
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
17
TCP is the main ____ protocol that is responsible for establishing connections and the reliable data transport between devices.

A) Application Layer
B) Presentation Layer
C) Network Layer
D) Transport Layer
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
18
TCP port ____ is the FTP control port used for passing FTP commands.

A) 19
B) 20
C) 21
D) 22
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
19
A ____ is a feature that controls a device's tolerance for unanswered service requests and helps to prevent a DoS attack.

A) flood guard
B) protocol guard
C) link guard
D) frame guard
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
20
DNS poisoning can be prevented by using the latest editions of the DNS software known as ____.

A) BIND
B) DHCP
C) WINS
D) finger
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
21
In the ____ cloud computing model, the customer has the highest level of control.

A) Cloud Application as a Service
B) Cloud Infrastructure as a Service
C) Cloud Software as a Service
D) Cloud System as a Service
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
22
____ is a pay-per-use computing model in which customers pay only for the computing resources they need.

A) Cloud computing
B) Virtualization
C) Cloud Software as a Service
D) Infrastructure as a Service
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
23
Server virtualization typically relies on the ____, which is software that runs on a physical computer to manage one or more virtual machine operating systems.

A) kernel
B) supervisor
C) hypercard
D) hypervisor
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
24
List and describe the three fields that each ICMP message contains.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
25
Describe one way to use FTP on a local host computer.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
26
In the ____ model, the cloud computing vendor provides access to the vendor's software applications running on a cloud infrastructure.

A) Cloud Application as a Service
B) Cloud Infrastructure as a Service
C) Cloud Software as a Service
D) Cloud System as a Service
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
27
Why is the Physical Layer omitted in the TCP/IP model?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
28
Discuss one security advantage to hosts running virtualization.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
29
What are the two types of community strings?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
30
____ is a means of managing and presenting computer resources by function without regard to their physical layout or location.

A) Portability
B) Virtualization
C) Availability
D) Migration assistance
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
31
____ provides a greater degree of security by implementing port-based authentication.

A) IEEE 802.3ad
B) IEEE 802.11n
C) IEEE 802.1x
D) IEEE 802.1z
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
32
The ____________________ Layer is omitted in the TCP/IP model.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
33
List the steps of a DNS lookup.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
34
With operating system virtualization, a(n) ____________________ system is the native operating system to the hardware.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
35
____________________ servers are intermediate hosts through which Web sites are accessed.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
36
List the steps in an 802.1x authentication procedure.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
37
Discuss the problems associated with storing the entire database of names and IP addresses in one location.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
38
____________________ computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort or service provider interaction.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
39
A(n) ____________________ is a record of events that occur.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
40
List and describe the three service models of cloud computing.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
41
List and describe three benefits offered by IP telephony.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
42
Match between columns
A malformed ping using ICMP is sent to the victim's computer that exceeds the size of an IP packet
DNS
A malformed ping using ICMP is sent to the victim's computer that exceeds the size of an IP packet
ICMP
A malformed ping using ICMP is sent to the victim's computer that exceeds the size of an IP packet
Network discovery
A malformed ping using ICMP is sent to the victim's computer that exceeds the size of an IP packet
Smurf DoS attack
A malformed ping using ICMP is sent to the victim's computer that exceeds the size of an IP packet
Ping of Death
A malformed ping using ICMP is sent to the victim's computer that exceeds the size of an IP packet
SNMP
A malformed ping using ICMP is sent to the victim's computer that exceeds the size of an IP packet
DNS poisoning
A malformed ping using ICMP is sent to the victim's computer that exceeds the size of an IP packet
STA
A malformed ping using ICMP is sent to the victim's computer that exceeds the size of an IP packet
IP telephony
Functions by exchanging management information between networked devices
DNS
Functions by exchanging management information between networked devices
ICMP
Functions by exchanging management information between networked devices
Network discovery
Functions by exchanging management information between networked devices
Smurf DoS attack
Functions by exchanging management information between networked devices
Ping of Death
Functions by exchanging management information between networked devices
SNMP
Functions by exchanging management information between networked devices
DNS poisoning
Functions by exchanging management information between networked devices
STA
Functions by exchanging management information between networked devices
IP telephony
An attacker can use ICMP messages as one of the first steps in reconnaissance to discover information about the hosts that are part of the network
DNS
An attacker can use ICMP messages as one of the first steps in reconnaissance to discover information about the hosts that are part of the network
ICMP
An attacker can use ICMP messages as one of the first steps in reconnaissance to discover information about the hosts that are part of the network
Network discovery
An attacker can use ICMP messages as one of the first steps in reconnaissance to discover information about the hosts that are part of the network
Smurf DoS attack
An attacker can use ICMP messages as one of the first steps in reconnaissance to discover information about the hosts that are part of the network
Ping of Death
An attacker can use ICMP messages as one of the first steps in reconnaissance to discover information about the hosts that are part of the network
SNMP
An attacker can use ICMP messages as one of the first steps in reconnaissance to discover information about the hosts that are part of the network
DNS poisoning
An attacker can use ICMP messages as one of the first steps in reconnaissance to discover information about the hosts that are part of the network
STA
An attacker can use ICMP messages as one of the first steps in reconnaissance to discover information about the hosts that are part of the network
IP telephony
Substitutes addresses so that the computer is automatically redirected to another device
DNS
Substitutes addresses so that the computer is automatically redirected to another device
ICMP
Substitutes addresses so that the computer is automatically redirected to another device
Network discovery
Substitutes addresses so that the computer is automatically redirected to another device
Smurf DoS attack
Substitutes addresses so that the computer is automatically redirected to another device
Ping of Death
Substitutes addresses so that the computer is automatically redirected to another device
SNMP
Substitutes addresses so that the computer is automatically redirected to another device
DNS poisoning
Substitutes addresses so that the computer is automatically redirected to another device
STA
Substitutes addresses so that the computer is automatically redirected to another device
IP telephony
Attackers can broadcast a ping request to all computers on the network but change the address from which the request came to that of the target
DNS
Attackers can broadcast a ping request to all computers on the network but change the address from which the request came to that of the target
ICMP
Attackers can broadcast a ping request to all computers on the network but change the address from which the request came to that of the target
Network discovery
Attackers can broadcast a ping request to all computers on the network but change the address from which the request came to that of the target
Smurf DoS attack
Attackers can broadcast a ping request to all computers on the network but change the address from which the request came to that of the target
Ping of Death
Attackers can broadcast a ping request to all computers on the network but change the address from which the request came to that of the target
SNMP
Attackers can broadcast a ping request to all computers on the network but change the address from which the request came to that of the target
DNS poisoning
Attackers can broadcast a ping request to all computers on the network but change the address from which the request came to that of the target
STA
Attackers can broadcast a ping request to all computers on the network but change the address from which the request came to that of the target
IP telephony
Using a data-based OP network to add digital voice clients and new voice applications onto the IP network
DNS
Using a data-based OP network to add digital voice clients and new voice applications onto the IP network
ICMP
Using a data-based OP network to add digital voice clients and new voice applications onto the IP network
Network discovery
Using a data-based OP network to add digital voice clients and new voice applications onto the IP network
Smurf DoS attack
Using a data-based OP network to add digital voice clients and new voice applications onto the IP network
Ping of Death
Using a data-based OP network to add digital voice clients and new voice applications onto the IP network
SNMP
Using a data-based OP network to add digital voice clients and new voice applications onto the IP network
DNS poisoning
Using a data-based OP network to add digital voice clients and new voice applications onto the IP network
STA
Using a data-based OP network to add digital voice clients and new voice applications onto the IP network
IP telephony
Used by devices to communicate updates or error information to other devices
DNS
Used by devices to communicate updates or error information to other devices
ICMP
Used by devices to communicate updates or error information to other devices
Network discovery
Used by devices to communicate updates or error information to other devices
Smurf DoS attack
Used by devices to communicate updates or error information to other devices
Ping of Death
Used by devices to communicate updates or error information to other devices
SNMP
Used by devices to communicate updates or error information to other devices
DNS poisoning
Used by devices to communicate updates or error information to other devices
STA
Used by devices to communicate updates or error information to other devices
IP telephony
Can determine that a switch has multiple ways to communicate with a host and then determine the best path while blocking out other paths
DNS
Can determine that a switch has multiple ways to communicate with a host and then determine the best path while blocking out other paths
ICMP
Can determine that a switch has multiple ways to communicate with a host and then determine the best path while blocking out other paths
Network discovery
Can determine that a switch has multiple ways to communicate with a host and then determine the best path while blocking out other paths
Smurf DoS attack
Can determine that a switch has multiple ways to communicate with a host and then determine the best path while blocking out other paths
Ping of Death
Can determine that a switch has multiple ways to communicate with a host and then determine the best path while blocking out other paths
SNMP
Can determine that a switch has multiple ways to communicate with a host and then determine the best path while blocking out other paths
DNS poisoning
Can determine that a switch has multiple ways to communicate with a host and then determine the best path while blocking out other paths
STA
Can determine that a switch has multiple ways to communicate with a host and then determine the best path while blocking out other paths
IP telephony
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 42 flashcards in this deck.