CIS 330 Exam 5 Short Answer

Ace your homework & exams now with Quizwiz!

What are some of the different reasons to use VLANs?

- Isolating connections with heavy traffic patterns. - Indentifying groups of devices whose data should be given priority handling - Configuring temporary networks - Reducing the cost of networking equipment

What are the differences between and default VLAN and native VLAN?

-a default VLAN is preconfigured on a switch and includes all the switch's ports - a native VLAN receives all untamed grams from untagged ports. This could pose a security risk when untagged traffic is allowed in a VLAN-managed network

What is hashing and how does it differ from encryption?

Hashing is a one way function that mixes up plain text and can only be reverse with the proper algorithm. Encryption is a two way function where is can be encrypted and decrypted.

List and describe the four different locations that antimalware can be installed

Host-based Server-based Network-based Cloud-based

What is a VLSM and how is it created?

A Virtual Length Subnet Mask is a subletting method that allows subnets to be divided into smaller groupings. It is created by a large subnet then splitting it up starting with the largest subnets to make sure they have the space they need.

How does a zero-day exploit differ from a typical exploit?

Attackers release malware once a flaw has been exploited before it can be patched.

Why might an organization be required to undergo a security audit?

So the any weakness may be detected by interviewing staff, performing vulnerability scans and analyzing physical security

What are some of the types of hackers?

White hat, black hat and gray hat

How to unmanaged switches and managed switches differ?

Unmanaged switches cannot support VLANs, whereas managed switches can if their ports can be portioned into groups.

What is vulnerability scanning and what are two types of vulnerability scans?

Vulnerability scanning is a program than scans for weaknesses on computer or on a network. The two types are authenticated and unauthenticated

When a hack attempts to perform a VLAN hopping attack, what are the two approaches likely to be used?

double tagging and switch spoofing

What are some common config errors that can occur when confirming VLANs?

incorrect port mode, incorrect VLAN assignment, VLAN isolation

What are some of the characteristics that make hacking difficult to detect?

qwerty


Related study sets

L'amour et le mariage (love and marriage)

View Set

7.1 The Kidney: Function, Anatomy, the Nephron and Glomerulus

View Set